3. General Organizational Safety and Quality Best Practices
Sherwood, G., & Horton-Deutsch, S. (2015). Reflective
organizations: On the front lines of
QSEN and reflective practice implementation. Retrieved from
https://ebookcentral-
proquest-
com.library.capella.edu/lib/capella/detail.action?docID=344020
7#
This e-book presents the paradigm shift required for
organizations to provide QSEN
(quality and safety education to nurses). It provides readers
with the innovative
pedagogical approaches required to change traditional content-
based health care
education methods to interactive methods that engage learners.
These approaches
include facilitative teaching, visual thinking strategies, creating
a presence that is
authentic, and meaningful learning through debriefing. Concrete
examples in the
resource demonstrate the application of reflective learning.
Additionally, the reflective
questions in the resource guide readers to evaluate their own
practice, either
5. guidelines program
implemented in acute health care settings. The sustainability of
the program was
characterized by the following: benefits for patients as the rate
of incidence of falls
reduced; routinization of best practices as the team’s adherence
to guidelines improved;
and, in the long term, the development of the team’s
adaptability to changes in
circumstances that threatened the program. Seven key factors
that accounted for the
sustainability of the program were also identified. The source
explains how
relationships between the characteristics of sustainability
(benefits, routinization, and
development) and the seven key factors contributed toward the
sustainability of the
improvement program. This source is valuable for nursing
students as it helps them
understand how safety programs can be sustained to ensure the
long-term reduction of
the incidence of sentinel events in geropsychiatric units.
Kossaify, A., Hleihel, W., & Lahoud, J.-C. (2017). Team-based
efforts to improve quality of
7. Effective teamwork can help
reduce the incidence of sentinel events that result from
preventable medical errors, which
are often caused by dysfunctional communication among team
members. Teamwork is
more reliable and efficient than individual work in high-risk
environments such as a
geropsychiatry unit. Although the specific contexts of readers’
practices may be different,
this resource is valuable for nursing administrators and
professionals as it discusses the
implementation of values needed for positive teamwork as well
as the monitoring and
management of teamwork.
Environmental Safety and Quality Risks
Powell-Cope, G., Quigley, P., Besterman-Dahan, K., Smith, M.,
Stewart, J., Melillo, C.,
Friedman, Y. (2014). A qualitative understanding of patient
falls in inpatient mental
health units. Journal of the American Psychiatric Nurses
Association, 20(5), 328–339.
https://doi.org/10.1177/1078390314553269
This source mentions a study conducted to analyze falls in
9. measures taken to resolve these challenges.
Wong Shee, A., Phillips, B., Hill, K., & Dodd, K. (2014).
Feasibility, acceptability, and
effectiveness of an electronic sensor bed/chair alarm in
reducing falls in patients with
cognitive impairment in a subacute ward. Journal of Nursing
Care Quality, 29(3), 253–
262. https://doi.org/10.1097/NCQ.0000000000000054
This source is a preliminary study conducted to determine the
effectiveness of electronic
sensor bed/chair alarms to reduce the occurrence of falls in
patients with cognitive
impairment. These alarms can be attached to the patient’s body
or to the bed/chair the
patient uses to alert the nursing staff every time the patients
move or leave their seat.
Nurses were educated about the alarms and asked to document
their observations and
provide feedback. Although effective at preventing falls in
patients with cognitive
impairment, the electronic sensors needed improvements such as
the elimination of cords
that may be hazardous to patients and the additional provision
11. falls in geropsychiatric units. Psychotropic medications can
cause cognitive impairments
and blurring of vision, which can be aggravated by dim lighting
in the units. The article
presents a trial pilot study conducted to evaluate the effects of
the use of modified night
lighting in inpatient wards to prevent falls. LED lights were
installed in the vicinity of the
beds and the toilets, where falls were likely to occur. The study
provides valuable insights
that could inform design and refurbishment efforts at
geropsychiatric units. An important
limitation of the study is that a stepped wedge, cluster
randomized controlled trial has not
yet been applied to test environmental modifications in any
setting. However, the
modifications discussed could still be implemented as an
important intervention strategy
for preventing falls in older adults with cognitive impairment.
Staff-Led Preventive Strategies
Morgan, L., Flynn, L., Robertson, E., New, S., Forde‐Johnston,
C., & McCulloch, P. (2016).
