Universal Middle-Range Nursing Theory: The Neuman Model Theory Essay

Total Length: 1799 words ( 6 double-spaced pages)

Total Sources: 3

Page 1 of 6

Internet Plan for Healthcare Facilities

A suitable IT plan for an electronic inventory control and communication for the 10 healthcare facilities in Gainesville, Florida will have voice or data communication between and among the Corporation, the master practice and the individual practices (China Mobile, 2011). It can provide or extend telehealth or eHealth devices through the network. It can also use mobile phones and similar devices for local health operations, which utilize the main network (China Mobile).

These top-of -- the line applications or devices are fast enabling healthcare operations in both the economically advanced and the developing countries (China Mobile, 2011). Through their skillful use, they can reach un-served and under-served populations, raise the level of efficiency of these operations, and cut down on costs of healthcare delivery, as a consequence. As consequences, they contribute to the effectiveness of public health programs and research, help prevent and treat disease of both mind and body, and reduce hospital visits and stays (China Mobile).

This type of hook-up internet setup, using the tablet-type device, can perform healthcare functions and activities speedily (China Mobile, 2011). These devices also allow self-diagnostics, supervision of long-term treatments, dispatch of clinical information from source to destinations in a flash, transmission of public messages, soliciting and recruiting of data on public health, personnel administration and control and supervision of supplies. These mobile networks' capabilities can be further enhanced by high-resolution images, video and voluminous file exchanges to the advantage of all the patients and the professionals at the practices and the Corporation. All of them can benefit from the capabilities of new-generation smartphones' computing power, vast storage and versatility in fitting many applications (China Mobile).

II. Network Security Plan

A strategic emergency plan for Sunshine Health Corporation should be in place and always ready for any eventuality (FCC, 2015). It is essentially a healthcare information system, which focuses on the protection of electronic medical records or EMR, and a reliable network security mechanism (Yoder, 2015). This security mechanism should comply with the guidelines of the Health Insurance Portability and Accountability Act or HIPAA, which specifically addresses IT-based health information systems. These are organizational data, personal records, intellectual property, and customer records. The network mechanism is devoted to the movement of all clinical and patient data from written records to the digital form in a database converted by software applications. It directs the flow of clinical work and office operations and administration (Yoder).

Selection of an EMR Provider

EMR providers sell their services on outsource basis as a third party (Yoder, 2015). The client, or Sunshine Health Corporation, should analyze the kind of EMR service it really needs before looking for one. The provider should be suitable to the company's administrative and clinical needs. Some EMR providers offer the precise service a company needs, such as information management. Computer and network systems should be carefully monitored and protected to ward off loss of data or inactivity (Yoder).

Stuck Writing Your "Universal Middle-Range Nursing Theory: The Neuman Model Theory" Essay?



Compliance with HIPAA Requirements

HIPAA rules and requirements guard the privacy and security of public health records (Yoder, 2015). The Corporation's network systems on data transfer and storage should thus comply with HIPAA regulations. The EMR provider, which is already complying to these regulations and offers network security solutions and off-site data backup according to HIPAA rules and requirements, is the right provider for the Corporation (Yoder).

Designing an Emergency-Mode Network Security Plan

A network security plan in this mode will always be ready for the unforeseen and prevent or reduce disruption of the delivery of essential services (FCC, 2015). The objective of this plan is to insure that operations remain un-interrupted and communication systems and network stay secure and operable at all times. The three phases are preparation, response and recovery.

Preparation

An apt and proactive network security plan prepares for communications and the continuity of operations, back-up communications, a wide range of communication systems, emergency notifications, security, power, test equipment and agreements on mutual aid (FCC, 2015). Communications and the continuity of operations consist of operational processes and procedures protective of computers, records and backed-up databases; recovery processes for assessment, repair or restoration, alternative solutions, analysis after an event, and updates of a management plan; communications response team, which will implement the security plan; training of the communications leader and others involved in communication coordination during an event; employee training exercises on all the phases of any event; employee contact lists of important telephone and cell phone numbers and email addresses, which should be regularly updated; priority services, such as three major federal programs for priority call queuing and provisions or restoration of major communication circuits, namely the telecommunications service priority program or TSP, Government Emergency Telecommunications Service Program or GETS; and the Wireless Priority Service Program or WPS; and alternate operations sites, which should be able to sustain IT and communications activities. Preparing back-up or redundant communications should also consider many types of communication systems, which include last-mile connectivity, internal infrastructure, hardware back-up, hardening and alternate routing, uninterrupted power supply and the proximate and market availability of replacement parts. Emergency notifications, such as structure-wide intercom systems, wire phone messages, emails and face-to-face communication, especially during crises. These systems should remain functional despite power failure. Disabled and other vulnerable employees should be especially informed and prepared to obey or cooperate with the plan. Security facilities should shield vital communications and IT equipment and only experienced personnel should be allowed to operate them and have access to them. Virus protection and similar software should be installed, run and regularly updated. Power sources should be insured at all times from commercial providers for extended periods of crisis. Backups like generators, solar power and batteries should be ready at all times in times of power failure. The Corporation may obtain new radios powered by off-the-shelf alkaline batteries with correct adapters......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Universal Middle-Range Nursing Theory The Neuman Model Theory" (2015, June 28) Retrieved May 13, 2024, from
https://www.aceyourpaper.com/essays/universal-middle-range-nursing-theory-neuman-2151409

Latest MLA Format (8th edition)

Copy Reference
"Universal Middle-Range Nursing Theory The Neuman Model Theory" 28 June 2015. Web.13 May. 2024. <
https://www.aceyourpaper.com/essays/universal-middle-range-nursing-theory-neuman-2151409>

Latest Chicago Format (16th edition)

Copy Reference
"Universal Middle-Range Nursing Theory The Neuman Model Theory", 28 June 2015, Accessed.13 May. 2024,
https://www.aceyourpaper.com/essays/universal-middle-range-nursing-theory-neuman-2151409