Bringing Secure Wireless Technology to the Bedside

2009 ◽  
pp. 303-312
Author(s):  
Dawn-Marie Turner ◽  
Sunil Hazari

Wireless technology has broad implications for the healthcare environment. Despite its promise, this new technology has raised questions about security and privacy of sensitive data that is prevalent in healthcare organizations. All healthcare organizations are governed by legislation and regulations, and the implementation of enterprise applications using new technology is comparatively more difficult than in other industries. Using a configuration-idiographic case-study approach, this study investigated challenges faced by two Canadian healthcare organizations. In addition to interviews with management and staff of the organizations, a walk-through was also conducted to observe and collect first-hand data of the implementation of wireless technology in the clinical environment. In the organizations under examination, it was found that wireless technology is being implemented gradually to augment the wired network. Problems associated with implementing wireless technology in these Canadian organizations are also discussed. Because of different standards in this technology, the two organizations are following different upgrade paths. Based on the data collected, best practices for secure wireless access in these organizations are proposed.

Author(s):  
Dawn-Marie Turner ◽  
Sunil Hazari

Wireless technology has broad implications for the healthcare environment. Despite its promise, this new technology has raised questions about security and privacy of sensitive data that is prevalent in healthcare organizations. All healthcare organizations are governed by legislation and regulations, and the implementation of enterprise applications using new technology is comparatively more difficult than in other industries. Using a configuration-idiographic case-study approach, this study investigated challenges faced by two Canadian healthcare organizations. In addition to interviews with management and staff of the organizations, a walk-through was also conducted to observe and collect first-hand data of the implementation of wire-less technology in the clinical environment. In the organizations under examination, it was found that wireless technology is being implemented gradually to augment the wired network. Problems associated with implementing wireless technology in these Canadian organizations are also discussed. Because of different standards in this technology, the two organizations are following different upgrade paths. Based on the data collected, best practices for secure wireless access in these organizations are proposed.


2020 ◽  
Vol 7 (7) ◽  
pp. 843-851
Author(s):  
Joash Kiprotich Rono ◽  
Samson Wokabi Mwangi ◽  
John Omboto

This study attempts to analyze the capacity of prisons security structures in Nakuru main prison to prevent inmate’s escapes in the perspective of junior officers working in the institution who formed 80 % of the sample respondents in the study. This research adopted descriptive research design which involved the use of observation, case study approach and survey technique.  Data was collected majorly using questionnaires as data collection instruments and was self-administered to 142 junior prison officers who were directly involved in the facilitation of safe custody to prisoners in Nakuru main prisons. The observation checklist was also used to ascertain the state of the physical security infrastructure used to prevent escapes in Nakuru main prison. Data obtained was analyzed using statistical package for social sciences (SPSS) and presented using frequencies, pie charts and tables. The findings from the majority of the respondents showed a lack of permanent perimeter fence at 47.4 %, old dilapidated buildings at 28.9%, lack of the use of technology e.g CCTV at 19.7%, inadequate lighting system at14.5%.  The study recommendsconstruction of a modern security wall in the institution as a strategy to effectively prevent escapes, use of new technology e.g CCTV erection of a proper and adequate watchtowers/Sentries and provision of adequate lighting system at Nakuru main prisons. In addition, there is a need to escalate a similar study to all prison institutions in order to enrich the findings and recommendations for Policymakers in the criminal justice system.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Charbel Chedrawi ◽  
Yara Atallah

Purpose This paper aims to dynamically analyze the opportunities and challenges of AI in the defense sector in Lebanon or any security agency or any organization with sensitive data through a resource-based view perspective, the adoption of artificial intelligence (AI)/narrow AI applications in the Lebanese Armed Forces (LAF) and to diagnose the current strategic orientation toward innovation and technology within the LAF while avoiding isomorphism. Design/methodology/approach The methodology is based on a qualitative interpretive case-study approach collected from several departments of the LAF. In fact, there is a developing convention to use qualitative research approaches among which case studies to study information technology phenomena (Trauth and Jessup, 2000; Benbasat et al., 1987; Klein and Meyers, 1999). Data were collected through centered semi-structured in-depth interviews (two to three hours each) with an interview guide coded abductively between the researchers and the interviewees conducted in numerous departments of the LAF with their top officials and generals (O1, O2, O3…); the anonymity of the interviewees was kept due to the sensitivity of the data collected, which took place between September 2018 and March 2019. Data consolidation and processing were conducted using NVivo. Findings This paper shows that the LAF is undeniably facing many challenges among which isomorphism caused by the lack of resources; it also shows that narrow AI applications provide new avenues for the LAF to avoid such institutional isomorphism. Originality/value The role of narrow AI in limiting isomorphism in the defense sector.


2020 ◽  
Vol 4 (1) ◽  
pp. 107-148
Author(s):  
Mac Osazuwa-Peters ◽  
Margot Hurlbert

Aim: This article provides insight into the portfolio of regulations advancing Carbon Capture and Storage (CCS) deployment. Using a taxonomy of policy portfolio tools adapted for regulations specific to CCS, this research identifies regulatory gaps as well as supports for CCS projects. Design / Research methods: Through a case study approach, this article analyzes the regulatory provisions in six jurisdictions (Texas, North Dakota, the U.S, Saskatchewan, Alberta and Canada) which have a successful CCS facility. Analyzing the provisions and content of regulations in these jurisdictions, this article highlights regulatory supports or areas of gaps for CCS projects in each jurisdiction. Conclusions / findings: There is no uniform definition or categorization of CO2 as a hazard, waste, pollutant or commodity across jurisdictions. This has serious impact on CO2 transport, especially across jurisdictions. It also impacts the administration of storage systems for CCS facilities. Regulations focusing primarily on technical aspects of CCS including capture, transport, and liability predominate while there are less regulatory provisions for the financial aspects of CCS technology as well as public engagement and support. While capital grants and emission and tax credits are the predominant financial issues covered in regulations, contract for differences, streamlining emission trading across borders and enhancing cooperation and multilevel engagement in CCS warrant more attention. Originality / value of the article: Many scenarios to maintain global warming below 2 degrees Celsius require combinations of new technology including CCS. The focus on CCS cost as a barrier to deployment overshadows the needs for regulatory support as a means of reducing uncertainties and de-risking CCS investments.  


