873 resultados para patient information
Resumo:
According to the diagnosis of schizophrenia in the DSM-IV-TR (American Psychiatric Association, 2000), negative symptoms are those personal characteristics that are thought to be reduced from normal functioning, while positive symptoms are aspects of functioning that exist as an excess or distortion of normal functioning. Negative symptoms are generally considered to be a core feature of people diagnosed with schizophrenia. However, negative symptoms are not always present in those diagnosed, and a diagnosis can be made with only negative or only positive symptoms, or with a combination of both. Negative symptoms include an observed loss of emotional expression (affective flattening), loss of motivation or self directedness (avolition), loss of speech (alogia), and also a loss of interests and pleasures (anhedonia). Positive symptoms include the perception of things that others do not perceive (hallucinations), and extraordinary explanations for ordinary events (delusions) (American Psychiatric Association, 2000). Both negative and positive symptoms are derived from watching the patient and thus do not consider the patient’s subjective experience. However, aspects of negative symptoms, such as observed affective flattening are highly contended. Within conventional psychiatry, the absence of emotional expression is assumed to coincide with an absence of emotional experience. Contrasting research findings suggests that patients who were observed to score low on displayed emotional expression, scored high on self ratings of emotional experience. Patients were also observed to be significantly lower on emotional expression when compared with others (Aghevli, Blanchard, & Horan, 2003; Selton, van der Bosch, & Sijben, 1998). It appears that there is little correlation between emotional experience and emotional expression in patients, and that observer ratings cannot help us to understand the subjective experience of the negative symptoms. This chapter will focus on research into the subjective experiences of negative symptoms. A framework for these experiences will be used from the qualitative research findings of the primary author (Le Lievre, 2010). In this study, the primary author found that subjective experiences of the negative symptoms belonged to one of the two phases of the illness experience; “transitioning into emotional shutdown” or “recovering from emotional shutdown”. This chapter will use the six themes from the phase of “transitioning into emotional shutdown”. This phase described the experience of turning the focus of attention away from the world and onto the self and the past, thus losing contact with the world and others (emotional shutdown). Transitioning into emotional shutdown involved; “not being acknowledged”, “relational confusion”, “not being expressive”, “reliving the past”, “detachment”, and “no sense of direction” (Le Lievre, 2010). Detail will be added to this framework of experience from other qualitative research in this area. We will now review the six themes that constitute a “transition into emotional shutdown” and corresponding previous research findings.
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
Resumo:
The health system is one sector dealing with a deluge of complex data. Many healthcare organisations struggle to utilise these volumes of health data effectively and efficiently. Also, there are many healthcare organisations, which still have stand-alone systems, not integrated for management of information and decision-making. This shows, there is a need for an effective system to capture, collate and distribute this health data. Therefore, implementing the data warehouse concept in healthcare is potentially one of the solutions to integrate health data. Data warehousing has been used to support business intelligence and decision-making in many other sectors such as the engineering, defence and retail sectors. The research problem that is going to be addressed is, "how can data warehousing assist the decision-making process in healthcare". To address this problem the researcher has narrowed an investigation focusing on a cardiac surgery unit. This research used the cardiac surgery unit at the Prince Charles Hospital (TPCH) as the case study. The cardiac surgery unit at TPCH uses a stand-alone database of patient clinical data, which supports clinical audit, service management and research functions. However, much of the time, the interaction between the cardiac surgery unit information system with other units is minimal. There is a limited and basic two-way interaction with other clinical and administrative databases at TPCH which support decision-making processes. The aims of this research are to investigate what decision-making issues are faced by the healthcare professionals with the current information systems and how decision-making might be improved within this healthcare setting by implementing an aligned data warehouse model or models. As a part of the research the researcher will propose and develop a suitable data warehouse prototype based on the cardiac surgery unit needs and integrating the Intensive Care Unit database, Clinical Costing unit database (Transition II) and Quality and Safety unit database [electronic discharge summary (e-DS)]. The goal is to improve the current decision-making processes. The main objectives of this research are to improve access to integrated clinical and financial data, providing potentially better information for decision-making for both improved from the questionnaire and by referring to the literature, the results indicate a centralised data warehouse model for the cardiac surgery unit at this stage. A centralised data warehouse model addresses current needs and can also be upgraded to an enterprise wide warehouse model or federated data warehouse model as discussed in the many consulted publications. The data warehouse prototype was able to be developed using SAS enterprise data integration studio 4.2 and the data was analysed using SAS enterprise edition 4.3. In the final stage, the data warehouse prototype was evaluated by collecting feedback from the end users. This was achieved by using output created from the data warehouse prototype as examples of the data desired and possible in a data warehouse environment. According to the feedback collected from the end users, implementation of a data warehouse was seen to be a useful tool to inform management options, provide a more complete representation of factors related to a decision scenario and potentially reduce information product development time. However, there are many constraints exist in this research. For example the technical issues such as data incompatibilities, integration of the cardiac surgery database and e-DS database servers and also, Queensland Health information restrictions (Queensland Health information related policies, patient data confidentiality and ethics requirements), limited availability of support from IT technical staff and time restrictions. These factors have influenced the process for the warehouse model development, necessitating an incremental approach. This highlights the presence of many practical barriers to data warehousing and integration at the clinical service level. Limitations included the use of a small convenience sample of survey respondents, and a single site case report study design. As mentioned previously, the proposed data warehouse is a prototype and was developed using only four database repositories. Despite this constraint, the research demonstrates that by implementing a data warehouse at the service level, decision-making is supported and data quality issues related to access and availability can be reduced, providing many benefits. Output reports produced from the data warehouse prototype demonstrated usefulness for the improvement of decision-making in the management of clinical services, and quality and safety monitoring for better clinical care. However, in the future, the centralised model selected can be upgraded to an enterprise wide architecture by integrating with additional hospital units’ databases.
