Refine
Year of publication
Document Type
- Conference Proceeding (384) (remove)
Keywords
- Solarthermie (6)
- physiotherapy (5)
- LiDAR (3)
- performing artists (3)
- Agile Lehre (2)
- Autarkie (2)
- Bodenverdichtung (2)
- Container (2)
- Energie (2)
- Gazebo (2)
Institute
- Fakultät WiSo (169)
- Fakultät AuL (137)
- Fakultät IuI (46)
- Institut für Duale Studiengänge (13)
- Institut für Management und Technik (13)
- Institut für Kommunikationsmanagement (2)
- Fakultät MKT (1)
- Institut für Musik (1)
- Sonstige Einrichtungen (1)
An Iterative Methodology for Developing National Recommendations for Nursing Informatics Curricula
(2016)
The increasing importance of IT in nursing requires educational measures to support its meaningful application. However, many countries do not yet have national recommendations for nursing informatics competencies. We thus developed an iterative triple methodology to yield validated and country specific recommendations for informatics core competencies in nursing. We identified relevant competencies from national sources (step 1), matched and enriched these with input from the international literature (step 2) and fed the resulting 24 core competencies into a survey (120 invited experts from which 87 responded) and two focus group sessions with a total of 48 experts (steps 3a/3b). The subsequent focus group sessions confirmed and expanded the findings. As a result, we were able to define role specific informatics core competencies for three countries.
We describe an automated approach, to easily track patients regaining their walking ability while recovering from neurological diseases like e.g. stroke. Based on captured gait data and objective measures derived out of it the rehabilitation process can be optimized and thus steered. In order to apply such system in clinical practice two key requirements have to be fulfilled: (i) the system needs to be applicable in terms of ease of use and performance; (ii) the derived measures need to be accurate.
Going Mobile : An Empirical Model for Explaining Successful Information Logistics in Ward Rounds
(2018)
Background: Medical ward rounds are critical focal points of inpatient care that call for uniquely flexible solutions to provide clinical information at the bedside. While this fact is undoubted, adoption rates of mobile IT solutions remain rather low.
Objectives: Our goal was to investigate if and how mobile IT solutions influence successful information provision at the bedside, i.e. clinical information logistics, as well as to shed light at socio-organizational factors that facilitate adoption rates from a user-centered perspective.
Methods: Survey data were collected from 373 medical and nursing directors of German, Austrian and Swiss hospitals and analyzed using variance-based Structural Equation Modelling (SEM).
Results: The adoption of mobile IT solutions explains large portions of clinical information logistics and is in itself associated with an organizational culture of innovation and end user participation.
Conclusion: Results should encourage decision makers to understand mobility as a core constituent of information logistics and thus to promote close end-user participation as well as to work towards building a culture of innovation.
The establishment of successful clinical information logistics (CIL) within the care processes is one of the main objectives of strategic health IT management in hospitals. While technical realisations in terms of useful, usable and interoperable IT solutions are essential precursors of CIL, there is limited empirical research on what socio-organisational factors underlie an innovation-friendly culture and how they can affect successful information provision. We applied factor analysis on survey data from 403 clinical directors from Germany, Austria and Switzerland and used the dimensions identified to explain the level of CIL with ordered logistic regression analysis. The intensity of collaboration and exchange with the IT department as well as the degree of executive IT leadership showed to be strongly associated with better CIL while personal views and attitudes of clinical directors were not. Analysing country differences revealed the degree of the exchange with the IT department to be significantly lower in German hospitals. This points at a potential strategic lever for German hospital executives to focus on.
Hospital CIOs play a central role in the adoption of innovative health IT. Until now, it remained unclear which particular conditions constitute their capability to innovate in terms of intrapersonal as well as organisational factors. An inventory of 20 items was developed to capture these conditions and examined by analysing data obtained from 164 German hospital CIOs. Principal component analysis resulted in three internally consistent components that constitute large portions of the CIOs innovation capability: organisational innovation culture, entrepreneurship personality and openness towards users. Results were used to build composite indicators that allow further evaluations.
