Free Essay

Safe Handling

In:

Submitted By misscubby12
Words 379
Pages 2
Annotated Bibliography #1
Osby, Melanie, Saxena, Sunita, Nelson, Janice, Shullman, Ira. (2007). Safe Handling and Administration of Blood Components. Pathology & Laboratory Medicine, 131(1), 690-694. Retrieved on October 17, 2010, from http://ezproxy.iuk.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=c8h&AN=2009579571&site=ehost-live. Seven case scenarios are reviewed by four medical doctors to assess the risks that hinder successful blood transfusions and administration of blood components (2007). The authors present scenarios of actual transfusion situations, the mistakes made that affected real patients, and the lessons for nurses and other physicians to prevent such errors in their careers. Various journals, textbooks and internet sources were used to obtain data to support their claims. In the article, the doctors explain how the transfusion process involves several steps that can compromise patient safety if not carried out according established guidelines. Sometimes stories can be the most effective way to raise awareness and educate. Incorporating this is a strength of the study. The authors present scenarios that show inappropriate blood component ordering, the importance of obtaining patient consent to transfuse, the proper way to submit a blood sample to a blood bank and issue the components, and transfusing and monitoring the patient during transfusion. The authors are effective because one can imagine being part of a transfusion that went bad and the emotions that it will bring about. The research goes beyond just scenarios with their cause and effects. The authors delve into the administrative responsibilities for all levels of medical staff and elaborate on the most intricate details in the process. The article further presents a table that gives information on needle size, types of tubing and filters to use, infusion rates, and using pumps and blood warmers. Another table shows the signs and symptoms displayed during a transfusion reaction. Similar to the other source used in this project, Transfusing safely: A 2006 guide for nurses, (2006), these four medical doctors emphasize the importance of establishing guidelines and a committee because the transfusion process is so intricate. Any minor detail left undone could have fatal results. This article is applicable to the nursing practice because it not only provides fundamentals, but also facilitates learning from others’ mistakes to prevent future errors.

Similar Documents

Premium Essay

Safe Patient Handling & Mobility Edit

...Safe Handling Program and Mobility Proposal for Change Implementation of a Safe Handling Program and Mobility Proposal The purpose of this paper is to propose a Safe Patient Handling Program and Mobility (SHPM) at Doctor’s Hospital. The need for this program will be proven through evidenced based research. According to the American Nurses Association and their position statement, “Elimination of Manuel Patient Handling to Prevent Work Related Musculoskeletal Disorders” the risk of musculoskeletal injury because of manual lifting techniques affects nurses working in any specialty area (ANA 2003). The ANA conducted it's own Health and Safety Survey of nurses in 2011, in which 62% of the more than 4.600 respondents indicated that suffering a disabling musculoskeletal injury was one of their top three safety concerns. The survey also showed that 8 of 10 nurses worked despite experiencing frequent musculoskeletal pain and that 13% were injured three or more times on the job within a year (ANA 2011). This proposal of implementing a Safe Patient and Handling Mobility program will explore the organizational and individual barriers to implementation and identify factors that might influence implementation. Factors influencing organizational readiness will be addressed for this proposed change as well as internal and external resources available to support this initiative. A theoretical model will be discussed, and how it relates to the proposal of a SPHM at Doctor’s Hospital...

Words: 1375 - Pages: 6

Free Essay

Practice

...or Die Trying”, is a very serious issue and can happen to anyone at any given time. While handling such private information like Social Security Numbers, Individuals Names, Addresses, Credit Card information… etc., needs to be properly kept safe from everyone. Things like that can be used to steal someone’s identity and cause serious harm to you and others. This is the type of information that needs to be kept under a lock and key in the safest safe known to man. While handling such information you should constantly monitor your system for any issues for any outside activity that should not be there. To prevent things like this from happening, you need to constantly have that extra watch dog out for around the clock monitoring. The internet is one complete network and everyone is connected in some way, shape or form. If there is a connection, there is always someone watching in that backdoor that you might not be thinking about. There is usually a port or open door somewhere that someone is waiting at for that right time. Yes, there is software, hardware and other ways to monitor your data and/or information, along with your closed network. You can never be too careful and confident to let it all go on by itself. Every day, there is updates and new technology that arrives and needs to constantly be put in place. You can never be too careful to keep such information safe. The impact could result in your company to go down and never come back if this ever happens...

