SlideShare a Scribd company logo
1 of 4
Clinical Research Challenges and Solutions: The “What If?” Series


A Simple Challenge, a Daily Pain:                 investigators (PI), while 25% stated that they
Managing URLs and Passwords.                      had “other” roles. This sample appears to
                                                  represent well the various functions that are
                                                  necessary to perform the necessary clinical
P-A. de Lame MD 1, M. Lemaire MD 2, J             research functions.
Boily MBA 3

What if?
                                                                   Fig 1: Participants
You could place all your secure websites
                                                  40%
links and passwords in a single place, secure
and accessible on the web from anywhere?                37.50%
                                                  30%
What’s the need?

The shift from paper-based operations to an                                                25.00%
                                                  20%
electronic environment has brought some
                                                               18.80%
real practical challenges to the study
coordinators. These challenges are usually        10%                           12.50%12.50%
not discussed in journals dedicated to clinical
trials or to bio-IT. Besides the expected                               6.30%
training, data entry and data management           0%
work that electronic data capture (EDC)                   SC     SM      PI      PM    DM Other
system require, personnel also is required to
comply with strict access control processes,      Scope of the Issue
which differ from system to system, sponsor
to sponsor, and even, from study to study.        The issue really comes from the
This is true also for other systems that study    multiplication of secure web sites and of
personnel use, such as study portals,             credentials that study personnel has to use
electronic medical records, and scheduling        on a daily basis. Indeed, managing the
systems.                                          multiple web sites as a single study may
                                                  require remains manageable to an extent
Experience shows that remembering all the         even though accessing these many systems
addresses (URLs) and the corresponding            can be sometimes challenging. However,
credentials (usernames and passwords) is a        most study sites are involved in several
real practical challenge for which few good       studies at any given time (figure 2).
solutions exist, if any. As a company
dedicated to addressing real-life problems
faced by research personnel, XeoTK
endeavored to explore the issue further.

How Does Study Personnel Cope?

In a survey performed in October and
November 2010, XeoTK asked various study
personnel what their primary role was. Most
participants (figure 1) were study
coordinators (SC), site monitors (SM), project
managers (PM), data managers (DM), and




      !                                                                                        Page 1
Clinical Research Challenges and Solutions: The “What If?” Series

       Fig 2: Number of Studies per Participant        systems that they are using on a very regular
50%
                                                       basis.
             50.00%
                                                                Fig 4: Passwords per Participant
38%                                                    50%
                               37.50%                                        50.00%

25%                                                    40%


13%                                                    30%
                                              12.50%            31.30%


 0%                                                    20%
               2-4              5-10            5-10
                                                                                          18.80%

According to XeoTK’s survey, eighty-seven              10%
percent of the respondents were involved in 2
to 10 studies. For each study, participants
stated that they needed to access between 2            0%
and 10 secure web sites (figure 3).                               1-5         6-15         16-25

                   Fig 3: Web Sites per Study          Because studies from multiple sponsors and
 50%                                                   various institutions require using systems
                      50.00%                           supported by many independent entities, no
                                                       single place exists where access to these
 38%                                                   multiple systems and the corresponding
                                                       credentials is made easy, safe and secure.
                                 31.30%                To put the matter in perspective, clinical
 25%
                                                       research is now making extended use of
                                                       information technology regardless of whether
                                                       EDC/RDC is actually used. Most information
 13%
                                              12.50%   and/or communications necessary to execute
                                                       clinical trials such as study documents, IRB
           6.30%                                       submissions, health records, lab data, reside
  0%
              1          2-4           5-10      >10   on separate systems, each of them
                                                       accessible on a different website and
Compounding Factors                                    requiring secure login. Study meetings are
                                                       increasingly virtual too. Since most study
Considering that there is no coordination              coordinators work simultaneously on different
among the various sponsors and CROs who                studies, the problem is compounded by the
manage these web sites, it comes to no                 multiple sponsors and CROs, their specific
surprise that study personnel has to manage            study portals and preferred EDC/RDC
a multitude of usernames and passwords,                systems, in addition to the systems put forth
besides having to remember the correct                 by IRBs, and core laboratories. The result: a
addresses (URLs) for the various portals and           study coordinator needs to remember on
EDC/RDC systems. The result is obvious:                average 5-10 different credentials and web
study personnel, just to do their jobs, have to        site addresses per study.
use a variety of web addresses and
credentials, most often between 6 and 15,              Managing Passwords
sometimes many more (figure 4). Some                   How do study coordinators usually manage
participants reported having to use well over          remembering their secure login information?
50 sets of credentials to access the various

