SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Chapter 12
Human
Technology
Interface
Human–Technology Interfaces
Examples
– EMR
– Defibrillator
– patient-controlled analgesia (PCA) pump
– Drug administration system
– any number of physiologic monitoring systems
– electronic thermometers
– and, of course, telephones and pagers.
Human–Technology Interface
Any time a human uses technology, there is
some type of hardware and/or software that
enables and supports the interaction.
Workarounds
• Circumvent troublesome technology
• Are bandaids
• Do not fix the problem
• Could put the patient at risk
Telehealth
Uses telecommunication and
videoconferencing software to communicate
more effectively and more frequently with
patients at home by using the technology to
monitor patients’ vital signs, supervise their
wound care, or demonstrate a procedure.
Telehealth Interfaces
Allow patients to interact with a virtual
clinician (actually a computer program) that
will ask questions, provide social support, and
tailor education to identify patient needs
based on the answers to screening questions
Telehealth Interfaces
These human–technology interfaces have
been remarkably successful; sometimes
patients prefer them to live clinicians!
Human Technology Interface Problems
The major cause of up to 87% of all patient
monitoring incidents. It is not always that
technology is faulty. Technology may perform
flawlessly, but interface design may lead
human user to make errors (Vicente, 2004).
Technology Should Fit
5 Levels of Human Requirements
1. Physical
2. Psychological
3. Team
4. Organizational
5. Political
Analysis Tools and Techniques
• Task-analysis
• Cognitive task analysis (CTA)
• Cognitive work analysts (CWA)
Involve the users
• Focus group
• Cognitive walkthrough
• Heuristic evaluation
• Formal usability test
• Field study
FITT Model
• Fit between Individuals, Tasks, and Technology
that
• Suggests that each of these factors
be considered in designing and evaluating
human-technology interfaces
Doctors Vs. Nurses
• Doctors and nurses describe patient
information differently
– doctors emphasized diagnosis, treatment and
management;
– nurses emphasized functional issues.
Issues Associated with Wearable
Technology
The human-technology interface must address:
• How will people use this technology?
• How will they behave with it on their person?
• How will they wear it?
• How and when will they enable and use it?
• Will others be able to detect the technology?
In the Ideal World
• Every human-technology interface will be
– designed to enhance users’ workflow
– as easy to use as ATM machines
– fully tested prior to its implementation in a
setting that mirrors the setting where
it will be used

Weitere ähnliche Inhalte

Was ist angesagt?

Telemedicine
TelemedicineTelemedicine
TelemedicineADITYA .
 
"Nursing Informatics PowerPoint Presentation"
"Nursing Informatics PowerPoint Presentation""Nursing Informatics PowerPoint Presentation"
"Nursing Informatics PowerPoint Presentation"chandy-20
 
Patient record system. shilpa Jose
Patient record system. shilpa JosePatient record system. shilpa Jose
Patient record system. shilpa Jose8281247574
 
Nursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityNursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityJaimika Patel
 
telemedicine and telenursing.pptx
telemedicine and telenursing.pptxtelemedicine and telenursing.pptx
telemedicine and telenursing.pptxHome
 
Telenursing; a current trend in nursing practice
Telenursing; a current trend in nursing practiceTelenursing; a current trend in nursing practice
Telenursing; a current trend in nursing practiceArowojolu Samuel
 
Interoperability & standards
Interoperability & standardsInteroperability & standards
Interoperability & standardsJ. Don Soriano
 
Telemedicine in the Healthcare Delivery System
Telemedicine in the Healthcare Delivery SystemTelemedicine in the Healthcare Delivery System
Telemedicine in the Healthcare Delivery SystemVSee
 
Introduction to Health Informatics
Introduction to Health InformaticsIntroduction to Health Informatics
Introduction to Health InformaticsMoustafa Hosni
 
Challenges in Nursing Administration
Challenges in Nursing AdministrationChallenges in Nursing Administration
Challenges in Nursing AdministrationLatha Venkatesan
 
