skip to main content
10.1145/1409635.1409672acmotherconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

A context-aware patient safety system for the operating room

Published:21 September 2008Publication History

ABSTRACT

Most context-aware systems have been designed for non-safety-critical environments such as offices, museums, and university campuses. This paper argues that context-awareness can be used for safety-critical systems too. But since the consequences of errors or failures in safety-critical systems are potentially severe, we should have a high degree of confidence in these systems. We present the design, implementation, and evaluation of a context-aware patient safety and information system (CAPSIS) designed for use during surgery. Specifically, our study indicates that CAPSIS could improve patient safety in the operating room. More generally, the paper suggests that context-aware technologies offer a promising step forward in the design of safety-critical systems.

References

  1. M. C. Abhaya Asthana and P. Krzyzanowski. An indoor wireless system for personalized shopping assistance. In Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, pages 69--74. IEEE Computer Society Press, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Agarwal, A. Joshi, T. Finin, Y. Yesha, and T. Ganous. A pervasive computing system for the operating room of the future. Mob. Netw. Appl., 12(2--3):215--228, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. E. Bardram. The Java Context Awareness Framework (JCAF) -- A Service Infrastructure and Programming Framework for Context-Aware Applications. In Proceedings of Pervasive 2005, pages 98--115, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. E. Bardram. Pervasive healthcare as a scientific dicipline. Methods of Information in Medicine, 47(3):129--142, 2008.Google ScholarGoogle Scholar
  5. J. E. Bardram, T. R. Hansen, M. Mogensen, and M. Soegaard. Experiences from Real-World Deployment of Context-Aware Technologies in a Hospital Environment. In Proceedings of Ubicomp 2006, pages 369--386, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. K. Cheverst, N. Davies, K. Mitchell, and A. Friday. Experiences of developing and deploying a context-aware tourist guide: the guide project. In Proceedings of MobiCom 2000, pages 20--31. ACM Press, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. F. D. Davis. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3):319--339, September 1989.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. K. Dey, M. Futakawa, D. Salber, and G. D. Abowd. The conference assistant: Combining context awareness with wearable computing. In Proceedings of the 3rd International Symposium on Wearable Computers, pages 21--28. IEEE Press, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. Dourish. What we talk about when we talk about context. Personal and Ubiquitous Computing, 8(1):19--30, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. Finkenzeller. RFID Handbook. John Wiley & Sons, West Sussex, UK, 2nd edition, 2003.Google ScholarGoogle Scholar
  11. M. Fleck, M. Frid, T. Kindberg, E. O'Brien-Strain, R. Rajani, and M. Spasojevic. Rememberer: A tool for capturing museum visits. In G. Borriello and L. E. Holmquist, editors, Proceedings of Ubicomp 2002: Ubiquitous Computing, volume 2498 of Lecture Notes in Computer Science, pages 48--55, Göteborg, Sweden, Sept. 2002. Springer Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. W. G. Griswold, P. Shanahan, S. W. Brown, R. Boyer, M. Ratto, R. B. Shapiro, and T. M. Truong. ActiveCampus: experiments in community-oriented ubiquitous computing. IEEE Computer, 37(10):73--81, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. T. R. Hansen, J. E. Bardram, and M. Soegaard. Moving out of the lab: Deploying pervasive technologies in a hospital. IEEE Pervasive Computing, 5(3):24--31, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Harter, A. Hopper, P. Steggles, A. Ward, and P. Webster. The anatomy of a context-aware application. Wireless Networks, 8(2/3):187--197, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. E. F. Hill. Jess in Action: Java Rule-Based Systems. Manning Publications Co., Greenwich, CT, USA, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. The Joint Commission, Oakbrook Terrace, IL, USA. Universal Protocol For Preventing Wrong Site, Wrong Procedure, Wrong Person Surgery#8482;, 2003.Google ScholarGoogle Scholar
  17. F. Kensing and K. Halskov Madsen. Generating Visions: Future Workshops and Metaphorical Design. In J. Greenbaum and M. Kyng, editors, Design at Work: Cooperative Design of Computer Systems., pages 155--168. Lawrence Erlbaum Associates, Hillsdale, NJ, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. L. Kohn, J. Corrigan, and M. Donaldson. To err is human: building a safer health system. National Academy Press, Washington, 2000.Google ScholarGoogle Scholar
  19. W. C. Levine, M. Meyer, P. Brzezinski, J. Robbins, and W. S. Sandberg. Computer automated total perioperative situational awareness and safety systems. In International Congress Series, CARS 2005: Computer Assisted Radiology and Surgery, volume 1281, pages 856--861. Elsevier, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  20. R. Oppermann and M. Specht. A context-sensitive nomadic exhibition guide. In Proceedings of Second International Symposium on Handheld and Ubiquitous Computing, HUC 2000, pages 127--142, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. W. S. Sandberg, M. Häkkinen, M. Egan, P. K. Curran, P. Fairbrother, K. Choquette, B. Daily, J.-P. Sarkka, and D. Rattner. Automatic detection and notification of "wrong patient -- wrong location" errors in the operating room. Surgical Innovation, 12(3):253--260, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  22. T. Schiøler. Patientsikkerhed. Ugeskrift for Lœger, 163(39):5350--5355, 2001.Google ScholarGoogle Scholar
  23. E. J. Thomas, D. M. Studdert, H. R. Burstin, E. J. Orav, T. Zeena, E. J. Williams, K. M. Howard, P. C. Weiler, and T. A. Brennan. Incidence and types of adverse events and negligent care in utah and colorado. Med Care, 38(3):261--271, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  24. R. Want, B. N. Schilit, N. I. Adams, R. Gold, K. Petersen, D. Goldberg, J. R. Ellis, and M. Weiser. An overview of the parctab ubiquitous computing environment. IEEE Personal Communications, 2(6):28--43, 1995.Google ScholarGoogle ScholarCross RefCross Ref
  25. H. Yan and T. Selker. Context-aware office assistant. In Proceedings of IUI 2000, pages 276--279. ACM Press, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Reviews

Edward Peter Hoffer

Hospitals incorporate many different practices and technologies to help ensure patient safety in the operating room (OR). This paper describes the design and initial testing of a radio-frequency identification (RFID) based system to improve patient safety. As of publication, it had not been used with actual patients. Patients, staff, blood products, and equipment are identified through RFID tags. The system checks that the correct patient is in the OR, that the operating table is correct for the patient, that all necessary staff are present, and that the blood for transfusion is properly matched. It gathers information from the hospital's electronic medical record, displays relevant information on the status board, and monitors physiologic data from patient sensors. It is designed to both verify that "all systems are go" and to flag potential errors. The gathering, organizing, and display of critical data is not a new idea; similar systems for intensive care units were described over a decade ago, including use of the common "green/yellow/red" display. It will be interesting to see a report on the system in actual use. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    UbiComp '08: Proceedings of the 10th international conference on Ubiquitous computing
    September 2008
    404 pages
    ISBN:9781605581361
    DOI:10.1145/1409635

    Copyright © 2008 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 21 September 2008

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate764of2,912submissions,26%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader