IT - Essay Example

Only on StudentShare

Extract of sample
IT


In order to ensure compliance with the Data Protection Act it was decided to ensure that any data which might uniquely identify any patient would not be part of the study. The section of the form, which contained the patient's name, was used only for cross-referencing the accuracy of the data auto generated from the PAS. This was undertaken by a research student employed for the duration of the study. This detachable section was then shredded and discarded.
The choice of variables reflects those used by the Royal College of Radiologists in its Re-audit of Radiotherapy Waiting Times 2003 report. It also ties in with the major audit undertaken by the Department annually. This will enable us to cross-reference and to align the data with a view to making recommendations for necessary improvements in the service.
Data on overall waiting times will feed into the Department's annual report and incremental improvements in service. Waiting times by gender is part of a larger study into inequalities of access to the service. The Department wishes to identify whether there is any disparity and if so to determine cause, and remove it promptly.
Limit to list - the Diagnosis, Dosage, Waiting List Status and Gender fields were limited to the prescribed coded choices. This method was chosen to further protect patient confidentiality in the event that the privacy of the data was compromised.
60 pat ...
Download paper

Summary

The Department currently has an arbitrary 'good practice' waiting time of 30 minutes between arrival and discharge. This survey will provide a benchmark for the Department to determine the length of time patients are actually waiting for treatment once they arrive
Author : laceyreynolds

Related Essays

Managing IT outsourcing
The following is an overview of managing the IT outsourcing relationship, which includes the business process of outsourcing, the tools and resources, understanding the cost and return on investment. Furthermore, there will be some examples of risk management and data security, as well as a look at the dimensions of relationship management and its importance.Business Process Outsourcing is best explained by Medas Company, an outsourcing management consultant. Their document, A Practical Guide to Business Process Outsourcing (2006) gives straightforward information on the actual process of...
9 pages (2259 words) Essay
Corporations IT Infrastructure
There are additional expenses that are to be bore because of training costs for the employees, establishment of an Information Technology Department in the organization for regular functioning of the system. Henceforth there are costs involved but definitely the benefits far outweigh the costs....
7 pages (1757 words) Assignment
IT Security
There is a long line of self-interested intruders ready and willing to capture this valuable data, and as our reliance on digital information has grown, so have the threats. Large concentrations of data, mobile devices, and the need to keep the data useful has all added to the vulnerability of our information technology. While our information system has worked to make our data more secure, the threats of attack and the divulging of information has become ever more prevalent. Information security is an ongoing process that can never quite meet the challenge of the security threats....
4 pages (1004 words) Essay
IT Wirless Technologies
Which implies the interference by 1 % of the devices in city will much greater than the interference by 1% of the devices in the town. Also as the city covers wider area, the signal that has to travel through the interference for a longer distance...
6 pages (1506 words) Essay
IT
Several designs were made to increase efficiency and power of an aircraft. It gradually has transformed in to a major economic activity from a mere pleasure ride that it was when it was initially invented. This essay would explore the entire transition of aircraft, from the time it was invented to the modifications it went through and the existing challenges it is facing as a result of globalization and other political and socio economic factors....
6 pages (1506 words) Essay
IT
According to Mintzberg (1999), they are “functional strategy, operational strategy, business strategy, dynamic strategy and corporative strategy. Strategic business unit is also included” (Mintzberg, 1999). Functional strategy in its turn includes strategic development of new products, marketing strategies, economic strategies, lawful principles, human resources and information technologies....
2 pages (502 words) Essay
IT
Information systems have gained a critical role in business leading to a number of operational advantages. Khurana (2010: 4) argues that one of the reasons why information system is important to businesses is its role in data and organizational management. This involves activities such as “capture of data, storage of data, processing of data, distribution of information, and presentation of information,” activities that are very important to businesses (Khurana, 2010, p. 4). Competitive nature of the corporate world has for instance led to increased efforts to track and retain customers....
2 pages (502 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!