Tuesday, January 28, 2020

Role Of The Nurse In Safe Administration Of Oral Medication Nursing Essay

Role Of The Nurse In Safe Administration Of Oral Medication Nursing Essay Administration of medicines to adults who are physically ill or injured is part of the adult nurses responsibility to provide holistic care and promote health (Veitch Christie 2007). Medicines are manufactured in several forms and can be administered by different routes. According to the form of the medications there are different requirements and equipment for their administration and storage (Burton and Donaldson 2007). This essay will focus on the administration of oral medicines, the standards and the legal requirements for their safe administration. The essay will also look at areas where problems are most likely to arise and will describe the measures which nurses can take to ensure patients safety when administering oral medicines. The National Patient Safety Agency (NPSA) defines patient safety as a process which involves identification, analysis and management of risks and incidents, including medication errors so potential or actual harm to patients can be prevented or minimised. Medication errors have a significant impact on patients, their families and health professionals involved. They can compromise patients safety and result in actual harm to patients. A total of 72,482 medication errors of which 14,111 caused harm of various extents to patients and 37 resulted in death were reported to the NPSA (2009) in one year. The same report showed that nearly half of the incidents were concerned with administration of medicines. Another report by the Department of Health (2004) estimated the cost of medication errors in NHS hospitals between  £200-400 million per year. Therefore it is vital that nurses adopt safe, methodical and skilled approach to administration of medicines. LEGAL The management of all medicines in the United Kingdom is governed by several legislations, the Standards for Medicine Management (2008) and the Standards of conduct, performance and ethics issued by the NMC (2008). The Standards outline the nurses responsibilities in relation to the current UK legislations. Burton Donaldson (2007) summarise these legislations in the latest edition of the Foundations for Nursing Practice. The Medicines Act (1968) regulates the requirements by which medicines are manufactured, prescribed and administered. The Medicines Act (1968) also classifies medicines into four categories which are Prescription only medicines (POMs), Pharmacy only medicines (Ps), General sales medicines (GSLs) and Control drugs (CDs).The Misuse of Drugs Act (1971) and the Misuse of Drugs Regulations (1985) provide the legal framework for the management of the controlled drugs and differentiate medicines according to the level of harm they may cause. The Mental Capacity Act (2005) provides the foundations for care delivery including medicine administration to people who lack the ability to make informed decisions. For Scotland these foundations are contained within The Mental Health (Care and Treatment) (Scotland) Act (2003) and The Adults with Incapacity (Scotland) Act (2000). These regulations are in place to assist and guide nurses and are fundamental in protecting patient safety. Anex1 of the Standards for Medicine Management (NMC 2008) specifies the nurses responsibility to comply with these regulations. However the administration of medication is not solely a mechanistic task to be performed and requires more than just following written instructions (NMC 2004). In respect to oral medicines and their administration the nurse should take a person centred approach and assess and assist each patient individually according to patients general condition. Kelly and Wright (2009) draw attention on the high number of medication administration errors in patients with swallowing difficulties, where physiological abnormalities can lead to difficulties in swallowing of liquids or tablets. Griffith (2005) suggests that alternative form of medicines should be considered if patients have difficulties swallowing tablets. The nurses responsibility in this respect is to perform the initial and ongoing assessment of patients condition to establish the suitability of certain type of oral medicine and the ability of the patient to take this medicine (NMC 2008). Physical or mental health conditions could also have an impact on the medication compliance by patients leading to crushing, mixing or disguising medicines in food or drink (Kelly Wright 2009). The Department of Health (2010) and The National Prescribing Centre (2010) outline the parameters and principles for safe mixing of medicines and the nurses role in this relation. Following these principles when nurses consider mixing of medicines they should always act in line with local policies, consult a pharmacist and obtain written instructions and also obtain consent from patients. Crushing and mixing of medicines without a careful assessment and justification could present safety risks for patients and nurses (Paparella 2010) because of their chemical formulations. Examples of these are the enteric coated tablets, slow released formulations and products containing carcinogenic substances. Crushing or splitting of these medicines may lead to undesirable effects for example unintended rapid absorption. Griffith (2005) points out the legal consequences of crushing tablets. If crushing of oral formulation results in harm for the patient the nurse responsible will be liable for negligence. Paparella (2010) suggests simple steps such as careful consideration whether a tablet is safe to crush and consultations with pharmacist could significantly minimise the risk for patients and nurses. It is also essential that nurses have a sufficient level of knowledge of how medicines interact with the human body in order to be able to observe if they achieve the desired therape utic effect and to avoid any adverse reactions (NMC 2008). Covert administration of medicines represents not only safety risks to patients but also has legal and ethical aspects which nurses have to consider before making a decision for such action (Griffith 2007). Although most of the nurses do not prescribe medicines it has been found that the administration of a wrong dose of medicine causes the largest number of deaths and serious harm to patients, followed by the administration of wrong medicine and omitted or delayed medicine (NPSA 2009). Subsequently, administering wrong dose of medicines has been linked to poor mathematical skills (Pentin Smith 2010). The nurses responsibility in connection with administering correct doses of oral medicines is outlined in the Standards for medicine administration (NMC 2008) which states the nurses must be aware of the patients care plan, check prescription and dosage before administering medicines. Administering of a wrong oral medicine is often associated with similar medicine or patient names, packaging, labelling or poor storage systems (NPSA 2009). This is particularly common issue in nursing and care homes where no wrist bands for identification are used (Pountney 2010). CONCLUSION Safe administration of medicines requires a methodical approach that follows local policies (Burton,C Donaldson,J 2007).

