A New Socio-technical Model for Studying Health Information Technology in Complex Adaptive Healthcare Systems

2015 ◽  
pp. 133-164
2019 ◽  
Vol 24 (3) ◽  
pp. 118-124 ◽  
Author(s):  
Katharine T Adams ◽  
Tracy C Kim ◽  
Allan Fong ◽  
Jessica L Howe ◽  
Kathryn M Kellogg ◽  
...  

Objective We analyzed the described resolutions of patient safety event reports related to health information technology to determine how healthcare systems responded to these events, recognizing that certain types of solutions such as training and education have a limited impact. Methods A large database of over 1.7 million patient safety event reports was filtered to include those identified by the reporter as being related to health information technology. The resolution text was manually reviewed and coded into one or more of four categories: No Resolution, Training/Education, Policy, Information Technology-oriented solution. Results Most events (64%) did not include a resolution. Of those that did, Training/Education was the most commonly reported single or component of a multi-pronged solution (55%), followed by Information Technology (45%). Only 59 events (6% of resolutions) described more than one method of resolution. Conclusion Health information technology-related patient safety event resolutions most often described a solution that suggested additional training or education for healthcare staff, despite the recognized limitations of training and education in resolving these events. Few events suggested multiple resolution methods. Ensuring health information technology-related events are resolved and incorporate effective solutions should be a continued focus area for healthcare systems.


Author(s):  
Karl E. Misulis ◽  
Mark E. Frisse

Evolution of healthcare systems and the constantly changing regulatory landscape continuously alter all facets of health information technology including access. Access to information systems must be controlled in order to protect privacy and confidentiality. Access systems must be flexible enough to be applicable regardless of device and location. While access must be secure, it cannot obstruct the efficient care of patients. Access controls depend on position because privileges and permissions depend on position. These controls are the method of enforcing authorization through mechanisms and policies. This chapter discusses some of the mechanisms of controlling access. Also discussed are some practical considerations for client and device strategy.


Sign in / Sign up

Export Citation Format

Share Document