221 research outputs found
Critical success factors in implementing an e-rostering system in a healthcare organisation
Effective and efficient staff scheduling has always been a challenging issue, especially in health service organisations. Both the extremes of staff shortage and overage have an adverse impact on the performance of healthcare organisations. In this case, an electronic and systematic staff scheduling (e-rostering) system is the often seen as the best solution. Unless an organisation has an effective implementation of such a system, possible cost savings, efficiency, and benefits could be minimal. This study is aimed to research key success factors for the successful effective implementation of an electronic rostering system, especially at healthcare organisations. A case study research method was used to evaluate critical success factors for effectively implementing an e-rostering system. The data were collected through interviews and observations. The findings indicate that technical support, an effective policy, leadership, clear goals and objectives, gradual change, evidence of the advantages of the new system, senior management support, and effective communication are the critical success factors in implementing an e-rostering system in healthcare organisations. Prior to this study, no such factors were grounded in the current context, so this research would help in bridging the gap towards effective implementation of an e-rostering system in the healthcare sector. This research also suggests future studies in different cultures and contexts
Readiness for improving safe care delivery through web-based hospital nurse scheduling & staffing technology: A multi-hospital approach
Hospital scheduling and staffing practices are linked to patient safety, nurse satisfaction, and cost outcomes (Steege & Rainbow, 2017). Staffing, while complex, is ultimately central to the overall success of the hospital. Demands to eliminate events that cause death or serious harm, produce high patient satisfaction scores while maximizing workforce productivity, test any administrator’s skillset. Providing qualified staff in the right place at the right time can be challenged by restrictive union contracts, variable patient acuities, staff attendance, and mandated staffing ratios. These demands may lead to overtime utilization. There is a growing understanding of the negative effects of healthcare worker fatigue on patient outcomes (IOM, 2004; Stimpfel & Aiken, 2013). The impending nursing shortage has the potential to exacerbate the problem of high quality care delivery and could lead to devastating impacts to the profession as well as patients. Though Kaiser Permanente (KP) is generally known for being a healthcare trailblazer, staffing technology was lagging. The purpose of this project is to prepare KP nursing for transformative change with web-based hospital scheduling and staffing. This work addresses the readiness for deployment across the KP system. Complexity and change theories frame this project. Hospital staffing epitomizes complexity. This planned change provides a road map for other nurse leaders to navigate the lessons learned. Satisfaction surveys from 222 nursing staff receiving training in the new technology reveal a favorable intent for technology adoption. Future work will focus on the impact realization of nurse-sensitive outcome indicators and registered nurse overtime
Energy Efficiency Comparative Analysis of Different Routing Protocol In MANET for Healthcare Environment
Now a day ad hoc mobile networks have several routing protocols, but every protocol has its own advantages and limitations therefore our main aim is to meet maximum performance using advance algorithm. Some are good in a small network; some are suitable in large networks, and some give better performance in location or global networks. Today advance and innovative applications for health care environments which are based on a wireless network are being developed in the commercial sectors. In our research work ECHERP framework gives a better performance as compared to other routing protocol. Designing WSN with this architecture in mind will enable designers to balance the energy dissipation and optimize the energy consumption among all network constituents because energy is one of the most crucial factor and sustain the network lifetime for the intended application. By categorizing the overall WSN system into sub region, components of each region were extracted in terms of their dominant factors, followed by a mathematical formula as a total energy cost function in terms of their constituents. As in our base paper three protocols are used which are DSR, DSDV and AODV and out of these DSR has best parameters on comparing diverse parameters has maximum remaining energy. But in our research a new protocol ECHERP is integrated in NS2 and then we compared these four protocols and we found that ECHERP have optimized values of parameters
Recommended from our members
Where are you? A preliminary examination of the track and trace mechanisms in place to facilitate effective closed-loop medical equipment retrieval in the National Health Service (NHS) (UK)
yesThe National Health Service (UK) is wholly accountable and heavily scrutinised for its strategy, activity, performance and spending (Appleby, 2016; NHS Confederation, 2016; Parliament UK, 2010), and much research has been undertaken as to its effectiveness at managing its operations and its competency in doing so (Gov.Uk, 2016; National Audit Office, 1999)). The impact of not performing adequately combined with threats such as funding cuts (King’s Fund, 2016), government intervention and private sector competition; has led to uncertainty and disillusion with the sustainability of the service (Hunter, 2016). Based on current economic concerns, this paper chooses to focus on the area of Medical Equipment Loans Services where products are released to patients to aid therapeutic rehabilitation and physical mobility. The aim of this study is to examine the process of product retrieval in a multi-case study analysis and consider how value-added technologies can be used to improve retrieval success rates
