Search results for: healthcare data security
26275 Slipping Through the Net: Women’s Experiences of Maternity Services and Social Support in the UK During the COVID-19 Pandemic
Authors: Freya Harding, Anne Gatuguta, Chi Eziefula
Abstract:
Introduction Research shows the quality of experiences of pregnancy, birth, and postpartum impacts the health and well-being of the mother and baby. This is recognised by the WHO in their recommendations ‘Intrapartum care for a positive childbirth experience’. The COVID-19 pandemic saw the transformation of the NHS Maternity services to prevent the transmission of COVID-19. Physical and social isolation may have affected women’s experiences of pregnancy, birth and postpartum; especially those of healthcare. Examples of such changes made to the NHS include both the reduction in volume of face-to-face consultations and restrictions to visitor time in hospitals. One notable detriment due to these changes was the absence of a partner during certain stages of birth. The aim of this study was to explore women’s experiences of pregnancy, birth, and postnatal period during the COVID-19 pandemic in the UK. Methods We collected qualitative data from women who had given birth during the COVID-19 pandemic. In-depth, semi-structured interviews were conducted with twelve participants recruited from mother and baby groups in Southeast England. Data were audio-recorded, transcribed verbatim, and analysed thematically using both inductive and deductive approaches. Ethics permission was granted from Brighton and Sussex Medical School (ER/BSMS9A83/1). Results Interviews were conducted with 12 women who gave birth between May 2020 and February 2021. Ages of the participants ranged between 28 and 42 years, most of which were white British, with one being Asian British. All participants were heterosexual and either married or co-habiting with their partner. Five participants worked in the NHS, and all participants had professional occupations. Women felt inadequately supported both socially and medically. An appropriate sense of control over their own birthing experience was lacking. Safety mechanisms, such as in-person visits from the midwife, had no suitable alternatives in place. Serious health issues were able to “slip through the net.” Mental health conditions in some of those interviewed worsened or developed. Similarly, reduced support from partners during birth and during the immediate postpartum period at the hospital, coupled with reduced ward staffing, resulted in some traumatic experiences; particularly for women who had undergone caesarean section. However, some unexpected positive effects were reported; one example being that partners were able to spend more time with their baby due to furlough schemes and working from home. Similarly, emergency care was not felt to have been compromised. Overall, six themes emerged: (1) Self-reported traumatic experiences, (2) Challenges of caring for a baby with reduced medical and social support, (3) Unexpected benefits to the parenting experience, (4) The effects of a sudden change in medical management (5) Poor communication from healthcare professionals (6) Social change; with subthemes of support accessing medical care, the workplace, family and friends, and antenatal & baby groups. Conclusions The results indicate that the healthcare system was unable to adequately deliver maternity care to facilitate positive pregnancy, birth, and postnatal experiences during the heights of the pandemic. The poor quality of such experiences has been linked an increased risk of long-term health complications in both the mother and child.Keywords: pregnancy, birth, postpartum, postnatal, COVID-19, maternity, social support, qualitative, pandemic
Procedia PDF Downloads 14026274 Methods for Restricting Unwanted Access on the Networks Using Firewall
Authors: Bhagwant Singh, Sikander Singh Cheema
Abstract:
This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques
Procedia PDF Downloads 10326273 Reviews of Chief Complaints and Treatments [in an Early Street Medicine Program]
Authors: A. Hoppe, T. Kagele, B. Hall, A. Nichols, B. Messner
Abstract:
The Spokane Street Medicine (SSM) Program aims to deliver medical care to members of Spokane, Washington, experiencing homelessness. Street medicine is designed to function in a non-traditional setting to help deliver healthcare to the underserved homeless population. In this analysis, clinical charts from street and shelter encounters made by the Spokane Street Medicine Program in early 2021 were reviewed in order to better understand the healthcare inequities prevalent among people experiencing homelessness in Spokane, WA. Pain, wound-care, and follow-up efforts were predominant concerns among the homeless population. More than half of the conditions addressed were acute, and almost a quarter of all chief complaints involved chronic unmanaged conditions. This analysis gives reason for the priorities of the SSM Program to be focused on pain, wound-care, and follow-up efforts. Understanding the specific medical needs of this population will allow for better resource allocation and improved health outcomes among people experiencing homelessness.Keywords: equity issues in public health, health disparities, health services accessibility, medical public health, street medicine
Procedia PDF Downloads 19126272 Exploitation behind the Development of Home Batik Industry in Lawean, Solo, Central Java
Authors: Mukhammad Fatkhullah, Ayla Karina Budita, Cut Rizka Al Usrah, Kanita Khoirun Nisa, Muhammad Alhada Fuadilah Habib, Siti Muslihatul Mukaromah
Abstract:
Batik industry has become one of the leading industries in the economy of Indonesia. Since the recognition of batik as one of cultural wealth and national identity of Indonesia by UNESCO, batik production keeps increasing as a result of increasing demands for batik, whether from domestically or abroad. One of the rapid development batik industries in Indonesia is batik industry in Lawean Village, Solo, Central Java, Indonesia. This batik industry generally uses putting-out system where batik workers work in their own houses. With the implementation of this system, therefore employers don’t have to prepare Environmental Impact Analysis (EIA), social security for workers, overtime payment, space for working, and equipment for working. The implementation of putting-out system causes many problems, starting from environmental pollution, the loss of social rights of workers, and even exploitation of workers by batik entrepreneurs. The data used to describe this reality is the primary data from qualitative research with in-depth interview data collection technique. Informants were determined purposively. The theory used to perform data interpretation is the phenomenology of Alfred Schutz. Both qualitative and phenomenology are used in this study to describe batik workers exploitation in terms of the implementation of putting-out system on home batik industry in Lawean. The research result showed that workers in batik industry sector in Lawean were exploited with the implementation of putting-out system. The workers were strictly employed by the entrepreneurs, so that their job cannot be called 'part-time' job anymore. In terms of labor and time, the workers often work more than 12 hours per day and they often work overtime without receiving any overtime payment. In terms of work safety, the workers often have contact with chemical substances contained in batik making materials without using any protection, such as clothes work, which is worsened by the lack of standard or procedure in work that can cause physical damage, such as burnt and peeled off skin. Moreover, exposure and contamination of chemical materials make the workers and their families vulnerable to various diseases. Meanwhile, batik entrepreneurs did not give any social security (including health cost aid). Besides that, the researchers found that batik industry in home industry sector is not environmentally friendly, even damaging ecosystem because industrial waste disposed without EIA.Keywords: exploitation, home batik industry, occupational health and safety, putting-out system
