Wednesday, September 25, 2019
Safe use of Health Information Technology Research Paper
Safe use of Health Information Technology - Research Paper Example Poor workflow and inefficient communication inevitably create more health IT sentinel events. Although communication and workflow are vital, the clinical content must also be well-structured to enable effective communication (The Joint Commission, 2015). For example, health records managers must be supplied with relevant and cogent information because they enter clinical data into systems on an as-is basis. Wrong or illegible data creates problems during retrieval. The success of any health IT framework also depends on internal organizational policies, procedures and cultures. These three aspects should be congruent with the overall objectives of the health IT system. Some cultures, policies and procedures hinder the efficient operation of the system, leading to health sentinel IT situations (Johnson, 2014). The level of training received by health staff determines their effectiveness in their duties. However, training is merely a means to an end. Employees should be taught to follow set policies and procedures or their training will be futile. The type of hardware and software used in a specific health IT framework determines the frequency with which sentinel events occur. To this effect, hardware and software must be relevant, usable, and adaptable (The Joint Commission, 2015). External factors, including vendor and other issues occurring in the external environment can also cause a health sentinel IT event. In some cases, legal and social challenges (e.g., culture) can increase the number of health sentinel IT situations (Balgrosky, 2014). Research shows that regular system appraisal and monitoring significantly reduces the probability of critical situations
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.