Author: PAPERLINK

  • Protected Health Information

    The post Protected Health Information is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    For this assessment, you will prepare a two-page interprofessional staff update on HIPAA and appropriate social media use in health care. Before you complete the detailed instructions in the courseroom, first select one of the settings below that will become the focus of your interprofessional staff update. After you have selected one of the two settings below, return to the courseroom to review the assessment instructions and grading rubric prior to completing your assessment.

    • Palliative and Hospice Care Settings: o Context: Palliative and hospice care settings focus on providing relief from the

    symptoms and stress of serious illnesses. The goal is to improve the quality of life for both the patient and the family. These settings can be in a patient’s home, a hospice facility, or a hospital. Given the emotionally charged nature of end-of- life care, the relationships between healthcare providers, patients, and families are deeply personal and sensitive.

    o Social Media Concern: Sharing emotional moments, patient stories, or even reflections on end-of-life care can inadvertently disclose private patient and family details. Given the vulnerability of this patient population, any breach of information can be particularly distressing for families.

    • Intensive Care Units (ICUs):

    o Context: ICUs are specialized hospital departments that provide critical care to patients with severe or life-threatening illnesses and injuries. Patients in ICUs often require close monitoring and advanced medical equipment. The nature of care in ICUs is intense, with patients often at a high risk and in unstable conditions. Families are deeply involved, and emotions run high.

    o Social Media Concern: Given the critical state of many ICU patients, sharing updates, discussing challenging cases, or even reflecting on patient outcomes can inadvertently disclose sensitive patient information. Even a seemingly harmless post about a long shift or a challenging night can contain context clues that breach patient confidentiality.

    The post Protected Health Information appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Protected Health Information (PHI): Privacy, Security, and Confidentiality Best Practices

    The post Protected Health Information (PHI): Privacy, Security, and Confidentiality Best Practices is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Protected Health Information (PHI): Privacy, Security, and Confidentiality Best Practices

    prepare a 2 page interprofessional staff update on HIPAA and appropriate social media use in health care.

    INTRODUCTION

    Health care providers today must develop their skills in mitigating risks to their patients and themselves related to patient information. At the same time, they need to be able distinguish between effective and ineffective uses of social media in health care.

    This assessment will require you to develop a staff update for an interprofessional team to encourage team members to protect the privacy, confidentiality, and security of patient information.

    PROFESSIONAL CONTEXT

    Health professionals today are increasingly accountable for the use of protected health information (PHI). Various government and regulatory agencies promote and support privacy and security through a variety of activities. Examples include:

    · Meaningful use of electronic health records (EHR).

    · Provision of EHR incentive programs through Medicare and Medicaid.

    · Enforcement of the Health Insurance Portability and Accountability Act (HIPAA) rules.

    · Release of educational resources and tools to help providers and hospitals address privacy, security, and confidentiality risks in their practices.

    Technological advances, such as the use of social media platforms and applications for patient progress tracking and communication, have provided more access to health information and improved communication between care providers and patients.

    At the same time, advances such as these have resulted in more risk for protecting PHI. Nurses typically receive annual training on protecting patient information in their everyday practice. This training usually emphasizes privacy, security, and confidentiality best practices such as:

    · Keeping passwords secure.

    · Logging out of public computers.

    · Sharing patient information only with those directly providing care or who have been granted permission to receive this information.

    Today, one of the major risks associated with privacy and confidentiality of patient identity and data relates to social media. Many nurses and other health care providers place themselves at risk when they use social media or other electronic communication systems inappropriately. For example, a Texas nurse was recently terminated for posting patient vaccination information on Facebook. In another case, a New York nurse was terminated for posting an insensitive emergency department photo on her Instagram account.

    PREPARATION

    As you begin to consider the assessment, it would be an excellent choice to complete the Breach of Protected Health Information (PHI) activity. The activity will support your success with the assessment by creating the opportunity for you to test your knowledge of potential privacy, security, and confidentiality violations of protected health information. The activity is not graded and counts towards course engagement.

    To successfully prepare to complete this assessment, complete the following:

    · Review the settings presented in the  Assessment 02 Supplement: Protected Health Information [PDF]  Download Assessment 02 Supplement: Protected Health Information [PDF] resource and select one to use as the focus for this assessment.