Words: 324 - Pages: 2

Free Essay

Acct 504 Case Studey

...Indelible Ink Machine, and Internal Control changes that I recommend you make. There are 5 main areas of control that LJB Company needs to address in order to stay in good standings with internal controls. The first internal control is the Establishment of Responsibility; “Control is most effective when only one person is responsible for a given task.”(Kimmel 339) A company should limit one employee to each area to limit the chance of illegal activities. Segregation of duties ties into establishing responsibility by assigning related activities to different employees. Documentation procedures deal with making sure that all transactions and events are documented and monitored. Physical, mechanical, and electronic controls are based on keeping safes, computers and time clocks monitored and restricted. Independent internal verification is used to audit employees and data reconciliation. The last category is called other. This deals with bonding employees who handle cash, and rotating employee duties. Based on the information you gave my colleague and my review of your company, I do not recommend you purchasing an Indelible Ink Machine at this time based on the information which gave to my colleague and my review of your company. This expensive purchase is unnecessary and can easily be avoided if you apply better internal control practices. The implementation of using numbered invoices is a good practice and should continue to be used moving forward. This practice will allow...

Words: 618 - Pages: 3

Free Essay

Wan Security

...important feature of the organization and has to play an important role in its working. Huge amount of information is transferred everyday and is crucial for the organization. A network crash due to any reason may cause a huge loss to the organization. Also any intrusion in the network may allow somebody to get hold of private and confidential information about the company. Hence, the security of the network is very crucial to the organization and its business. The goals of this security plan are to ensure the complete security of the network. This would include physical security, network security and access control systems. Physical security is about keeping the network equipments safe from being physically damaged, tampered with or from being stolen. Network security is about keeping the information safe over the network while transmission. Access control systems refer to the control systems that would allow a user to access the information, that could be crucial to the organization, or the private information of the organization. These are discussed in detail in the following sections. While discussing the security of the network, we make some assumptions. The security employees or the security guards are trustworthy. The employees of the company are trustworthy and they won’t their passwords or other secret keys with anyone. In case an employee is found malicious, he/she would be departed from access to the network immediately. For network security there is a trusted third party...

Words: 328 - Pages: 2

Premium Essay

Jimmy Valentine Quotes

...Valentine was a safe-cracking thief. After getting out of jail, Jimmy fell in love and changed his name to Ralph Spencer. Ralph is a nice, morally good man who is the opposite of his true self. Jimmy Valentine was trying to live a moral life because of Jimmy’s sacrifice, honesty and determination. Jimmy Valentine was trying to live a moral life because of his sacrifices. First, Jimmy sacrifices his true identity by opening a safe in front of people that know him as Ralph. “In a minute Jimmy’s pet drill was biting smoothly into the steel door. In ten minutes-breaking his own burglarious record-he threw back the bolts and opened the door.” Second, Ralph sacrificed being noticed as Jimmy Valentine by meeting people and making friendships. The quote from the article proves this point, “Socially he was a success, and made many friends.”...

Words: 726 - Pages: 3

Free Essay

The Is My Essay

...Week 3 1) Security’s not how it was like back in the days, where all they did was lock away mainframes in the server room. Times have changed, technology has advanced and now comes in many forms. Security is very crucial to any organization, and physical security is no exception. Organizations are not just prone to cyber attacks, but as well breaking and entering, trespassing, natural disaster, fire, flood and much more. Physical security protects people, data, equipment’s, systems and facilities etc. Facility management is very important to any organization. It protects company assets. CPTED “is a discipline that outlines how the proper design of a physical environment can reduce crime by directly affecting human behavior”. It helps to provide support in loss and crime through proper facility construction and procedures. CPTED provides three main approaches to provide overall security. Which include natural access control, natural surveillance, and natural territorial reinforcement. It’s the best approach to build a facility through the CPTED approach. It’s also best to follow proper maintenance and procedures pertaining to physical security. For examples facility keys should only be assigned by the facility management and should be documented. Procedures should be written out clearly stating, how the keys should be distributed, inventoried or even destroyed given the circumstances. On any facility, it’s imperative to enforce access control, to prevent unauthorized personnel...