       !                                                                                      Page 2
Clinical Research Challenges and Solutions: The “What If?” Series

Study personnel use multiple methods, often              computer industry standards that require
simultaneously, to keep track of their                   screens to take less than 2 seconds to
credentials. Post-It notes, note books,                  refresh from one to the next. Small gains in
computer files, and emails are popular (figure           time to access may not means much at first
5). And when memory fails, the “retrieve my              sight. However, as users have to switch from
password” function is a surprisingly often               one system to the other, or login several
used last resort option (12.5%).                         times as sessions expired, the small gains
                                                         may accumulate into significant time savings
      Fig 5: Methods Used to Retrieve Credentials        at the end of the day, as well as much
60%
                                                         decreased stress and frustration.

                     56.30%                                            Fig 6: Speed of Access
50%
                                                         60%

40%                                                                            56.30%
                              37.50%
30%
                                       31.30%
                                                         40%
20%
           18.80%
10%                                             12.50%

                                                                  25.00%
 0%                                                      20%
                     Note Computer
                                                                                             18.80%
           Post-It   Book File     Email        Memory

None of these methods is actually safe.
Indeed, the credentials can be lost and
found, seen or stolen with the associated risk           0%
of being then misused. Most importantly,                          Always    Sometimes       Often too
even if not misused, lost credentials                             quick,    longer          long and
invalidate the associated electronic                              easy      than expected   frustrating
signatures that are critical to many systems
used in clinical research, thus requiring
generating new credentials, a time-
consuming process.                                       Multiple Workstations

None of these methods is efficient either. To            Another aspect that affects the efficiency of
access a given web site, one needs to type in            these methods is that, if they hosted on a
the correct address (URL), then the                      computer (as files or applications), they are
credentials, which have to be retrieved first.           not portable. That means that about 1/3 of
This leads to time wasted on processes that              the respondents have to use alternative
if streamlined, should be transparent                    means (not computer-bound) of keeping
(preferably) or at the least, very easy. The             track of their credentials as they use any
experience reported in our survey illustrates            computer that is available at work (figure 7),
the point (figure 6).                                    a trend that is expected to grow with the
                                                         increasing use of information systems in
Importantly, the experience of the users is              medical practice, including the expanding use
reported on a perceptual basis, as opposed               of electronic medical records. This is
to absolute measures of time and motion.                 reflected in figure 7, which depicts what work
Thus, it is not clear from this survey whether           stations our participants use to access the
“always quick and easy” corresponds to                   various web sites from.

       !                                                                                          Page 3
Clinical Research Challenges and Solutions: The “What If?” Series

            Figure 7: Work Station Used        3. Direct data entry using an assigned work
70%
                                                  computer
            68.80%                             4. Direct data entry using any computer

                                               5. “Not applicable” corresponds to 18.8% of
                                                  the participants who are not involved in
                                                  any data entry activities.

                                                                     Figure 8: Data Entry
35%                                            50.00%
                                                           50.00%
                                31.30%

                                                                              37.50%

                                               25.00%


 0%                                                                                              18.80%
          Work / home         Any available
                                                                    12.50%             12.50%
          computer            computer

                                                    0%
Managing Data Capture                                          1        2         3        4        5

As electronic signatures are particularly
critical to EDC/RDC, the XeoTK survey more
specifically inquired about the methods used   In summary
by personnel involved in data entry to
perform this task.                             Current methods used by study personnel to
                                               manage secure login information present a
The results shown in figure 8 confirm that     serious problem, because, by lacking security
very often, any available computer is used.    and efficiency, they essentially defeat the
They also show that, even though EDC/RDC       methods aimed at protecting the system used
aims at being paperless, worksheets are        on clinical research, and the data that they
used by the majority of the participants       host. However, we cannot blame study
concerned.                                     personnel for trying to address the problem
                                               with the means that are at hand. Current
This figure also suggests that multiple        technologies allow for much better solutions
methods may be used by the same                that provide secure, mobile, fast and easy
personnel, probably depending on studies       access to critically important web sites.
are set up, study requirements, and how user
friendly systems are.