Author(s):  
Gavin J. Baxter ◽  
Thomas Connolly ◽  
Mark Stansfield

This paper investigates the implementation and use of an internal organisational blog by several departments in the HR division in a large public sector financial organisation in the UK. This qualitative study adopts a case study approach and examines the experiences of staff using the blog to explore whether it can facilitate organisational learning. The thinking and decisions that informed the pilot study are also investigated. Initial findings indicate that implementing an internal organisational blog does not revolve around the technology itself, but the work required to inform and educate staff about the idea of using a blog for working purposes. This paper has practical implications for the practitioner community with reference to organisational management informing them of issues to consider prior to implementing new technology in team environments. The paper also examines approaches towards maintaining technology initiatives (in this case blogs) once they are up and running. The unique focus of this paper is that it explores blog use from the perspective of individuals who have never used them before as opposed to a department that is already familiar with the technology.


Author(s):  
Gavin J. Baxter ◽  
Thomas Connolly ◽  
Mark Stansfield

This paper investigates the implementation and use of an internal organisational blog by several departments in the HR division in a large public sector financial organisation in the UK. This qualitative study adopts a case study approach and examines the experiences of staff using the blog to explore whether it can facilitate organisational learning. The thinking and decisions that informed the pilot study are also investigated. Initial findings indicate that implementing an internal organisational blog does not revolve around the technology itself, but the work required to inform and educate staff about the idea of using a blog for working purposes. This paper has practical implications for the practitioner community with reference to organisational management informing them of issues to consider prior to implementing new technology in team environments. The paper also examines approaches towards maintaining technology initiatives (in this case blogs) once they are up and running. The unique focus of this paper is that it explores blog use from the perspective of individuals who have never used them before as opposed to a department that is already familiar with the technology.


Author(s):  
Muhmmad Nizar Fahmi ◽  
Diyah Indiyati ◽  
Agus Purbathin Hadi

The changing period of generation to generation Z makes the existence of old media shifted by new media. Generation Z tends to rely on new technology to access information. Newspapers as the part of the old media can disappear over time. Jawa Pos as one of the newspapers in Indonesia makes a communication strategy to increase the reading interest of the younger generation. The strategy was made through a rubric of young people named Zetizen, previously named Detection. This study aimed to find out Jawa Pos communication strategy in increasing young people's reading interest through the Zetizen rubric. The research was conducted from February to April 2018 at the Java Bos office. The method used is descriptive qualitative method through a case study approach. The results of the study show that the communication strategy made by Jawa Pos is an online strategy and offline strategy through the Zetizen rubric. These two communication strategies are executed by different divisions, Community Division and Page Division. The online strategy that is carried out by the provision of content through social media and websites that are executed by Division Pages. Page Division is also responsible for one part of the offline strategy, which is providing content through the Zetizen rubric. Community Division handles the process of offline engagement through events held. Keywords: communication strategy; Jawa Pos; reading interest; Zetizen


Author(s):  
Elizabeth Auma Ochola ◽  
Dorothy Omollo ◽  
Norbert Basweti

Social networks are increasingly gaining importance in higher education by offering learners opportunity to virtually interact with colleagues and lecturers. The ability to leverage Social Networking Sites (SNS) for meaningful learning activities has the potential to benefit the modern adult learner who has to balance a career, family obligations, and the goals of attending college. This paper is a case study that highlights the use of Google Plus and Whatsup in the learning processes of MBA students at the University of Nairobi. The participants of this study were drawn from the MBA evening class of 500 students between ages 19 and49 years. The research used a single quantitative and qualitative case study approach to explore the benefits associated with incorporating social networking functionalities within an adult’s learning experience; the preferred social networking sites and why? Adult learners experiences in utilizing social networking services; the pros and cons of using the social networks in learning. The findings reveal positive uptake with a few challenges including: computer illiteracy, resistance to new technology, concerns for privacy and information overload from lecturers’ posts.


2021 ◽  
pp. 002188632110435
Author(s):  
Julie S. Ågnes

This study shows how introducing new technology can be like welcoming a digital colleague. Designed to mimic the actions of employees, robotic process automation is a technology that involves developing software robots to perform standardized tasks. Although beneficial for the firm, robotization may come at a cost for the employees, since the technology puts positions at risk by automating manual procedures. In this study, I used a case study approach to examine how employees responded to robotization in three organizations. The findings revealed that the employee responses were overwhelmingly constructive and positive. In addition to responding with a big-picture perspective and finding opportunities, the employees humanized software robots as new digital colleagues, with whom they developed relationships. The results discussed in this study contribute to understanding technology-driven change by empirically illustrating employees’ multidimensional—affective, behavioral, and cognitive—responses to robotization, and the supportive context securing implementation.


Sign in / Sign up

Export Citation Format

Share Document