LEADER 05310nam 22006254a 450 001 9910143259703321 005 20180718131902.0 010 $a1-280-23743-0 010 $a9786610237432 010 $a0-470-70963-4 010 $a0-470-77450-9 010 $a1-4051-5098-X 035 $a(CKB)1000000000351698 035 $a(EBL)239838 035 $a(OCoLC)437153118 035 $a(SSID)ssj0000301785 035 $a(PQKBManifestationID)11947534 035 $a(PQKBTitleCode)TC0000301785 035 $a(PQKBWorkID)10264233 035 $a(PQKB)10501200 035 $a(MiAaPQ)EBC239838 035 $a(EXLCZ)991000000000351698 100 $a20021115d2003 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aLimiting harm in health care$b[electronic resource] $ea nursing perspective /$fedited by Frank Milligan, Kate Robinson 210 $aOxford, OX ; Malden, MA, USA $cBlackwell Pub.$dc2003 215 $a1 online resource (298 p.) 300 $aDescription based upon print version of record. 311 $a0-632-05996-6 320 $aIncludes bibliographical references and index. 327 $aContents; Preface; Contributors; Acknowledgements; 1. Introduction, Aims and Mapping Health Care; Introduction; The aims of this book; Doctors and nurses; Seeing the limits of medicine - maps as knowledge; The map of western medicine; Mapping medical harm; Examples of harm; Expanding nursing roles in health care; The chapters; References; 2. Defining Medicine and the Nature of Iatrogenic Harm; Introduction; Western medicine - the world-view of a profession; The body and the 'gaze'; Discourse - talking medicine; The dominant discourse of western medicine; Iatrogenesis and iatrogenic harm 327 $aRecent evidence on iatrogenic harmConclusion; References; 3. Being a Professional - A Defence Against Causing Harm?; Introduction; The professionalisation agenda; Being a profession; A changing climate of opinion; Options for the future; A new sort of profession?; Conclusion; References; 4. Harm Reduction in Context - The Scope of Nursing Practice; Introduction; Nursing in the contemporary health care context; The professional regulation of nursing; Accountability of nurses beyond professional regulation; The dynamic and expanding role of nursing; Conclusion; References 327 $a5. Expanding Nurse Prescribing and the Hidden Harm within Modern Drug TherapyIntroduction; Adverse drug reactions - what are they and can they be prevented?; Alternative and complementary therapies; Interactions between conventional drugs and herbal remedies; Compliance and concordance; Drug errors; Nurse prescribing; Drug calculations; Do nurses have the necessary knowledge?; Conclusion; References; 6. Shifts in the Care of Hyperactive Children; Introduction; Background; What is ADHD?; Labelling; If ADHD does exist, what current interventions are on offer?; Is intervention always needed? 327 $aOther issuesConclusion; References; 7. The Medicalisation of Mental Health Practice - Lessons from the Care of Patients Who Deliberately Self-harm; Introduction; Suicide and deliberate self-harm; The medical model and the nurse; Failings of the medical model; Psychological care and mental health nursing; Inpatient psychiatric care: models and frames; The medical frame; Alternatives to the medical model; Inpatient care: the patient's perspective; Relationships and incidents of self-harm; New models: the role of the nurse researcher; Conclusion; References 327 $a8. Complaints as a Measure of Harm - Lessons from Community Health CouncilsIntroduction; Complaints and the NHS complaints procedure; The work of Community Health Councils in supporting complainants; Community Health Councils, primary care and the private sector; Supporting complainants; The nature of complaints; Disabling complainants; The NHS - moving towards a culture of openness?; Beyond complaints: specific Community Health Council initiatives; Expanding information technology; Limits and reform of Community Health Councils; Conclusion; References 327 $a9. Nurse Diagnosed Myocardial Infarction - Hidden Nurse Work and Iatrogenic Risk 330 $aLimiting Harm in Health Care highlights the potential for unnecessary harm in health care practice. This harm is mostly unintentional, but it can result from many different aspects of medical treatment in a wide range of practice areas. Adverse events, events or omissions during clinical care resulting in physical or psychological injury, are increasingly being recognised as significant problems in health care. Following clarification of the nature and extent of medical harm in health care, separate chapters explore the potential for medical harm in diverse areas of practice. Topics 606 $aNursing errors$xPrevention 608 $aElectronic books. 615 0$aNursing errors$xPrevention. 676 $a362.1/73/068 676 $a610 701 $aMilligan$b Frank$0873756 701 $aRobinson$b Kate$0873757 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143259703321 996 $aLimiting harm in health care$91950619 997 $aUNINA LEADER 07843nam 22008415 450 001 996466211503316 005 20201107132706.0 010 $a3-642-33675-2 024 7 $a10.1007/978-3-642-33675-1 035 $a(CKB)3400000000086263 035 $a(SSID)ssj0000767475 035 $a(PQKBManifestationID)11429490 035 $a(PQKBTitleCode)TC0000767475 035 $a(PQKBWorkID)10740460 035 $a(PQKB)10497920 035 $a(DE-He213)978-3-642-33675-1 035 $a(MiAaPQ)EBC3070300 035 $a(PPN)168325128 035 $a(EXLCZ)993400000000086263 100 $a20120910d2012 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Safety, Reliability, and Security$b[electronic resource] $eSAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012, Proceedings /$fedited by Frank Ortmeier, Peter Daniel 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XVI, 530 p. 198 illus.) 225 1 $aProgramming and Software Engineering ;$v7613 300 $aInternational conference proceedings. 