The key to the methods shown on the X-axis
is as follows:
                                               1,2,3: XeoTK, Inc., Lambertville, NJ 08530 (www.xeotk.com)
1. Capturing data on a worksheet, then
   entering using an assigned work             XeoTK™ is developing OneKey™ which allows clinical
   computer                                    research professionals who routinely manage, secure, and
                                               access website links and passwords, anytime and anywhere
                                               to perform their work without compromising any existing
2. Capturing data on a worksheet, then         electronic signatures.
   entering using any computer
                                               XeoTK, OneKey and the XeoTK logo are trademarks of
                                               XeoTK Inc.


      !                                                                                            Page 4

More Related Content

More from Jeffrey Boily

Centaur animal health launches unique calcium supplement for dairy cattle - ...
Centaur animal health launches unique calcium supplement for dairy cattle  - ...Centaur animal health launches unique calcium supplement for dairy cattle  - ...
Centaur animal health launches unique calcium supplement for dairy cattle - ...Jeffrey Boily
 
Centaur animal health appoints new president and chief executive... August. ...
Centaur animal health appoints new president and chief executive...  August. ...Centaur animal health appoints new president and chief executive...  August. ...
Centaur animal health appoints new president and chief executive... August. ...Jeffrey Boily
 
Centaur animal health announces addition to board of directors - February. 2...
Centaur animal health announces addition to board of directors  - February. 2...Centaur animal health announces addition to board of directors  - February. 2...
Centaur animal health announces addition to board of directors - February. 2...Jeffrey Boily
 
High risk,high-reward, no consensus- kc business magazine june 2013, p 43
High risk,high-reward, no consensus- kc business magazine june 2013, p 43High risk,high-reward, no consensus- kc business magazine june 2013, p 43
High risk,high-reward, no consensus- kc business magazine june 2013, p 43Jeffrey Boily
 
Biomedical Research Expands Area Economy - KC Business, May 2012
Biomedical Research Expands Area Economy - KC Business, May 2012Biomedical Research Expands Area Economy - KC Business, May 2012
Biomedical Research Expands Area Economy - KC Business, May 2012Jeffrey Boily
 
One Health Biomanufacturing Summit - March 2012
One Health Biomanufacturing Summit - March 2012One Health Biomanufacturing Summit - March 2012
One Health Biomanufacturing Summit - March 2012Jeffrey Boily
 
Making your way in the new pharma and biotech world - Sept 2010
Making your way in the new pharma and biotech world - Sept 2010Making your way in the new pharma and biotech world - Sept 2010
Making your way in the new pharma and biotech world - Sept 2010Jeffrey Boily
 
Analysis of the pharmaceutical industry / Product Management Today -Jan 2008
Analysis of the pharmaceutical industry / Product Management Today -Jan 2008Analysis of the pharmaceutical industry / Product Management Today -Jan 2008
Analysis of the pharmaceutical industry / Product Management Today -Jan 2008Jeffrey Boily
 
Biotechnology Innovation and Entrepreneurship / Ingram's Magazine -Feb 2012
Biotechnology Innovation and Entrepreneurship / Ingram's Magazine -Feb 2012Biotechnology Innovation and Entrepreneurship / Ingram's Magazine -Feb 2012
Biotechnology Innovation and Entrepreneurship / Ingram's Magazine -Feb 2012Jeffrey Boily
 
INSIDE THE CORRIDOR - Spring 2012
INSIDE THE CORRIDOR - Spring 2012INSIDE THE CORRIDOR - Spring 2012
INSIDE THE CORRIDOR - Spring 2012Jeffrey Boily
 
