27,738 research outputs found

    Applying hierarchical task analysis to medication administration errors

    Get PDF
    Medication use in hospitals is a complex process and is dependent on the successful interaction of health professionals functioning within different disciplines. Errors can occur at any one of the five main stages of prescribing, documenting, dispensing or preparation, administering and monitoring. The responsibility for the error is often placed on the nurse, as she or he is the last person in the drug administration chain whilst more pressing underlying causal factors remain unresolved. This paper demonstrates how hierarchical task analysis can be used to model drug administration and then uses the systematic human error reduction and prediction approach to predict which errors are likely to occur. The paper also puts forward design solutions to mitigate these errors

    A safety analysis approach to clinical workflows : application and evaluation

    Get PDF
    Clinical workflows are safety critical workflows as they have the potential to cause harm or death to patients. Their safety needs to be considered as early as possible in the development process. Effective safety analysis methods are required to ensure the safety of these high-risk workflows, because errors that may happen through routine workflow could propagate within the workflow to result in harmful failures of the system’s output. This paper shows how to apply an approach for safety analysis of clinic al workflows to analyse the safety of the workflow within a radiology department and evaluates the approach in terms of usability and benefits. The outcomes of using this approach include identification of the root causes of hazardous workflow failures that may put patients’ lives at risk. We show that the approach is applicable to this area of healthcare and is able to present added value through the detailed information on possible failures, of both their causes and effects; therefore, it has the potential to improve the safety of radiology and other clinical workflows

    Visualizing Magnitude: Graphical Number Representations Help Users Detect Large Number Entry Errors

    Get PDF
    Nurses frequently have to program infusion pumps to deliver a prescribed quantity of drug over time. Occasional errors are made in the performance of this routine number entry task, resulting in patients receiving the incorrect dose of a drug. While many of these number entry errors are inconsequential, others are not; infusing 100 ml of a drug instead of 10 ml can be fatal. This paper investigates whether a supplementary graphical number representation, depicting the magnitude of a number, can help people detect number entry errors. An experiment was conducted in which 48 participants had to enter numbers from a ‘prescription sheet’ to a computer interface using a keyboard. The graphical representation was supplementary and was shown both on the ‘prescription sheet’ and the device interface. Results show that while overall more errors were made when the graphical representation was visible, the graphical representation helped participants to detect larger number entry errors (i.e., those that were out by at least an order of magnitude). This work suggests that a graphical number entry system that visualizes magnitude of number can help people detect serious number entry errors

    A review of human factors principles for the design and implementation of medication safety alerts in clinical information systems.

    Get PDF
    The objective of this review is to describe the implementation of human factors principles for the design of alerts in clinical information systems. First, we conduct a review of alarm systems to identify human factors principles that are employed in the design and implementation of alerts. Second, we review the medical informatics literature to provide examples of the implementation of human factors principles in current clinical information systems using alerts to provide medication decision support. Last, we suggest actionable recommendations for delivering effective clinical decision support using alerts. A review of studies from the medical informatics literature suggests that many basic human factors principles are not followed, possibly contributing to the lack of acceptance of alerts in clinical information systems. We evaluate the limitations of current alerting philosophies and provide recommendations for improving acceptance of alerts by incorporating human factors principles in their design

    Mathematical skills in the workplace: final report to the Science Technology and Mathematics Council

    Get PDF

    Student Nurse Perceptions of Effective Medication Administration Education

    Get PDF
    Nursing faculty strive to educate students in a manner that prevents errors, promoting quality, patient-centered care. This endeavor is dependent upon meaningful and effective education that incorporates educational experiences reflective of the service sector. Anecdotal reports from clinical faculty and student nurses suggest that academic medication administration education may not optimally prepare students for safe entry into clinical practice. The aim of this phenomenologic qualitative research is to understand student nurse perceptions regarding teaching strategies and learning activities that prepared them for safe medication administration in acute care clinical settings. Focus group interviews resulted in two broad themes that are identified as Effective Education and Gaps in Education. Within these broad themes, findings revealed that students value faculty demonstrations, peer-learning opportunities, and repetitive practice with timely feedback. Study findings also pointed to educational gaps. Students reported needing to learn communication and conflict resolution strategies that would help them manage real-world interruptions, distractions, and computer generated alerts. Study findings recommend implementing relevant decision-support technology within academic lab learning activities

    Transforming Healthcare Quality through Information Tehnology

    Get PDF
    Information and information exchange are crucial to the delivery of care on all levels of the health care delivery system—the patient, the care team, the health care organization, and the encompassing political-economic environment. To diagnose and treat individual patients effectively, individual care providers and care teams must have access to at least three major types of clinical information—the patient’s health record, the rapidly changing medical-evidence base, and provider orders guiding the process of patient care. In this frame, Information Technology can help healthcare organizations improve the quality of care that they provide, improve patient safety, improve cost-effectiveness, accelerate the translation of research findings into practice, improve care for the medically underserved, increase consumer involvement, improve accuracy and privacy, and increase their ability to monitor health nationally. Consequently, in the present article are presented some implementations of Information and Communication Technologies in the Health Care field.Healthcare; Quality; Information and Communication Technologies

    Audit-based Compliance Control (AC2) for EHR Systems

    Get PDF
    Traditionally, medical data is stored and processed using paper-based files. Recently, medical facilities have started to store, access and exchange medical data in digital form. The drivers for this change are mainly demands for cost reduction, and higher quality of health care. The main concerns when dealing with medical data are availability and confidentiality. Unavailability (even temporary) of medical data is expensive. Physicians may not be able to diagnose patients correctly, or they may have to repeat exams, adding to the overall costs of health care. In extreme cases availability of medical data can even be a matter of life or death. On the other hand, confidentiality of medical data is also important. Legislation requires medical facilities to observe the privacy of the patients, and states that patients have a final say on whether or not their medical data can be processed or not. Moreover, if physicians, or their EHR systems, are not trusted by the patients, for instance because of frequent privacy breaches, then patients may refuse to submit (correct) information, complicating the work of the physicians greatly. \ud \ud In traditional data protection systems, confidentiality and availability are conflicting requirements. The more data protection methods are applied to shield data from outsiders the more likely it becomes that authorized persons will not get access to the data in time. Consider for example, a password verification service that is temporarily not available, an access pass that someone forgot to bring, and so on. In this report we discuss a novel approach to data protection, Audit-based Compliance Control (AC2), and we argue that it is particularly suited for application in EHR systems. In AC2, a-priori access control is minimized to the mere authentication of users and objects, and their basic authorizations. More complex security procedures, such as checking user compliance to policies, are performed a-posteriori by using a formal and automated auditing mechanism. To support our claim we discuss legislation concerning the processing of health records, and we formalize a scenario involving medical personnel and a basic EHR system to show how AC2 can be used in practice. \ud \ud This report is based on previous work (Dekker & Etalle 2006) where we assessed the applicability of a-posteriori access control in a health care scenario. A more technically detailed article about AC2 recently appeared in the IJIS journal, where we focussed however on collaborative work environments (Cederquist, Corin, Dekker, Etalle, & Hartog, 2007). In this report we first provide background and related work before explaining the principal components of the AC2 framework. Moreover we model a detailed EHR case study to show its operation in practice. We conclude by discussing how this framework meets current trends in healthcare and by highlighting the main advantages and drawbacks of using an a-posteriori access control mechanism as opposed to more traditional access control mechanisms
    corecore