Tuesday, December 10, 2019

Approaches to Health Informatics Samples †MyAssignmenthelp.com

Question: Discuss about the Approaches to Health Informatics. Answer: Overview According to the propositions of Right to Information, the government officials of diverse fields are entrusted with the responsibility to convey correct and authentic information to the general public (Kellermann and Jones 2013). This proposal would provide an insight into the different approaches towards the aspect of health informatics. The major highlights of the proposal are the development of aims and objectives, which would guide the researcher to deduce new facts from the scholarly articles on the proposed research topic (O'Leary 2013). Moreover, methodology would enhance the preconceived knowledge of the researcher in terms of accumulating essential data for the execution of the research (Panneerselvam 2014). Aim The aim of this proposal would be to expose what proportion of the medical staffs are not using RiskMan to report incidents along with the evaluation of the part of the experience of using the system is leading to staff not reporting incidents via RiskMan so that the effectiveness of the RiskMan can be identified. Objectives To identify what proportion of the medical staffs are not using RiskMan to report incidents To evaluate what part of the experience of using the system is leading to staff not reporting incidents via RiskMan To recommend strategies for increasing the use of RiskMan Research Questions "What proportion of the medical staff is not using RiskMan to report incidents?" "What part of the experience of using the system is leading to staff not reporting incidents via RiskMan?" Research Hypothesis H0: A huge proportion of medical staffs not use RiskMan to report incidents H1: A huge proportion of medical staffs use RiskMan to report incidents Literature Review In this chapter, various aspects of health informatics are discussed. Taking into consideration different and wide ranging sources would broaden the perspectives of the researcher regarding levying proper and correct information to the general public (Toennessen et al. 2013). One of the major highlights of this chapter would be the theoretical application of RiskMan, which is assistance in terms of spontaneous reporting of the hazardous instances. The revelations of the book entitled, Guide to Health Informatics would form an integral element in terms of outpouring the scholarly viewpoints on health informatics (Coiera 2015). Herein, lays the correlation with the word guide. Effective consideration of the revelations of the book would help the healthcare professionals to convey correct and authentic information to the service users. For this, certain technological considerations need to be followed by the healthcare organizations. Assistance from the book, Organizational aspects of health informatics: managing technological change would help the researcher to shed light on the practices adopted by the healthcare professionals for reporting the instances (Lorenzi and Riley 2013). Hilbers et al. (2013) depicts that utilization of RiskMan proves beneficial in terms of mitigating the intensity of the risk factors for the personnel as well as the service user. Adherence and compliance to the computer legislations, such as Data Prot ection Act (1998) helps in maintaining the safety and security of the official data as well as the personal belongings of the service users. Installation of security software in the profile of the service users can be correlated to the action of managing the technological changes for ensuring that the service users get the access to correct and authentic health related information (Zheng et al. 2014). Within this, one of an essential change is the adoption of the RiskMan software, which helps the healthcare personnel to mitigate the intensity of the risk factors through quantitative risk analysis (Lyapina et al. 2015). The advancement of science relates to the increased access to the health related information. Maeda et al. (2012) portray that an evidence of this is the wearable technology, which helps the service users to interact with the healthcare professionals at any point of time. The installation of the software in the watches worn by the service users aligns with the phrase of human-in-the-loop (Holzinger 2016). Maintenance of an integrated structure for the utilization of the software enhances the value of the preconceived approach towards health informatics (Kavaler and Alexander 2012). Delving deep into the aspect of informatics, the main motive is to inform people and upgrade their knowledge. Alexander and Kavaler (2012) affirm that in view of the earlier sentence, the field of health can be considered as a part of the informatics. Herein, lays a contrast between the generalization and categorization of the aspects of health and informatics. Theoretical application within this motive acts as medium for reducing the risks and adding quality to the living