scholarly journals The Rising Frequency of IT Blackouts Indicates the Increasing Relevance of IT Emergency Concepts to Ensure Patient Safety

2016 ◽  
Vol 25 (01) ◽  
pp. 130-137 ◽  
Author(s):  
U. Sax ◽  
M. Lipprandt ◽  
R. Röhrig

Summary Introduction: As many medical workflows depend vastly on IT support, great demands are placed on the availability and accuracy of the applications involved. The cases of IT failure through ransomware at the beginning of 2016 are impressive examples of the dependence of clinical processes on IT. Although IT risk management attempts to reduce the risk of IT blackouts, the probability of partial/total data loss, or even worse, data falsification, is not zero. The objective of this paper is to present the state of the art with respect to strategies, processes, and governance to deal with the failure of IT systems. Methods: This article is conducted as a narrative review. Results: Worst case scenarios are needed, dealing with methods as to how to survive the downtime of clinical systems, for example through alternative workflows. These workflows have to be trained regularly. We categorize the most important types of IT system failure, assess the usefulness of classic counter measures, and state that most risk management approaches fall short on exactly this matter. Conclusion: To ensure that continuous, evidence-based improvements to the recommendations for IT emergency concepts are made, it is essential that IT blackouts and IT disasters are reported, analyzed, and critically discussed. This requires changing from a culture of shame and blame to one of error and safety in healthcare IT. This change is finding its way into other disciplines in medicine. In addition, systematically planned and analyzed simulations of IT disaster may assist in IT emergency concept development.

CNS Spectrums ◽  
2015 ◽  
Vol 20 (3) ◽  
pp. 215-222 ◽  
Author(s):  
James L. Knoll

Responding to the California Supreme Court’s decision and its related legal obligations in Tarasoff v. Regents of Univ. of California over 30 years ago has become a standard part of mental health practice. This case influenced legal requirements governing therapists’ duty to protect third parties in nearly every state in the country. The final ruling in Tarasoff emphasized that therapists have a duty to protect individuals who are being threatened with bodily harm by their patients.This article will provide a brief overview and update on duty to protect legal requirements. Clinical guidelines for addressing threats and the duty to protect will be discussed, along with risk management approaches. The article will conclude with a sample vignette illustrating these principles.


2009 ◽  
Vol 3 (5-6) ◽  
pp. 85-89
Author(s):  
Alexandra Horobet ◽  
Sorin Dumitrescu ◽  
Cosmin Joldes

The purpose of this paper is to provide an understanding of corporate risk management practices in Romanian companies, by investigating the risk management approaches Romanian companies take. Our main findings are that Romanian managers are not aware of the magnitude of exposure their companies have to various types of risk – hazard, operational, financial and strategic risks, while they are able to manage rather well all these risks, even the ones that have the lowest impact on the business. At the same time, risk management systems employed by Romanian companies are rather inarticulate and based on traditional approaches towards risk management, which might represent by itself a major source of risk, given the complexity of the business environment they face.


Author(s):  
Mustafa Yuksel ◽  
Asuman Dogac ◽  
Cebrail Taskin ◽  
Anil Yalcinkaya

The PHR systems need to be integrated with a wide variety of healthcare IT systems including EHRs, electronic medical devices, and clinical decision support services to get their full benefit. It is not possible to sustain the integration of PHRs with other healthcare IT systems in a proprietary way; this integration has to be achieved by exploiting the promising interoperability standards and profiles. This chapter provides a survey and analysis of the interoperability standards and profiles that can be used to integrate PHRs with a variety of healthcare applications and medical data resources, including EHR systems to enable access of a patient to his own medical data generated by healthcare professionals; personal medical devices to obtain the patient’s instant physiological status; and the clinical decision support services for patient-physician shared decision making.


2020 ◽  
pp. 163-175
Author(s):  
Preston G. Smith ◽  
Guy M. Merritt

2009 ◽  
Vol 9 (6) ◽  
pp. 2015-2026 ◽  
Author(s):  
F. Dall'Osso ◽  
M. Gonella ◽  
G. Gabbianelli ◽  
G. Withycombe ◽  
D. Dominey-Howes

Abstract. Australia is vulnerable to the impacts of tsunamis and exposure along the SE coast of New South Wales is especially high. Significantly, this is the same area reported to have been affected by repeated large magnitude tsunamis during the Holocene. Efforts are under way to complete probabilistic risk assessments for the region but local government planners and emergency risk managers need information now about building vulnerability in order to develop appropriate risk management strategies. We use the newly revised PTVA-3 Model (Dall'Osso et al., 2009) to assess the relative vulnerability of buildings to damage from a "worst case tsunami" defined by our latest understanding of regional risk – something never before undertaken in Australia. We present selected results from an investigation of building vulnerability within the local government area of Manly – an iconic coastal area of Sydney. We show that a significant proportion of buildings (in particular, residential structures) are classified as having "High" and "Very High" Relative Vulnerability Index scores. Furthermore, other important buildings (e.g., schools, nursing homes and transport structures) are also vulnerable to damage. Our results have serious implications for immediate emergency risk management, longer-term land-use zoning and development, and building design and construction standards. Based on the work undertaken here, we recommend further detailed assessment of the vulnerability of coastal buildings in at risk areas, development of appropriate risk management strategies and a detailed program of community engagement to increase overall resilience.


1996 ◽  
Vol 11 (4) ◽  
pp. 333-346 ◽  
Author(s):  
Fred J. Heemstra ◽  
Rob J. Kusters

Most software projects take place in a volatile environment in which many dangers exist that may affect the successful outcome of the project. After completion of the project an evaluation may show that many of the problems encountered during the project could have been foreseen before they actually occurred. Risk management is an approach that is aimed at predicting the occurrence of this type of problem and at taking counter measures to either prevent them from affecting the project or to soften their impact. In this paper the basic activities related to risk management are described. Furthermore a concrete method aimed at supporting risk management is presented. This method has been used successfully in practice. Some of the results obtained by using it are presented on the basis of five cases. Some conclusions are that: (1) the use of a short and structured checklist will ease identification of and discussions about risks, (2) a risk management method in which explicit use is made of a group related approach, involving all parties, will increase reliability and acceptance of the results, and (3) involvement of a neutral process risk advisor will further both the successful use of the method and the acceptance of the results.


Sign in / Sign up

Export Citation Format

Share Document