scholarly journals Survey of Rehabilitation Clinicians in the United States: Barriers and Critical Use-Cases for mRehab Adoption

Author(s):  
John Morris ◽  
Nicole Thompson ◽  
Tracey Wallace ◽  
Mike Jones ◽  
Frank DeRuyter

AbstractThis paper presents data and analysis from survey research conducted by the Rehabilitation Engineering Research Center on Information and Communications Technology Access for Information and Communications Technology (ICT) Access for Community Living, Health and Function (LiveWell RERC) on the perceptions and attitudes of clinical professionals in rehabilitation medicine regarding mobile health (mHealth) and mobile rehabilitation (mRehab) practices, techniques and technology in the United States. The analytical focus of this paper is on two key survey questions related to specific barriers and opportunities (most critical use-cases) for adopting mHealth/mRehab interventions. We present response data to these two questions segmented by clinical specialty – physical, occupational, speech and recreation therapy – to identify possible variation between and among these rehabilitation professions. This analysis provides a detailed map of the terrain of clinician expectations and experiences for the adoption and implementation of mHealth/mRehab interventions in the United States, and possibly other countries. Results show substantial support for mRehab interventions and technologies across all four clinical specialties. The most frequently identified barriers to effective use of mobile and internet technologies to support patients remotely focused on patients (ability to learn and use the technology, and internet access), not clinicians. The was more variability among clinical specializations regarding best use-cases. Tracking patient adherence to prescribed activities and supporting patients in the home and community were the most frequently cited best use cases across the whole sample.

2011 ◽  
pp. 654-663
Author(s):  
Som Naidu

The number of distance education and e-learning programs has been on the rise for some time now (Hannan & Silver, 2000). In the United States, the National Survey of Information Technology in Higher Education, as part of its Campus Computing Project, carries out regular surveys of the use of information and communications technology (ICT) in higher education (USA-DOE, 2000).


2007 ◽  
Vol 8 (2) ◽  
pp. 146-173 ◽  
Author(s):  
Susanto Basu ◽  
John Fernald

Abstract Many people point to information and communications technology (ICT) as the key for understanding the acceleration in productivity in the United States since the mid-1990s. Stories of ICT as a ‘general-purpose technology’ suggest that measured total factor productivity (TFP) should rise in ICT-using sectors (reflecting either unobserved accumulation of intangible organizational capital; spillovers; or both), but with a long lag. Contemporaneously, however, investments in ICT may be associated with lower TFP as resources are diverted to reorganization and learning. We find that US industry results are consistent with general-purpose technology (GPT) stories: the acceleration after the mid-1990s was broad-based - located primarily in ICT-using industries rather than ICT-producing industries. Furthermore, industry TFP accelerations in the 2000s are positively correlated with (appropriately weighted) industry ICT capital growth in the 1990s. Indeed, as GPT stories would suggest, after controlling for past ICT investment, industry TFP accelerations are negatively correlated with increases in ICT usage in the 2000s.


Vojno delo ◽  
2021 ◽  
Vol 73 (1) ◽  
pp. 1-14
Author(s):  
Dejan Vuletić ◽  
Miloš Milenković ◽  
Anđelija Đukić

Modern society is critically dependent on information as a strategic resource and information and communications technology, which carries out its transmission, processing and exchange. Information and communications technology has created a new environment, cyberspace, in which tensions, disagreements and incidents are becoming more frequent. In recent years, the mentioned area has increasingly appeared as a domain of conflict between the leading world and regional powers. The paper gives a brief description of the concept of operations in several domains and elements of the new concept of joint warfare of the US Armed Forces. The importance of cyberspace for the US has been pointed out with a review of organizational changes and the adoption of certain strategic and doctrinal documents. The paper presents certain events and activities in cyberspace, in recent years, between the United States on the one hand, and Iran and North Korea on the other. The United States Cyber Command (USCYBERCOM) was created in 2009. USCYBERCOM was elevated to the status of a full and independent unified command in May 2018. It indicates the importance of cyberspace for the Pentagon. In many ways, the separation of USCYBERCOM from Strategic Commands, which oversees strategic rejection, is a symbol of the change in the US attitude in cyberspace from "defensive" to "persistent engagement." The United States is still the strongest force in cyberspace and shows ambition to carry out cyber operations at all levels of command. It is unlikely that Iran will provoke the United States into a large-scale military conflict and wage a direct war in cyberspace. Iran has rapidly improved its ability to operate in cyberspace, and it is estimated that this trend will continue. The imbalance can prevent Iran from a direct military conflict with the United States and its allies. Greater action is expected with an asymmetric arsenal such as e.g. cyber attacks. Iranian and North Korean operations are similar in target selection, planning and exploitation of attacks. Both countries undertake different variants of phishing attacks in an attempt to deceive their victims into downloading malicious software by presenting it as a legitimate link or file. Whereas Iran usually had a motive only to cause disruption to the functioning of financial institutions, North Korean motive was both financial and political retaliation. Certain discovered incidents indicate that North Korea devotes much more time to conducting invasive surveillance before carrying out attacks. Numerous examples show that some activities have been prepared over the years and with the support of certain state bodies. Regardless of the fact that an investigation has been launched against certain groups, most often sponsored by states, it is unlikely that this will deter countries such as North Korea and Iran from giving up further activities and will pose an increasing threat to the US security.


Author(s):  
Som Naidu

The number of distance education and e-learning programs has been on the rise for some time now (Hannan & Silver, 2000). In the United States, the National Survey of Information Technology in Higher Education, as part of its Campus Computing Project, carries out regular surveys of the use of information and communications technology (ICT) in higher education (USA-DOE, 2000).


Author(s):  
Jacqueline Strenio ◽  
Joyita Roy Chowdhury

Workplace sexual harassment is a serious occupational hazard, adversely affecting workers' employment trajectories, economic well-being, and mental and physical health. Prior to COVID-19, it was widespread and primarily perpetrated by men against women, both in the physical workplace and physical and virtual public spaces associated with work. This chapter examines how the transition to remote work has effected changes in the prevalence and types of sexual harassment, paying attention to its gendered nature. Remote work holds both promise and peril. While exposure to physical harassment has fallen, information and communications technology has increased the risk of sexual harassment in virtual spaces. The cases of the United States and India are explored in more detail to compare worker experiences across the Global North and Global South, in countries with vastly different socioeconomic structures. This chapter contributes to the understanding of the benefits and challenges of remote work in combatting sexual harassment.


Sign in / Sign up

Export Citation Format

Share Document