standards of the people (Coiera 2015). Maeda (2012) moreover argues that the generalization of people in the earlier sentence contradicts the limitation of Australia. Research Methodology Mackey and Gass (2015) stated that research methodology provides an overview of the research process so that the research result can be obtained in a systematic way. This section thus comprises of research philosophy, data collection process, data analysis technique, ethical consideration and the research limitations. Research Philosophy For every research, the researcher follows a certain philosophy, which helps in the establishment of authentic facts and conclusions (Sarantakos 2012). Mainly there are three kinds of philosophies, such as positivism, post-positivism and interpretivism. In case of the current research, the researcher would choose positivism and interpretivism (Taylor, Bogdan and DeVault 2015). Wahyuni (2012) portrays that the reason behind this selection is to deduce new facts from the real and scientific facts gathered from the scholarly articles on health informatics. Data Collection Data are collected in a research in order to obtain desired research result. () depicts that data can be collected through two methods- primary data collection and secondary data collection (Leening et al. 2012). Primary data are collected directly through the respondents of the research and collected through interviews and survey. On the other hand, secondary data are collected through sources like articles, peer journals, companys websites, statistical data in magazines and newspaper excerpt (Bryman and Bell 2015). In this research, the primary quantitative data is utilized for collecting data (Palinkas et al. 2015). Within this, 35 medical staffs from different hospitals and care homes would be surveyed regarding their use of RiskMan for reporting hazardous incidents. Survey questionnaire forms would be distributed to the staffs prior to the discussion session. Along with this, interview would be conducted on five managers of these hospitals in order to gain an insight into the ma nagerial approach on the use of software for levying information to the service users regarding healthcare. Overall, both the quantitative and qualitative data collection method would be chosen by the researcher for carrying out this research (Panneerselvam 2014). Data Analysis The collected data for the research is analyzed through two ways- quantitatively and qualitatively (Eriksson and Kovalainen 2015). The primary data are analyzed through quantitatively; on the other hand, secondary data is analyzed through qualitatively. Qualitative data analysis methods highlight the process of analyzing the sources relevant to the research topic are also referred for linking the anticipated findings with the developed objectives (Maxwell 2012). In this research, both the qualitatively and quantitatively methods is utilized in analyzing the primary and secondary data collection. Ethical Considerations Every research is conducted through the consideration of certain considerations by the researcher. Emerging successful in this direction adds value to the roles and responsibilities of the researcher as an individual (Miller et al. 2012). The major drive behind this is the conscious approach towards the preservation of dignity and sentiments of the samples (Silverman 2016). In this research, the researcher would adhere to the propositions of Data Protection Act (1998), which would enable the researcher to refrain from any kind of pressurization regarding the surveys and interviews. In other words, the samples would be at liberty to withdraw the process at once when they feel uncomfortable. This liberty aligns with the individuality of the samples and preservation of this individuality is the credit of the researcher in terms of maintaining research ethics (Flick 2015). Research Limitations Researchers make efforts to carry out the research in an efficient and effective manner. However, owing to the circumstances, the researcher fails to execute the research in great depth (Faden et al. 2013). Mainly in a research, there are two kinds of limitations, time and financial. Countering this, both are interrelated with each other. Lack of financial flexibility compels the researcher to encounter difficulties in terms of adopt only one method for data collection and analysis. This limits the scope and arena of the research. This is also applicable for the time constraints, which compels the researcher to compromise with the quality of the research (Baskerville and Wood 2016). In the case of this research, the lack of financial and time constraints would result in the achievement of negative outcomes, which acts as an interplay with the basic right possessed by the humans. Conclusion This report emerges successful in providing an insight into the different and wide ranging approaches towards health informatics. This has been carried out by developing a proposal, which consists of the aims, objectives, literature