Procedia PDF Downloads 31926271 Flexible Communication Platform for Crisis Management
Authors: Jiří Barta, Tomáš Ludík, Jiří Urbánek
Abstract:
The topics of disaster and emergency management are highly debated among experts. Fast communication will help to deal with emergencies. Problem is with the network connection and data exchange. The paper suggests a solution, which allows possibilities and perspectives of new flexible communication platform to the protection of communication systems for crisis management. This platform is used for everyday communication and communication in crisis situations too.Keywords: crisis management, information systems, interoperability, crisis communication, security environment, communication platform
Procedia PDF Downloads 47526270 Robotic Solution for Nuclear Facility Safety and Monitoring System
Authors: Altab Hossain, Shakerul Islam, Golamur R. Khan, Abu Zafar M. Salahuddin
Abstract:
An effective identification of breakdowns is of premier importance for the safe and reliable operation of Nuclear Power Plants (NPP) and its associated facilities. A great number of monitoring and diagnosis methodologies are applied and used worldwide in areas such as industry, automobiles, hospitals, and power plant to detect and reduce human disasters. The potential consequences of several hazardous activities may harm the society using nuclear and its associated facilities. Hence, one of the most popular and effective methods to ensure safety and monitor the entire nuclear facility and imply risk-free operation without human interference during the hazardous situation is using a robot. Therefore, in this study, an advanced autonomous robot has been designed and developed that can monitor several parameters in the NPP to ensure the safety and do some risky job in case of nuclear disaster. The robot consisted of autonomous track following unit, data processing and transmitting unit can follow a straight line and take turn as the bank greater than 90 degrees. The developed robot can analyze various parameters such as temperature, altitude, radiation, obstacle, humidity, detecting fire, measuring distance, ultrasonic scan and taking the heat of any particular object. It has an ability to broadcast live stream and can record the document to its own server memory. There is a separate control unit constructed with a baseboard which processes the recorded data and a transmitter which transmits the processed data. To make the robot user-friendly, the code is developed such a way that a user can control any of robotic arm as per types of work. To control at any place and without the track, there is an advanced code has been developed to take manual overwrite. Through this process, administrator who has logged in permission to Dynamic Host Client Protocol (DHCP) can make the handover of the control of the robot. In this process, this robot is provided maximum nuclear security from being hacked. Not only NPP, this robot can be used to maximize the real-time monitoring system of any nuclear facility as well as nuclear material transportation and decomposition system.Keywords: nuclear power plant, radiation, dynamic host client protocol, nuclear security
Procedia PDF Downloads 20926269 Interventions to Improve the Performance of Community Based Health Insurance in Low- and Lower Middle-Income-Countries: a Systematic Review
Authors: Scarlet Tabot Enanga Longsti
Abstract:
Community-Based Health Insurance (CBHI) schemes have been proposed as a possible means to achieve affordable health care in low-and lower-middle-income countries. The existing evidence provides mixed results on the impact of CBHI schemes on healthcare utilisation and out -of-pocket payments (OOPP) for healthcare. Over 900 CBHI schemes have been implemented in underdeveloped countries, and these schemes have undergone different modifications over the years. Prior reviews have suggested that different designs of CBHI schemes may result in different outcomes. Objectives: This review sought to determine the interventions that affect the impact of CBHI schemes on OOPP and health service utilisation. Interventions in this study referred to any action or modification in the design of a CBHI scheme that affected the impact of the scheme on OOPP and/or healthcare utilization. Methods: Any CBHI study that was done in a lower middle-income country, that used an experimental design, that included OOPP or health care utilisation as outcome variables, and that was published in either English or French was included in this study. Studies were searched for in MEDLINE, Embase, CINAHL, EconLit, IBSS, Web of Science, Cochrane Library, and Global Index Medicus from July to August 2023. Bias was assessed using Joanna Brigs Institute tools for quality assessment for randomized control trials and quasi experimental studies. A narrative synthesis was done. Results: 12 studies were included in the review, with a total of 69 villages, 13,653 households, and 62,786 participants. Average premium collection was 4.8 USD/year. Most CBHI schemes had flat rates. The study revealed that a range of interventions impact OOPP and health care utilisation. Five categories of interventions were identified. The intervention with the highest impact on OOPP and utilisation was “Audit visits”. Next in line came external funds, training scheme workers, and engaging community leaders and village heads to advertise the scheme. Free healthcare led to a significant increase in utilisation of health services, a significant reduction in Catastrophic health expenditure, but an insignificant effect on OOPP among insured compared with uninsured. Conclusions: Community-Based Health Insurance could pave the way for Universal Health Care in low and middle-income countries. However, this can only be possible if careful thought is given to how schemes are designed. Due to the heterogeneity of studies and results on CBHI schemes, there is need for further research for more effective designs to be developed.Keywords: community based health insurance, developing countries, health service utilisation, out of pocket payment
Procedia PDF Downloads 6726268 Facial Recognition of University Entrance Exam Candidates using FaceMatch Software in Iran
Authors: Mahshid Arabi
Abstract:
