221 research outputs found

    Critical success factors in implementing an e-rostering system in a healthcare organisation

    Get PDF
    Effective and efficient staff scheduling has always been a challenging issue, especially in health service organisations. Both the extremes of staff shortage and overage have an adverse impact on the performance of healthcare organisations. In this case, an electronic and systematic staff scheduling (e-rostering) system is the often seen as the best solution. Unless an organisation has an effective implementation of such a system, possible cost savings, efficiency, and benefits could be minimal. This study is aimed to research key success factors for the successful effective implementation of an electronic rostering system, especially at healthcare organisations. A case study research method was used to evaluate critical success factors for effectively implementing an e-rostering system. The data were collected through interviews and observations. The findings indicate that technical support, an effective policy, leadership, clear goals and objectives, gradual change, evidence of the advantages of the new system, senior management support, and effective communication are the critical success factors in implementing an e-rostering system in healthcare organisations. Prior to this study, no such factors were grounded in the current context, so this research would help in bridging the gap towards effective implementation of an e-rostering system in the healthcare sector. This research also suggests future studies in different cultures and contexts

    Readiness for improving safe care delivery through web-based hospital nurse scheduling & staffing technology: A multi-hospital approach

    Get PDF
    Hospital scheduling and staffing practices are linked to patient safety, nurse satisfaction, and cost outcomes (Steege & Rainbow, 2017). Staffing, while complex, is ultimately central to the overall success of the hospital. Demands to eliminate events that cause death or serious harm, produce high patient satisfaction scores while maximizing workforce productivity, test any administrator’s skillset. Providing qualified staff in the right place at the right time can be challenged by restrictive union contracts, variable patient acuities, staff attendance, and mandated staffing ratios. These demands may lead to overtime utilization. There is a growing understanding of the negative effects of healthcare worker fatigue on patient outcomes (IOM, 2004; Stimpfel & Aiken, 2013). The impending nursing shortage has the potential to exacerbate the problem of high quality care delivery and could lead to devastating impacts to the profession as well as patients. Though Kaiser Permanente (KP) is generally known for being a healthcare trailblazer, staffing technology was lagging. The purpose of this project is to prepare KP nursing for transformative change with web-based hospital scheduling and staffing. This work addresses the readiness for deployment across the KP system. Complexity and change theories frame this project. Hospital staffing epitomizes complexity. This planned change provides a road map for other nurse leaders to navigate the lessons learned. Satisfaction surveys from 222 nursing staff receiving training in the new technology reveal a favorable intent for technology adoption. Future work will focus on the impact realization of nurse-sensitive outcome indicators and registered nurse overtime

    Energy Efficiency Comparative Analysis of Different Routing Protocol In MANET for Healthcare Environment

    Get PDF
    Now a day ad hoc mobile networks have several routing protocols, but every protocol has its own advantages and limitations therefore our main aim is to meet maximum performance using advance algorithm. Some are good in a small network; some are suitable in large networks, and some give better performance in location or global networks. Today advance and innovative applications for health care environments which are based on a wireless network are being developed in the commercial sectors. In our research work ECHERP framework gives a better performance as compared to other routing protocol. Designing WSN with this architecture in mind will enable designers to balance the energy dissipation and optimize the energy consumption among all network constituents because energy is one of the most crucial factor and sustain the network lifetime for the intended application. By categorizing the overall WSN system into sub region, components of each region were extracted in terms of their dominant factors, followed by a mathematical formula as a total energy cost function in terms of their constituents. As in our base paper three protocols are used which are DSR, DSDV and AODV and out of these DSR has best parameters on comparing diverse parameters has maximum remaining energy. But in our research a new protocol ECHERP is integrated in NS2 and then we compared these four protocols and we found that ECHERP have optimized values of parameters

    E-health-IoT Universe: A Review

    Get PDF
    The Internet of Things (IoT) devices are able to collect and share data directly with other devices through the cloud environment, providing a huge amount of information to be gathered, stored and analyzed for data-analytics processes. The scenarios in which the IoT devices may be useful are amazing varying, from automotive, to industrial automation or remote monitoring of domestic environment. Furthermore, has been proved that healthcare applications represent an important field of interest for IoT devices, due to the capability of improving the access to care, reducing the cost of healthcare and most importantly increasing the quality of life of the patients. In this paper, we analyze the state-of-art of IoT in medical environment, illustrating an extended range of IoT-driven healthcare applications that, however, still need innovative and high technology-based solutions to be considered ready to market. In particular, problems regarding characteristics of response-time and precision will be examined.  Furthermore, wearable and energy saving properties will be investigated in this paper and also the IT architectures able to ensure security and privacy during the all data-transmission process. Finally, considerations about data mining applications, such as risks prediction, classification and clustering will be provided, that are considered fundamental issues to ensure the accuracy of the care processes

    NIOSH Emergency Preparedness and Response Program: Evidence Package for 2007-2017

    Get PDF
    This document contains materials to demonstrate the relevance and impact of the Emergency Preparedness and Response Program\u2019s work in the areas of Emergency Responder Health Monitoring and Surveillance (ERHMS), anthrax preparedness and response capabilities, and other emergency preparedness activities and responses

    Data security in European healthcare information systems

    Get PDF
    This thesis considers the current requirements for data security in European healthcare systems and establishments. Information technology is being increasingly used in all areas of healthcare operation, from administration to direct care delivery, with a resulting dependence upon it by healthcare staff. Systems routinely store and communicate a wide variety of potentially sensitive data, much of which may also be critical to patient safety. There is consequently a significant requirement for protection in many cases. The thesis presents an assessment of healthcare security requirements at the European level, with a critical examination of how the issue has been addressed to date in operational systems. It is recognised that many systems were originally implemented without security needs being properly addressed, with a consequence that protection is often weak and inconsistent between establishments. The overall aim of the research has been to determine appropriate means by which security may be added or enhanced in these cases. The realisation of this objective has included the development of a common baseline standard for security in healthcare systems and environments. The underlying guidelines in this approach cover all of the principal protection issues, from physical and environmental measures to logical system access controls. Further to this, the work has encompassed the development of a new protection methodology by which establishments may determine their additional security requirements (by classifying aspects of their systems, environments and data). Both the guidelines and the methodology represent work submitted to the Commission of European Communities SEISMED (Secure Environment for Information Systems in MEDicine) project, with which the research programme was closely linked. The thesis also establishes that healthcare systems can present significant targets for both internal and external abuse, highlighting a requirement for improved logical controls. However, it is also shown that the issues of easy integration and convenience are of paramount importance if security is to be accepted and viable in practice. Unfortunately, many traditional methods do not offer these advantages, necessitating the need for a different approach. To this end, the conceptual design for a new intrusion monitoring system was developed, combining the key aspects of authentication and auditing into an advanced framework for real-time user supervision. A principal feature of the approach is the use of behaviour profiles, against which user activities may be continuously compared to determine potential system intrusions and anomalous events. The effectiveness of real-time monitoring was evaluated in an experimental study of keystroke analysis -a behavioural biometric technique that allows an assessment of user identity from their typing style. This technique was found to have significant potential for discriminating between impostors and legitimate users and was subsequently incorporated into a fully functional security system, which demonstrated further aspects of the conceptual design and showed how transparent supervision could be realised in practice. The thesis also examines how the intrusion monitoring concept may be integrated into a wider security architecture, allowing more comprehensive protection within both the local healthcare establishment and between remote domains.Commission of European Communities SEISMED proje
    • …
    corecore