scholarly journals Managing ICT in Healthcare Organization

2011 ◽  
pp. 1357-1372 ◽  
Author(s):  
Nasriah Zakaria ◽  
Shafiz Affendi ◽  
Norhayati Zakaria

The objective of this chapter is to illustrate a case study of a medical research institute in Malaysia in order to discuss issues pertaining to ICT adoption in healthcare organizations, in particular exploring the culture, challenges, and issues of ICT adoption among medical teams, patients, etc. In this chapter, we examine the question of ‘What are the challenges of implementing ICT in healthcare organizations?’ Some of the lessons learned from the case study were: ICT was successfully adopted and implemented based on several factors such as supportive organizational culture, competent IT workers, committed IT department and heavy investment on ICT infrastructure. Yet challenges also arise which hinges upon factors like initial deployment of outside IT resources or expertise for ICT implementation, lack of user training and continuous communication between involved parties in the initial stage.

Author(s):  
Nasriah Zakaria ◽  
Shafiz Affendi ◽  
Norhayati Zakaria

The objective of this chapter is to illustrate a case study of a medical research institute in Malaysia in order to discuss issues pertaining to ICT adoption in healthcare organizations, in particular exploring the culture, challenges, and issues of ICT adoption among medical teams, patients, etc. In this chapter, we examine the question of ‘What are the challenges of implementing ICT in healthcare organizations?’ Some of the lessons learned from the case study were: ICT was successfully adopted and implemented based on several factors such as supportive organizational culture, competent IT workers, committed IT department and heavy investment on ICT infrastructure. Yet challenges also arise which hinges upon factors like initial deployment of outside IT resources or expertise for ICT implementation, lack of user training and continuous communication between involved parties in the initial stage.


2020 ◽  
Author(s):  
Ying He ◽  
Cunjin Luo

Abstract Background: The recent industry reports show that the number of security incidents in healthcare sector is still increasing, especially the high severity incident, such as data leakage incident and ransomware, which can lead to significant impact on healthcare services. It is imperative for the organizations to learn lessons from those incidents. Traditional ways to disseminate lessons learned are based on text approach, the linear format of which can obscure relationships among concepts and discourage readers from integrating information across ideas. Graphical diagrams can serve this purpose, as it can communicate both individual elements of information and relationships between them. Methods: The Generic Security Template (GST) has been proposed to support the exchange of lessons learned from security incidents. It utilises graphical notations to communicate both individual elements of information and relationships between them. This paper conducts a case study by adopting the GST to capture and structure the incident information of a data leakage incident in a UK healthcare organization in order to facilitate incident exchange. Results: The results show that, the GST was able to visualise and depict the key elements, including lessons learned, the associated security requirements and organizational contextual information identified from the selected data leakage incident case study from NHS. GST provides a unified way to communicate incident information. Conclusions: This research has significance for the healthcare organizations to improve their incident learning practices. It fosters an environment where different stakeholders can speak the same language while exchanging the lessons learned from the security incidents. Future work will consider apply the GST to analyse other complex security incidents such as the advanced persistent threats (APTs) in healthcare organizations and extend the use of the GST in other industries. Keywords: Security Assurance Modelling, Generic Security Template (GST), Security Incident, Healthcare Organization.


Author(s):  
Nurit L. Friedman ◽  
Nava Pliskin

Managers of healthcare organizations are increasingly aware that the potential of medical information systems exceeds mere support of routine administrative and clinical transaction processing. This chapter describes a case study about Maccabi Health Services, the second largest health maintenance organization in Israel and the first one to computerize clinical records resulting from routine transactions in doctors’ offices, laboratories, and pharmacies. In this case about decision-making support practices, recycling the content of existing databases made it possible to discover patterns of sub-optimal treatment without having to invest time and money in additional data-collection procedures. The case study thus demonstrates value-added utilization of patient data, beyond uses intended at the beginning, for effectively supporting the implementation and evaluation of disease-management programs. Lessons learned about organizational benefits reaped from the organization’s decision-support practices include implications for such initiatives as data warehousing, data mining, and online analytical processing.


2011 ◽  
Vol 15 (1) ◽  
Author(s):  
Michael L. Fetters ◽  
Tova Garcia Duby

Faculty development programs are critical to the implementation and support of curriculum innovation. In this case study, the authors present lessons learned from ten years of experience in faculty development programs created to support innovation in technology enhanced learning. Stages of curriculum innovation are matched to stages of faculty development, and important lessons for success as well as current challenges are delineated and discussed.


2018 ◽  
Vol 50 (04) ◽  
pp. 507-512
Author(s):  
S. CHANDIO ◽  
M. SADRY ◽  
A.A CHANDIO ◽  
A. H. ABRO ◽  
A. A. SHAH ◽  
...  
Keyword(s):  

Author(s):  
Kaye Chalwell ◽  
Therese Cumming

Radical subject acceleration, or moving students through a subject area faster than is typical, including skipping grades, is a widely accepted approach to support students who are gifted and talented. This is done in order to match the student’s cognitive level and learning needs. This case study explored radical subject acceleration for gifted students by focusing on one school’s response to the learning needs of a ten year old mathematically gifted student. It provides insight into the challenges, accommodations and approach to radical subject acceleration in an Australian school. It explored the processes and decisions made to ensure that a gifted student’s learning needs were met and identified salient issues for radical subject acceleration. Lessons learned from this case study may be helpful for schools considering radical acceleration.


i-com ◽  
2021 ◽  
Vol 20 (1) ◽  
pp. 19-32
Author(s):  
Daniel Buschek ◽  
Charlotte Anlauff ◽  
Florian Lachner

Abstract This paper reflects on a case study of a user-centred concept development process for a Machine Learning (ML) based design tool, conducted at an industry partner. The resulting concept uses ML to match graphical user interface elements in sketches on paper to their digital counterparts to create consistent wireframes. A user study (N=20) with a working prototype shows that this concept is preferred by designers, compared to the previous manual procedure. Reflecting on our process and findings we discuss lessons learned for developing ML tools that respect practitioners’ needs and practices.


2021 ◽  
pp. 026732312110283
Author(s):  
Judith Simon ◽  
Gernot Rieder

Ever since the outbreak of the COVID-19 pandemic, questions of whom or what to trust have become paramount. This article examines the public debates surrounding the initial development of the German Corona-Warn-App in 2020 as a case study to analyse such questions at the intersection of trust and trustworthiness in technology development, design and oversight. Providing some insights into the nature and dynamics of trust and trustworthiness, we argue that (a) trust is only desirable and justified if placed well, that is, if directed at those being trustworthy; that (b) trust and trustworthiness come in degrees and have both epistemic and moral components; and that (c) such a normatively demanding understanding of trust excludes technologies as proper objects of trust and requires that trust is directed at socio-technical assemblages consisting of both humans and artefacts. We conclude with some lessons learned from our case study, highlighting the epistemic and moral demands for trustworthy technology development as well as for public debates about such technologies, which ultimately requires attributing epistemic and moral duties to all actors involved.


Sign in / Sign up

Export Citation Format

Share Document