Telemedicine ppt
Telemedicine pptTelemedicine ppt
Telemedicine pptkhandhar
 
Nursing informatics`
Nursing informatics`Nursing informatics`
Nursing informatics`Kate Balgos
 
Nursing Theory Analysis Presentation (1)
Nursing Theory Analysis Presentation (1)Nursing Theory Analysis Presentation (1)
Nursing Theory Analysis Presentation (1)juliann trumpower
 
PPT on Cutting Edge Technology Demonstration in Nursing
PPT on Cutting Edge Technology Demonstration in NursingPPT on Cutting Edge Technology Demonstration in Nursing
PPT on Cutting Edge Technology Demonstration in NursingArchanaSelvan
 
1. nursing informatics lecture
1. nursing informatics lecture 1. nursing informatics lecture
1. nursing informatics lecture Peak Review/FSUU
 
Nursing Informatics; a distinct specialty
Nursing Informatics; a distinct specialtyNursing Informatics; a distinct specialty
Nursing Informatics; a distinct specialtyegonallah88
 

Was ist angesagt? (20)

Telemedicine
TelemedicineTelemedicine
Telemedicine
 
"Nursing Informatics PowerPoint Presentation"
"Nursing Informatics PowerPoint Presentation""Nursing Informatics PowerPoint Presentation"
"Nursing Informatics PowerPoint Presentation"
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Patient record system. shilpa Jose
Patient record system. shilpa JosePatient record system. shilpa Jose
Patient record system. shilpa Jose
 
Telemedicine
TelemedicineTelemedicine
Telemedicine
 
Nursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityNursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and security
 
telemedicine and telenursing.pptx
telemedicine and telenursing.pptxtelemedicine and telenursing.pptx
telemedicine and telenursing.pptx
 
Telenursing; a current trend in nursing practice
Telenursing; a current trend in nursing practiceTelenursing; a current trend in nursing practice
Telenursing; a current trend in nursing practice
 
Interoperability & standards
Interoperability & standardsInteroperability & standards
Interoperability & standards
 
Telemedicine in the Healthcare Delivery System
Telemedicine in the Healthcare Delivery SystemTelemedicine in the Healthcare Delivery System
Telemedicine in the Healthcare Delivery System
 
Introduction to Health Informatics
Introduction to Health InformaticsIntroduction to Health Informatics
Introduction to Health Informatics
 
Challenges in Nursing Administration
Challenges in Nursing AdministrationChallenges in Nursing Administration
Challenges in Nursing Administration
 
Telemedicine ppt
Telemedicine pptTelemedicine ppt
Telemedicine ppt
 
Nursing informatics`
Nursing informatics`Nursing informatics`
Nursing informatics`
 
Nursing Theory Analysis Presentation (1)
Nursing Theory Analysis Presentation (1)Nursing Theory Analysis Presentation (1)
Nursing Theory Analysis Presentation (1)
 
Health Information Exchange
Health Information Exchange Health Information Exchange
Health Information Exchange
 
PPT on Cutting Edge Technology Demonstration in Nursing
PPT on Cutting Edge Technology Demonstration in NursingPPT on Cutting Edge Technology Demonstration in Nursing
PPT on Cutting Edge Technology Demonstration in Nursing
 
1. nursing informatics lecture
1. nursing informatics lecture 1. nursing informatics lecture
1. nursing informatics lecture
 
Nursing Informatics; a distinct specialty
Nursing Informatics; a distinct specialtyNursing Informatics; a distinct specialty
Nursing Informatics; a distinct specialty
 
TELEMEDICINE
TELEMEDICINETELEMEDICINE
TELEMEDICINE
 

Ähnlich wie Chapter 12

Adequate directions for use "In the Age of AI and Watson"
Adequate directions for use "In the Age of AI and Watson"Adequate directions for use "In the Age of AI and Watson"
Adequate directions for use "In the Age of AI and Watson"Stephen Allan Weitzman
 
Chapter 16
Chapter 16Chapter 16
Chapter 16bodo-con
 
Intuitive Technology Notes
Intuitive Technology NotesIntuitive Technology Notes
Intuitive Technology NotesMProcun
 