The Internet of Things (IoT) relies on sensor devices to measure real-world phenomena in order to provide IoT services. The sensor readings are shared with multiple entities, such as IoT services, other IoT devices or other third parties. The collected data may be sensitive and include personal information. To protect the privacy of the users, the data needs to be protected through an encryption algorithm. For sharing cryptographic cipher-texts with a group of users Attribute-Based Encryption (ABE) is well suited, as it does not require to create group keys. However, the creation of ABE cipher-texts is slow when executed on resource constraint devices, such as IoT sensors. In this paper, we present a modification of an ABE scheme, which not only allows to encrypt data efficiently using ABE, but also reduces the size of the cipher-text, that must be transmitted by the sensor. We also show how our modification can be used to realise an instantaneous key revocation mechanism.
The Internet of Things (IoT) is the enabler for new innovations in several domains. It allows the connection of digital services with real, physical entities. These entities are devices of different categories and range in size from large machinery to tiny sensors. In the latter case, devices are typically characterized by limited resources in terms of computational power, available memory and sometimes limited power supply. As a consequence, the use of security algorithms requires expert knowledge in order for them to work within the limited resources. That means to find a suitable configuration for the algorithms to perform properly on the device. On the other side, there is the desire to protect valuable assets as strong as possible. Usually, security goals are captured in security policies, but they do not consider resource availability on the involved device and their consumption while executing security algorithms. This paper presents a resource aware information exchange model and a generation tool that uses high-level security policies as input. The model forms the conceptual basis for an automated security configuration recommendation system.
The Internet of Things (IoT) is the enabler for new innovations in several domains. It allows the connection of digital services with physical entities in the real world. These entities are devices of different categories and sizes range from large machinery to tiny sensors. In the latter case, devices are typically characterized by limited resources in terms of computational power, available memory and sometimes limited power supply. As a consequence, the use of security algorithms requires of them to work within the limited resources. This means to find a suitable implementation and configuration for a security algorithm, that performs properly on the device, which may become a challenging task. On the other side, there is the desire to protect valuable assets as strong as possible. Usually, security goals are recorded in security policies, but they do not consider resource availability on the involved device and its power consumption while executing security algorithms. This paper presents an IoT security configuration tool that helps the designer of an IoT environment to experiment with the trade-off between maximizing security and extending the lifetime of a resource constrained IoT device. The tool is controlled with high-level description of security goals in the form of policies. It allows the designer to validate various (security) configurations for a single IoT device up to a large sensor network.
Ein aus auenökologischer Perspektive optimales Abflussregime ist dann erreicht,
wenn durch dessen Steuerung (Zeitpunkt, Dauer, Häufigkeit und Intensität) „Möglichkeiten“ geschaffen werden, dass auentypische Arten sich dauerhaft ansiedeln
können. Über die Interpretation von Wasserstandsganglinien an unterschiedlichen
Auengewässern und der flächenhaften Kartierung von Überflutungsflächen in
Kombination mit Vegetationsaufnahmen können erste Rückschlüsse auf die Funktionalität und Effektivität von den im Projektgebiet durchgeführten Renaturierungsmaßnahmen gezogen werden.
Continuity of care is a concept that is defined as the uninterrupted and coordinated care provided to a patient and that includes an informational dimension which describes the information exchange between the parties involved. In nursing, the nursing summary is the main instrument to ensure informational continuity of care. The aim of this paper is to present an HL7 Clinical Document Architecture based document standard for the eNursing Summary and to discuss the need for harmonizing these results at international level. The eNursing Summary proposed in this paper was developed on the basis of several internationally accepted concepts, primarily the nursing process, the ISO 18104 Reference Terminology Model for Nursing and various data sets. The standardisation process embraced several phases of involving nursing experts for validating its structure and content. It was finally evaluated by a network of 100 healthcare organizations. We argue that the eNursing Summary is a good starting point for standardising nursing discharge and transfer documents on a global level. However, further work is needed to bring together the different national and international strands in standardisation.
Handovers need a common ground on the clinical cases between the members of the successive shifts to establish continuity of care. Conventional electronic patient record systems (EHR) proved to be only insufficiently suitable for supporting the grounding process. Against this background we proposed a basic concept for a handover EHR that extends general EHRs in particular openEHR based systems. The resulting handover information model was implemented in a database and evaluated based on 120 clinical cases. The information items of these cases could be mapped successfully to the model, however, the new class “anticipatory guidance” needed to be introduced. The evaluation also demonstrated the importance of highly aggregated information on the clinical case, opinions and meta-information such as the relevance of an item during handovers. Based on these findings, in particular the handover database, handover EHR applications are currently developed to support the grounding process.