AllFreePapers.com - All Free Papers and Essays for All Students
Search

Technology, Humans Services & Interoperability

Autor:   •  July 7, 2019  •  Research Paper  •  910 Words (4 Pages)  •  35 Views

Page 1 of 4

Technology, Human Services, and Interoperability

Allison Partridge

BSHS/375

Jan. 21, 2019

Ms. Norma Swales


Technology, Human Services, and Interoperability

Mental Health Providers is someone who can help someone else achieves their goals in recovering from the issues that hinder one’s emotions, attitudes, and behaviors.  There are several different types of mental health professionals available.  Over the past decades, technological innovations have evolved from computers to cell phones and so much more in-depth advancements of technology.  Upon this rapid rate of advanced technology comes the various ways mental health has grown in linking technology and human services globally as well as locally across agencies.

According to the website, for the Substance abuse and Mental Health Services Administration better known as SAMSHA, by way of prevention management reporting and training systems.  SAMSHA provides three separate but integrated information services: (a) prevention resources, (b) data submission, (c) reporting services.  In referencing to Mental Health organizations, there is diagnosis given such as depression for example.  If a client receives a clinical diagnosis that would include depression.  Several factors accompany, which may initiate a referral or several referrals to other agencies that specialize in depression.  

Therefore, mental health professionals can work from various facilities like general hospitals, psychiatric facilities, community health clinics, schools, or private practices.  Support systems, support groups, all require specific theories and different ways funding would filter through each outsourced organization or agency.

                        Interoperability Models

“There are three models of health information technology interoperability: (1) Loosely Linked Network, (2) Network Model, (3) Top-Down Model (Scheoch, 2010).”

Loosely Linked Network models examples such as cloud computing and smartphone apps.  In this model, software is the service rather than the product.  (Scheoch, 2010).”  Networking, storage, etc. are provided with the already established app, which allows the agency only to use the application, and tools that are needed to achieve their goals.  The agency's infrastructure is similar to a social network that provides information upon demand.  The security level weakened because the cloud computing places the security of your agency's report in the hands of others, out of your agency's control exposes it to global risks.  Clients’ records would be at a higher risk as its activity linked to the Internet.

The Network Model is developed and is similar to the travel industry.  One task of the social work profession is developing a plan that includes an intervention.  This intervention plan based on a client's needs and wants about how the response handled, is the old way of referring to a client outside your agency. The professional would make several phone call recommendations for further assistance in advancing the client's treatment.  Presently, the mental health provider recommends the next phase of treatment, optimizing a more detailed screening matching their clients' specific needs to the expertise of another mental health facility.  According to the client's expectations and the expertise the services and the availability, this type of model requires a heightened level of security for long-term storage of client information in the follow-up according to the HIPPA laws and regulations.  Some added advantages are the performance of multiple routine tasks such as scheduling intra-agency meetings, the collection of clients progress, in return allows the social worker more to focus on their assessments including observations, building relationships.  Disadvantages would be lack of agencies working as a collaborative team to support system-wide goals — other concerns information security and privacy protection.

...

Download as:   txt (5.5 Kb)   pdf (73.5 Kb)   docx (12.1 Kb)  
Continue for 3 more pages »