    · Review the infographics on protecting PHI provided in the resources for this assessment, or find other infographics to review. These infographics serve as examples of how to succinctly summarize evidence-based information.

    · Analyze these infographics and distill them into five or six principles of what makes them effective. As you design your interprofessional staff update, apply these principles.  Note: In a staff update, you will not have all the images and graphics that an infographic might contain. Instead, focus your analysis on what makes the messaging effective.

    · Select from any of the following options, or a combination of options, as the focus of your interprofessional staff update:

    · Social media best practices.

    · What not to do: social media.

    · Social media risks to patient information.

    · Steps to take if a breach occurs.

    · Conduct independent research on the topic you have selected in addition to reviewing the suggested resources for this assessment. This information will serve as the source(s) of the information contained in your interprofessional staff update. Consult the  BSN Program Library Research Guide  for help in identifying scholarly and/or authoritative sources.

    SCENARIO

    In this assessment, imagine you are a nurse in one of the health care settings described in the following resource:

    · Assessment 02 Supplement: Protected Health Information [PDF] Download Assessment 02 Supplement: Protected Health Information [PDF]

    Assessment 01 – Nursing Informatics in Health Care For this assessment, you will write a 4–5 page evidence-based proposal to support the need for a nurse informaticist in an organization who would focus on improving health care outcomes. Before you complete the detailed instructions in the courseroom, first review the focus of the new nurse informaticist position you will propose by examining the description below. You will write your evidence-based proposal to support the need for a new nurse informaticist who would focus on enhancing patient education through digital platforms. • Enhancing Patient Education through Digital Platforms: o Background: Patient education is crucial for improving adherence to treatment plans and promoting self-management of chronic conditions. o Benefits: Digital platforms, such as patient portals and mobile apps, can provide patients with easy access to accurate and reliable educational materials, leading to better understanding and management of their health. This meets many patients where they are and provides opportunities to provide personalized education tailored to a patient’s specific conditions and needs. Such tools often take the forms of interactive multimedia that can also improve patient understanding.

    Before your shift begins, you scroll through Facebook and notice that a coworker has posted a photo of herself and a patient on Facebook and described how happy she is that her patient is making great progress. You have recently completed your annual continuing education requirements at work and realize this is a breach of your organization’s social media policy. Your organization requires employees to immediately report such breaches to the privacy officer to ensure the post is removed immediately and that the nurse responsible receives appropriate corrective action.

    You follow appropriate organizational protocols and report the breach to the privacy officer. The privacy officer takes swift action to remove the post. Due to the severity of the breach, the organization terminates the nurse.

    Based on this incident’s severity, your organization has established a task force with two main goals:

    · Educate staff on HIPAA and appropriate social media use in health care.

    · Prevent confidentiality, security, and privacy breaches.

    The task force has been charged with creating a series of interprofessional staff updates on the following topics:

    · Social media best practices.

    · What not to do: Social media.

    · Social media risks to patient information.

    · Steps to take if a breach occurs.

    PROPOSAL FORMAT

    The chief nursing officer (CNO) and human resources (HR) manager have asked you to include the headings below in your  proposal and to be sure to address the bullets following each heading. Remember that you will emphasize the focus of the new nurse informaticist position as described in the  Assessment 01 Supplement: Nursing Informatics in Health Care [PDF]  Download Assessment 01 Supplement: Nursing Informatics in Health Care [PDF]resource.

    Nursing Informatics and the Nurse Informaticist

    · What is nursing informatics?

    · What is the role of the nurse informaticist?

    Nurse Informaticists and Other Health Care Organizations

    · What is the experience of other health care organizations with nurse informaticists?

    · How do these nurse informaticists interact with the rest of the nursing staff and the interdisciplinary team?

    Impact of Full Nurse Engagement in Health Care Technology

    · How does fully engaging nurses in health care technology impact:

    · Patient care?

    · Protected health information (security, privacy, and confidentiality)?