Univ. of IL Physicians Q Study
Univ. of IL Physicians Q StudyUniv. of IL Physicians Q Study
Univ. of IL Physicians Q StudyDavid Donohue
 
Note This assignment is for academic research pro only Thank yo.docx
Note This assignment is for academic research pro only Thank yo.docxNote This assignment is for academic research pro only Thank yo.docx
Note This assignment is for academic research pro only Thank yo.docxgabriellabre8fr
 
Grand rounds. tbi. june, 2016 final tb
Grand rounds. tbi. june, 2016 final tbGrand rounds. tbi. june, 2016 final tb
Grand rounds. tbi. june, 2016 final tbMike Wilhelm
 
Apply Computer and Mobile Health Technology.pptx
Apply Computer and Mobile Health Technology.pptxApply Computer and Mobile Health Technology.pptx
Apply Computer and Mobile Health Technology.pptxdereje33
 
Tehnology enabled care
Tehnology enabled careTehnology enabled care
Tehnology enabled careLakshmi S Lux
 
Technology forecast in healthcare industry
Technology forecast in healthcare industryTechnology forecast in healthcare industry
Technology forecast in healthcare industrySafina Shaikh
 
Chapter 28
Chapter 28Chapter 28
Chapter 28bodo-con
 
Healthcare Market Research Jim Lee
Healthcare Market Research Jim LeeHealthcare Market Research Jim Lee
Healthcare Market Research Jim LeeJim Lee
 
New technological trends in nursing uqu oct2015grace
New technological trends in nursing uqu oct2015graceNew technological trends in nursing uqu oct2015grace
New technological trends in nursing uqu oct2015gracegrace lindsay
 
Use of mobile device in health care setting
Use of mobile device in health care settingUse of mobile device in health care setting
Use of mobile device in health care settingDr. Samir Sawli
 
Georgetown Innovation Center for Biomedical Informatics Symposium Precision ...
 Georgetown Innovation Center for Biomedical Informatics Symposium Precision ... Georgetown Innovation Center for Biomedical Informatics Symposium Precision ...
Georgetown Innovation Center for Biomedical Informatics Symposium Precision ...Warren Kibbe
 
Computer aid in medical instrument term paper PPT
Computer aid in medical instrument term paper PPTComputer aid in medical instrument term paper PPT
Computer aid in medical instrument term paper PPTKoushik Sarkar
 
Implementing Clinical Decision
Implementing Clinical DecisionImplementing Clinical Decision
Implementing Clinical DecisionCMDLMS
 
mHealth Across the Continuum of Care
mHealth Across the Continuum of CaremHealth Across the Continuum of Care
mHealth Across the Continuum of CareCORE Group
 

Ähnlich wie Chapter 12 (20)

Adequate directions for use "In the Age of AI and Watson"
Adequate directions for use "In the Age of AI and Watson"Adequate directions for use "In the Age of AI and Watson"
Adequate directions for use "In the Age of AI and Watson"
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Intuitive Technology Notes
Intuitive Technology NotesIntuitive Technology Notes
Intuitive Technology Notes
 
Univ. of IL Physicians Q Study
Univ. of IL Physicians Q StudyUniv. of IL Physicians Q Study
Univ. of IL Physicians Q Study
 
Note This assignment is for academic research pro only Thank yo.docx
Note This assignment is for academic research pro only Thank yo.docxNote This assignment is for academic research pro only Thank yo.docx
Note This assignment is for academic research pro only Thank yo.docx
 
Grand rounds. tbi. june, 2016 final tb
Grand rounds. tbi. june, 2016 final tbGrand rounds. tbi. june, 2016 final tb
Grand rounds. tbi. june, 2016 final tb
 
Apply Computer and Mobile Health Technology.pptx
Apply Computer and Mobile Health Technology.pptxApply Computer and Mobile Health Technology.pptx
Apply Computer and Mobile Health Technology.pptx
 
Tehnology enabled care
Tehnology enabled careTehnology enabled care
Tehnology enabled care
 
