459,572 research outputs found

    The Second International Conference on Health Information Technology Advancement

    Get PDF
    TABLE OF CONTENTS I. Message from the Conference Co-Chairs B. Han and S. Falan …………………………....….……………. 5 II. Message from the Transactions Editor H. Lee …...………..………….......………….……….………….... 7 III. Referred Papers A. Emerging Health Information Technology and Applications The Role of Mobile Technology in Enhancing the Use of Personal Health Records Mohamed Abouzahra and Joseph Tan………………….……………. 9 Mobile Health Information Technology and Patient Care: Methods, Themes, and Research Gaps Bahae Samhan, Majid Dadgar, and K. D. Joshi…………..…. 18 A Balanced Perspective to Perioperative Process Management Jim Ryan, Barbara Doster, Sandra Daily, and Carmen Lewis…..….…………… 30 The Impact of Big Data on the Healthcare Information Systems Kuo Lane Chen and Huei Lee………….…………… 43 B. Health Care Communication, Literacy, and Patient Care Quality Digital Illness Narratives: A New Form of Health Communication Jofen Han and Jo Wiley…..….……..…. 47 Relationships, Caring, and Near Misses: Michael’s Story Sharie Falan and Bernard Han……………….…..…. 53 What is Your Informatics Skills Level? -- The Reliability of an Informatics Competency Measurement Tool Xiaomeng Sun and Sharie Falan.….….….….….….…. 61 C. Health Information Standardization and Interoperability Standardization Needs for Effective Interoperability Marilyn Skrocki…………………….…….………….… 76 Data Interoperability and Information Security in Healthcare Reid Berryman, Nathan Yost, Nicholas Dunn, and Christopher Edwards.…. 84 Michigan Health Information Network (MiHIN) Shared Services vs. the HIE Shared Services in Other States Devon O’Toole, Sean O’Toole, and Logan Steely…..……….…… 94 D. Health information Security and Regulation A Threat Table Based Approach to Telemedicine Security John C. Pendergrass, Karen Heart, C. Ranganathan, and V.N. Venkatakrishnan …. 104 Managing Government Regulatory Requirements for Security and Privacy Using Existing Standard Models Gregory Schymik and Dan Shoemaker…….…….….….… 112 Challenges of Mobile Healthcare Application Security Alan Rea………………………….……………. 118 E. Healthcare Management and Administration Analytical Methods for Planning and Scheduling Daily Work in Inpatient Care Settings: Opportunities for Research and Practice Laila Cure….….……………..….….….….… 121 Predictive Modeling in Post-reform Marketplace Wu-Chyuan Gau, Andrew France, Maria E. Moutinho, Carl D. Smith, and Morgan C. Wang…………...…. 131 A Study on Generic Prescription Substitution Policy as a Cost Containment Approach for Michigan’s Medicaid System Khandaker Nayeemul Islam…….…...……...………………….… 140 F. Health Information Technology Quality Assessment and Medical Service Delivery Theoretical, Methodological and Practical Challenges in Designing Formative Evaluations of Personal eHealth Tools Michael S. Dohan and Joseph Tan……………….……. 150 The Principles of Good Health Care in the U.S. in the 2010s Andrew Targowski…………………….……. 161 Health Information Technology in American Medicine: A Historical Perspective Kenneth A. Fisher………………….……. 171 G. Health Information Technology and Medical Practice Monitoring and Assisting Maternity-Infant Care in Rural Areas (MAMICare) Juan C. Lavariega, Gustavo Córdova, Lorena G Gómez, Alfonso Avila….… 175 An Empirical Study of Home Healthcare Robots Adoption Using the UTUAT Model Ahmad Alaiad, Lina Zhou, and Gunes Koru.…………………….….………. 185 HDQM2: Healthcare Data Quality Maturity Model Javier Mauricio Pinto-Valverde, Miguel Ángel Pérez-Guardado, Lorena Gomez-Martinez, Martha Corrales-Estrada, and Juan Carlos Lavariega-Jarquín.… 199 IV. A List of Reviewers …………………………..…….………………………208 V. WMU – IT Forum 2014 Call for Papers …..…….…………………20

    The Role of Transportation in Campus Emergency Planning, MTI Report 08-06

    Get PDF
    In 2005, Hurricane Katrina created the greatest natural disaster in American history. The states of Louisiana, Mississippi and Alabama sustained significant damage, including 31 colleges and universities. Other institutions of higher education, most notably Louisiana State University (LSU), became resources to the disaster area. This is just one of the many examples of disaster impacts on institutions of higher education. The Federal Department of Homeland Security, under Homeland Security Presidential Directive–5, requires all public agencies that want to receive federal preparedness assistance to comply with the National Incident Management System (NIMS), which includes the creation of an Emergency Operations Plan (EOP). Universities, which may be victims or resources during disasters, must write NIMS–compliant emergency plans. While most university emergency plans address public safety and logistics management, few adequately address the transportation aspects of disaster response and recovery. This MTI report describes the value of integrating transportation infrastructure into the campus emergency plan, including planning for helicopter operations. It offers a list of materials that can be used to educate and inform campus leadership on campus emergency impacts, including books about the Katrina response by LSU and Tulane Hospital, contained in the report´s bibliography. It provides a complete set of Emergency Operations Plan checklists and organization charts updated to acknowledge lessons learned from Katrina, 9/11 and other wide–scale emergencies. Campus emergency planners can quickly update their existing emergency management documents by integrating selected annexes and elements, or create new NIMS–compliant plans by adapting the complete set of annexes to their university´s structures

    Published incidents and their proportions of human error

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Purpose - The information security field experiences a continuous stream of information security incidents and breaches, which are publicised by the media, public bodies and regulators. Despite the need for information security practices being recognised and in existence for some time the underlying general information security affecting tasks and causes of these incidents and breaches are not consistently understood, particularly with regard to human error. Methodology - This paper analyses recent published incidents and breaches to establish the proportions of human error, and where possible subsequently utilises the HEART human reliability analysis technique, which is established within the safety field. Findings - This analysis provides an understanding of the proportions of incidents and breaches that relate to human error as well as the common types of tasks that result in these incidents and breaches through adoption of methods applied within the safety field. Originality - This research provides original contribution to knowledge through the analysis of recent public sector information security incidents and breaches in order to understand the proportions that relate to human erro

    American Eagle Outfitters – Vietnam Factory Code 98008411831 Audit Date December 1, 2010 Tracking Repo

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2010_AmEagle_TR_Vietnam_98008411831.pdf: 183 downloads, before Oct. 1, 2020

    Cyber-Vulnerabilities & Public Health Emergency Response

    Get PDF
    corecore