Tuesday, April 30, 2019

Safe use of Health Information Technology Research Paper

Safe use of Health Information Technology - Research Paper Example curt work flow and in effectual communication inevitably create more health IT sentinel events. Although communication and workflow are vital, the clinical content must also be well-structured to enable effective communication (The spliff Commission, 2015). For example, health records managers must be supplied with relevant and cogent information because they enter clinical data into systems on an as-is basis.Wrong or illegible data creates problems during retrieval. The success of any health IT framework also depends on internal organizational policies, procedures and cultures. These three aspects should be congruent with the overall objectives of the health IT system. Some cultures, policies and procedures hinder the efficient operation of the system, leading to health sentinel IT situations (Johnson, 2014). The level of training received by health faculty determines their effectiveness in their duties. However, training is merely a means to an end. Employees should be taught to follow set policies and procedures or their training will be futile. The type of hardware and software used in a particular proposition health IT framework determines the frequency with which sentinel events occur. To this effect, hardware and software must be relevant, usable, and adaptable (The vocalize Commission, 2015). External factors, including vendor and other issues occurring in the external environment can also cause a health sentinel IT event. In some cases, legal and social challenges (e.g., culture) can increase the number of health sentinel IT situations (Balgrosky, 2014). Research shows that regular system appraisal and monitoring significantly reduces the probability of critical situations

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.