311 $a3-642-33674-4 320 $aIncludes bibliographical references and author index. 327 $aIntroduction to Sassur 2012 -- AdvoCATE: An Assurance Case Automation Toolset -- Towards a Case-Based Reasoning Approach for Safety Assurance Reuse -- Modeling for Safety in a Synthesis-Centric Systems Engineering Framework --  A Model Based Approach for Safety Analysis -- Towards a Model-Based Evolutionary Chain of Evidence for Compliance with Safety Standards -- A New Approach to Assessment of Confidence in Assurance Cases -- An Unified Meta-model for Trustworthy Systems Engineering -- A Preliminary Fault Injection Framework for Evaluating Multicore Systems -- Meeting Real-Time Requirements with Multi-core Processors --  Assessing Software Interference Management When Modifying Safety-Related Software -- Introduction to ASCoMS 2012 -- Towards Dependable and Stable Perception in Smart Environments with Timing and Value Faults --  An Approach Supporting Fault-Propagation Analysis for Smart Sensor Systems -- Use of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles to Safer Cars: Selected Challenges for the Software Engineering -- Modelling of Safety-Related Timing Constraints for Automotive Embedded Systems -- Introduction to DESEC4LCCI 2012 -- Quantitative Security Evaluation of a Multi-biometric Authentication System -- Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology -- On Securing Communications among Federated Health Information Systems -- How Secure Is ERTMS -- International Cooperation Experiences: Results Achieved, Lessons Learned, and Way Ahead -- A Federated Simulation Framework with ATN Fault Injection Module for Reliability Analysis of UAVs in Non-controlled Airspace -- HSIENA: A Hybrid Publish/Subscribe System --  WSDM-Enabled Autonomic Augmentation of Classical Multi-version Software Fault-Tolerance Mechanisms -- Formal Verification of a Safety Argumentation and Application to a Complex UAV System --  Electronic Reliability Estimation: How Reliable Are the Results -- Model-Based Assessment of Multi-region Electric Power Systems Showing Heterogeneous Characteristics.-Introduction to the ERCIM/EWICS Cyberphysical Systems Workshop 2012 -- The Cyber-Physical Attacker -- Dependable and Secure Embedded Node Demonstrator --  Towards Secure Time-Triggered Systems -- Towards a Framework for Simulation Based Design, Validation and Performance Analysis of Electronic Control Systems -- Compiling for Time Predictability -- Towards the Automated Qualification of Tool Chain Design -- A Systematic Elaboration of Safety Requirements in the Avionic Domain -- Parallel NuSMV: A NuSMV Extension for the Verification of Complex Embedded Systems --  Supporting Assurance by Evidence-Based Argument Services -- Towards Composable Robotics: The R3-COP Knowledge-Base Driven Technology Platform -- Addressing the Needs of an Aging Population: An Experiment for Monitoring Behaviour in a Domestic Environment --  Introduction to IWDE 2012 -- Modeling the Effects of Software on Safety and Reliability in Complex Embedded Systems -- Towards Artificial Perception -- A Case Study of Radio-Based Monitoring System for Enhanced Safety of Logistics Processes -- Visual Approach Facilitating the Importance Analysis of Component Fault Trees -- Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation -- From Discrete Event Simulation to Virtual Reality Environments -- Program Comprehension in Preprocessor-Based Software. 330 $aThis book constitutes the refereed proceedings of 5 workshops colocated with SAFECOMP 2012, the 31st International Conference on Computer Safety, Reliability, and Security, held in Magdeburg, Germany, in September 2012. The 49 revised full papers presented were carefully reviewed and selected from numerous submissions. According to the workshops covered, the papers are organized in topical sections on: next generation of system assurance approaches for safety-critical systems (Sassur), architecting safety in collaborative mobile systems (ASCoMS), dependable and secure computing for large-scale complex critical infrastructures (DESEC4LCCI), ERCIM/EWICS/cyberphysical systems (ERCIM/EWICS), and on digital engineering (IWDE). 410 0$aProgramming and Software Engineering ;$v7613 606 $aComputer security 606 $aComputer communication systems 606 $aComputer logic 606 $aArtificial intelligence 606 $aSoftware engineering 606 $aComputers and civilization 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aLogics and Meanings of Programs$3https://scigraph.springernature.com/ontologies/product-market-codes/I1603X 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 608 $aConference proceedings.$2fast 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aComputer logic. 615 0$aArtificial intelligence. 615 0$aSoftware engineering. 615 0$aComputers and civilization. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aLogics and Meanings of Programs. 615 24$aArtificial Intelligence. 615 24$aSoftware Engineering. 615 24$aComputers and Society. 676 $a005.8 702 $aOrtmeier$b Frank$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDaniel$b Peter$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aSassur (Workshop)$f(2012 :$eMagdeburg, Germany) 712 12$aASCoMS 2012$f(2012 :$eMagdeburg, Germany) 712 12$aDESEC4LCCI 2012$f(2012 :$eMagdeburg, Germany) 712 12$aERCIM/EWICS 2012$f(2012 :$eMagdeburg, Germany) 712 12$aInternational Workshop on Digital Engineering$f(2012 :$eMagdeburg, Germany) 906 $aBOOK 912 $a996466211503316 996 $aComputer Safety, Reliability, and Security$92175020 997 $aUNISA