Monday, January 20, 2020

Essay --

I would like to present myself as a prospective candidate for Master’s Program in Mechanical Engineering at Masdar Institute of science and technology. I graduated from NED University of Engineering and Technology as a Mechanical Engineer in December 2011. The reason I opted mechanical engineering was my inclination towards the subjects relating mechanics of solids. My interest in this field grew to such an extent that I became passionate of taking the knowledge gained in the classrooms to the next level and was successful in securing the final year project of â€Å"Designing of Pipeline for Refinery Effluent†, a real time industrial assignment of Pakistan Refinery Limited which is considered as one of the leading oil and gas companies in Pakistan. To secure such an industrial project, which not only needed research potential but also the aspect of understanding the dynamics involved in the industry, I prepared myself during my bachelors by participating in numerous projects and received multiple national awards for my work, as a leader and a member of team for the design and fabrication of unmanned aerial vehicle (UAV) in DBFC (Design Build and Fly) organized by the American Institute of Aeronautics and Astronautics (AIAA). I was also selected for the renowned international competition Shell Eco Marathon Asia, to design an energy efficient car. These projects not only gave me hands-on experience in dealing with composites and testing my knowledge, they also gave me the chance to explore the field of fluid mechanics and aerodynamics. Along with these notable competitions, I regularly took part in local engineering competitions and seminars to actively apply the knowledge I gained during my bachelors. Having done these mechanical ... ...ill help me in understanding the analytical techniques and instruments, while my software skills will assist me in handling the problems related to modeling and simulation. It will also enable me to execute the challenging tasks to the fullest of my abilities. I believe Masdar Institute is the perfect institute which provides the right blend of research and academics needed in the professional world and I am hopeful that this combination would prove to be an asset for me in the future to come. I envision a career in this field as a culmination of my interests and I would appreciate the opportunity to pursue this at Masdar. Admission in the master's program at this esteemed institute would be a milestone in my academic, professional and personal life and ambitions. If accepted, I will be dedicated to perform at a level that will make both the university and I proud.

Sunday, January 12, 2020

Pre-Interview Essay

Pre-interview Essay 30/01/2013 I would like to follow the CELTA course for quite a few reasons. To begin with, and more importantly, I want to do the course so as to obtain the right qualifications for and English tutor. I think that the CELTA course can provide me, not only with the necessary teaching skills, but also with the highest knowledge of the subject.Moreover, if one already has the education and skills needed this course gives him the opportunity to keep up to date with the English language, because as it is widely known language, in general, keeps evolving and changing. Another important reason that makes me want to follow the course is the fact that CELTA diploma is recognized thru out the world. That is a great advantage as one has the opportunity to work at almost any country he desires.Needless to say that this is of great benefit not only to one’s teaching experience but to him as a person, as he will be able to broaden his horizons by meeting new educational systems and cultures. I believe that I would be a successful teacher of the English language because I am very interested in it, therefore, I would constantly try to enrich my knowledge around it and do my best to be up to date, not only with the language itself but with educational systems so that my students would get the best education possible from me.I am of the opinion that you must love what you do so as to be good at it and teaching is what I love. Other than that, I feel that I am the kind of person that can pass his knowledge to the others. I am friendly and easy-going which makes people around me feel comfortable and able to trust me. On the other hand, I am very organized and focused on my goals, even a little bit of a control freak which I believe make me better at what I do and are some important qualities for a successful teacher.