Up & close with Jeff Boily- Business Journal - July 2012
Up & close with Jeff Boily- Business Journal - July 2012Up & close with Jeff Boily- Business Journal - July 2012
Up & close with Jeff Boily- Business Journal - July 2012Jeffrey Boily
 
Innovation and Entrepreneurship- Ingram's Magazine August 2012
Innovation and  Entrepreneurship- Ingram's Magazine August 2012Innovation and  Entrepreneurship- Ingram's Magazine August 2012
Innovation and Entrepreneurship- Ingram's Magazine August 2012Jeffrey Boily
 
Animal PHARM - 2012 Animal Health Investment Forum- September 11, 2012
Animal PHARM - 2012 Animal Health Investment Forum- September 11, 2012Animal PHARM - 2012 Animal Health Investment Forum- September 11, 2012
Animal PHARM - 2012 Animal Health Investment Forum- September 11, 2012Jeffrey Boily
 

More from Jeffrey Boily (13)

Centaur animal health launches unique calcium supplement for dairy cattle - ...
Centaur animal health launches unique calcium supplement for dairy cattle  - ...Centaur animal health launches unique calcium supplement for dairy cattle  - ...
Centaur animal health launches unique calcium supplement for dairy cattle - ...
 
Centaur animal health appoints new president and chief executive... August. ...
Centaur animal health appoints new president and chief executive...  August. ...Centaur animal health appoints new president and chief executive...  August. ...
Centaur animal health appoints new president and chief executive... August. ...
 
Centaur animal health announces addition to board of directors - February. 2...
Centaur animal health announces addition to board of directors  - February. 2...Centaur animal health announces addition to board of directors  - February. 2...
Centaur animal health announces addition to board of directors - February. 2...
 
High risk,high-reward, no consensus- kc business magazine june 2013, p 43
High risk,high-reward, no consensus- kc business magazine june 2013, p 43High risk,high-reward, no consensus- kc business magazine june 2013, p 43
High risk,high-reward, no consensus- kc business magazine june 2013, p 43
 
Biomedical Research Expands Area Economy - KC Business, May 2012
Biomedical Research Expands Area Economy - KC Business, May 2012Biomedical Research Expands Area Economy - KC Business, May 2012
Biomedical Research Expands Area Economy - KC Business, May 2012
 
One Health Biomanufacturing Summit - March 2012
One Health Biomanufacturing Summit - March 2012One Health Biomanufacturing Summit - March 2012
One Health Biomanufacturing Summit - March 2012
 
Making your way in the new pharma and biotech world - Sept 2010
Making your way in the new pharma and biotech world - Sept 2010Making your way in the new pharma and biotech world - Sept 2010
Making your way in the new pharma and biotech world - Sept 2010
 
Analysis of the pharmaceutical industry / Product Management Today -Jan 2008
Analysis of the pharmaceutical industry / Product Management Today -Jan 2008Analysis of the pharmaceutical industry / Product Management Today -Jan 2008
Analysis of the pharmaceutical industry / Product Management Today -Jan 2008
 
Biotechnology Innovation and Entrepreneurship / Ingram's Magazine -Feb 2012
Biotechnology Innovation and Entrepreneurship / Ingram's Magazine -Feb 2012Biotechnology Innovation and Entrepreneurship / Ingram's Magazine -Feb 2012
Biotechnology Innovation and Entrepreneurship / Ingram's Magazine -Feb 2012
 
INSIDE THE CORRIDOR - Spring 2012
INSIDE THE CORRIDOR - Spring 2012INSIDE THE CORRIDOR - Spring 2012
INSIDE THE CORRIDOR - Spring 2012
 
Up & close with Jeff Boily- Business Journal - July 2012
Up & close with Jeff Boily- Business Journal - July 2012Up & close with Jeff Boily- Business Journal - July 2012
Up & close with Jeff Boily- Business Journal - July 2012
 
Innovation and Entrepreneurship- Ingram's Magazine August 2012
Innovation and  Entrepreneurship- Ingram's Magazine August 2012Innovation and  Entrepreneurship- Ingram's Magazine August 2012
Innovation and Entrepreneurship- Ingram's Magazine August 2012
 
