459,572 research outputs found
The Second International Conference on Health Information Technology Advancement
TABLE OF CONTENTS
I. Message from the Conference Co-Chairs
B. Han and S. Falan …………………………....….……………. 5
II. Message from the Transactions Editor
H. Lee …...………..………….......………….……….………….... 7
III. Referred Papers
A. Emerging Health Information Technology and Applications
The Role of Mobile Technology in Enhancing the Use of Personal Health Records
Mohamed Abouzahra and Joseph Tan………………….……………. 9
Mobile Health Information Technology and Patient Care: Methods, Themes, and Research Gaps
Bahae Samhan, Majid Dadgar, and K. D. Joshi…………..…. 18
A Balanced Perspective to Perioperative Process Management
Jim Ryan, Barbara Doster, Sandra Daily, and Carmen Lewis…..….…………… 30
The Impact of Big Data on the Healthcare Information Systems
Kuo Lane Chen and Huei Lee………….…………… 43
B. Health Care Communication, Literacy, and Patient Care Quality
Digital Illness Narratives: A New Form of Health Communication
Jofen Han and Jo Wiley…..….……..…. 47
Relationships, Caring, and Near Misses: Michael’s Story
Sharie Falan and Bernard Han……………….…..…. 53
What is Your Informatics Skills Level? -- The Reliability of an Informatics Competency Measurement Tool
Xiaomeng Sun and Sharie Falan.….….….….….….…. 61
C. Health Information Standardization and Interoperability
Standardization Needs for Effective Interoperability
Marilyn Skrocki…………………….…….………….… 76
Data Interoperability and Information Security in Healthcare
Reid Berryman, Nathan Yost, Nicholas Dunn, and Christopher Edwards.…. 84
Michigan Health Information Network (MiHIN) Shared Services vs. the HIE Shared Services in Other States
Devon O’Toole, Sean O’Toole, and Logan Steely…..……….…… 94
D. Health information Security and Regulation
A Threat Table Based Approach to Telemedicine Security
John C. Pendergrass, Karen Heart, C. Ranganathan, and V.N. Venkatakrishnan
…. 104
Managing Government Regulatory Requirements for Security and Privacy Using Existing Standard Models
Gregory Schymik and Dan Shoemaker…….…….….….… 112
Challenges of Mobile Healthcare Application Security
Alan Rea………………………….……………. 118
E. Healthcare Management and Administration
Analytical Methods for Planning and Scheduling Daily Work in Inpatient Care Settings:
Opportunities for Research and Practice
Laila Cure….….……………..….….….….… 121
Predictive Modeling in Post-reform Marketplace
Wu-Chyuan Gau, Andrew France, Maria E. Moutinho, Carl D. Smith, and Morgan C. Wang…………...…. 131
A Study on Generic Prescription Substitution Policy as a Cost Containment Approach for Michigan’s Medicaid System
Khandaker Nayeemul Islam…….…...……...………………….… 140
F. Health Information Technology Quality Assessment and Medical Service Delivery
Theoretical, Methodological and Practical Challenges in Designing Formative Evaluations of Personal eHealth Tools
Michael S. Dohan and Joseph Tan……………….……. 150
The Principles of Good Health Care in the U.S. in the 2010s
Andrew Targowski…………………….……. 161
Health Information Technology in American Medicine: A Historical Perspective
Kenneth A. Fisher………………….……. 171
G. Health Information Technology and Medical Practice
Monitoring and Assisting Maternity-Infant Care in Rural Areas (MAMICare)
Juan C. Lavariega, Gustavo Córdova, Lorena G Gómez, Alfonso Avila….… 175
An Empirical Study of Home Healthcare Robots Adoption Using the UTUAT Model
Ahmad Alaiad, Lina Zhou, and Gunes Koru.…………………….….………. 185
HDQM2: Healthcare Data Quality Maturity Model
Javier Mauricio Pinto-Valverde, Miguel Ángel Pérez-Guardado, Lorena Gomez-Martinez, Martha Corrales-Estrada, and Juan Carlos Lavariega-Jarquín.… 199
IV. A List of Reviewers …………………………..…….………………………208
V. WMU – IT Forum 2014 Call for Papers …..…….…………………20
Recommended from our members
Cyber insurance of information systems: Security and privacy cyber insurance contracts for ICT and helathcare organizations
Nowadays, more-and-more aspects of our daily activities are digitalized. Data and assets in the cyber-space, both for individuals and organizations, must be safeguarded. Thus, the insurance sector must face the challenge of digital transformation in the 5G era with the right set of tools. In this paper, we present CyberSure-an insurance framework for information systems. CyberSure investigates the interplay between certification, risk management, and insurance of cyber processes. It promotes continuous monitoring as the new building block for cyber insurance in order to overcome the current obstacles of identifying in real-time contractual violations by the insured party and receiving early warning notifications prior the violation. Lightweight monitoring modules capture the status of the operating components and send data to the CyberSure backend system which performs the core decision making. Therefore, an insured system is certified dynamically, with the risk and insurance perspectives being evaluated at runtime as the system operation evolves. As new data become available, the risk management and the insurance policies are adjusted and fine-tuned. When an incident occurs, the insurance company possesses adequate information to assess the situation fast, estimate accurately the level of a potential loss, and decrease the required period for compensating the insured customer. The framework is applied in the ICT and healthcare domains, assessing the system of medium-size organizations. GDPR implications are also considered with the overall setting being effective and scalable