Saturday, January 4, 2020

Evaluating The Security Of A System Or Computer Network

Introduction In this report I will explain three penetrations methods. The three methods are: OSSTMM Method, DOS and VMs penetrations testing. A penetration test is a method to evaluate the security of a system or computer network. This method allows to simulate an attack and find exploitable vulnerabilities to propose an action plan to improve the security. There are two types of penetration testing: the pentest in Black Box or pentest in White Box. The pentester in Black Box mode really puts in the skin of an external attacker, he has no information on the target. The pentester in White Box mode work in collaboration with the DSI and the technical team in order to get maximum information for the penetration test. The objective of pentester can vary according to context: ïÆ' ¼ List a set of information found in one way or another, and which may be sensitive or critical. ïÆ' ¼ List the vulnerabilities or weaknesses in the security system that can be exploited. ïÆ' ¼ Demonstrate that a potential attacker s capacity to find vulnerabilities and exploit them to break into the information system. ïÆ' ¼ Test the effectiveness of intrusion detection systems and responsiveness of the security team, and sometimes users. ïÆ' ¼ Perform a final presentation and reporting its progress and its findings to the client. ïÆ' ¼ Provide ideas and advise on methods of resolution and correction of discovered vulnerabilities. Nowadays the security of systems or network are constantly changing, quickly evolving, weShow MoreRelatedA Brief Note On Professional Seminar : Network Security1732 Words   |  7 Pages Network Security Abstract Network Security The Internet continues to grow exponentially. Personal, government, and business applications continue to multiply on the Internet, with immediate benefits to end users. However, these network-based applications and services can pose security risks to individuals and to the information resources of companies and governments. Information is an asset that must be protected. Without adequate network security, many individualsRead MoreComputer Networks And Its Impact On The Organization s Business Strategy1230 Words   |  5 PagesComputer networks allow for employees within an organization to share files and exchange ideas more efficiently. Also, computer networks make it easier to back up all the company’s data on an offsite server. Computer networking supports business operations and contributes immensely to globalization. Therefore, organizations invest heavily in computer networks ensuring they work efficiently. This paper discusses ten points to consider when evaluating a c omputer network. These evaluation points exploreRead MoreRole Of Core Technologies On An Effective It System Essay714 Words   |  3 PagesEffective IT System The world of technology cores has a different function in today’s era. The core roles of these technologies play an important part to keep this world as we know it to operating on a day to day basis. The basis of the technology that makes IT System useful is Computer Networks, Information Assurance, Wed Technologies, Database, Computer Programs and Programming. In order for IT System to become active first Computer Programs and Programming must be put in place. Computer Programs andRead MoreRisk Analysis : The American Red Cross1743 Words   |  7 Pagesthen provide recommendations to address these threats† (Taylor et al, 2006). Risk analysis encompasses not only the equipment and programs used in an organization but also covers the culture, managerial, and administrative processes to assure data security. A key factor in risk analysis is to have a good Information Resource Management Plan. The American Red Cross is a Humanitarian Organization that provides services in Humanitarian Relief (i.e.: Disaster Relief, Services to the Armed Forces, InternationalRead MoreCommon Weaknesses and Attacks Associated with E-Commerce and Social Networking Application1248 Words   |  5 Pagese-commerce and social networking applications Security of transactions is critical in building the confidence of customers in a specified e-commerce site. This security depends heavily on an organization s ability to ensure authenticity, availability, privacy, integrity and disruption of unwanted intrusions. Malicious program known as sniffer programs often disrupt the privacy transactions especially when one uses unauthorized networks. They are found at network connection end points. When transactionsRead MoreWEEK TWO CMGT 400 INDIVIDUAL ASSIGNMENT Essay1436 Words   |  6 Pagesï » ¿ Common Information Security Threats involving Ethical and Legal Sally Lowe CMGT 400 January 19, 2015 Kell, David Common Information Security Threats involving Ethical and Legal Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campusesRead MoreNetwork And Computer Systems Become Universal And Exposed, Security Threats And Risks Essay1540 Words   |  7 PagesINTRODUCTION As networks and computer systems become universal and exposed, security threats and risks continue to grow more rapidly. This causes enormous threats; therefore, Security specialists and experts are continuously trying to find solutions for these kinds of threats through different methods like attack signatures and looking for methods to prevent them. Nevertheless, as solutions are formed, new types of threats emerge, for example spam mails, spywares, worms and Trojans just to mentionRead MoreQuestions and Answers About Networking: Subnets and Hub Essay1329 Words   |  6 Pagesthe advantages of subnet? Answer: A subnet is a logical grouping of network devices. which mention which hosts a part of a sub network number are come with the subnet is divided into their respective networks virtually defined sections allows the administrator to gain a lot of network subnets. When there as any organization network divided i nto subnets allows it to be connected to the Internet with a single shared network address. Subnets outside an organization can obtain multiple Internet CorrespondenceRead MoreEssay764 Words   |  4 Pagesdirect product of research. My inspiration for pursuing a Masters degree in Computer Science stemmed from my persistence urge to get involved in research that benefits humanity. Gaining extensive knowledge in different areas of Computer Science would be my short-term goal. In the long run, I am going to build a Cyber Security and Big Data Analytics research lab in my home country, Bangladesh. I could not get into Computer Science field at the undergraduate level. However, a Bachelors degree in ElectronicsRead MoreFinancial Sabotage Has Taken Place Essay1470 Words   |  6 PagesIntroduction When organizations experience the computer-related disruption in the form of cyber-attacks and data breaches, it causes distrust among shareholders, stakeholders, employees, and consumers. This paper will provide a discussion of some the major effects and damage that organizations will face when financial sabotage has taken place. Also included are some of the known reasons why organizations experience these issues along with some preventative measures that may assist with marginalizing