Words: 667 - Pages: 3

Premium Essay

Grenn

...access and 45,000 servers. All employees communicate using smartphones and email. Many employees work from home and travel extensively. They will need access to Discretionary, mandatory, role-based, rule-based, content-dependent, and nondiscretionary access controls, they are a large company and will need someone to be in charge of each control because not everyone have the same access. 4. Backordered parts are a defense contractor that builds communications parts for the military. All employees communicate using smartphones and email. They would need Discretionary, content-dependent and rule-based access control, they have a group of people who contain sensitive data that need to be controlled. They communication parts need to be safe. 5. Confidential Services Inc is a military-support branch consisting of 14,000,000 computers with internet access and 250,000 servers. All employees must have security clearances, and they communicate mainly using BlackBerry devices and email. They would need Mandatory, Discretionary, role-based, rule-based, content-dependent, nondiscretionary. They have many individuals all who need different access, so they need someone...

Words: 299 - Pages: 2

Free Essay

Waja Concept

...THE WAJA CONCEPT Proton’s Waja was conceptualised as the basis for the company’s advancement from assembly and minor re-engineering to the position of full design and manufacture. It was designed as a competitive product for global consumption of the 21st Century with an attractive design targeting mature, dynamic and multi-cultural markets. The Proton Waja boasts superlative handling dynamics together with compliant ride and enormous body strength and integrity. The new Proton broadens the company’s product line-up joining the cult-status Satria GTi as well as the price-leading Persona and Satria models. Waja is the result of intensive engineering work by Proton R & D in Malaysia and Lotus Engineering in Hethel, England. The blend of technologies from Malaysia and England has produced a car that is at once safe, secure, strong and precise, a car worthy of comparison with the world’s best mid-size sedans. KEY TECHNICAL FEATURES OF THE WAJA • Lotus ride and handling • Unique modular integration • A stronger more rigid body • High levels of primary and secondary safety • Significant NVH reductions STYLING The Proton Waja benefits from inspired styling and boasts clean and stylish lines born in the company’s design studio at Shah Alam. The Waja has a personality all its own and has adopted clean smooth lines in a classic three box design on a platform which will be used as the basis for other models in the future. The styling has been aimed...

Words: 1378 - Pages: 6

Free Essay

Read from Url

...LAB EXERCISE 1: READ FROM URL URLReader.java import java.net.*; import java.io.*; public class URLReader { public static void main(String[] args) throws Exception { URL yahoo = new URL("http://www.lelong.com/"); BufferedReader in = new BufferedReader( new InputStreamReader( yahoo.openStream())); String inputLine; for ( int i =0;(inputLine = in.readLine()) != null; i++){ System.out.println(inputLine);} in.close(); } } LAB EXERCISE 2: Echo Client EchoClient .java import java.io.*; import java.net.*; public class EchoClient { public static void main(String[] args) { try { Socket s = new Socket("127.0.0.1", 9999); BufferedReader r = new BufferedReader(new InputStreamReader(s.getInputStream())); PrintWriter w = new PrintWriter(s.getOutputStream(), true); BufferedReader con = new BufferedReader(new InputStreamReader(System.in)); String line; do { line = r.readLine(); if ( line != null ) System.out.println(line); line = con.readLine(); w.println(line); } while ( !line.trim().equals("bye") ); } catch (Exception err) { System.err.println(err); } } } LAB EXERCISE 3:MULTI THREADS SimpleThreads.java public class SimpleThreads { //Display a message, preceded by the name of the current thread static void threadMessage(String message) { String threadName = Thread.currentThread().getName(); System...

