Information Technology Reference
In-Depth Information
provided to care givers into the implementation
process of all future installations. As one care
provider told us, “if it isn't given to me in a way
I can use it, I won't even look at it” (Glascock &
Kutzik 2007a; Glascock & Kutzik 2007b).
we have moved our work from monitoring to
informatics (Glascock & Kutzik 2008).
This move was accomplished through the
development of a multi-site study (CHI) that em-
ployed a methodology that utilized a systematic
and comparative data collection at multiple sites
for test periods of six months. Over time, this
methodology evolved into the Evidence Based
Evaluation of Telehomecare Applications or “EB-
ETA” (Glascock & Kutzik, 2009). The EBETA is
comprised of three basic components. The first
is the TAO, which stands for “trigger-action-out-
come”. This is a web-based data entry instrument
into which the caregiver enters the actions taken
and the health outcomes brought about by the ac-
tions. In each of the research locations in which the
EBETA was employed, the red and yellow alerts
are sent to the designated caregiver who initiated
the TAO by clicking on the specified server and
opening a “form” which is auto-populated with
information about the client, the alert(s) in ques-
tion and which asks the caregiver to check boxes
and fill in text fields relating to their actions in
response to the alerts (see Figure 2). Each client
Stage 5: The Caring Home Initiative
After spending so many years designing, devel-
oping and testing the ELMS, this quote was very
disturbing; what does she mean by “in a way I
can use it”? Information is information, isn't it?
The ELMS provides it and caregivers use it, our
job is done, isn't it? Unfortunately, the real world
answer to this is, no. Our assumption and the as-
sumptions of everyone else working to develop
remote monitoring systems, was that caregivers
would just figure out how to use the information
to provide better and more cost-effective care. This
turned out not to be the case and over the last two
years we have moved from working on the sensor
array that is the technological heart of behavioral
monitoring, to how the information is displayed,
manipulated, stored and retrieved; in other words,
Figure 2.
Search WWH ::




Custom Search