Search results
11 – 15 of 15
– The purpose of this paper is to define best practice, while identifying the impediments to its implementation.
Abstract
Purpose
The purpose of this paper is to define best practice, while identifying the impediments to its implementation.
Design/methodology/approach
The paper takes the form of a commentary.
Findings
There is as of yet no accepted definition of best practice that has both face and construct validity.
Practical implications
Defining what best practice means for health systems around the world will require a collaborative approach, adapting recommendations to local culture and resources. Avoiding a silo approach that could result in unintended consequences and conflicting recommendations can only be achieved with a patient-centric approach. Holistic patient care with consideration of varying societies' needs as a whole is the only way to truly offer best practice recommendations. Emergency medicine needs to be a leader in stepping away from the silo approach and establishing what truly is best in patient care.
Originality/value
Practical application of concepts of best practice will be difficult. Of necessity they will vary from country to country and from one level of care to another.
Details
Keywords
The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global…
Abstract
Purpose
The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a strange disconnect, however, between this supposed fight and the actual control over cybersecurity “on the ground”. This paper aims to reconnect discourse and control via a property rights approach, where control is located first and foremost in ownership.
Design/methodology/approach
This paper first conceptualizes current governance mechanisms through ownership and property rights. These concepts locate control over internet resources. They also help us understand ongoing shifts in control. Such shifts in governance are actually happening, security governance is being patched left and right, but these arrangements bear little resemblance to either the national security model of states or the global model of multi-stakeholder collaboration. With the conceptualization in hand, the paper then presents case studies of governance that have emerged around specific security externalities.
Findings
While not all mechanisms are equally effective, in each of the studied areas, the author found evidence of private actors partially internalizing the externalities, mostly on a voluntary basis and through network governance mechanisms. No one thinks that this is enough, but it is a starting point. Future research is needed to identify how these mechanisms can be extended or supplemented to further improve the governance of cybersecurity.
Originality/value
This paper bridges together the disconnected research communities on governance and (technical) cybersecurity.
Details
Keywords
Irina Farquhar, Michael Kane, Alan Sorkin and Kent H. Summers
This chapter proposes an optimized innovative information technology as a means for achieving operational functionalities of real-time portable electronic health records, system…
Abstract
This chapter proposes an optimized innovative information technology as a means for achieving operational functionalities of real-time portable electronic health records, system interoperability, longitudinal health-risks research cohort and surveillance of adverse events infrastructure, and clinical, genome regions – disease and interventional prevention infrastructure. In application to the Dod-VA (Department of Defense and Veteran's Administration) health information systems, the proposed modernization can be carried out as an “add-on” expansion (estimated at $288 million in constant dollars) or as a “stand-alone” innovative information technology system (estimated at $489.7 million), and either solution will prototype an infrastructure for nation-wide health information systems interoperability, portable real-time electronic health records (EHRs), adverse events surveillance, and interventional prevention based on targeted single nucleotide polymorphisms (SNPs) discovery.
Sarang Deo, Ilya Kolesov and Sachin Waikar
Stan Kent, vice president of pharmacy at NorthShore University HealthSystem, is faced with the challenge of seasonal planning for the influenza vaccine. The supply received by the…
Abstract
Stan Kent, vice president of pharmacy at NorthShore University HealthSystem, is faced with the challenge of seasonal planning for the influenza vaccine. The supply received by the multilocation healthcare system is unreliable in terms of timing and quantity. As part of improved planning, Kent is contemplating a new contract with NorthShore's major supplier of flu vaccines. The options under consideration include fixing either the date of delivery or the quantity delivered. The main decision involved in either option would be how much vaccine to order. The case also provides details about the seasonal influenza epidemic in the United States, illustrates operational complexities of the U.S. flu vaccine supply chain, and provides a brief description of the various channels used to distribute flu vaccine to end consumers.
The main objective of the case is to illustrate supply chain decision making when there is an unreliable supply (in contrast to the usual case of uncertain demand). A secondary objective is to make students think about appropriate internal (within sector) and external (other sectors) benchmarks to evaluate the performance of a health commodity supply chain.
Details