Words: 1219 - Pages: 5

Premium Essay

It 110

...IT110-1302A-06 Introduction to Programming Hockey Performance 5/6/2013 TABLE OF CONTENTS Contents TITLE PAGE 1 TABLE OF CONTENTS 2 Week 1: Project Outline 3 Week 1: Project Outline 4 Week 1: Use Case Diagrams 5 Week 1: Class Diagram 6 Week 2: Java Fundamental 7 Week 2: Java Fundamental 8 Week 3: Java Control Structures 9 Week 3: Java Control Structures 10 Week 4: Error Handling and File Input/Output 11 Week 4: Error Handling and File Input/Output 13 Week 4: Error Handling and File Input/Output 14 Week 4: Error Handling and File Input/Output 15 Week 4: Error Handling and File Input/Output 16 Week 4: Error Handling and File Input/Output 17 Week 4: Error Handling and File Input/Output 18 Week 4: Error Handling and File Input/Output 19 Week 4: Error Handling and File Input/Output 20 Week 5: Final Application Design & Screenshots 21 Week 5: Final Application Design & Screenshots 22 Week 5: Final Application Design & Screenshots 23 Week 5: Final Application Design & Screenshots 24 Week 5: Final Application Design & Screenshots 25 Week 5: Final Application Design & Screenshots 26 Week 5: Final Application Design & Screenshots 27 Week 5: Final Application Design & Screenshots 28 Week 5: Final Application Design & Screenshots 29 REFERENCE: An Introduction to Java Programming and Object-Oriented Application Development 29 ISBN-13: 9780619217464 29 Author(s): Johnson 29 Week 1: Project Outline ...

Words: 773 - Pages: 4

Free Essay

Java

...public abstract class Animal extends Organism { boolean ateThisTurn; boolean wantsToMove; public void wasIJustFed(boolean ateOrNot) { if (ateOrNot == true) { ateThisTurn = true; } else { ateThisTurn = false; } } public void resetHunger() { ateThisTurn = false; } public void wasIJustMoved(boolean movedOrNot) { if (movedOrNot) { wantsToMove = false; } else { wantsToMove = true; } } public String toString() { String deadOrAlive = new String(); if (isAlive) { deadOrAlive = "A Living "; } else { deadOrAlive = "A Dead "; } return "[" + deadOrAlive + organismType + ": " + currentHP + "/" + maxHP + " | " + lastReproduced + "/" + reproduceEvery + " - ateThisTurn = " + ateThisTurn + "\n"; } public boolean justAte() { return ateThisTurn; } public boolean moveThisTurn() { return wantsToMove && isAlive; } public boolean isReadyToReproduce() { return super.isReadyToReproduce() && maxHP == currentHP && ateThisTurn && isAlive; } public boolean isBurning() { return false; } } import java.awt.*; import java.util.ArrayList; public class Breeder { public Breeder() { } public static void breed(Organism breedingOrganism, WorldWorker environment, Point pointHolder)...

Words: 2671 - Pages: 11

Free Essay

Quantum of Reservations

...Introduction Article 15(4) was inserted into the Constitution by way of amendment and wasn’t a clause which was present in the Constitution, since it came into being. This amendment gave the executive powers to make any special provisions for the advancement of any socially and educationally backward classes of citizens or for the Schedule Castes and Schedule Tribes. This provision was considered necessary by the legislature as India gained independence and a democratic form of Government came into being, the need to uplift the down-trodden was felt. Reservation were to be implemented initially for only 10 years but have being continuing till now. Over the years the extent to which reservations should be allowed has been a matter of great controversy and has been discussed in various cases. The present condition is that reservations in general should not exceed 50%. But this was not always the position. Since Article 15(4) permits discrimination in reverse by reserving seats in educational institutions, the extent of such reservation assumes great importance for the citizen, for the public generally and for the State. An instructive illustration of such appointments to unreserved and reserved posts is furnished by the facts of T. Devadasan v. Union of India and Anr. Out of 45 appointments to be made, 16 were made from unreserved seats and 29 from candidates belonging to the Schedule Castes and Tribes. The petitioner complained that although he had obtained 61 per cent marks...