Intentional rounding: A staff‐led quality improvement
intervention in the prevention of
13. system to design the rounding format and the frontline nursing
staff who conducted the
intentional rounds. Although its sample size was small and not
entirely representative, the
study does establish intentional rounding as an effective falls-
prevention strategy, which
when implemented with adequate staff engagement and support
from leadership
definitively reduces the occurrence of falls.
Moncada, L. V. V., & Mire, G. L. (2017). Preventing falls in
older persons. Am Fam Physician,
96(4), 240–247. Retrieved from
https://www.aafp.org/afp/2017/0815/p240.pdf
The article posits that a history of falls in older persons is
associated with an increased
risk of a future fall. The American Geriatrics Society
recommends that older adults aged
65 and above should undergo annual screening for balance
impairment and a history of
falls as a preliminary intervention for the prevention of falls.
The article also highlights
an algorithm developed by the Centers for Disease Control and
Prevention. The
15. Isaac, L. M., Buggy, E., Sharma, A., Karberis, A., Maddock, K.
M., & Weston, K. M. (2018).
Enhancing hospital care of patients with cognitive impairment.
International Journal of
Health Care Quality Assurance, 31(2), 173–186.
https://doi.org/10.1108/IJHCQA-11-
2016-0173
This paper evaluates the TOP5 intervention strategy of
improving patient care. The
strategy involves engaging with carers of geriatric patients
(individuals who are family
members or friends of the patients) to collect characteristic non-
clinical information
about patients to personalize care and reduce falls. The carers of
patients narrated to the
nursing staff five important and distinct characteristic details
such as the patients’ needs
and past emotional experiences. The nursing staff then prepared
a customized plan of
care for each patient based on this information. This study
reported a significant
reduction in falls and qualitatively improved care. The study
enables nursing students to
17. engagement that can help reduce the incidence of sentinel
events, especially in health
care units such as geropsychiatry units. Bedside reporting is a
vital concern in
geropsychiatric units as patients are prone to behavioral
changes and unpredictable
behavior may affect other patients in the unit. During a shift
change, the nursing staff can
alert the incoming staff about the condition of such patients to
proactively prepare the
staff to address any forthcoming issue. Barriers to bedside
reporting were also analyzed,
and barriers perceived by patients and those perceived by nurses
were identified. These
barriers can be eliminated through open communication and by
educating the nursing
staff. The article provides a valuable discussion of factors that
influence bedside
reporting such as patient-centered care philosophy, guidelines
of the Joint Commission
Institute, demand for patient participation in making health care
decisions, and the
shortcomings of traditional handover practices.
Stergiopoulos, S., Brown, C. A., Felix, T., Grampp, G., & Getz,
19. underreporting of the adverse drug events such as lack of
training among health care
professionals and standardized reporting processes.
Underreporting of adverse drug
events can be a critical problem, especially in health care units
such as geropsychiatry
units. Individual patients may react differently to psychotropic
drugs; reactions may
include overdoses or allergic reactions. These reactions need to
be monitored closely and
reported efficiently to avoid complications including falls.
Nursing students can
understand the importance of reporting adverse drug events
through this source.
Lozito, M., Whiteman, K., Swanson-Biearman, B., Barkhymer,
M., & Stephens, K. (2018).
Good catch campaign: Improving the perioperative culture of
safety. AORN Journal,
107(6), 705–714. https://doi.org/10.1002/aorn.12148
This article provides evidence-based results to show that the
culture of safety in a
perioperative unit was improved after implementing the good
catch campaign. Good
catch is the ability of nursing staff to point out mistakes and
21. References
Chari, S. R., Smith, S., Mudge, A., Black, A. A., Figueiro, M.,
Ahmed, M., . . . Haines, T. P.
(2016). Feasibility of a stepped wedge cluster RCT and
concurrent observational sub-
study to evaluate the effects of modified ward night lighting on
inpatient fall rates and
sleep quality: A protocol for a pilot trial. Pilot and Feasibility
Studies, 2(1).
https://doi.org/10.1186/s40814-015-0043-x
Fleiszer, A. R., Semenic, S. E., Ritchie, J. A., Richer, M.-C., &
Denis, J.-L. (2016). A unit-level
perspective on the long-term sustainability of a nursing best
practice guidelines program:
An embedded multiple case study. International Journal of
Nursing Studies, 53, 204–
218. https://doi.org/10.1016/j.ijnurstu.2015.09.004
Isaac, L. M., Buggy, E., Sharma, A., Karberis, A., Maddock, K.