    · In this section, you will explain evidence-based strategies that the nurse informaticist and interdisciplinary team can use to effectively manage patients’ protected health information, particularly privacy, security, and confidentiality. Evidence-based means that they are supported by evidence from scholarly sources.

    · Workflow?

    · Costs and return on investment?

    Opportunities and Challenges

    · What are the opportunities and challenges for nurses and the interdisciplinary team with the addition of a nurse informaticist role?

    · How can the  interdisciplinary team collaborate to improve quality care outcomes through technology?

    Summary of Recommendations

    · What are 3–4 key takeaways from your  proposal about the recommended nurse informaticist role that you want the CNO and the HR manager to remember?

    · This is the section where the justification for the implementation of the nursing informaticist role is addressed. Remember to include evidence from the literature to support your recommendation.

    ADDIOTAL REQUIREMENTS

    · Written communication: Ensure written communication is free of errors that detract from the overall message.

    · Submission length: 4–5 double-spaced pages, in addition to title and references pages.

    · Font: Times New Roman, 12 point.

    · Citations and References: Cite a  minimum of three current scholarly and/or authoritative sources to support your ideas. In addition, cite a  minimum of one current professional blog or website to support your central ideas.  Current means no more than five years old.

    · APA formatting: Be sure to follow APA formatting and style guidelines for citations and references. For an APA refresher, consult the  Evidence and APA  page on Campus.

    By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and scoring guide criteria:

    · Competency 1: Describe nurses’ and the interdisciplinary team’s role in informatics with a focus on electronic health information and patient care technology to support decision making.

    · Define nursing informatics and the role of the nurse informaticist.

    · Explain how the nurse collaborates with the interdisciplinary team, including technologists, to improve the quality of patient care.

    · Justify the need for a nurse informaticist in a health care organization.

    · Competency 2: Implement evidence-based strategies to effectively manage protected health information.

    · Explain evidence-based strategies that the nurse and interdisciplinary team can use to effectively manage patients protected health information (privacy, security, and confidentiality).

    · Competency 5: Apply professional, scholarly communication to facilitate use of health information and patient care technologies.

    · Follow APA style and formatting guidelines for citations and references.

    · Create a clear, well-organized, and professional proposal that is generally free from errors in grammar, punctuation, and spelling.

    The post Protected Health Information (PHI): Privacy, Security, and Confidentiality Best Practices appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • PSY-358 Topic 1: Developmental Forces and Successful Aging Survey and Research

    The post PSY-358 Topic 1: Developmental Forces and Successful Aging Survey and Research is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Part I: Biopsychosocial Forces

    Define each of the major developmental forces below and include at least three examples for each.

    · Biological:

    · Definition:

    · Examples:

    · Psychological:

    · Definition:

    · Examples:

    · Sociocultural:

    · Definition:

    · Examples:

    · Life cycle:

    · Definition:

    · Examples:

    Part II: Interviewee Responses

    In 75-100-words per age category/interviewee, summarize the significant forces that have shaped their lives. Hint: you might ask questions like, “How do you think your culture (e.g., religion, ethnicity), generation, education, etc. influenced your life?”

    · Responses for early-adulthood interviewee (20s-40s)

    · Responses for middle-adulthood interviewee (40s-60s):

    · Responses for late-adulthood interviewee (65 and over):

    Which force(s) had the strongest influence on your interviewee’s development (e.g., mental, physical, spiritual)? (50-75 words) Hint: This might be different for each of your interviewees but try to find commonalities if possible.

    In 75-100 words, discuss how their response lines up with academic research. Hint: you might share research that supports or refutes one of their experiences with child rearing, divorce, racism, trauma, addiction, career, etc.

    Part III: Successful Aging

    In 50-75 words per question, please answer the following:

    · Interview each person regarding their perception of “successful aging” and summarize your results. Hint: What advice did they give you? What might they have done differently?

    · What commonalities did your interviewees share, if any?

    · Do you feel their age influenced their response? Why or why not?

    · What other factors influenced their responses (e.g., spiritual beliefs, physical health)?

    · How do their responses line up with the academic research? Hint: you might share a study that aligns with their advice

    The post PSY-358 Topic 1: Developmental Forces and Successful Aging Survey and Research appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Literature Review

    The post Literature Review is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Go back to the last Paper and see what sources may help in writing this next Paper. You do not have to use all of them, but you will certainly use some.

