You are on page 1of 3

PROCEEDINGS of the HUMAN FACTORS AND ERGONOMICS SOCIETY 50th ANNUAL MEETING—2006 1466

CONSEQUENTIAL ANALYSIS OF INFORMATION SYSTEM


CRITICALITY IN A HEALTHCARE ORGANIZATION
Perry SJ1, Wears RL1,2, Chozos N3, Johnson CW3, Smith KF4
1
University of Florida, Jacksonville, FL
2
Clinical Safety Research Unit – Imperial College, London
3
University of Glasgow, Scotland
4
Shands Jacksonville Medical Center, Jacksonville, Florida

Implementation of information technology (IT) in healthcare has increased with little


attention paid to the consequences of system failures. This qualitative study assesses the
organizational understanding of IT vulnerabilities, the potential consequences of failure
and system recovery capabilities within a large healthcare facility. Fifty nine percent
(59%) of identified software applications were rated mission critical by participants, 46%
were medium impact and 1 application was a non-factor. Downtime procedures were in
place for only 39% of applications with 30% of those deemed “mission-critical” lacking
downtime procedures. Expected recovery time objectives (RTO) and recovery point
objectives (RPO) for users were not consistent with those projected by the IT department.
A sub-analysis of the emergency department showed a high percentage of mission critical
software but only 36% had downtime procedures. Continued inattention to the risks and
hazards associated with widely disseminated IT within healthcare represents a continuing
and little discussed vulnerability.

INTRODUCTION METHODS

Advanced information technology has been Setting. An urban 653 bed teaching hospital
gradually increasing its presence in the clinical that is part of an 8 hospital network. This medical
work areas of healthcare. Often the introduction of facility has over 300,000 patient visits annually and
IT functionality begins as an optional ‘luxury’ that is staffed by 4500 employees and clinicians.
will enhance or improve some aspect of clinical
care or information management, and therein is not Data collection. A data criticality survey was
viewed as mission-critical. The new IT gradually administered to units and services within the
becomes a necessity, because the old systems have hospital in conjunction with the ITS department of
withered, are not maintained, or get in the way of the study site. Individual interviews were
current IT-based systems. The result is that conducted with representative personnel using
mission-critical (and sometimes, life- or limb- standard questions to acquire more detail.
critical) functionality is in use with little or no Respondents were asked to assess the following: 1)
formal consideration by it users or the organization mission criticality (on a 10-point Likert scale) of
of its physical or logical security, its reliability, or the software currently being utilized in their areas,
the consequences of failure - unavailability, 2) the recovery time objective (RTO), defined as
unreliability (eg, data corruption), or data loss. the time goal for the reestablishment of IT
The objective of this paper was to use functions in the event of a system failure,
qualitative research methods to assess 3) recovery point objective (RPO), defined as the
organizational understanding of IT vulnerabilities, period of time for which work may be lost within
the potential consequences of failure and system the software program once the application is
recovery capabilities in a large healthcare facility.
Downloaded from pro.sagepub.com at University of Exeter on August 14, 2015
PROCEEDINGS of the HUMAN FACTORS AND ERGONOMICS SOCIETY 50th ANNUAL MEETING—2006 1467

restored and 4) documentation of down-time reported that they maintained downtime procedures
procedures. for some or all of the applications used by their
Additional data were obtained in the ED by service area while 39% reported that they did not
interviews with selected users to assess their any such procedures in place. Two percent (2%)
perceptions of consequences of failure as they did not know if downtime procedures existed or
relate to the clinical, research, and educational did not answer. Of those who stated no down time
missions, and to critical administrative functions. procedure existed, 30% of their applications had
The types of system failure were not specified been designated as mission-critical (rating 1 or 2).
to the participants (eg, unavailability, inaccuracy,
unreliability, data loss). To obtain the point of Recovery Time Objective (RTO). Assessment
view end users, application layer functionality of Recovery Time Objective ranged from 1 - 168
rather than hardware and software subcomponents hrs with a median of 11 hrs. Significant
were the focus of this project. divergence was noted between subjects expected
All surveys were anonymous and no subject RTO and the current capability for recovery
identifiers were recorded in the interviews. projected by the facility’s IT department for the
applications it supported (range 1.5 - 82 hrs,
Data analysis. Simple descriptive statistics median= 17 hrs).
were used to summarize the data. For ease of
summarization, the 10-point criticality scale was Recovery Point objective (RPO). Responses to
collapsed into three categories: 1-2 mission critical, the question of what Recovery Point Objective
3-8 medium impact, 9-10 non-factor. would be acceptable for data loss ranged from 0-
168 hrs, median =1 hr. A difference was found
RESULTS between the expected RPO of the participants and
the projected period for data loss from the IT
Surveys were distributed to 25 units and department for the applications it supported (range:
services within the hospital with 11 units 0-24 hrs, median=16 hrs).
responding (44%). One hundred forty-eight (148)
servers were identified to be in use within by the Emergency Department (ED) sub-analysis
facility per survey results and ITS logs with total of Fifteen key ED personnel were surveyed and/or
130 software applications in operation. Eighty (80) interviewed regarding IT applications used in the
of these applications were supported by hospital department Twenty-two (22) separate systems were
IT, with the remaining 50 maintained by individual identified in the ED with 14 rated mission-critical
departments or outside sources. (64%), 8 rated medium impact (36%), and 0 rated
non-critical. Downtime procedures were
Data criticality ratings. Eighty-seven (87) of identified for only 6 applications (27%), with most
the 130 identified software applications (67%) respondents only vaguely familiar with those
were rated by participants on its importance to identified. (e.g, “I know we start writing on this
departmental or area operations and services. form but I do not know where to get them”).
Forty-six (46) of 87 applications rated were
designated as “mission critical” (53%), 40 as DISCUSSION
medium impact (46%) and only 1 application as a
non-factor. The remaining 43 applications received The growing dependence on IT-based tools in
no rating from participants. clinical work has been insidious and relatively
untracked inside healthcare organizations. Little
Downtime procedures. Two hundred and forty- attention has been directed to the vulnerabilities
four (244) responses were received when asked that are growing in parallel with this increasing
whether individual units maintained documented dependence. There are numerous publications
downtime procedures for each of the applications within main stream medical journals looking at
utilized in their area. Fifty-nine percent ( 59%) discrete IT based tools for “sexy” topics such as
Downloaded from pro.sagepub.com at University of Exeter on August 14, 2015
PROCEEDINGS of the HUMAN FACTORS AND ERGONOMICS SOCIETY 50th ANNUAL MEETING—2006 1468