Animal PHARM - 2012 Animal Health Investment Forum- September 11, 2012
Animal PHARM - 2012 Animal Health Investment Forum- September 11, 2012Animal PHARM - 2012 Animal Health Investment Forum- September 11, 2012
Animal PHARM - 2012 Animal Health Investment Forum- September 11, 2012
 

Recently uploaded

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Clinical Research Challenges And Solutions “What If ”- Nov 2012

  • 1. Clinical Research Challenges and Solutions: The “What If?” Series A Simple Challenge, a Daily Pain: investigators (PI), while 25% stated that they Managing URLs and Passwords. had “other” roles. This sample appears to represent well the various functions that are necessary to perform the necessary clinical P-A. de Lame MD 1, M. Lemaire MD 2, J research functions. Boily MBA 3 What if? Fig 1: Participants You could place all your secure websites 40% links and passwords in a single place, secure and accessible on the web from anywhere? 37.50% 30% What’s the need? The shift from paper-based operations to an 25.00% 20% electronic environment has brought some 18.80% real practical challenges to the study coordinators. These challenges are usually 10% 12.50%12.50% not discussed in journals dedicated to clinical trials or to bio-IT. Besides the expected 6.30% training, data entry and data management 0% work that electronic data capture (EDC) SC SM PI PM DM Other system require, personnel also is required to comply with strict access control processes, Scope of the Issue which differ from system to system, sponsor to sponsor, and even, from study to study. The issue really comes from the This is true also for other systems that study multiplication of secure web sites and of personnel use, such as study portals, credentials that study personnel has to use electronic medical records, and scheduling on a daily basis. Indeed, managing the systems. multiple web sites as a single study may require remains manageable to an extent Experience shows that remembering all the even though accessing these many systems addresses (URLs) and the corresponding can be sometimes challenging. However, credentials (usernames and passwords) is a most study sites are involved in several real practical challenge for which few good studies at any given time (figure 2). solutions exist, if any. As a company dedicated to addressing real-life problems faced by research personnel, XeoTK endeavored to explore the issue further. How Does Study Personnel Cope? In a survey performed in October and November 2010, XeoTK asked various study personnel what their primary role was. Most participants (figure 1) were study coordinators (SC), site monitors (SM), project managers (PM), data managers (DM), and ! Page 1
  • 2. Clinical Research Challenges and Solutions: The “What If?” Series Fig 2: Number of Studies per Participant systems that they are using on a very regular 50% basis. 50.00% Fig 4: Passwords per Participant 38% 50% 37.50% 50.00% 25% 40% 13% 30% 12.50% 31.30% 0% 20% 2-4 5-10 5-10 18.80% According to XeoTK’s survey, eighty-seven 10% percent of the respondents were involved in 2 to 10 studies. For each study, participants stated that they needed to access between 2 0% and 10 secure web sites (figure 3). 1-5 6-15 16-25 Fig 3: Web Sites per Study Because studies from multiple sponsors and 50% various institutions require using systems 50.00% supported by many independent entities, no single place exists where access to these 38% multiple systems and the corresponding credentials is made easy, safe and secure. 31.30% To put the matter in perspective, clinical 25% research is now making extended use of information technology regardless of whether EDC/RDC is actually used. Most information 13% 12.50% and/or communications necessary to execute clinical trials such as study documents, IRB 6.30% submissions, health records, lab data, reside 0% 1 2-4 5-10 >10 on separate systems, each of them accessible on a different website and Compounding Factors requiring secure login. Study meetings are increasingly virtual too. Since most study Considering that there is no coordination coordinators work simultaneously on different among the various sponsors and CROs who studies, the problem is compounded by the manage these web sites, it comes to no multiple sponsors and CROs, their specific surprise that study personnel has to manage study portals and preferred EDC/RDC a multitude of usernames and passwords, systems, in addition to the systems put forth besides having to remember the correct by IRBs, and core laboratories. The result: a addresses (URLs) for the various portals and study coordinator needs to remember on EDC/RDC systems. The result is obvious: average 5-10 different credentials and web study personnel, just to do their jobs, have to site addresses per study. use a variety of web addresses and credentials, most often between 6 and 15, Managing Passwords sometimes many more (figure 4). Some How do study coordinators usually manage participants reported having to use well over remembering their secure login information? 50 sets of credentials to access the various ! Page 2