M., & Weston, K. M. (2018).
Enhancing hospital care of patients with cognitive impairment.
International Journal of
Health Care Quality Assurance, 31(2), 173–186.
https://doi.org/10.1108/IJHCQA-11-
23. 96(4), 240–247. Retrieved from
https://www.aafp.org/afp/2017/0815/p240.pdf
Morgan, L., Flynn, L., Robertson, E., New, S., Forde‐Johnston,
C., & McCulloch, P. (2016).
Intentional rounding: A staff‐led quality improvement
intervention in the prevention of
patient falls. Journal of Clinical Nursing, 26(1–2), 115–124.
https://doi.org/10.1111/jocn.13401
Powell-Cope, G., Quigley, P., Besterman-Dahan, K., Smith, M.,
Stewart, J., Melillo, C.,
Friedman, Y. (2014). A qualitative understanding of patient
falls in inpatient mental
health units. Journal of the American Psychiatric Nurses
Association, 20(5), 328–339.
https://doi.org/10.1177/1078390314553269
Sherwood, G., & Horton-Deutsch, S. (2015). Reflective
organizations: On the front lines of
QSEN and reflective practice implementation. Retrieved from
https://ebookcentral-
proquest-
com.library.capella.edu/lib/capella/detail.action?docID=344020
7#
Stergiopoulos, S., Brown, C. A., Felix, T., Grampp, G., & Getz,
K. A. (2016). A survey of
26. Introduction
Use of Information Communication Technology in business is
key to business access. In most of the information is passed
through the use of the technology device. This has led to a
reduction in cost and length of time the information is passed. It
has become a practice adopted by the business institution such
that even within the same office employees communicate
through slack or Trello (Kocarev, 2012).
Significance of Information Communication Technology
Implementation of ICT in the business sector has a greater cost
because there is a new emerging use of technology in business
management. Use of the data science and artificial intelligence
in the business requires a huge amount of funding: first, it needs
training of the manpower to work with the software and be able
to properly implement the policy of the companies.
Implementation of the emerging technology in the business
sector is different and tedious as there are different intended use
compared to other sectors. Again the cost of implementing
technology in the business is higher since there are several
devices needed to make a complete device that can function.
Unlike other firms that only used the technology for mare
purpose of communication. The company needs to implement
ICT for benefit of business analysis identification,
communication, and data security as well as market intelligence
(Mach-Król, M. Olszak & Pełech-Pilichowski, 2015).
Conclusion
Presently, any organization that needs to succeed in the
business should opt-in the use of ICT. Though the cost of
27. installation and maintenance may be high it is important since it
makes the management have secured business do several issues
such as market implementation as well as communication
(Salazar & Sawyer, 2007).
References
Kocarev, L. (2012). ICT Innovations 2011 [recurso electrónico].
Alemania: Springer Healthcare Ltd.
Mach-Król, M., M. Olszak, C., & Pełech-Pilichowski, T.
(2015). Advances in ICT for Business, Industry and Public
Sector. Cham: Springer.
Salazar, A., & Sawyer, S. (2007). Handbook of information
technology in organizations and electronic markets. New Jersey:
World Scientific.
Running head: MODULE 4 PROJECT 1
MODULE 4 PROJECT 5
28. Issues, Assumptions, Complaints
Robert Jamerson
Rasmussen College
Issues
Implementation of information and communication
technology remains an integral opportunity for most firms.
However, most firms face enormous challenges as much as they
are likely to introduce significant and lasting positive changes
to the organization. For instance, the rapid penetration of
mobile access has greatly impacted communication in various
ways. Additionally, it is imperative to have programs that test,
share, and develop valuable knowledge that will help in
alleviating pitfalls during implementation process. However, it
is noteworthy that this emergent potential and opportunity
presents numerous issues and possible threats for large
organizations, which include:
a) Issues of Sustainability and Scale: the use of ICT in
organizations remain very important. However, one of the issues
is that most organizations usually have a large scale and
unsustainable. It is important that organizations address issues
of sustainability to realize the full potential of ICT as an
integral program for organizations. Additionally, ICT is an
29. important tool that improves levels of collaboration, both
internally and externally but it faces the hurdle of scaling that
will necessitate coordination.
b) Funding: the issue of funding remains the most vital issue
since ICT implementation presents fundamental and far-
reaching questions regarding its financing (Bouwman, et al.,
2008). It is never easy for firms to properly manage and
resource financial and human investment in ICT.