    · Get sources from  Quantic FoundryLinks to an external site. to help provide data on the motivators and demographics. 

    · Decide if there is enough info to provide an audience info about what the demographics think about the motivators and at least one clear reason why (for each). If there is move on. If not, find additional college appropriate sources to fill out the info. Quantic Foundry’s experts have done MANY scholarly essays, and Nick Yee also write a book, that you can find in the library. 

    · Take the sources and create a full APA references page.

    · Start with a correct APA title page.

    · Have the References page follow, making sure to conform to APA formatting and citation guidelines. 

    If you have it, start with the draft you were working on in class. If not, use the Intro and hypothesis draft.

    · After the intro paragraph, present your completed literature review.

    · This will cover several paragraphs, at least four, possibly more.

    · Make sure each paragraph starts with a topic sentence that presents a single focused idea about your motivators and demographic. For example, this particularly demographic feels this way about my first motivator because…

    · For each paragraph, make sure to use your source info to illustrate the topic sentence. Info can include the Quantic Foundry data, data from other sources, info from sources–including Quantic Foundry– on what a demographic feels and why, etc. 

    · Make sure that you explain and interpret the source material you present.

    · Explain how the source material goes together to illustrate the topic sentence. 

    · Cite all source material following APA guidelines.

    · Summarize and bring all of the material together in a “concluding” paragraph that ends with your hypothesis.

    · Submit this is full APA format.

    The post Literature Review appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • What theories did you observe through watching the videos?

    The post What theories did you observe through watching the videos? is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    What theories did you observe through watching the videos? Be specific with mentioning the theories and where you observed them. You should include a description of at least three theories. Be sure to describe what was happening in the video that allowed you to connect it to these three theories. You can reference all or some of the videos. (THEORIES FROM TEXTBOOK LINKED BELOW)

    · Describe at least three specific strategies that you noted in the videos that you can use in your classroom. What makes you believe that these strategies will be effective in your classroom? How will these strategies impact teaching and learning.

    · Was there anything in the videos that surprised you? Explained why you were surprised by this in the video. If nothing surprised you explained why and how you would improve parts of the video.

    · What did you observe that you would not include in your classroom? Why would you not include this into your classroom?

    You will have a total of 8 questions answered (4 questions for each section).

    You will divide your paper into three sections that say: Section One, Section Two, and Section Three. You can copy and paste the questions into your paper. You can answer each question fully.

    The post What theories did you observe through watching the videos? appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • The following MIPS Code is executed using the single cycle MIPS architecture

    The post The following MIPS Code is executed using the single cycle MIPS architecture is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Question 1: The following MIPS Code is executed using the single cycle MIPS architecture. Include all iterations of the loop while answering the questions. Start: addiu $t6, $0, 64

    addi $t8, $0, 8 add $s1, $s0, $t8 Loop: slt $t0, $s0, $s1 beq $t0, $0, Exit lbu $t1, 0($s0) sub $t1, $t1, $t6 sb $t1, 0($s0) addi $s0, $s0, 1 j Loop Exit:

    (a) Data Path – For the given code, write the Functional Units used in order.

    • Specify if any Functional Units (FUs) are used at the same time for the same instruction, for example PC+4 Adder is used while Instruction Memory is in use.

    • For Multiplexors, if the output of the MUX is used, then it implies that the MUX is used (i.e., if the select lines are 0 or 1 and not don’t cares, then the MUX is used). Similarly, if any FU output is unused, we assume that the FU is unused.

    • You may group the instructions with the same datapath. • You may use the following notations for the Functional Units or the image on the next

    page. Instruction Memory (IM), Data Memory (DM), Register File (RF), Arithmetic and Logical Unit (ALU), Program Counter Register (PC), Sign Extension block (SE), Control Unit (ctrl1), ALU control unit (ctrl2), PC+4 Adder (add1), Branch PC target Adder (add2), Shift Left 2 (sll), Regdst MUX (mux1), ALUSrc MUX (mux2), MemtoReg MUX (mux3), PCSrc MUX (mux4), Jump MUX (mux5).