  • 3. Clinical Research Challenges and Solutions: The “What If?” Series Study personnel use multiple methods, often computer industry standards that require simultaneously, to keep track of their screens to take less than 2 seconds to credentials. Post-It notes, note books, refresh from one to the next. Small gains in computer files, and emails are popular (figure time to access may not means much at first 5). And when memory fails, the “retrieve my sight. However, as users have to switch from password” function is a surprisingly often one system to the other, or login several used last resort option (12.5%). times as sessions expired, the small gains may accumulate into significant time savings Fig 5: Methods Used to Retrieve Credentials at the end of the day, as well as much 60% decreased stress and frustration. 56.30% Fig 6: Speed of Access 50% 60% 40% 56.30% 37.50% 30% 31.30% 40% 20% 18.80% 10% 12.50% 25.00% 0% 20% Note Computer 18.80% Post-It Book File Email Memory None of these methods is actually safe. Indeed, the credentials can be lost and found, seen or stolen with the associated risk 0% of being then misused. Most importantly, Always Sometimes Often too even if not misused, lost credentials quick, longer long and invalidate the associated electronic easy than expected frustrating signatures that are critical to many systems used in clinical research, thus requiring generating new credentials, a time- consuming process. Multiple Workstations None of these methods is efficient either. To Another aspect that affects the efficiency of access a given web site, one needs to type in these methods is that, if they hosted on a the correct address (URL), then the computer (as files or applications), they are credentials, which have to be retrieved first. not portable. That means that about 1/3 of This leads to time wasted on processes that the respondents have to use alternative if streamlined, should be transparent means (not computer-bound) of keeping (preferably) or at the least, very easy. The track of their credentials as they use any experience reported in our survey illustrates computer that is available at work (figure 7), the point (figure 6). a trend that is expected to grow with the increasing use of information systems in Importantly, the experience of the users is medical practice, including the expanding use reported on a perceptual basis, as opposed of electronic medical records. This is to absolute measures of time and motion. reflected in figure 7, which depicts what work Thus, it is not clear from this survey whether stations our participants use to access the “always quick and easy” corresponds to various web sites from. ! Page 3
  • 4. Clinical Research Challenges and Solutions: The “What If?” Series Figure 7: Work Station Used 3. Direct data entry using an assigned work 70% computer 68.80% 4. Direct data entry using any computer 5. “Not applicable” corresponds to 18.8% of the participants who are not involved in any data entry activities. Figure 8: Data Entry 35% 50.00% 50.00% 31.30% 37.50% 25.00% 0% 18.80% Work / home Any available 12.50% 12.50% computer computer 0% Managing Data Capture 1 2 3 4 5 As electronic signatures are particularly critical to EDC/RDC, the XeoTK survey more specifically inquired about the methods used In summary by personnel involved in data entry to perform this task. Current methods used by study personnel to manage secure login information present a The results shown in figure 8 confirm that serious problem, because, by lacking security very often, any available computer is used. and efficiency, they essentially defeat the They also show that, even though EDC/RDC methods aimed at protecting the system used aims at being paperless, worksheets are on clinical research, and the data that they used by the majority of the participants host. However, we cannot blame study concerned. personnel for trying to address the problem with the means that are at hand. Current This figure also suggests that multiple technologies allow for much better solutions methods may be used by the same that provide secure, mobile, fast and easy personnel, probably depending on studies access to critically important web sites. are set up, study requirements, and how user friendly systems are. The key to the methods shown on the X-axis is as follows: 1,2,3: XeoTK, Inc., Lambertville, NJ 08530 (www.xeotk.com) 1. Capturing data on a worksheet, then entering using an assigned work XeoTK™ is developing OneKey™ which allows clinical computer research professionals who routinely manage, secure, and access website links and passwords, anytime and anywhere to perform their work without compromising any existing 2. Capturing data on a worksheet, then electronic signatures. entering using any computer XeoTK, OneKey and the XeoTK logo are trademarks of XeoTK Inc. ! Page 4