Assumptions
Assumptions that many organizations make when implementing
ICT is that the process is unlikely to create huge hurdles.
However, potential clients rapidly become frustrated when much
touted advancements perform tests to understand the
technological performance (Bouwman, et al., 2008). There are
two assumptions behind leading a pilot activity before
presenting a development in all cases in an enormous
association: first, to fill in as an examination and demonstrate
specialized attainability to top administration and, second, to
fill in as a dependable showing model for different units in the
association (Hosoya, Maruhashi & Orihashi, 2015). These two
reasons for existing are not constantly perfect. In the event that
the advancement must prevail at the pilot site so as to endure
politically, the usage supervisor may pick a site that stances for
all intents and purposes no hazard however that neither offers
genuine advantage to the association nor builds up a model for
different units.
Simultaneously, in any case, if the preliminary is to be a valid
test, it cannot happen among the most imaginative individuals
in the enterprise. Accomplishment at this sort of site is
powerless against the analysis that these clients are a long way
from run of the mill. Testing the new innovation best case
scenario performing unit, despite the fact that it might be the
place the advancement is most required and would demonstrate
the most marvelous outcomes, is no better a decision. On the off
chance that the undertaking misfires, the usage supervisor won't
know the amount of the disappointment was brought about by
30. remarkable issues with the site and how much by the inborn
properties of the innovation. In the event that the task succeeds,
faultfinders will rush to take note of that anything would have
helped activities at that site (Gendron, 2013).
Constraints
There are numerous constraints that may hinder the
successful implementation of ICT in an organization. Some of
them include time and unavailability of resources. Since the
implementation of any technological changes within an
organizations require deadlines. However, these deadlines may
prove difficult to meet because of time constraints.
Additionally, implementation require resources and lack of the
resources may also cause enormous problems to the successful
implementation of the desired changes within an organization.
Lack of enough resources creates gaps in the implementation
process
References
Bouwman, H., van, . H. B., van, . W. L., & van, D. J. A. G. M.
(2008). Information and Communication Technology in
Organizations: Adoption, Implementation, Use and Effects.
London SAGE Publications Ann Arbor, Michigan ProQuest.
Gendron, M. S. (2013). Business Intelligence Applied:
Implementing an Effective Information and Communications
Technology Infrastructure. Hoboken, New Jersey.
Hosoya, K., Maruhashi, K., & Orihashi, N. (2015). U.S. Patent
No. 8,933,840. Washington, DC: U.S. Patent and Trademark
Office.
31. Methodology, Current Systems, and Processes/Environment
Robert Jamerson
Rasmussen College
Discussion
Methodology
The inclusion of up to date information technology in
communication systems used by the military will significantly
improve the effectiveness and speed of communication and will
ensure that third parties do not have the chance to interrupt
ongoing communication. The inclusion of up to date technology
in communications systems used by the military is feasible, as
currently, technology is widely used in most military
communications (DOD, 2011). A key strength of this initiative
is that the country’s military communication systems will be
highly secured. A key weakness is the high costs of the new
investments that will have to be made in new technology.
Current Systems
Currently, the department of defense (DOD) relies on
32. information technology to a great extent in communicating with
its staff in different locations. The systems in place are however
not updated as frequently as they are supposed to as technology
changes. This means they may be vulnerable to some extent and
can be hacked. By continuously updating the systems, however,
vulnerabilities can be continuously detected and eliminated,
which makes the systems more secure and improves their
efficiency as communications tools.
Processes/Environment
A key change the new communication technology will provide
is security. As technology changes, new communication systems
become available that are more secure, while old systems that
may have vulnerabilities are disposed of. The adoption of new
technology improves the security of the systems in place and
makes it difficult for third parties to access information being
communicated. Secondly, new communication systems improve
the efficiency and speed of communication and make it possible
for more people to be included in the communications network
of the DOD. This eliminates the possibility of errors taking
place within the communication network.
33. References
DOD. (2011). Department of Defense (DoD) Information
Technology (IT) Enterprise Strategy and Roadmap. Retrieved
from Department of Defense :
https://dodcio.defense.gov/Portals/0/Documents/Announcement/
Signed_ITESR_6SEP11.pdf
Communication Technology
Robert Jamerson
Rasmussen College
Executive Summary
There is no company which can ever be protected fully by a
single layer of security. Where a single door could get closed,
other tend to get left wide open, thus giving a way for hackers
to quickly find different vulnerabilities. However, once an
34. organization uses several defenses together, like; integrity
auditing solutions, intrusion detection systems and malware
scanners, these help in efficiently closing the gaps which get
created by relying upon a single security solution. With the
development of technology, the world is obliged to adapt. Crime
has become a present-day problem, and with the spread of
computer technologies and computers, computers that commit
crime has become rampant (Willison &Warkentin, 2013).