In recent years, remarkable advancements in the fields of artificial intelligence and machine learning have led to the development of facial recognition technologies. These technologies are now employed in a wide range of applications, including security, surveillance, healthcare, and education. In the field of education, the identification of university entrance exam candidates has been one of the fundamental challenges. Traditional methods such as using ID cards and handwritten signatures are not only inefficient and prone to fraud but also susceptible to errors. In this context, utilizing advanced technologies like facial recognition can be an effective and efficient solution to increase the accuracy and reliability of identity verification in entrance exams. This article examines the use of FaceMatch software for recognizing the faces of university entrance exam candidates in Iran. The main objective of this research is to evaluate the efficiency and accuracy of FaceMatch software in identifying university entrance exam candidates to prevent fraud and ensure the authenticity of individuals' identities. Additionally, this research investigates the advantages and challenges of using this technology in Iran's educational systems. This research was conducted using an experimental method and random sampling. In this study, 1000 university entrance exam candidates in Iran were selected as samples. The facial images of these candidates were processed and analyzed using FaceMatch software. The software's accuracy and efficiency were evaluated using various metrics, including accuracy rate, error rate, and processing time. The research results indicated that FaceMatch software could accurately identify candidates with a precision of 98.5%. The software's error rate was less than 1.5%, demonstrating its high efficiency in facial recognition. Additionally, the average processing time for each candidate's image was less than 2 seconds, indicating the software's high efficiency. Statistical evaluation of the results using precise statistical tests, including analysis of variance (ANOVA) and t-test, showed that the observed differences were significant, and the software's accuracy in identity verification is high. The findings of this research suggest that FaceMatch software can be effectively used as a tool for identifying university entrance exam candidates in Iran. This technology not only enhances security and prevents fraud but also simplifies and streamlines the exam administration process. However, challenges such as preserving candidates' privacy and the costs of implementation must also be considered. The use of facial recognition technology with FaceMatch software in Iran's educational systems can be an effective solution for preventing fraud and ensuring the authenticity of university entrance exam candidates' identities. Given the promising results of this research, it is recommended that this technology be more widely implemented and utilized in the country's educational systems.Keywords: facial recognition, FaceMatch software, Iran, university entrance exam
Procedia PDF Downloads 4926267 Promoting Community Food Security and Empowerment among Somali Bantu Refugees: A Case for Community Kitchen Gardens
Authors: Michelle D. Hand, Michelle L. Kaiser
Abstract:
African refugees are among the fastest-growing populations in the United States and nearly half of these refugees come from Somalia, many of whom are Somali Bantus, the most marginalized group in Somali society. Yet limited research is available on Somali Bantu refugees. In this paper, Empowerment Theory is used to guide an in-depth exploration of the potential benefits of using community kitchen gardens to increase community food security among Somali Bantu refugees. In addition, recommendations for future research, policy and practice are offered following existing scholarly and grey source literature guidelines as informed by an Empowerment perspective to best meet the needs of this under-researched and underserved yet growing population.Keywords: community kitchen gardens, food insecurity, refugees, Somali Bantu
Procedia PDF Downloads 27526266 Cybersecurity Engineering BS Degree Curricula Design Framework and Assessment
Authors: Atma Sahu
Abstract:
After 9/11, there will only be cyberwars. The cyberwars increase in intensity the country's cybersecurity workforce's hiring and retention issues. Currently, many organizations have unfilled cybersecurity positions, and to a lesser degree, their cybersecurity teams are understaffed. Therefore, there is a critical need to develop a new program to help meet the market demand for cybersecurity engineers (CYSE) and personnel. Coppin State University in the United States was responsible for developing a cybersecurity engineering BS degree program. The CYSE curriculum design methodology consisted of three parts. First, the ACM Cross-Cutting Concepts standard's pervasive framework helped curriculum designers and students explore connections among the core courses' knowledge areas and reinforce the security mindset conveyed in them. Second, the core course context was created to assist students in resolving security issues in authentic cyber situations involving cyber security systems in various aspects of industrial work while adhering to the NIST standards framework. The last part of the CYSE curriculum design aspect was the institutional student learning outcomes (SLOs) integrated and aligned in content courses, representing more detailed outcomes and emphasizing what learners can do over merely what they know. The CYSE program's core courses express competencies and learning outcomes using action verbs from Bloom's Revised Taxonomy. This aspect of the CYSE BS degree program's design is based on these three pillars: the ACM, NIST, and SLO standards, which all CYSE curriculum designers should know. This unique CYSE curriculum design methodology will address how students and the CYSE program will be assessed and evaluated. It is also critical that educators, program managers, and students understand the importance of staying current in this fast-paced CYSE field.Keywords: cyber security, cybersecurity engineering, systems engineering, NIST standards, physical systems
Procedia PDF Downloads 9626265 Interactive IoT-Blockchain System for Big Data Processing
Authors: Abdallah Al-ZoubI, Mamoun Dmour
Abstract:
The spectrum of IoT devices is becoming widely diversified, entering almost all possible fields and finding applications in industry, health, finance, logistics, education, to name a few. The IoT active endpoint sensors and devices exceeded the 12 billion mark in 2021 and are expected to reach 27 billion in 2025, with over $34 billion in total market value. This sheer rise in numbers and use of IoT devices bring with it considerable concerns regarding data storage, analysis, manipulation and protection. IoT Blockchain-based systems have recently been proposed as a decentralized solution for large-scale data storage and protection. COVID-19 has actually accelerated the desire to utilize IoT devices as it impacted both demand and supply and significantly affected several regions due to logistic reasons such as supply chain interruptions, shortage of shipping containers and port congestion. An IoT-blockchain system is proposed to handle big data generated by a distributed network of sensors and controllers in an interactive manner. The system is designed using the Ethereum platform, which utilizes smart contracts, programmed in solidity to execute and manage data generated by IoT sensors and devices. such as Raspberry Pi 4, Rasbpian, and add-on hardware security modules. The proposed system will run a number of applications hosted by a local machine used to validate transactions. It then sends data to the rest of the network through InterPlanetary File System (IPFS) and Ethereum Swarm, forming a closed IoT ecosystem run by blockchain where a number of distributed IoT devices can communicate and interact, thus forming a closed, controlled environment. A prototype has been deployed with three IoT handling units distributed over a wide geographical space in order to examine its feasibility, performance and costs. Initial results indicated that big IoT data retrieval and storage is feasible and interactivity is possible, provided that certain conditions of cost, speed and thorough put are met.Keywords: IoT devices, blockchain, Ethereum, big data
Procedia PDF Downloads 15026264 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud
Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal
Abstract:
Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid
Procedia PDF Downloads 32026263 Post Covid-19 Scenario and Contemporary International Security Challenges
Authors: Rubina Waseem
Abstract:
The research focuses on the major crises and major effects, largely unforeseen, to counter international security concerns. At the close of 2019, the Covid-19 pandemic broke out in the city of Wuhan in Hubei province, China. The coronavirus was initially seen as an inchoate danger, aimed at striking people randomly. Owing to the extraordinary transmissibility of the virus and the highly knitted nature of the international political world, the Covid-19 soon became a formidable global challenge. The once hustling and bustling avenues, city centers, and market places became deserted. Lockdown, self-isolation, hygiene and safety, social-distancing, and job losses became a new norm. The national economies gradually plunged into crisis. The pandemic has so far caused over 33 million cases and one million deaths. The virus continues to devastate social life, as there is yet no therapeutic available. While the world was preoccupied addressing the human and social toll, the pandemic has exacerbated despair, mistrust, and friction in international relations, diplomacy, and strategy. The research will discuss how the coronavirus has accelerated the trends of transition in the postwar security order constructed by the United States. China, Russia, European Union, and other lesser regional players are now increasingly changing their security orientations to undermine the United States standing and authority in world politics. The systemic level analyses will be adopted as a methodology to broaden the lens of the study, and the research will analyze the prevalent global power distribution, whether vulnerable or exposed. The trends of parochial nationalism and isolationism are increasingly replacing multilateralism and collectivism. Yet worse, military posturing is assuming a greater role in international interactions. Taken together, the pandemic has worsened the prospects of international peace and stability by mounting equal pressure across the channels of international relations, diplomacy, and strategy. It is yet unclear which country or collectivity will face the real brunt. Despite this jaded and pessimistic view, the lingering pandemic has the potential to reinforce cooperation, multilateralism, and collectivism in the realm of international politics. There is a renewed momentum for global efforts against the pandemic. States and societies are coming closer to act as a whole. Equally important, the world leaders are feeling tempted to revisit the traditional conception of national security. In this regard, they are exploring the possibility of according preference to non-traditional security issues. In essence, the research concludes that Covid-19 has put the international political system under a great trial.Keywords: covid-19, global challenges, international politics, international security
Procedia PDF Downloads 16426262 JavaScript Object Notation Data against eXtensible Markup Language Data in Software Applications a Software Testing Approach
Authors: Theertha Chandroth
Abstract:
This paper presents a comparative study on how to check JSON (JavaScript Object Notation) data against XML (eXtensible Markup Language) data from a software testing point of view. JSON and XML are widely used data interchange formats, each with its unique syntax and structure. The objective is to explore various techniques and methodologies for validating comparison and integration between JSON data to XML and vice versa. By understanding the process of checking JSON data against XML data, testers, developers and data practitioners can ensure accurate data representation, seamless data interchange, and effective data validation.Keywords: XML, JSON, data comparison, integration testing, Python, SQL
Procedia PDF Downloads 14126261 Advancing Dialysis Care Access and Health Information Management: A Blueprint for Nairobi Hospital
Authors: Kimberly Winnie Achieng Otieno
Abstract:
The Nairobi Hospital plays a pivotal role in healthcare provision in East and Central Africa, yet it faces challenges in providing accessible dialysis care. This paper explores strategic interventions to enhance dialysis care, improve access and streamline health information management, with an aim of fostering an integrated and patient-centered healthcare system in our region. Challenges at The Nairobi Hospital The Nairobi Hospital currently grapples with insufficient dialysis machines which results in extended turn around times. This issue stems from both staffing bottle necks and infrastructural limitations given our growing demand for renal care services. Our Paper-based record keeping system and fragmented flow of information downstream hinders the hospital’s ability to manage health data effectively. There is also a need for investment in expanding The Nairobi Hospital dialysis facilities to far reaching communities. Setting up satellite clinics that are closer to people who live in areas far from the main hospital will ensure better access to underserved areas. Community Outreach and Education Implementing education programs on kidney health within local communities is vital for early detection and prevention. Collaborating with local leaders and organizations can establish a proactive approach to renal health hence reducing the demand for acute dialysis interventions. We can amplify this effort by expanding The Nairobi Hospital’s corporate social responsibility outreach program with weekend engagement activities such as walks, awareness classes and fund drives. Enhancing Efficiency in Dialysis Care Demand for dialysis services continues to rise due to an aging Kenyan population and the increasing prevalence of chronic kidney disease (CKD). Present at this years International Nursing Conference are a diverse group of caregivers from around the world who can share with us their process optimization strategies, patient engagement techniques and resource utilization efficiencies to catapult The Nairobi Hospital to the 21st century and beyond. Plans are underway to offer ongoing education opportunities to keep staff updated on best practices and emerging technologies in addition to utilizing a patient feedback mechanisms to identify areas for improvement and enhance satisfaction. Staff empowerment and suggestion boxes address The Nairobi Hospital’s organizational challenges. Current financial constraints may limit a leapfrog in technology integration such as the acquisition of new dialysis machines and an investment in predictive analytics to forecast patient needs and optimize resource allocation. Streamlining Health Information Management Fully embracing a shift to 100% Electronic Health Records (EHRs) is a transformative step toward efficient health information management. Shared information promotes a holistic understanding of patients’ medical history, minimizing redundancies and enhancing overall care quality. To manage the transition to community-based care and EHRs effectively, a phased implementation approach is recommended. Conclusion By strategically enhancing dialysis care access and streamlining health information management, The Nairobi Hospital can strengthen its position as a leading healthcare institution in both East and Central Africa. This comprehensive approach aligns with the hospital’s commitment to providing high-quality, accessible, and patient-centered care in an evolving landscape of healthcare delivery.Keywords: Africa, urology, diaylsis, healthcare