E-health-IoT Universe: A Review
The Internet of Things (IoT) devices are able to collect and share data directly with other devices through the cloud environment, providing a huge amount of information to be gathered, stored and analyzed for data-analytics processes. The scenarios in which the IoT devices may be useful are amazing varying, from automotive, to industrial automation or remote monitoring of domestic environment. Furthermore, has been proved that healthcare applications represent an important field of interest for IoT devices, due to the capability of improving the access to care, reducing the cost of healthcare and most importantly increasing the quality of life of the patients. In this paper, we analyze the state-of-art of IoT in medical environment, illustrating an extended range of IoT-driven healthcare applications that, however, still need innovative and high technology-based solutions to be considered ready to market. In particular, problems regarding characteristics of response-time and precision will be examined. Furthermore, wearable and energy saving properties will be investigated in this paper and also the IT architectures able to ensure security and privacy during the all data-transmission process. Finally, considerations about data mining applications, such as risks prediction, classification and clustering will be provided, that are considered fundamental issues to ensure the accuracy of the care processes
NIOSH Emergency Preparedness and Response Program: Evidence Package for 2007-2017
This document contains materials to demonstrate the relevance and impact of the Emergency Preparedness and Response Program\u2019s work in the areas of Emergency Responder Health Monitoring and Surveillance (ERHMS), anthrax preparedness and response capabilities, and other emergency preparedness activities and responses
Data security in European healthcare information systems
This thesis considers the current requirements for data security in European healthcare systems and
establishments. Information technology is being increasingly used in all areas of healthcare
operation, from administration to direct care delivery, with a resulting dependence upon it by
healthcare staff. Systems routinely store and communicate a wide variety of potentially sensitive
data, much of which may also be critical to patient safety. There is consequently a significant
requirement for protection in many cases.
The thesis presents an assessment of healthcare security requirements at the European level, with a
critical examination of how the issue has been addressed to date in operational systems. It is
recognised that many systems were originally implemented without security needs being properly
addressed, with a consequence that protection is often weak and inconsistent between establishments.
The overall aim of the research has been to determine appropriate means by which security may be
added or enhanced in these cases.
The realisation of this objective has included the development of a common baseline standard for
security in healthcare systems and environments. The underlying guidelines in this approach cover
all of the principal protection issues, from physical and environmental measures to logical system
access controls. Further to this, the work has encompassed the development of a new protection
methodology by which establishments may determine their additional security requirements (by
classifying aspects of their systems, environments and data). Both the guidelines and the
methodology represent work submitted to the Commission of European Communities SEISMED
(Secure Environment for Information Systems in MEDicine) project, with which the research
programme was closely linked.
The thesis also establishes that healthcare systems can present significant targets for both internal
and external abuse, highlighting a requirement for improved logical controls. However, it is also
shown that the issues of easy integration and convenience are of paramount importance if security is
to be accepted and viable in practice. Unfortunately, many traditional methods do not offer these
advantages, necessitating the need for a different approach.
To this end, the conceptual design for a new intrusion monitoring system was developed, combining
the key aspects of authentication and auditing into an advanced framework for real-time user
supervision. A principal feature of the approach is the use of behaviour profiles, against which user
activities may be continuously compared to determine potential system intrusions and anomalous
events.
The effectiveness of real-time monitoring was evaluated in an experimental study of keystroke
analysis -a behavioural biometric technique that allows an assessment of user identity from their
typing style. This technique was found to have significant potential for discriminating between
impostors and legitimate users and was subsequently incorporated into a fully functional security
system, which demonstrated further aspects of the conceptual design and showed how transparent
supervision could be realised in practice.
The thesis also examines how the intrusion monitoring concept may be integrated into a wider
security architecture, allowing more comprehensive protection within both the local healthcare
establishment and between remote domains.Commission of European Communities
SEISMED proje
- …