Audit trail requirements

2021 ◽  
Author(s):  
Derrick Tapscot ◽  
◽  
Jeremey Connor ◽  
Greg Bischof ◽  
Eugene Tung ◽  
...  
Keyword(s):  
2019 ◽  
Author(s):  
Alan Godfrey ◽  
Jennifer Goldsack ◽  
Pamela Tenaerts ◽  
Clara Aranda ◽  
Azad Hussain ◽  
...  

UNSTRUCTURED Technology is advancing at extraordinary rates with novel data being generated which could potentially revolutionary different therapeutic areas of medicine. However, adoption is medicine is hampered by a lack of trust, particularly for biometric monitoring technologies (BioMeTs) where a key question facing frontline healthcare professionals is are BioMeTs fit for purpose? Here, we discuss pragmatic barriers and guidance regarding BioMeTs, cumulating in a proposed guidance framework to better inform their development and deployment in digital medicine. Furthermore, the framework proposes a process to establish an audit trail of BioMeTs (hardware and algorithms), to instil trust amongst multidisciplinary users.


Author(s):  
Abhijit Pal ◽  
Rajiv Shinde ◽  
Manuel Selvi Miralles ◽  
Paul Workman ◽  
Johann de Bono

2018 ◽  
Vol 2 (1) ◽  
pp. 16-24
Author(s):  
Mohamad Muspawi
Keyword(s):  

Penelitian ini bertujuan untuk mengetahui kondisi nyata implementasi supervisi keuangan pada MAN Insan Cendekia provinsi Jambi. Dimana kebaradaan MAN Insan Cendekia provinsi Jambi merupakan rujukan lembaga pendidikan berbasiskan agama Islam di provinsi Jambi dalam hal kualitas kelembagaannya. Target khusus yang ingin dicapai dari penelitian ini adalah: 1). Bagaimana implementasi supervisi keuangan di MAN Insan Cendekia Provinsi Jambi?. 2). Apa saja kendala  implementasi supervisi keuangan di MAN Insan Cendekia Provinsi Jambi?. Metode penelitian yang digunakan adalah metode kualitatif deskriptif, yang mana peneliti menguraikan temuan penelitian secara naratif. Teknik pengumpulan data yang gunakan adalah teknik obervasi, dokumentasi, dan wawancara. Untuk mengecek validitas data maka penulis melakukan ketekunan pengamatan, triangulasi, member check, audit trail. Dan untuk menganalisis data maka penulis melakukan penelaahan dan reduksi data, unitisasi data, kategorisasi data, dan interpretasi data. Hasil penelitian menunjukkan bahwa: 1. Implementasi supervisi keuangan di MAN Insan Cendekia Provinsi Jambi dilaksanakan dalam bentuk: a. Supervisi dengan pemantauan langsung harian. b. Supervisi berdasarkan penilaian laporan bulanan. c. Supervisi melalui pelatihan internal.  2. Kendala  implementasi supervisi keuangan di MAN Insan Cendekia Provinsi Jambi sebagai berikut: a. Tingginya kesibukan kepala Madrasah. b. Staf keuangan ada yang sakit ketika disupervisi.  


2016 ◽  
Vol 21 ◽  
pp. 23-32 ◽  
Author(s):  
Olivia Rossanese ◽  
Suzanne Eccles ◽  
Caroline Springer ◽  
Amanda Swain ◽  
Florence I. Raynaud ◽  
...  

Author(s):  
Marian Carcary

The merits of qualitative research remain an issue of ongoing debate and investigation. Qualitative researchers emphasise issues such as credibility, dependability, and transferability in demonstrating the trustworthiness of their research outcomes. This refers to the extent to which the research outcomes are conceptually sound and serves as the basis for enabling other researchers to assess their value. Carcary (2009) proposed trustworthiness in qualitative inquiry could be established through developing a physical and intellectual research audit trail – a strategy that involves maintaining an audit of all key stages and theoretical, methodological, and analytical decisions, as well as documenting how a researcher’s thinking evolves throughout a research project. Since 2009, this publication has been cited in greater than 600 studies. The current paper provides an analysis of the use and value of the research audit trail, based on the author’s application of this strategy across diverse research projects in the field of Information Systems management over a ten year time period. Based on a critical reflection on insights gained through these projects, this paper provides an in‑depth discussion of a series of guidelines for developing and applying the research audit trail in practice. These guidelines advance existing thinking and provide practical recommendations in relation to maintaining a research audit trail throughout a research project. Based on these guidelines and the core issues that should be covered at a physical and intellectual research audit trail level, a checklist that can be tailored to each project’s context is provided to support novice researchers and those who are new to the research audit trail strategy. As such, this paper demonstrates commitment to rigor in qualitative research. It provides a practical contribution in terms of advancing guidelines and providing a supporting checklist for ensuring the quality and transparency of theoretical, methodological, and analytical processes in qualitative inquiry. Embedding these guidelines throughout the research process will promote critical reflection among researchers across all stages of qualitative research and, in tracing through the researcher’s logic, will provide the basis for enabling other researchers to independently assess whether the research findings can serve as a platform for further investigation.


2012 ◽  
pp. 1112-1125
Author(s):  
Liam Peyton ◽  
Jun Hu

E-health networks can enable integrated healthcare services and data interoperability in the form of electronic health records accessible via Internet technology. Efficiency and quality of care can be improved for example by: streamlining administrative processes involving prescriptions and insurance payments; providing remote access to specialists through telemedicine; or correlating data from clinics, pharmacies and emergency rooms to detect potential adverse events. However, a major requirement to enable adoption of e-health networks is the ability to address issues around security, privacy and trust in a systematic manner. In particular, privacy legislation, regulatory guidelines, and organizational policies require that a framework for privacy protection must be established. Federated identity management can be used to systematically protect patient and health care provider identities in a single sign on framework that controls access to patient data, but an audit trail and reporting mechanism is needed in order to ensure and validate compliance. In this chapter, the authors use example e-health scenarios to analyze the legal, business and technical issues that need to be addressed.


Sign in / Sign up

Export Citation Format

Share Document