Communication Technology
Scope
This week, we will look at diverse articles on data breaches.
Companies get penetrated by cybercriminals. Some of the
companies is among the biggest credit bureaus and the criminals
get away with personal data for nearly 145 million individuals.
In addition, to prevent downtime as a result of malicious attacks
like network intrusions and DOS, that is, denial-of-service,
security equipment and extra software ought to be used too.
This too helps in improving the aspect of availability in
information security (Sen, R., &Borle, 2015).
History
DiD, that is, Depth in Defense, is a strategy to Cybersecurity
whereby there is a series of defensive mechanisms which get
layered so as to protect valuable information and data. In the
case that a single mechanism fails, the other one immediately
steps up to thwart an attack. This strategy has intentional
redundancies in a multi-layered and addresses several diverse
35. attack vectors. Also known as the “castle approach,” Depth in
Defense is therefore a concept in information assurance
whereby several layers of defense or rather security controls get
replaced all through an information technology system
(Mavroeidakos, et.al, 2016).
References
Mavroeidakos, T., Michalas, A., &Vergados, D. D. (2016,
April). Security architecture based on defense in depth for
Cloud Computing environment. In 2016 IEEE Conference on
Computer Communications Workshops (INFOCOM
WKSHPS)(pp. 334-339). IEEE.
Sen, R., &Borle, S. (2015). Estimating the contextual risk of
data breach: An empirical approach. Journal of Management
Information Systems, 32(2), 314-341.
Willison, R., &Warkentin, M. (2013). Beyond deterrence: An
expanded view of employee computer abuse. MIS quarterly,
37(1).
Running head: COMMUNICATION TECHNOLOGY 1
COMMUNIACTION TECHNOLOGY 4
36. Communication Technology
Robert Jamerson
Rasmussen College
Communication Technology
Introduction
Communication is essential in the performance of day to day
activities in an organization or government sector.
Communication facilitates the organizing, leading and
controlling of the areas. In the Department of Defense (DOD),
communication could be a determinant of war and peace.
Miscommunication could lead to war very easily (Paul et al.,
2015). This paper seeks to describe the type of advancement
that should be made in the communication department.
Communication Technology in the Department of Defense
Think tanks work is to research and engage in advocacy in
different areas and initiate their work according to their
findings or suggest the solutions to the agency involved. In this
case, the think tank is to come up with the best communication
strategy. Over the years, hackers have become more intelligent
and the technology used in most defense departments is still
vulnerable. Hackers can easily find their way into the
communication channels and share the information they get with
the general public. Some of the information that the defense
department keep secret is to avoid the citizens from panicking.
The solution that the team came up with was to ensure that
people using any communication devices must undergo training
on how to use them and also how to quickly notice any changes
in the communication systems.
Every computerized system needs an antivirus that should be
regularly updated. This strengthens the security of data and
information stored in the systems. Moreover, communication
channels should be secure at all time. In any talks or messages
passed in the chain of command, every person involved should
use a secure line. The DOD should purchase new
communication devices and replace the old ones from time to
37. time. The department should also make sure they are up to date
with the latest communication gadgets. This makes the DOD be
always ahead of the hackers. Nonetheless, communication
gadgets should be wireless. This reduces the chances for
communication tapping by hackers (Hosoya et al., 2015).
Conclusion
In conclusion, every member of the department of defense
should understand the need for privacy and loyalty.
Communication about work routines should be minimal with
strangers and members of the family. Carrying any defense
communication gadgets to one’s home could result in a security
breach from some dangerous people that live in the community.
Observing all conditions that the think tank recommended
would result to a peaceful world.
References
Hosoya, K., Maruhashi, K., & Orihashi, N. (2015). U.S. Patent
No. 8,933,840. Washington, DC: U.S. Patent and Trademark
Office.
Paul, C., Yeats, J., Clarke, C. P., & Matthews, M.
(2015). Assessing and evaluating Department of Defense efforts
to inform, influence, and persuade: desk reference. RAND
NATIONAL DEFENSE RESEARCH INST SANTA MONICA
CA.