Procedia PDF Downloads 5926260 Medicompills Architecture: A Mathematical Precise Tool to Reduce the Risk of Diagnosis Errors on Precise Medicine
Authors: Adriana Haulica
Abstract:
Powered by Machine Learning, Precise medicine is tailored by now to use genetic and molecular profiling, with the aim of optimizing the therapeutic benefits for cohorts of patients. As the majority of Machine Language algorithms come from heuristics, the outputs have contextual validity. This is not very restrictive in the sense that medicine itself is not an exact science. Meanwhile, the progress made in Molecular Biology, Bioinformatics, Computational Biology, and Precise Medicine, correlated with the huge amount of human biology data and the increase in computational power, opens new healthcare challenges. A more accurate diagnosis is needed along with real-time treatments by processing as much as possible from the available information. The purpose of this paper is to present a deeper vision for the future of Artificial Intelligence in Precise medicine. In fact, actual Machine Learning algorithms use standard mathematical knowledge, mostly Euclidian metrics and standard computation rules. The loss of information arising from the classical methods prevents obtaining 100% evidence on the diagnosis process. To overcome these problems, we introduce MEDICOMPILLS, a new architectural concept tool of information processing in Precise medicine that delivers diagnosis and therapy advice. This tool processes poly-field digital resources: global knowledge related to biomedicine in a direct or indirect manner but also technical databases, Natural Language Processing algorithms, and strong class optimization functions. As the name suggests, the heart of this tool is a compiler. The approach is completely new, tailored for omics and clinical data. Firstly, the intrinsic biological intuition is different from the well-known “a needle in a haystack” approach usually used when Machine Learning algorithms have to process differential genomic or molecular data to find biomarkers. Also, even if the input is seized from various types of data, the working engine inside the MEDICOMPILLS does not search for patterns as an integrative tool. This approach deciphers the biological meaning of input data up to the metabolic and physiologic mechanisms, based on a compiler with grammars issued from bio-algebra-inspired mathematics. It translates input data into bio-semantic units with the help of contextual information iteratively until Bio-Logical operations can be performed on the base of the “common denominator “rule. The rigorousness of MEDICOMPILLS comes from the structure of the contextual information on functions, built to be analogous to mathematical “proofs”. The major impact of this architecture is expressed by the high accuracy of the diagnosis. Detected as a multiple conditions diagnostic, constituted by some main diseases along with unhealthy biological states, this format is highly suitable for therapy proposal and disease prevention. The use of MEDICOMPILLS architecture is highly beneficial for the healthcare industry. The expectation is to generate a strategic trend in Precise medicine, making medicine more like an exact science and reducing the considerable risk of errors in diagnostics and therapies. The tool can be used by pharmaceutical laboratories for the discovery of new cures. It will also contribute to better design of clinical trials and speed them up.Keywords: bio-semantic units, multiple conditions diagnosis, NLP, omics
Procedia PDF Downloads 7026259 Using Machine Learning Techniques to Extract Useful Information from Dark Data
Authors: Nigar Hussain
Abstract:
It is a subset of big data. Dark data means those data in which we fail to use for future decisions. There are many issues in existing work, but some need powerful tools for utilizing dark data. It needs sufficient techniques to deal with dark data. That enables users to exploit their excellence, adaptability, speed, less time utilization, execution, and accessibility. Another issue is the way to utilize dark data to extract helpful information to settle on better choices. In this paper, we proposed upgrade strategies to remove the dark side from dark data. Using a supervised model and machine learning techniques, we utilized dark data and achieved an F1 score of 89.48%.Keywords: big data, dark data, machine learning, heatmap, random forest
Procedia PDF Downloads 3126258 Determination of Complexity Level in Merged Irregular Transposition Cipher
Authors: Okike Benjamin, Garba Ejd
Abstract:
Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.Keywords: transposition cipher, merged irregular cipher, encryption, complexity level
Procedia PDF Downloads 34526257 Farmers’ Perception and Response to Climate Change Across Agro-ecological Zones in Conflict-Ridden Communities in Cameroon
Authors: Lotsmart Fonjong
Abstract:
The livelihood of rural communities in the West African state of Cameroon, which is largely dictated by natural forces (rainfall, temperatures, and soil), is today threatened by climate change and armed conflict. This paper investigates the extent to which rural communities are aware of climate change, how their perceptions of changes across different agro-ecological zones have impacted farming practices, output, and lifestyles, on the one hand, and the extent to which local armed conflicts are confounding their efforts and adaptation abilities. The paper is based on a survey conducted among small farmers in selected localities within the forest and savanna ecological zones of the conflict-ridden Northwest and Southwest Cameroon. Attention is paid to farmers’ gender, scale, and type of farming. Farmers’ perception of/and response to climate change are analysed alongside local rainfall and temperature data and mobilization for climate justice. Findings highlight the fact that farmers’ perception generally corroborates local climatic data. Climatic instability has negatively affected farmers’ output, food prices, standards of living, and food security. However, the vulnerability of the population varies across ecological zones, gender, and crop types. While these factors also account for differences in local response and adaptation to climate change, ongoing armed conflicts in these regions have further complicated opportunities for climate-driven agricultural innovations, inputs, and exchange of information among farmers. This situation underlines how poor communities, as victims, are forced into many complex problems outsider their making. It is therefore important to mainstream farmers’ perceptions and differences into policy strategies that consider both climate change and Anglophone conflict as national security concerns foe sustainable development in Cameroon.Keywords: adaptation policies, climate change, conflict, small farmers, cameroon
Procedia PDF Downloads 15926256 Cirrhosis Mortality Prediction as Classification using Frequent Subgraph Mining
Authors: Abdolghani Ebrahimi, Diego Klabjan, Chenxi Ge, Daniela Ladner, Parker Stride
Abstract:
In this work, we use machine learning and novel data analysis techniques to predict the one-year mortality of cirrhotic patients. Data from 2,322 patients with liver cirrhosis are collected at a single medical center. Different machine learning models are applied to predict one-year mortality. A comprehensive feature space including demographic information, comorbidity, clinical procedure and laboratory tests is being analyzed. A temporal pattern mining technic called Frequent Subgraph Mining (FSM) is being used. Model for End-stage liver disease (MELD) prediction of mortality is used as a comparator. All of our models statistically significantly outperform the MELD-score model and show an average 10% improvement of the area under the curve (AUC). The FSM technic itself does not improve the model significantly, but FSM, together with a machine learning technique called an ensemble, further improves the model performance. With the abundance of data available in healthcare through electronic health records (EHR), existing predictive models can be refined to identify and treat patients at risk for higher mortality. However, due to the sparsity of the temporal information needed by FSM, the FSM model does not yield significant improvements. To the best of our knowledge, this is the first work to apply modern machine learning algorithms and data analysis methods on predicting one-year mortality of cirrhotic patients and builds a model that predicts one-year mortality significantly more accurate than the MELD score. We have also tested the potential of FSM and provided a new perspective of the importance of clinical features.Keywords: machine learning, liver cirrhosis, subgraph mining, supervised learning
Procedia PDF Downloads 13426255 Smuggling of Migrants as an Influential Factor on National Security, Economic and Social Life
Authors: Jordan Georgiev Deliversky
Abstract:
Human trafficking and smuggling of migrants are criminal activities, which are on the rise over recent years. The number of legal migrants arrived in Europe from outside the European Union are far less than those who want to come and settle in Europe. The objective of this paper is to present the impact on economic and social life of significant measures influencing the smuggling of migrants. The analysis is focused on various complex factors which have multiple origins and are highly influential as regard to the process of migration and the smuggling of migrants. The smuggling of migrants is a criminal activity, directly related to migration. The main results show that often the routes chosen for smuggling of migrants are circuitous, as smugglers carefully avoid strictly controlled roads, checkpoints, and countries or jurisdictions where there is efficiency of justice, with particular emphasis on the law on trafficking of persons and smuggling of migrants.Keywords: corruption, migration, security, smuggling
Procedia PDF Downloads 26626254 Towards a Framework for Embedded Weight Comparison Algorithm with Business Intelligence in the Plantation Domain
Authors: M. Pushparani, A. Sagaya
Abstract:
Embedded systems have emerged as important elements in various domains with extensive applications in automotive, commercial, consumer, healthcare and transportation markets, as there is emphasis on intelligent devices. On the other hand, Business Intelligence (BI) has also been extensively used in a range of applications, especially in the agriculture domain which is the area of this research. The aim of this research is to create a framework for Embedded Weight Comparison Algorithm with Business Intelligence (EWCA-BI). The weight comparison algorithm will be embedded within the plantation management system and the weighbridge system. This algorithm will be used to estimate the weight at the site and will be compared with the actual weight at the plantation. The algorithm will be used to build the necessary alerts when there is a discrepancy in the weight, thus enabling better decision making. In the current practice, data are collected from various locations in various forms. It is a challenge to consolidate data to obtain timely and accurate information for effective decision making. Adding to this, the unstable network connection leads to difficulty in getting timely accurate information. To overcome the challenges embedding is done on a portable device that will have the embedded weight comparison algorithm to also assist in data capture and synchronize data at various locations overcoming the network short comings at collection points. The EWCA-BI will provide real-time information at any given point of time, thus enabling non-latent BI reports that will provide crucial information to enable efficient operational decision making. This research has a high potential in bringing embedded system into the agriculture industry. EWCA-BI will provide BI reports with accurate information with uncompromised data using an embedded system and provide alerts, therefore, enabling effective operation management decision-making at the site.Keywords: embedded business intelligence, weight comparison algorithm, oil palm plantation, embedded systems
Procedia PDF Downloads 28726253 Health Services for Women Refugees: A Quantitative Exploratory Study in Ottawa, Canada
Authors: Kholoud Sheba
Abstract:
Women refugees expectedly are physical, socially and mentally vulnerable due to their past traumatic experiences and their novel circumstances in their receiving countries. They may have a wide range of general, mental, and reproductive health problems, but reportedly avoid visiting health care facilities owing to complex elements. Women refugees are usually unfamiliar with their new country health system and unable to navigate it efficiently. They have limited English language skills, which makes it even harder to access culturally insensitive health services. This study examines barriers to health care for refugee women in Ottawa and offers suggestions to address these challenges. Drawing from culturally congruent health care models in Canada, the United Kingdom, and some parts of the United States, this study highlights the importance of cultivating compassion in the provision of health care for women refugees as a way of addressing some of the disparities in health care in Canada. To address the study purpose, a survey questionnaire was designed and pretested questionnaire and was administrated using SurveyMonkey, a paid source survey application, over a period of two weeks. Snowballing sampling procedures were used to recruit the participants. Data was measured using frequencies, percentages, t-test, ANOVA, and chi-square. The test of significance is set at p < .05. The study asked how refugees perceive their experience in accessing and navigating public health services in Ottawa; what challenges refugees face with healthcare in Canada, and, if gender is related to refugees’ perceptions of the health care system they are forced to use? Results show refugees perceived their experience accessing the healthcare services in Canada to be a positive experience and the health providers to be culturally sensitive and allowing enough time listening to their complaints. The language stood tall in their barriers accessing the services due to low English proficiency and the need for interpretation services to encourage them attending the services.Keywords: women refugee, access barriers, Ottawa, resettlement
Procedia PDF Downloads 14526252 Community Policing: Exploring the Police and Community Participation for Crime Control in Bia West of Ghana
Authors: Bertha Korang Gyimah, Obed Asamoah, Kenross, T. Asamoah
Abstract:
In every human community, crimes or offenses cannot be eliminated, but as crimes are expected, there should be bodies that will control and prevent the crimes. There has been an increasing rate of crime, such as armed robbery, kidnapping, murder, and other forms of violence in the country. Community participation in crime control cannot be left out in Ghana. Several works have been conducted to deal with the importance of community participation in policing, but the causes of communities not fully participating in community policing have been left out. The main aim of the research was to assess the impact of community policing and why the communities are reluctant to partake in community policing to help control crime in Bia West. There have been perceptions about Police that, they expose informant after they give the police tip-off which put the whistleblower life in danger. This has made the community not to get involved in security issues in the community they live in. This situation has posed a serious threat to the Ghana Police Service and its ability to position itself strategically in order to carry out a perfect investigation to bring the perpetrators into custody and to protect their lives and property, as well as the maintenance of law and order. Due to less data on community participation in the Ghana Police Service, the research adopted an interpretative framework to assess the meaning connoted to community policing from the perspectives of the stakeholders themselves. The qualitative research method was used. There was an engagement of the police and community where focus group discussions and individual in-depth interviews were organized in the randomly selected communities in the district. Key informant interviews were used to solicit views of the people why they are reluctant to give information to the police to help them take the perpetrators to book. In the data collected, it was observed that most of the people have been under threats of offenders after they come back from the prisons, it was also observed that some of the unprofessional police personnel’s expose the whistleblowers who put their lives in danger. The data obtained were analyzed using simple Analytical tool SPSS and Excel. Based on the analysis, it was observed that a high number of people in the communities contacted had not made their mind to participate in any security issues. Based on the views of the community, there should be a high level of professionalism in the recruitment system of the Ghana police service to come out with professional police officers who can abide by the rules and regulations governing the profession.Keywords: community, bia west, Ghana, participation, police
Procedia PDF Downloads 14426251 Data-Driven Performance Evaluation of Surgical Doctors Based on Fuzzy Analytic Hierarchy Processes
Authors: Yuguang Gao, Qiang Yang, Yanpeng Zhang, Mingtao Deng
Abstract:
To enhance the safety, quality and efficiency of healthcare services provided by surgical doctors, we propose a comprehensive approach to the performance evaluation of individual doctors by incorporating insights from performance data as well as views of different stakeholders in the hospital. Exploratory factor analysis was first performed on collective multidimensional performance data of surgical doctors, where key factors were extracted that encompass assessment of professional experience and service performance. A two-level indicator system was then constructed, for which we developed a weighted interval-valued spherical fuzzy analytic hierarchy process to analyze the relative importance of the indicators while handling subjectivity and disparity in the decision-making of multiple parties involved. Our analytical results reveal that, for the key factors identified as instrumental for evaluating surgical doctors’ performance, the overall importance of clinical workload and complexity of service are valued more than capacity of service and professional experience, while the efficiency of resource consumption ranks comparatively the lowest in importance. We also provide a retrospective case study to illustrate the effectiveness and robustness of our quantitative evaluation model by assigning meaningful performance ratings to individual doctors based on the weights developed through our approach.Keywords: analytic hierarchy processes, factor analysis, fuzzy logic, performance evaluation
Procedia PDF Downloads 5826250 Anomaly Detection of Log Analysis using Data Visualization Techniques for Digital Forensics Audit and Investigation
Authors: Mohamed Fadzlee Sulaiman, Zainurrasyid Abdullah, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin
Abstract:
In common digital forensics cases, investigation may rely on the analysis conducted on specific and relevant exhibits involved. Usually the investigation officer may define and advise digital forensic analyst about the goals and objectives to be achieved in reconstructing the trail of evidence while maintaining the specific scope of investigation. With the technology growth, people are starting to realize the importance of cyber security to their organization and this new perspective creates awareness that digital forensics auditing must come in place in order to measure possible threat or attack to their cyber-infrastructure. Instead of performing investigation on incident basis, auditing may broaden the scope of investigation to the level of anomaly detection in daily operation of organization’s cyber space. While handling a huge amount of data such as log files, performing digital forensics audit for large organization proven to be onerous task for the analyst either to analyze the huge files or to translate the findings in a way where the stakeholder can clearly understand. Data visualization can be emphasized in conducting digital forensic audit and investigation to resolve both needs. This study will identify the important factors that should be considered to perform data visualization techniques in order to detect anomaly that meet the digital forensic audit and investigation objectives.Keywords: digital forensic, data visualization, anomaly detection , log analysis, forensic audit, visualization techniques
Procedia PDF Downloads 28726249 Evaluating and Improving Healthcare Staff Knowledge of the [NG179] NICE Guidelines on Elective Surgical Care during the COVID-19 Pandemic: A Quality Improvement Project
Authors: Stavroula Stavropoulou-Tatla, Danyal Awal, Mohammad Ayaz Hossain
Abstract:
The first wave of the COVID-19 pandemic saw several countries issue guidance postponing all non-urgent diagnostic evaluations and operations, leading to an estimated backlog of 28 million cases worldwide and over 4 million in the UK alone. In an attempt to regulate the resumption of elective surgical activity, the National Institute for Health and Care Excellence (NICE) introduced the ‘COVID-19 rapid guideline [NG179]’. This project aimed to increase healthcare staff knowledge of the aforementioned guideline to a targeted score of 100% in the disseminated questionnaire within 3 months at the Royal Free Hospital. A standardized online questionnaire was used to assess the knowledge of surgical and medical staff at baseline and following each 4-week-long Plan-Study-Do-Act (PDSA) cycle. During PDSA1, the A4 visual summary accompanying the guideline was visibly placed in all relevant clinical areas and the full guideline was distributed to the staff in charge together with a short briefing on the salient points. PDSA2 involved brief small-group teaching sessions. A total of 218 responses was collected. Mean percentage scores increased significantly from 51±19% at baseline to 81±16% after PDSA1 (t=10.32, p<0.0001) and further to 93±8% after PDSA2 (t=4.9, p<0.0001), with 54% of participants achieving a perfect score. In conclusion, the targeted distribution of guideline printouts and visual aids, combined with small-group teaching sessions, were simple and effective ways of educating healthcare staff about the new standards of elective surgical care at the time of COVID-19. This could facilitate the safe restoration of surgical activity, which is critical in order to mitigate the far-reaching consequences of surgical delays on an unprecedented scale during a time of great crisis and uncertainty.Keywords: COVID-19, elective surgery, NICE guidelines, quality improvement
