ORCID Profile
0000-0003-4980-8249
Current Organisation
University of Wollongong
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: IEEE
Date: 2013
Publisher: Springer Science and Business Media LLC
Date: 04-07-2012
DOI: 10.1007/S10916-012-9865-8
Abstract: Most hospital-based staff can be considered to be mobile but many hospital information systems (HIS) are based on fixed desk top computers. Wireless networks allow HIS to be brought to the point of care using mobile devices such as laptops on trolleys thus providing data which can aid in clinical decision-making. The research objective of this project focusses on the collaborative design of a laptop solution for providing data at the point of care. The research approach was based on a combination of action research and design science. Action research techniques including participant observation and informal one-to-one discussions were used to obtain information that was used to evolve the trolley design as a design artefact while addressing usability limitations. This paper presents three versions of the trolley design and how they evolved based on the feedback provided to the researchers from clinical use. Also these results show that using iterative action research techniques (planning, action, evaluation and reflection) in collaborative research can provide productive outcomes addressing a specific design objective within an acute care setting.
Publisher: Emerald
Date: 2006
Publisher: Springer Science and Business Media LLC
Date: 11-03-2010
DOI: 10.1007/S10916-009-9264-Y
Abstract: mWard is a project whose purpose is to enhance existing clinical and administrative decision support and to consider mobile computers, connected via wireless network, for bringing clinical information to the point of care. The mWard project allowed a limited number of users to test and evaluate a selected range of mobile-wireless infrastructure and mobile health care computing devices at the neuroscience ward at Southern Health's Monash Medical Centre, Victoria, Australia. Before the project commenced, the ward had two PC's which were used as terminals by all ward-based staff and numerous multi-disciplinary staff who visited the ward each day. The first stage of the research, outlined in this paper, evaluates a selected range of mobile-wireless infrastructure.
Publisher: Elsevier BV
Date: 02-2014
DOI: 10.1016/J.IJMEDINF.2013.10.008
Abstract: This paper introduces two concepts into analyses of information security and hospital-based information systems-- a Socio-Technical-Material theoretical framework and the Natural Hospital Environment. The research is grounded in a review of pertinent literature with previously published Australian (Victoria) case study data to analyse the way clinicians work with privacy and security in their work. The analysis was sorted into thematic categories, providing the basis for the Natural Hospital Environment and Socio-Technical-Material framework theories discussed here. Natural Hospital Environments feature inadequate yet pervasive computer use, aural privacy shortcomings, shared workspace, meagre budgets, complex regulation that hinders training outcomes and out-dated infrastructure and are highly interruptive. Working collaboratively in many cases, participants found ways to avoid or misuse security tools, such as passwords or screensavers for patient care. Workgroup infrastructure was old, architecturally limited, haphazard in some instances, and was less useful than paper handover sheets to ensure the quality of patient care outcomes. Despite valiant efforts by some participants, they were unable to control factors influencing the privacy of patient health information in public hospital settings. Future improvements to hospital-based organisational frameworks for e-health can only be made when there is an improved understanding of the Socio-Technical-Material theoretical framework and Natural Hospital Environment contexts. Aspects within control of clinicians and administrators can be addressed directly although some others are beyond their control. An understanding and acknowledgement of these issues will benefit the management and planning of improved and secure hospital settings.
Publisher: Elsevier BV
Date: 12-2009
DOI: 10.1016/J.IJMEDINF.2009.08.006
Abstract: This manuscript describes the health information system security threat lifecycle (HISSTL) theory. The theory is grounded in case study data analyzing clinicians' health information system (HIS) privacy and security (P&S) experiences in the practice context. The 'questerview' technique was applied to this study of 26 clinicians situated in 3 large Australian (across Victoria) teaching hospitals. Questerviews rely on data collection that apply standardized questions and questionnaires during recorded interviews. Analysis (using Nvivo) involved the iterative scrutiny of interview transcripts to identify emergent themes. Issues including poor training, ambiguous legal frameworks containing punitive threats, productivity challenges, usability errors and the limitations of the natural hospital environment emerged from empirical data about the clinicians' HIS P&S practices. The natural hospital environment is defined by the permanence of electronic HISs (e-HISs), shared workspaces, outdated HIT infrastructure, constant interruption, a P&S regulatory environment that is not conducive to optimal training outcomes and budgetary constraints. The evidence also indicated the obtrusiveness, timeliness, and reliability of P&S implementations for clinical work affected participant attitudes to, and use of, e-HISs. The HISSTL emerged from the analysis of study evidence. The theory embodies elements such as the fiscal, regulatory and natural hospital environments which impede P&S implementations in practice settings. These elements conflict with improved patient care outcomes. Efforts by clinicians to avoid conflict and emphasize patient care above P&S tended to manifest as security breaches. These breaches entrench factors beyond clinician control and perpetuate those within clinician control. Security breaches of health information can progress through the HISSTL. Some preliminary suggestions for addressing these issues are proposed. Legislative frameworks that are not related to direct patient care were excluded from this study. Other limitations included an exclusive focus on patient care tasks post-admission and pre-discharge from public hospital wards. Finally, the number of cases was limited by the number of participants who volunteered to participate in the study. It is reasonable to assume these participants were more interested in the P&S of patient care work than their counterparts, though the study was not intended to provide quantitative or statistical data. Nonetheless, additional case studies would strengthen the HISSTL theory if confirmatory, practice-based evidence were found.
Publisher: SAGE Publications
Date: 03-2009
Abstract: Home-based palliative care (hospice) services require comprehensive and fully integrated information systems to develop and manage the various aspects of their business, incorporating client data and management information. These systems assist in maintaining the quality of client care as well as improved management efficiencies. This article reports on a large not-for-profit home-based palliative care service in Australia, which embarked on a project to develop an electronic data management system specifically designed to meet the needs of the palliative care sector. This web-based client information management system represents a joint venture between the organization and a commercial company and has been a very successful project.
Publisher: ACM
Date: 24-11-2008
No related grants have been discovered for Linda Dawson.