Technology forecast in healthcare industry
Technology forecast in healthcare industryTechnology forecast in healthcare industry
Technology forecast in healthcare industry
 
Chapter 28
Chapter 28Chapter 28
Chapter 28
 
Healthcare Market Research Jim Lee
Healthcare Market Research Jim LeeHealthcare Market Research Jim Lee
Healthcare Market Research Jim Lee
 
New technological trends in nursing uqu oct2015grace
New technological trends in nursing uqu oct2015graceNew technological trends in nursing uqu oct2015grace
New technological trends in nursing uqu oct2015grace
 
Use of mobile device in health care setting
Use of mobile device in health care settingUse of mobile device in health care setting
Use of mobile device in health care setting
 
Georgetown Innovation Center for Biomedical Informatics Symposium Precision ...
 Georgetown Innovation Center for Biomedical Informatics Symposium Precision ... Georgetown Innovation Center for Biomedical Informatics Symposium Precision ...
Georgetown Innovation Center for Biomedical Informatics Symposium Precision ...
 
Computer aid in medical instrument term paper PPT
Computer aid in medical instrument term paper PPTComputer aid in medical instrument term paper PPT
Computer aid in medical instrument term paper PPT
 
Implementing Clinical Decision
Implementing Clinical DecisionImplementing Clinical Decision
Implementing Clinical Decision
 
Health IT and OpenMRS
Health IT and OpenMRSHealth IT and OpenMRS
Health IT and OpenMRS
 
Technology Assisted=Care for Substance Use Disorders
Technology Assisted=Care for Substance Use DisordersTechnology Assisted=Care for Substance Use Disorders
Technology Assisted=Care for Substance Use Disorders
 
mHealth Across the Continuum of Care
mHealth Across the Continuum of CaremHealth Across the Continuum of Care
mHealth Across the Continuum of Care
 
Data management
Data managementData management
Data management
 

Mehr von bodo-con

5530: Chapter 24
5530: Chapter 245530: Chapter 24
5530: Chapter 24bodo-con
 
5530: Chapter 23
5530: Chapter 235530: Chapter 23
5530: Chapter 23bodo-con
 
5530: Chapter 22
5530: Chapter 225530: Chapter 22
5530: Chapter 22bodo-con
 
5530: Chapter 21
5530: Chapter 215530: Chapter 21
5530: Chapter 21bodo-con
 
5530: Chapter 20
5530: Chapter 205530: Chapter 20
5530: Chapter 20bodo-con
 
5530: Chapter 18
5530: Chapter 185530: Chapter 18
5530: Chapter 18bodo-con
 
5530: Chapter 17
5530: Chapter 175530: Chapter 17
5530: Chapter 17bodo-con
 
5530: Chapter 16
5530: Chapter 165530: Chapter 16
5530: Chapter 16bodo-con
 
5530: Chapter 15
5530: Chapter 155530: Chapter 15
5530: Chapter 15bodo-con
 
5530: Chapter 14
5530: Chapter 145530: Chapter 14
5530: Chapter 14bodo-con
 
5530: Chapter 13
5530: Chapter 135530: Chapter 13
5530: Chapter 13bodo-con
 
5530: Chapter 12
5530: Chapter 125530: Chapter 12
5530: Chapter 12bodo-con
 
5530: Chapter 11
5530: Chapter 115530: Chapter 11
5530: Chapter 11bodo-con
 
5530: Chapter 10
5530: Chapter 105530: Chapter 10
5530: Chapter 10bodo-con
 
5530: Chapter 9
5530: Chapter 95530: Chapter 9
5530: Chapter 9bodo-con
 
5530: Chapter 8
5530: Chapter 85530: Chapter 8
5530: Chapter 8bodo-con
 
5530: Chapter 7
5530: Chapter 75530: Chapter 7
5530: Chapter 7bodo-con
 

Mehr von bodo-con (20)