    (b) Control Path – For the given code, write the values of the control signals for each instruction.

    • You may group the instructions with the same control signals. • The control signals to be included are: ALUOp, ALU control output (ALU ctrl),

    Branch, Jump, PCSrc, Regdst, ALUSrc, MemtoReg, RegWrite, MemRead and MemWrite

    Instr ALU

    Op ALU ctrl

    Reg dst

    ALU Src

    Memto Reg

    Branch Jump PC Src

    Reg Write

    Mem Read

    Mem Write

    (c) Execution Time – For the given code, compute the execution time for each instruction and for the complete code based on the following information.

    (i) Given the following access times for the critical functional units, compute the time taken to execute each instruction.You may group the instructions with the same execution time.

    Memory Access = 0.25ns; Register Access = 0.13ns; ALU execution = 0.18ns

    (ii) Assuming all instructions are executed using a fixed clock cycle length. What is the execution time for the complete code/program?

    Question 2: The following MIPS Code is executed using the MIPS multicycle architecture. Include all iterations of the loop. Initial values for the registers are: $s0 = 0x230, $s1 = 0x240 and $t1 = 1

    Loop: slt $t0, $s0, $s1 beq $t0, $0, Exit lbu $t1, 0($s0) sub $t1, $t1, $t6 sb $t1, 0($s0) add $s0, $s0, $t1 j Loop Exit:

    (a) Data Path – For the given code, trace the steps of execution using the image below.

    (b) Control Path – For the given code, write the values of the control signals for each instruction.

    • You may group the instructions with the same control signals. • The control signals to be included are: ALUOp, ALU control output (ALU ctrl), IorD,

    ALUSrcA, ALUSrcB, IRWrite, PCWrite, PCWriteCond, PCSource, Regdst, RegWrite, MemRead and MemWrite

    (c) Execution Time – For the given code, compute the execution time for the program with Processor clock rate 4GHz.

    Question 3: The following MIPS Code is executed using the MIPS pipeline architecture. Include all iterations of the loop. For the given code, write the Pipeline Implementation by resolving all the three hazards using stalls or Hardware, based on the provided assumptions for each part. Start: addiu $s1, $0, 0x1234

    addi $s0, $0, 0x122C Loop: lb $t1, 0($s0) sb $t1, 2($s0) nor $t2, $t1, $t1 sb $t2, 0($s0) addi $s0, $s0, 4 bne $s0, $s1, Loop Exit: addi $s0, $0, 0x122C

    (a) Consider the following assumptions: (only structural hazards are resolved in hardware, other hazards have to be resolved with stall/nop.)

    • There is separate instruction and data memory access. • Register read and write can happen within the same clock cycle. • There is NO Forwarding unit and NO Hazard detection Unit. • Use stall if an instruction is delayed after fetch. • Use nop if an instruction is delayed before fetch.

    (b) Consider the following assumptions: (structural and data hazards are resolved using hardware, other hazards have to be resolved with stall/nop.)

    • There is separate instruction and data memory access. • Register read and write can happen within the same clock cycle. • There is Forwarding unit. Show data forwarding between the correct stages, wherever

    necessary. • There is NO Hazard detection Unit, i.e., no resolution for control hazards in hardware. • Use stall if an instruction is delayed after fetch. • Use nop if an instruction is delayed before fetch.

    (c) Consider the following assumptions: (all hazards are resolved using hardware)

    • There is separate instruction and data memory access. • Register read and write can happen within the same clock cycle. • There is Forwarding unit. Show data forwarding between the correct stages, wherever

    necessary. • There is Hazard detection Unit to detect mispredictions and flush if necessary. • The 2-bit branch prediction scheme is used with initial prediction being weakly Not Taken. • There is Branch target Buffer (BTB) containing target address for the branch instruction. • Use stall if an instruction is delayed after fetch. • Use nop if an instruction is delayed before fetch.