Resumo:
Many current HCI, social networking, ubiquitous computing, and context aware designs, in order for the design to function, have access to, or collect, significant personal information about the user. This raises concerns about privacy and security, in both the research community and main-stream media. From a practical perspective, in the social world, secrecy and security form an ongoing accomplishment rather than something that is set up and left alone. We explore how design can support privacy as practical action, and investigate the notion of collective information-practice of privacy and security concerns of participants of a mobile, social software for ride sharing. This paper contributes an understanding of HCI security and privacy tensions, discovered while “designing in use” using a Reflective, Agile, Iterative Design (RAID) method.
Resumo:
Building Information Modeling (BIM) is a modern approach to the design, documentation, delivery, and life cycle management of buildings through the use of project information databases coupled with object-based parametric modeling. BIM has the potential to revolutionize the Architecture, Engineering and Construction (AEC) industry in terms of the positive impact it may have on information flows, working relationships between project participants from different disciplines and the resulting benefits it may achieve through improvements to conventional methods. This chapter reviews the development of BIM, the extent to which BIM has been implemented in Australia, and the factors which have affected the up-take of BIM. More specifically, the objectives of this chapter are to investigate the adoption of BIM in the Australian AEC industry and factors that contribute towards the uptake (or non uptake) of BIM. These objectives are met by a review of the related literature in the first instance, followed by the presentation of the results of a 2007 postal questionnaire survey and telephone interviews of a random sample of professionals in the Australian AEC industry. The responses suggest that less than 25 percent of the sample had been involved in BIM – rather less than might be expected from reading the literature. Also, of those who have been involved with BIM, there has been very little interdisciplinary collaboration. The main barriers impeding the implementation of BIM widely across the Australian AEC industry are also identified. These were found to be primarily a lack of BIM expertise, lack of awareness and resistance to change. The benefits experienced as a result of using BIM are also discussed. These include improved design consistency, better coordination, cost savings, higher quality work, greater productivity and increased speed of delivery. In terms of conclusion, some suggestions are made concerning the underlying practical reasons for the slow up-take of BIM and the successes for those early adopters. Prospects for future improvement are discussed and proposals are also made for a large scale worldwide comparative study covering industry-wide participants
Resumo:
The Web has become a worldwide repository of information which individuals, companies, and organizations utilize to solve or address various information problems. Many of these Web users utilize automated agents to gather this information for them. Some assume that this approach represents a more sophisticated method of searching. However, there is little research investigating how Web agents search for online information. In this research, we first provide a classification for information agent using stages of information gathering, gathering approaches, and agent architecture. We then examine an implementation of one of the resulting classifications in detail, investigating how agents search for information on Web search engines, including the session, query, term, duration and frequency of interactions. For this temporal study, we analyzed three data sets of queries and page views from agents interacting with the Excite and AltaVista search engines from 1997 to 2002, examining approximately 900,000 queries submitted by over 3,000 agents. Findings include: (1) agent sessions are extremely interactive, with sometimes hundreds of interactions per second (2) agent queries are comparable to human searchers, with little use of query operators, (3) Web agents are searching for a relatively limited variety of information, wherein only 18% of the terms used are unique, and (4) the duration of agent-Web search engine interaction typically spans several hours. We discuss the implications for Web information agents and search engines.