review and methodology regarding the execution of the research in an effective manner. The limitations highlighted acts as an obstacle in this efficient execution; however, application of rational and conscious approach towards these constraints would broaden the perspectives and approaches towards levying correct and authentic information to the public for upgrading their living standards. References Alexander, R.S. and Kavaler, F., 2012. Risk Management: An Institutional Imperative.RiskManagement in Health Care Institutions, p.1. Baskerville, R.L. and Wood-Harper, A.T., 2016. A critical perspective on action research as a method for information systems research. InEnacting Research Methods in Information Systems: Volume 2(pp. 169-190). Springer International Publishing. Bryman, A. and Bell, E., 2015.Business research methods. Oxford University Press, USA. Coiera, E., 2015.Guide to health informatics. CRC press. Creswell, J.W., 2013.Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications. Creswell, J.W., 2014.A concise introduction to mixed methods research. Sage Publications. Eriksson, P. and Kovalainen, A., 2015.Qualitative Methods in Business Research: A Practical Guide to Social Research. Sage. Faden, R.R., Kass, N.E., Goodman, S.N., Pronovost, P., Tunis, S. and Beauchamp, T.L., 2013. An ethics framework for a learning health care system: a departure from traditional research ethics and clinical ethics.Hastings Center Report,43(s1), pp.S16-S27. Flick, U., 2015.Introducing research methodology: A beginner's guide to doing a research project. Sage. Gale, N.K., Heath, G., Cameron, E., Rashid, S. and Redwood, S., 2013. Using the framework method for the analysis of qualitative data in multi-disciplinary health research.BMC medical research methodology,13(1), p.117. Hilbers, E.S., de Vries, C.G. and Geertsma, R.E., 2013. Medical technology at home: safety-related items in technical documentation.International journal of technology assessment in health care,29(01), pp.20-26. Holzinger, A., 2016. Interactive machine learning for health informatics: when do we need the human-in-the-loop?.Brain Informatics,3(2), pp.119-131. Kavaler, F. and Alexander, R.S., 2012.Riskmanagement in health care institutions. Jones Bartlett Publishers. Kellermann, A.L. and Jones, S.S., 2013. What it will take to achieve the as-yet-unfulfilled promises of health information technology.Health Affairs,32(1), pp.63-68. Leening, M.J., Kavousi, M., Heeringa, J., van Rooij, F.J., Verkroost-van Heemst, J., Deckers, J.W., Mattace-Raso, F.U., Ziere, G., Hofman, A., Stricker, B.H.C. and Witteman, J.C., 2012. Methods of data collection and definitions of cardiac outcomes in the Rotterdam Study.European journal of epidemiology,27(3), pp.173-185. Liamputtong, P., 2013.Qualitative research methods. Lorenzi, N.M. and Riley, R.T., 2013.Organizational aspects of health informatics: managing technological change. Springer Science Business Media. Lyapina, M., Yaneva-Deliverska, M., Deliversky, J. and Kisselova, A., 2015. EUROPEAN AND INTERNATIONAL STANDARDS ON MEDICAL DEVICES FOR DENTISTRY.Journal of IMABAnnual Proceeding Scientific Papers,21(1), pp.713-717. Mackey, A. and Gass, S.M., 2015.Second language research: Methodology and design. Routledge. Maeda, H., 2012. Histology in forensic practice.Forensic Science, Medicine, and Pathology,8(1), pp.62-63. Maxwell, J.A., 2012.A realist approach for qualitative research. Sage. Miller, T., Birch, M., Mauthner, M. and Jessop, J. eds., 2012.Ethics in qualitative research. Sage. O'Leary, Z., 2013.The essential guide to doing your research project. Sage. Palinkas, L.A., Horwitz, S.M., Green, C.A., Wisdom, J.P., Duan, N. and Hoagwood, K., 2015. Purposeful sampling for qualitative data collection and analysis in mixed method implementation research.Administration and Policy in Mental Health and Mental Health Services Research,42(5), pp.533-544. Panneerselvam, R., 2014.Research methodology. PHI Learning Pvt. Ltd. Sarantakos, S., 2012.Social research. Palgrave Macmillan. Schmidt, F.L. and Hunter, J.E., 2014.Methods of meta-analysis: Correcting error and bias in research findings. Sage publications. Silverman, D. ed., 2016.Qualitative research. Sage. Smith, J.A. ed., 2015.Qualitative psychology: A practical guide to research methods. Sage. Taylor, S.J., Bogdan, R. and DeVault, M., 2015.Introduction to qualitative research methods: A guidebook and resource. John Wiley Sons. Toennessen, B., Swart, E. and Marx, Y., 2013. Patient safety culture-knowledge and knowledge needs of medical students.Zentralblatt fur Chirurgie,138(6), pp.650-656. Wahyuni, D., 2012. The research design maze: Understanding paradigms, cases, methods and methodologies. Zheng, Y.L., Ding, X.R., Poon, C.C.Y., Lo, B.P.L., Zhang, H., Zhou, X.L., Yang, G.Z., Zhao, N. and Zhang, Y.T., 2014. Unobtrusive sensing and wearable devices for health informatics.IEEE Transactions on Biomedical Engineering,61(5), pp.1538-1554.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.