BCSH: The specification and use of Information Technology (IT) systems in Blood Transfusion Practice

2007 ◽  
Vol 17 (3) ◽  
pp. 150-150 ◽  
Author(s):  
M. Nightingale ◽  
C. Prowse
2021 ◽  
pp. 25-29
Author(s):  
Rakesh Kumar Sharma ◽  
Shahid Anjum Awan ◽  
Vijay Sawhney

INTRODUCTION: Blood transfusion is an important concern for the society, as it is life saving for patients with bleeding disorders, accidents, surgeries, inherited/acquired hematological diseases and malignancies. Generally, donors are classied into the following categories: voluntary, family replacement, remunerated or paid donors, and autologous donor. AIMS & OBJECTIVES:To understand the importance of Blood & its safe Transfusion practice in a Teaching Hospital. METHODOLOGY: An Observational study was conducted over a period of 12 months from January 2019 to December 2019 in a 750 –bedded Tertiary Care Hospital of Jammu(UT). OBSERVATIONS: In addition to providing Blood-Transfusion Services to the patients admitted in SMGS Hospital Jammu & Other Associated Hospitals of GMC Jammu, the Blood-Bank is also catering to the needs of Registered Private Nursing Homes & Hospitals of Jammu(UT).This Blood-Bank has exceptionally maintained a record of consuming the whole stock of Blood without wasting even a single pint of blood. DISCUSSION: The Aim of Blood Transfusion Services is to supply good Quality of Blood & its Components to the Patients & avoid any risk to the Donors as well as Recepients. Hence it is extremely essential to institute strict Quality Control Measures RECOMMENDATIONS: Recommended that Upgradation of Blood-Bank is essential to cater with the needs of Additional bed-strength that SMGS Hospital is going to acquire in the coming future.


Vox Sanguinis ◽  
1969 ◽  
Vol 16 (4-5) ◽  
pp. 247-251
Author(s):  
T.J. Greenwalt

Author(s):  
Bamidele Ola ◽  
Iyobor Egho-Promise

The emergence of ecommerce almost three decades ago has completely transformed the approach to purchasing goods and services across various countries in the world. Almost every country in the globe, now have some form of ecommerce operations, this has further been enhanced by the stay at home COVID-19 induced lockdowns. The value and volume of transactions has also increased in transactions. However, there has been security concerns impacting ecommerce operations, which has in part, led to increasing adoption of hosting ecommerce systems in the public cloud. Threat modelling offer mechanisms to enhance the security of information technology (IT) systems. In this paper, we apply different threat modelling techniques to decompose the migration of an on-premise hosted ecommerce system to the public cloud and also evaluate these threat modelling techniques.


2014 ◽  
Vol 2014 ◽  
pp. 1-4 ◽  
Author(s):  
Mostafa Alavi-Moghaddam ◽  
Mahmoud Bardeh ◽  
Hossein Alimohammadi ◽  
Habib Emami ◽  
Seyed-Mostafa Hosseini-Zijoud

Background. Blood transfusion is the cornerstone of therapy for many serious and common diseases. This study was performed to assess blood transfusion practice before and after implementation of type and screen protocol in emergency department of a university affiliated hospital in Iran, 2012-2013.Methods. An audit was studied before and after the implementation of type and screen protocol. The number of blood transfusions, time interval between blood order and transfusion, cross-match to transfusion ratio (C/Tratio), and transfusion index (TI) were checked.C/Tratio was used as a measure of the efficiency of blood ordering practice. We compared our results before and after implementation of type and screen protocol.Results. In present study after implementation of type and screen protocol, the time interval between requesting blood transfusion and transfusion of blood has decreased significantly (P<0.001). The number of blood transfusions required by actual patients increased significantly from 1/2 to 2 (P<0.001). The average cross-match to transfusion (C/T) ratio got near 1.13 from 1.41 and TI got near 0.91 from 0.58 (P<0.001).Conclusion. The implementation of T&S protocol has been proven to be safe, efficient, and beneficial to the transfusion practice of our hospital from the current study.


Author(s):  
Kecheng Liu ◽  
Michael Hu

Technological infrastructure must satisfy business requirements, and more importantly, it must be able to evolve to meet the new requirements. This requires not only a good understanding of business strategies, visions and functions, but also the evolvability built into the architecture. This chapter first presents a semiotic approach to the business and information technology (hereafter IT) systems. This approach treats the IT system as an integral part of the business organisation. The chapter then discusses the applicability of a semiotic framework in the e-government in the UK, particularly in an evolvable architecture for e-policing. The semiotic framework is applied in the assessment of the e-government strategies and systems requirements, and in the analysis of these requirements to the e-architecture. A case study demonstrating the applicability of the framework is conducted to evaluate the implementation of the national Information Systems Strategy for the Police Service (ISS4PS) and the Crime Justice Information Technology community (CJIT) in the UK.


Author(s):  
Stephen Crossley

This chapter explains how austerity has led to an increasingly fragmented and disparate economy and geography of welfare. These changes have affected people's ability to access services, leaving some of them isolated and excluded from activities that they previously enjoyed. The chapter then questions the use of new information technology (IT) systems and the related expansion of cybernetic relations to register, administer, manage, and target some of the most vulnerable members of society. It argues that these virtual systems emerge as a way of dealing with cases that need physical and in-depth contact in the context of austerity budgets rather than a tested way of pooling information to save lives. This argument suggests that they can also be a way to exclude service users from decision-making about their entitlement and ultimately their lives, reconfiguring the power relations between the public and the state.


Sign in / Sign up

Export Citation Format

Share Document