Thursday, June 13, 2019

Safe use of Health Information Technology Research Paper

Safe use of Health Information Technology - Research Paper Example worthless workflow and inefficient communication inevitably create more health IT sentinel events. Although communication and workflow are vital, the clinical content must also be well-structured to enable effective communication (The vocalise Commission, 2015). For example, health records managers must be supplied with relevant and cogent information because they enter clinical data into systems on an as-is basis.Wrong or illegible data creates problems during retrieval. The success of any health IT framework also depends on internal organizational policies, procedures and cultures. These three aspects should be harmonious with the overall objectives of the health IT system. Some cultures, policies and procedures hinder the efficient operation of the system, leading to health sentinel IT situations (Johnson, 2014). The level of training received by health module determines their effectiveness in their duties. How ever, training is merely a means to an end. Employees should be taught to follow set policies and procedures or their training will be futile. The type of ironware and software used in a specific health IT framework determines the frequency with which sentinel events occur. To this effect, hardware and software must be relevant, usable, and adaptable (The Joint Commission, 2015). External factors, including vendor and other issues occurring in the external environment can also cause a health sentinel IT event. In some cases, wakeless and social challenges (e.g., culture) can increase the number of health sentinel IT situations (Balgrosky, 2014). Research shows that regular system appraisal and monitoring significantly reduces the probability of critical situations

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.