In the media introduction to this module, it was suggested that you as a nurse have an important role in the Systems Development Life Cycle (SDLC). With a focus on patient care and outcomes, nurses may not always see themselves as contributors to the development of new systems. However, as you may have observed in your own experience, exclusion of nurse contributions when implementing systems can have dire consequences.
In this Discussion, you will consider the role you might play in systems development and the ramifications of not being an active participant in systems development.
- Review the steps of the Systems Development Life Cycle (SDLC) as presented in the Resources.
- Reflect on your own healthcare organization and consider any steps your healthcare organization goes through when purchasing and implementing a new health information technology system.
- Consider what a nurse might contribute to decisions made at each stage of the SDLC when planning for new health information technology.
Homework:- Post a 3 Paragraph description of what you believe to be the consequences of a healthcare organization not involving nurses in each stage of the SDLC when purchasing and implementing a new health information technology system. Provide specific examples of potential issues at each stage of the SDLC and explain how the inclusion of nurses may help address these issues. Then, explain whether you had any input in the selection and planning of new health information technology systems in your nursing practice or healthcare organization and explain potential impacts of being included or not in the decision-making process. Be specific and provide examples.
Kindly use these 3 references below:
2. Laureate Education (Producer). (2018). Interoperability, Standards, and Security [Video file]. Baltimore, MD: Author
3. McGonigle, D., & Mastrian, K. G. (2017). Nursing informatics and the foundation of knowledge (4th ed.). Burlington, MA: Jones & Bartlett Learning.
- Chapter 9, “Systems Development Life Cycle: Nursing Informatics and Organizational Decision Making” (pp. 175–187)
- Chapter 12, “Electronic Security” (pp. 229–242)
- Chapter 13, “Workflow and Beyond Meaningful Use” (pp. 245–261)