medication safety and computerized physician proportion (~60%) lack documented downtime
order entry (CPOE) but only a handful that procedures in case of system failure. The
question the widespread unexpected hazards expectations of users for recovery from system
associated with use of IT systems in general.(Ash failure and subsequent data recovery are
2004, Wears and Berg, 2005) incongruent with the current capabilities of the
This failure to attend to the risks of IT is due in system. Inattentiveness to these issues by
part to the misconception that hazards and failures healthcare organizations and users decreases their
in healthcare will manifest in obvious and easily ability to cope or maintain patient safety when
discernible ways, such as with a wrong site system failure occurs.
surgery. As a result, there is even less attention
being paid to the possibility that failures can LIMITATIONS
become manifest at some distance in time and
space from the initiating fault, or that faults may The use of survey methodology in this project
arise from the unexpected interactions of normally limits its utility in several ways. Department chairs
functioning components The risk of operating and unit directors assigned survey completion to
mission-critical applications on commercial off- the person most IT knowledgeable in their area, but
the-shelf (COTS) hardware and software is also respondents varied a great deal in their level of
being largely overlooked. sophistication and understanding. In addition,
Healthcare organizations remain unaware of respondents were asked to estimate the effect of
these risks due to their lack of experience with the system outage on unit operations, but their ability
majority of these hazards. Even vicarious to envision such conditions and how they might
experience is scant, as those who have experienced affect operations in unknown. Telephone, cell
significant failures seldom share their experience phone and pager systems were not included in this
publicly. Previous work by these authors is one of study because they were being reconfigured at that
a handful to describe a system wide IT failure from time. Mission criticality was not consistently
a still unidentified fault in the software of an defined but was locally interpreted. Finally, the
automated medication dispensing system.(Wears effectiveness of down time procedures was not
and Perry, 2005) Additionally, there is limited assessed, only their existence.
understanding of the highly complex domain of IT
and its unique hazards by organizational leaders REFERENCES
and end-users rooted a naïve faith that the
problems are all under control.(Nemeth, 2005) Ash JS, Berg M, Coiera E. Some unintended
consequences of information technology in health care: the
Continued inattention to the risks and hazards
nature of patient care information system-related errors. J Am
associated with widely disseminated IT within Med Inform Assoc 2004; 11(2):104-12.
healthcare will undermine recognition of failure
and the ability to cope with it. Lagadec, Patrick. Major Technological Risk: Assessment
of Industrial Disasters. 1982.
These days we adopt innovations in large
Nemeth C, Nunnally M, O'Connor M, et al. Getting to
number, and put them to extensive use, faster than the point: developing IT for the sharp end of healthcare.
we can even hope to know their Journal of Biomedical Informatics 2005;38(1):18-25.
consequences…which tragically removes our
ability to control the course of events…. Wears RL, Perry SJ, Cook RI. The role of automation in
Patrick Lagadec, Major Technology Risk(1982) complex system failures. J Patient Safety. 2005:1(1):56-61.

Wears RL, Berg M. Computer Technology and Clinical


CONCLUSION Work: Still Waiting for Godot. JAMA 2005;293(10):1261-63.

Despite recognition of a large number of


mission-critical IT applications, a significant

Downloaded from pro.sagepub.com at University of Exeter on August 14, 2015

You might also like