    Question 4: The following MIPS Code is executed using the MIPS 2-issue pipeline architecture. Include all iterations of the loop. For the given code, show the steps in unrolling the loop and write the 2-issue VLIW pipeline representing the order of issuing the instructions from the loop unrolled code. Start: addi $s0, $s1, 32 Loop: lb $t1, 0($s0) sb $t1, 2($s0) nor $t2, $t1, $t1 sb $t2, 0($s0) addi $s0, $s0, -8 bne $s0, $s1, Loop Exit:

    The post The following MIPS Code is executed using the single cycle MIPS architecture appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Why is advocacy necessary in the field of psychology?

    The post Why is advocacy necessary in the field of psychology? is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Prompt

    Why is advocacy necessary in the field of psychology?

    Parameters

    · Identify one major point from the readings that was a new learning point for you

    · Retrieve one article/citation about advocacy in psychology

    · Apply what you learned from reading this additional article

    · Address how reading this additional article built upon the major point(s) from the readings

    · Discuss contradictory information from the article to the readings’ main point(s)

    · Your initial post should follow APA guidelines

    Your initial post should read 500 to 600 words, with the accompanying citations/references in APA format. To receive the maximum points, your post should include citations/references from all of this week’s readings and an additional article of your choosing.

    The post Why is advocacy necessary in the field of psychology? appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • For this assignment, you will need to put together a slide presentation with audio narrations about your project

    The post For this assignment, you will need to put together a slide presentation with audio narrations about your project is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    For this assignment, you will need to put together a slide presentation with audio narrations about your project. Be sure the format you use supports an audio function (i.e., PowerPoint). This should be presented similar to a research project. Therefore, your presentation should mirror the format of the final written report. You should include an introduction section, where you introduce the problem behavior, why it is a problem and what the end goal of your project was. Then you should introduce your methods. How did you try and change this behavior? Then have a results section with data. This means you should include at least one graph/chart/table to display your results. This figure should present a summary of your data. Do not include your raw data. For example, you might want to graph the percentage of successes you had across weeks. Then you should have a conclusion section where you share your success and the challenges that you encountered. Remember, slides are visual aids to your narrations. Therefore, slides should have lots of pictures and graphics and relatively few words. Do not write what you are planning to say on your slides. This makes for a dull presentation.

    Parameters

    · Narration should be approximately 10 minutes

    · Please access this document

    · Links to an external site.

    · for support on recording a presentation with narration

    · This will typically be 10 to 15 slides

    · Don’t forget to include citations if you reference other’s work.

    The post For this assignment, you will need to put together a slide presentation with audio narrations about your project appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Develop an experiment that would allow you to distinguish between a Pavlovian SSDR and an instrumental avoidance response

    The post Develop an experiment that would allow you to distinguish between a Pavlovian SSDR and an instrumental avoidance response is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Develop an experiment that would allow you to distinguish between a Pavlovian SSDR and an instrumental avoidance response, and explain how you would know which type of response was occurring. Be sure to indicate what you independent and dependent variables are and how your results would distinguish between these possibilities. Parameters

    · Initial post should be at least 200 words

    · APA format

    The post Develop an experiment that would allow you to distinguish between a Pavlovian SSDR and an instrumental avoidance response appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Create a short 3 to 5-minute patient education video

    The post Create a short 3 to 5-minute patient education video is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    For your signature assignment you will create a short 3 to 5-minute patient education video. The video is intended to be a teaching tool that you could use for a patient and family who is newly diagnosed with a psychiatric illness.

    Select one of the following diagnoses covered this term: Major Depressive Disorder, Generalized Anxiety Disorder, Bipolar Disorder, Schizophrenia, Attention Deficit/ Hyperactivity Disorder, Post-Traumatic Stress Disorder, Obsessive-Compulsive Disorder, Eating disorder.

    Create a patient education video using an innovative platform such as Biteable, Animaker, Canva, or other  video creation tool . The video should include:

    · A description of the diagnosis and common symptoms using lay terms

    · A holistic treatment plan that includes: One medication, one specific therapy, and one evidenced based non-pharmacologic treatment that are used for this diagnosis. Briefly explain how each will help the patient.

    · Appropriate resources for patients to get further information and/ or support

    · The last slide should include your references

    The post Create a short 3 to 5-minute patient education video appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper