An Electronic Checklist Improves Transfer and Retention of Critical Information at Intraoperative Handoff of Care

2015 ◽  
Vol 120 (1) ◽  
pp. 96-104 ◽  
Author(s):  
Aalok V. Agarwala ◽  
Paul G. Firth ◽  
Meredith A. Albrecht ◽  
Lisa Warren ◽  
Guido Musch
2015 ◽  
Vol 59 (4) ◽  
pp. 169-170
Author(s):  
Aalok V. Agarwala ◽  
Paul G. Firth ◽  
Meredith A. Albrecht ◽  
Lisa Warren ◽  
Guido Musch

TAPPI Journal ◽  
2015 ◽  
Vol 14 (9) ◽  
pp. 609-616 ◽  
Author(s):  
FRÉDÉRIC CLERC ◽  
VIRGINIE CHAMBOST ◽  
PAUL STUART

The objective of this TAPPI JOURNAL (TJ) special feature is to synthesize critical information and take-away messages from the 2013 TAPPI Biorefinery Design Course in Green Bay, WI, USA, based on the presentations made, as well as discussions between participants and experts. The content of this feature was developed based on notes taken during the course; synthesis of critical information; identification of some critical results and figures included here; and identification of key messages that may be useful to TJ readers.


Author(s):  
David James Hudson

Drawing on a range of critical race and anti-colonial writing, and focusing chiefly on Anglo-Western contexts of librarianship, this paper offers a broad critique of diversity as the dominant mode of anti-racism in LIS. After outlining diversity's core tenets, I examine the ways in which the paradigm's centering of inclusion as a core anti-racist strategy has tended to inhibit meaningful treatment of racism as a structural phenomenon. Situating LIS diversity as a liberal anti-racism, I then turn to diversity's tendency to privilege individualist narratives of (anti-)racism, particularly narratives of cultural competence, and the intersection of such individualism with broader structures of political-economic domination. Diversity's preoccupation with demographic inclusion and individual behavioural competence has, I contend, left little room in the field for substantive engagement with race as a historically contingent phenomenon: race is ultimately reified through LIS diversity discourse, effectively precluding exploration of the ways in which racial formations are differentially produced in the contextually-specific exercise of power itself. I argue that an LIS foregrounding of race as a historical construct - the assumption of its contingency - would enable deeper inquiry into the complex ways in which our field - and indeed the diversity paradigm specifically - aligns with the operations of contemporary regimes of racial subordination in the first place. I conclude with a reflection on the importance of the Journal of Critical Information and Library Studies as a potential site of critical exchange from which to articulate a sustained critique of race in and through our field.


Mousaion ◽  
2019 ◽  
Vol 37 (3) ◽  
Author(s):  
Oluyemi Folorunso Ayanbode ◽  
Williams Ezinwa Nwagwu

This article concerns the study examining the use of collaborative technologies (CTs) for the acquisition, creation, sharing, transfer, and retention of knowledge by therapy team members (TTMs) in psychiatric hospitals, and the determinants of the use of CTs as well as how they relate to knowledge management (KM) practices. The skills of the TTMs in the use of CTs were also investigated. Carried out within the positivist and constructivist paradigms, a sample survey was conducted among TTMs from two purposively selected psychiatric hospitals in Southwest Nigeria. Quantitative data was collected from self-administered questionnaires completed by 283 TTMs and was analysed using the Statistical Package for Social Sciences (SPSS) 22. Qualitative data was collected from interviews conducted with four heads of departments. The study showed that the TTMs in the relevant hospitals used 26 different CTs for knowledge acquisition, creation, sharing, transfer, and retention. The largest proportion (84.5%) of the respondents confirmed that skill in the use of CTs determined the use of CTs for KM practices. More than half (54.3%) of the TTMs were highly skilled in the use of CTs for KM practices. The findings suggested that the respondents were positively inclined towards the use of CTs and that they were involved in the use of various CTs to facilitate KM practices and processes. It was found that task interdependence was characteristic of the TTMs’ work in the selected psychiatric hospitals, and that, to benefit from the potential advantages of task interdependence and to effectively employ CTs in operations and processes, TTMs’ skills in the use of CTs should be developed. In addition, professional ties among experts in different fields of specialisation should be encouraged.


Author(s):  
Ilia Pavlovich Mikhnev ◽  
Svetlana Vladimirovna Mikhneva

The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rights and obligations are enshrined; a number of powers cause the duality of the legal status of certain federal bodies of state power. The clarity and unambiguity of securing the rights and obligations of state bodies authorized in the field of information security are guarantees for effectively ensuring the security of important information infrastructure facilities.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


Sign in / Sign up

Export Citation Format

Share Document