CNS Spectrums ◽  
2015 ◽  
Vol 20 (3) ◽  
pp. 215-222 ◽  
Author(s):  
James L. Knoll

Responding to the California Supreme Court’s decision and its related legal obligations in Tarasoff v. Regents of Univ. of California over 30 years ago has become a standard part of mental health practice. This case influenced legal requirements governing therapists’ duty to protect third parties in nearly every state in the country. The final ruling in Tarasoff emphasized that therapists have a duty to protect individuals who are being threatened with bodily harm by their patients.This article will provide a brief overview and update on duty to protect legal requirements. Clinical guidelines for addressing threats and the duty to protect will be discussed, along with risk management approaches. The article will conclude with a sample vignette illustrating these principles.


2016 ◽  
Vol 25 (01) ◽  
pp. 130-137 ◽  
Author(s):  
U. Sax ◽  
M. Lipprandt ◽  
R. Röhrig

Summary Introduction: As many medical workflows depend vastly on IT support, great demands are placed on the availability and accuracy of the applications involved. The cases of IT failure through ransomware at the beginning of 2016 are impressive examples of the dependence of clinical processes on IT. Although IT risk management attempts to reduce the risk of IT blackouts, the probability of partial/total data loss, or even worse, data falsification, is not zero. The objective of this paper is to present the state of the art with respect to strategies, processes, and governance to deal with the failure of IT systems. Methods: This article is conducted as a narrative review. Results: Worst case scenarios are needed, dealing with methods as to how to survive the downtime of clinical systems, for example through alternative workflows. These workflows have to be trained regularly. We categorize the most important types of IT system failure, assess the usefulness of classic counter measures, and state that most risk management approaches fall short on exactly this matter. Conclusion: To ensure that continuous, evidence-based improvements to the recommendations for IT emergency concepts are made, it is essential that IT blackouts and IT disasters are reported, analyzed, and critically discussed. This requires changing from a culture of shame and blame to one of error and safety in healthcare IT. This change is finding its way into other disciplines in medicine. In addition, systematically planned and analyzed simulations of IT disaster may assist in IT emergency concept development.


2009 ◽  
Vol 3 (5-6) ◽  
pp. 85-89
Author(s):  
Alexandra Horobet ◽  
Sorin Dumitrescu ◽  
Cosmin Joldes

The purpose of this paper is to provide an understanding of corporate risk management practices in Romanian companies, by investigating the risk management approaches Romanian companies take. Our main findings are that Romanian managers are not aware of the magnitude of exposure their companies have to various types of risk – hazard, operational, financial and strategic risks, while they are able to manage rather well all these risks, even the ones that have the lowest impact on the business. At the same time, risk management systems employed by Romanian companies are rather inarticulate and based on traditional approaches towards risk management, which might represent by itself a major source of risk, given the complexity of the business environment they face.


2020 ◽  
pp. 163-175
Author(s):  
Preston G. Smith ◽  
Guy M. Merritt

Author(s):  
Dieter Fink

Under the system of e-commerce, organisations leave themselves open to attack which can have catastrophic consequences. Recent well-publicised business disruptions to firms such as Northwest Airlines and Ebay have had significant business impacts. The chapter identifies the differences in risk management approaches for older information technology systems and those required for e-commerce. The benefits and the critical success factors for an e-commerce risk management methodology are identified and discussed. A literature survey revealed the existence of only two methodologies with potential suitability for e-commerce risk management. They are evaluated against the critical success factors. The chapter recommends a program of research to make risk management more dynamic and interactive particularly for the operational aspects of e-commerce.


2019 ◽  
Author(s):  
Shiqiang Du ◽  
Xiaotao Cheng ◽  
Qingxu Huang ◽  
Ruishan Chen ◽  
Philip Ward ◽  
...  

Abstract. A mega-flood in 1998 caused tremendous losses in China, and triggered large investments in flood risk management (Bryan et al., 2018). However, rapid urbanization and climate change pose new challenges and it is time to rethink whether China is prepared for the next mega-flood. In China’s fast growing economy, with rapid urbanization, novel flood risk management approaches are required in addition to reinforcing structural protection, such as levees. These include a risk-based urban planning and a coordinated water governance system with public participation.


Sign in / Sign up

Export Citation Format

Share Document