Resumo:
For millennia humans have sought, organized, and used information as they learned and evolved patterns of human information behaviors to resolve their human problems and survive. However, despite the current focus on living in an "information age," we have a limited evolutionary understanding of human information behavior. In this article the authors examine the current three interdisciplinary approaches to conceptualizing how humans have sought information including (a) the everyday life information seeking-sense-making approach, (b) the information foraging approach, and (c) the problem-solution perspective on information seeking approach. In addition, due to the lack of clarity regarding the role of information use in information behavior, a fourth information approach is provided based on a theory of information use. The use theory proposed starts from an evolutionary psychology notion that humans are able to adapt to their environment and survive because of our modular cognitive architecture. Finally, the authors begin the process of conceptualizing these diverse approaches, and the various aspects or elements of these approaches, within an integrated model with consideration of information use. An initial integrated model of these different approaches with information use is proposed.
Resumo:
Purpose - During multitasking, humans handle multiple tasks through task switching or engage in multitasking information behaviors. For example, a user switches between seeking new kitchen information and medical information. Recent studies provide insights these complex multitasking human information behaviors (HIB). However, limited studies have examined the interplay between information and non-information tasks. Design/methodology/approach - The goal of the paper was to examine the interplay of information and non-information task behaviors. Findings - This paper explores and speculates on a new direction in HIB research. The nature of HIB as a multitasking activity including the interplay of information and non-information behavior tasks, and the relation between multitasking information behavior to cognitive style and individual differences, is discussed. A model of multitasking between information and non-information behavior tasks is proposed. Practical implications/limitations - Multitasking information behavior models should include the interplay of information and non-information tasks, and individual differences and cognitive styles. Originality/value - The paper is the first information science theoretical examination of the interplay between information and non-information tasks. © Emerald Group Publishing Limited.
Resumo:
Purpose - Since the beginning of human existence, humankind has sought, organized and used information as it evolved patterns and practices of human information behaviors. However, the field of human information behavior (HIB) has not heretofore pursued an evolutionary understanding of information behavior. The goal of this exploratory study is to provide insight about the information behavior of various individuals from the past to begin the development of an evolutionary perspective for our understanding of HIB. Design/methodology/approach - This paper presents findings from a qualitative analysis of the autobiographies and personal writings of several historical figures, including Napoleon Bonaparte, Charles Darwin, Giacomo Casanova and others. Findings - Analysis of their writings shows that these persons of the past articulated aspects of their HIB's, including information seeking, information organization and information use, providing tangible insights into their information-related thoughts and actions. Practical implications - This paper has implications for expanding the nature of our evolutionary understanding of information behavior and provides a broader context for the HIB research field. Originality/value - This the first paper in the information science field of HIB to study the information behavior of historical figures and begin to develop an evolutionary framework for HIB research. © Emerald Group Publishing Limited.
Resumo:
Abstract: How has human information behavior evolved? Our paper explores this question in the form of notions, models and theories about the relationship between information behavior and human evolution. Alexander’s Ecological Dominance and Social Competition/Cooperation (EDSC) model currently provides the most comprehensive overview of human traits in the development of a theory of human evolution and sociality. His model provides a basis for explaining the evolution of human socio-cognitive abilities, including ecological dominance, and social competition/cooperation. Our paper examines the human trait of information behavior as a socio-cognitive ability related to ecological dominance, and social competition/cooperation. The paper first outlines what is meant by information behavior from various interdisciplinary perspectives. We propose that information behavior is a socio-cognitive ability that is related to and enables other sociocognitive abilities such as human ecological dominance, and social competition/cooperation. The paper reviews the current state of evolutionary approaches to information behavior and future directions for this research . Keywords: information behavior, socio-cognitive ability, ecological dominance, social competition, social cooperation.
Resumo:
Information behavior studies are a growing body of research that highlights the importance of information for everyone in the information age. This e-book presents an international and diverse range of studies and insights into the current state of theories and models of information behavior. There is an emphasis on the socialpersonalhuman dimensions of information seeking using social science methods and theoretical frameworks. The studies particularly draw on the methods and theories of anthropology, sociology and psychology to produce interpretations of the way in which information is experienced in the lives of individuals working as critical care nurses in a medical environment, the information seeking behavior of the visually impaired, the social interactions within knitting circles in public libraries, and attempts to apply information behavior theory to the design of information solutions. Collectively the papers contribute more generally to our understanding of information behavior theory and models, including the medical and retrieval contexts.