Procedia PDF Downloads 19526248 Resilient Regions for Purpose of Crisis Management
Authors: Jana Gebhartova, Tomas Duda, Ivan Benes
Abstract:
World is characterized by constantly emerging new links, increasing complexity and speed of processes in the society. The globalized world needs (except political and financial mechanisms and institutions) functional supply chains. Transport and supply chains can be interrupted in case of natural disasters, conflicts and civil disorders, sudden demand shocks, export/import restrictions, terrorism. Long-term interruption of crucial services for human existence can results in breakdown of the whole society. If global supply chains can be interrupted, the ability to survive a crisis situation depends on local self-sufficiency, it means ensuring water, food and energy. In the world of 21st century, new way of thinking (based on the concept of resilience) is needed. Planning for self-sufficiency and resilience must be part of the agenda of local governments. The paper presents first results of research project VF20112015518 “Security of population – crisis management” that deals with issue of critical infrastructure, ensuring regional self-sufficiency in crisis situations and issues related to population protection and water, energy and food security. The project is being solved within Security Research of Ministry of the Interior of the Czech Republic in 2011-2015.Keywords: crisis management, resilience, indicators of self-sufficiency, continuity of supplies
Procedia PDF Downloads 37926247 Breast Cancer Awareness among Female Nurses: Time to Scrub off Assumptions
Authors: Rahy Farooq, Maria Ahmad Khan, Ayesha Isani Majeed
Abstract:
Objective: The main aim of this research is to assess the knowledge, attitude and practices of female nursing staff and nursing students regarding breast cancer, to provide a baseline for monitoring trends of breast cancer awareness in them. Background: Healthcare professionals are a direct source of information for the patients and the general public as a whole. It is, therefore, essential that the information they convey be accurate and helps in building additional awareness. However, clinical experience does not influence the knowledge, attitude and practices regarding breast cancer. Nurses, being the prime part of the healthcare professionals, play a significant role and hence, their awareness regarding this pressing issue is pertinent. Lack of awareness regarding common presenting symptoms or breast cancer risk factors translates to poor breast cancer screening practices and late diagnosis. Methodology: A cross-sectional study of 280 female nurses was conducted at a tertiary care hospital in Islamabad, Pakistan. A pre-tested structured questionnaire with additional variables like cultural barriers to seeking medical help was used. The scores for outcome variables including knowledge, attitude and practices were pre-defined. Data was analyzed using SPSSv23. Results: Of the 280 participants with a mean age of 28.99±9.98 years, 142 (50.7%) were married, and 138 (49.3%) were unmarried. Mean scores were computed to be 6.14±2.93 (out of 12), 0.30±0.7 (out of 3) and 9.53±1.92 (out of 16) for knowledge, attitude and practice respectively. Using independent sample T-test, a statistically significant correlation was found when means for the score of Attitude was compared with age. With a p-value of 0.018, 117 nurses of age more than 30 years, faced more practical, financial, emotional and service barriers as compared to 163 women younger than 30 years of age. Knowledge of age-related lifetime risks was also significantly poor more in single women; with a p-value of 0.006 for identification of correct age as a risk factor and a p-value of 0.005 for correct identification of risk for development of breast cancer in the lifetime of women. By application of Chi-square test, there was a significant correlation between marital status and cultural barriers to seeking medical help, showing that single women (58.7%) shy away from talking about breast cancer considering it a taboo (p-value 0.028) whereas, more married nurses (59.2%) were apprehensive that they might be considered at fault by the society, as compared to 40.8% of single nurses. (p-value 0.038). Conclusion: Owing to the scarcity of awareness among nurses, this study recognizes the need for delivering effective information to the female nurses regarding breast cancer. Educating patients is likely to be effective if the female nurses play their part and have correct attitudes towards breast cancer practices. A better understanding of the knowledge and practices regarding breast cancer among the nursing population will enable high-risk patients to be recognized early. Therefore, we recommend arrangement of special courses and seminars for all healthcare professionals including the nursing staff.Keywords: breast cancer, cultural barriers, kap, nurses
Procedia PDF Downloads 23926246 Autonomy in Healthcare Organisations: A Comparative Case Study of Middle Managers in England and Iran
Authors: Maryam Zahmatkesh
Abstract:
Middle managers form a significant occupational category in organisations. They undertake a vital role, as they sit between the operational and strategic roles. Traditionally they were acting as diplomat administrators, and were only in power to meet the demands of professionals. Following the introduction of internal market, in line with the principles of New Public Management, middle managers have been considered as change agents. More recently, in the debates of middle managers, there is emphasis on entrepreneurialism and enacting strategic role. It was assumed that granting autonomy to the local organisations and the inception of semi-autonomous hospitals (Foundation Trusts in England and Board of Trustees in Iran) would give managers more autonomy to act proactively and innovatively. This thesis explores the hospital middle managers’ perception of and responses to public management reforms (in particular, hospital autonomy) in England and Iran. In order to meet the aims of the thesis, research was undertaken within the interpretative paradigm, in line with social constructivism. Data were collected from interviews with forty-five middle managers, observational fieldwork and documentary analysis across four teaching university hospitals in England and Iran. The findings show the different ways middle managers’ autonomy is constrained in the two countries. In England, middle managers have financial and human recourses, but their autonomy is constrained by government policy and targets. In Iran, middle managers are less constrained by government policy and targets, but they do not have financial and human resources to exercise autonomy. Unbalanced autonomy causes tension and frustration for middle managers. According to neo-institutional theory, organisations are deeply embedded within social, political, economic and normative settings that exert isomorphic and internal population-level pressures to conform to existing and established modes of operation. Health systems which are seeking to devolve autonomy to middle managers must appreciate the multidimensional nature of the autonomy, as well as the wider environment that organisations are embedded, if they are about to improve the performance of managers and their organisations.Keywords: autonomy, healthcare organisations, middle managers, new public management
Procedia PDF Downloads 311