The Role of Transportation in Campus Emergency Planning, MTI Report 08-06
In 2005, Hurricane Katrina created the greatest natural disaster in American history. The states of Louisiana, Mississippi and Alabama sustained significant damage, including 31 colleges and universities. Other institutions of higher education, most notably Louisiana State University (LSU), became resources to the disaster area. This is just one of the many examples of disaster impacts on institutions of higher education. The Federal Department of Homeland Security, under Homeland Security Presidential Directive–5, requires all public agencies that want to receive federal preparedness assistance to comply with the National Incident Management System (NIMS), which includes the creation of an Emergency Operations Plan (EOP). Universities, which may be victims or resources during disasters, must write NIMS–compliant emergency plans. While most university emergency plans address public safety and logistics management, few adequately address the transportation aspects of disaster response and recovery. This MTI report describes the value of integrating transportation infrastructure into the campus emergency plan, including planning for helicopter operations. It offers a list of materials that can be used to educate and inform campus leadership on campus emergency impacts, including books about the Katrina response by LSU and Tulane Hospital, contained in the report´s bibliography. It provides a complete set of Emergency Operations Plan checklists and organization charts updated to acknowledge lessons learned from Katrina, 9/11 and other wide–scale emergencies. Campus emergency planners can quickly update their existing emergency management documents by integrating selected annexes and elements, or create new NIMS–compliant plans by adapting the complete set of annexes to their university´s structures
Published incidents and their proportions of human error
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Purpose
- The information security field experiences a continuous stream of information security incidents and breaches, which are publicised by the media, public bodies and regulators. Despite the need for information security practices being recognised and in existence for some time the underlying general information security affecting tasks and causes of these incidents and breaches are not consistently understood, particularly with regard to human error.
Methodology
- This paper analyses recent published incidents and breaches to establish the proportions of human error, and where possible subsequently utilises the HEART human reliability analysis technique, which is established within the safety field.
Findings
- This analysis provides an understanding of the proportions of incidents and breaches that relate to human error as well as the common types of tasks that result in these incidents and breaches through adoption of methods applied within the safety field.
Originality
- This research provides original contribution to knowledge through the analysis of recent public sector information security incidents and breaches in order to understand the proportions that relate to human erro
American Eagle Outfitters – Vietnam Factory Code 98008411831 Audit Date December 1, 2010 Tracking Repo
This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2010_AmEagle_TR_Vietnam_98008411831.pdf: 183 downloads, before Oct. 1, 2020
Recommended from our members
Assessing the probability of patients reoffending after discharge from low to medium secure forensic mental health services: An inductive prevention paradox
Citizens of developed societies are troubled by those who commit ‘irrational' crimes against the person. Reoffending by ex-patients following their release from secure mental health services triggers particularly intense angst when amplified by media and political scrutiny. Forensic mental health service providers are expected to minimise the occurrence of such transgressions by releasing only those patients who are judged acceptably unlikely to reoffend. However, reoffending probabilities can only be estimated by observing behaviour in secure institutional settings designed specifically to prevent patients from transgressing. The article explores this ‘inductive prevention paradox' which arises when the implementation of measures designed to avoid an adverse event obscures direct observation of what might have happened if prophylaxis had not been attempted. The analysis presented draws on data obtained in 1999–2003 from two qualitative studies in medium to low secure UK institutions, one providing forensic mental health services and the other forensic learning disability services. We explored the views of 56 staff members and 21 patients about risk management in forensic services and undertook additional 25 staff interviews for case studies of the 21 patients. The wider applicability of the inductive prevention paradox will be considered in the Discussion. We argue that the prognostic limitations arising from prevention have been underestimated by policy makers and in official inquiries; and that the prevailing personal risk assessment framework needs to be complemented by greater attention to the environments which patients will be discharged into
Alcuni abstract di articoli che trattano argomenti relativi all'eHealth
Non utile per esam
- …