SUSHCS
SUSHCSSUSHCS
SUSHCS
 
PPA
PPAPPA
PPA
 
OHPE
OHPEOHPE
OHPE
 
5530: Chapter 24
5530: Chapter 245530: Chapter 24
5530: Chapter 24
 
5530: Chapter 23
5530: Chapter 235530: Chapter 23
5530: Chapter 23
 
5530: Chapter 22
5530: Chapter 225530: Chapter 22
5530: Chapter 22
 
5530: Chapter 21
5530: Chapter 215530: Chapter 21
5530: Chapter 21
 
5530: Chapter 20
5530: Chapter 205530: Chapter 20
5530: Chapter 20
 
5530: Chapter 18
5530: Chapter 185530: Chapter 18
5530: Chapter 18
 
5530: Chapter 17
5530: Chapter 175530: Chapter 17
5530: Chapter 17
 
5530: Chapter 16
5530: Chapter 165530: Chapter 16
5530: Chapter 16
 
5530: Chapter 15
5530: Chapter 155530: Chapter 15
5530: Chapter 15
 
5530: Chapter 14
5530: Chapter 145530: Chapter 14
5530: Chapter 14
 
5530: Chapter 13
5530: Chapter 135530: Chapter 13
5530: Chapter 13
 
5530: Chapter 12
5530: Chapter 125530: Chapter 12
5530: Chapter 12
 
5530: Chapter 11
5530: Chapter 115530: Chapter 11
5530: Chapter 11
 
5530: Chapter 10
5530: Chapter 105530: Chapter 10
5530: Chapter 10
 
5530: Chapter 9
5530: Chapter 95530: Chapter 9
5530: Chapter 9
 
5530: Chapter 8
5530: Chapter 85530: Chapter 8
5530: Chapter 8
 
5530: Chapter 7
5530: Chapter 75530: Chapter 7
5530: Chapter 7
 

Kürzlich hochgeladen

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Kürzlich hochgeladen (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Chapter 12

  • 2. Human–Technology Interfaces Examples – EMR – Defibrillator – patient-controlled analgesia (PCA) pump – Drug administration system – any number of physiologic monitoring systems – electronic thermometers – and, of course, telephones and pagers.
  • 3. Human–Technology Interface Any time a human uses technology, there is some type of hardware and/or software that enables and supports the interaction.
  • 4. Workarounds • Circumvent troublesome technology • Are bandaids • Do not fix the problem • Could put the patient at risk
  • 5. Telehealth Uses telecommunication and videoconferencing software to communicate more effectively and more frequently with patients at home by using the technology to monitor patients’ vital signs, supervise their wound care, or demonstrate a procedure.
  • 6. Telehealth Interfaces Allow patients to interact with a virtual clinician (actually a computer program) that will ask questions, provide social support, and tailor education to identify patient needs based on the answers to screening questions
  • 7. Telehealth Interfaces These human–technology interfaces have been remarkably successful; sometimes patients prefer them to live clinicians!
  • 8. Human Technology Interface Problems The major cause of up to 87% of all patient monitoring incidents. It is not always that technology is faulty. Technology may perform flawlessly, but interface design may lead human user to make errors (Vicente, 2004).
  • 9. Technology Should Fit 5 Levels of Human Requirements 1. Physical 2. Psychological 3. Team 4. Organizational 5. Political
  • 10. Analysis Tools and Techniques • Task-analysis • Cognitive task analysis (CTA) • Cognitive work analysts (CWA)
  • 11. Involve the users • Focus group • Cognitive walkthrough • Heuristic evaluation • Formal usability test • Field study
  • 12. FITT Model • Fit between Individuals, Tasks, and Technology that • Suggests that each of these factors be considered in designing and evaluating human-technology interfaces
  • 13. Doctors Vs. Nurses • Doctors and nurses describe patient information differently – doctors emphasized diagnosis, treatment and management; – nurses emphasized functional issues.
  • 14. Issues Associated with Wearable Technology The human-technology interface must address: • How will people use this technology? • How will they behave with it on their person? • How will they wear it? • How and when will they enable and use it? • Will others be able to detect the technology?
  • 15. In the Ideal World • Every human-technology interface will be – designed to enhance users’ workflow – as easy to use as ATM machines – fully tested prior to its implementation in a setting that mirrors the setting where it will be used