Words: 1443 - Pages: 6

Premium Essay

Programming

...Question 1: (5 marks) Write a program in Java using linked list to manage information about persons. Variables used to store information about a person are: • name - the name of a person (character string). • age - the age of a person (integer value). You should write the MyList class, which is a linked list data structure to store person information. The following functions should be included in the MyList class: • void addLast(String xName, int xAge) - check if the first letter of xName is not 'B' (i.e. xName.charAt(0) != 'B') then add new person with name=xName, age=xAge to the end of the list. • void addFirst(String xName, int xAge) - check if the first letter of xName is not 'B' then add new person with name=xName, age=xAge to the begining of the list. • void addMany(String [] a, int [] b) - this function is given. • void ftraverse(RandomAccessFile f) throws Exception - display all nodes in the file f in format: (name, age). This function is given. • void f1() – Test addLast function. You do not need to edit this function. Your task is to complete the function addLast(String xName, int xAge) function only. With the given data, the content of f1.txt must be the following: (A0,9) (A7,13) (A5,7) (A3,11) (A4,9) (A2,12) (A6,5) (A1,6) • void f2() – Test addFirst function. You do not need to edit this function. Your task is to complete the function addFirst(String xName, int xAge) function only. With the given data, the content of f2.txt must be the following: ...

Words: 349 - Pages: 2

Free Essay

Something

...MIPS Reference Data Card (“Green Card”) 1. Pull along perforation to separate card 2. Fold bottom side (columns 3 and 4) together M I P S Reference Data Add Immediate Add Unsigned And And Immediate Branch On Equal addi 1 CORE INSTRUCTION SET FORNAME, MNEMONIC MAT OPERATION (in Verilog) add Add R R[rd] = R[rs] + R[rt] I I R[rt] = R[rs] + SignExtImm R[rt] = R[rs] + SignExtImm Add Imm. Unsigned addiu addu and andi beq OPCODE / FUNCT (Hex) (1) 0 / 20hex (1,2) (2) 8hex 9hex 0 / 21hex 0 / 24hex (3) (4) (4) (5) (5) chex 4hex 5hex 2hex 3hex 0 / 08hex (2) (2) (2,7) (2) 24hex 25hex 30hex fhex 23hex 0 / 27hex 0 / 25hex (3) dhex 0 / 2ahex R R[rd] = R[rs] + R[rt] R R[rd] = R[rs] & R[rt] I I I J J R[rt] = R[rs] & ZeroExtImm if(R[rs]==R[rt]) PC=PC+4+BranchAddr if(R[rs]!=R[rt]) PC=PC+4+BranchAddr PC=JumpAddr R[31]=PC+8;PC=JumpAddr Branch On Not Equal bne Jump Jump And Link Jump Register j jal jr Load Byte Unsigned lbu Load Halfword Unsigned Load Linked Load Upper Imm. Load Word Nor Or Or Immediate Set Less Than lhu ll lui lw nor or ori slt R PC=R[rs] R[rt]={24’b0,M[R[rs] I +SignExtImm](7:0)} R[rt]={16’b0,M[R[rs] I +SignExtImm](15:0)} I R[rt] = M[R[rs]+SignExtImm] I I R[rt] = {imm, 16’b0} R[rt] = M[R[rs]+SignExtImm] R R[rd] = ~ (R[rs] | R[rt]) R R[rd] = R[rs] | R[rt] I I R[rt] = R[rs] | ZeroExtImm R R[rd] = (R[rs] < R[rt]) ? 1 : 0 OPCODE / FMT /FT FOR/ FUNCT NAME, MNEMONIC MAT OPERATION (Hex) bc1t FI if(FPcond)PC=PC+4+BranchAddr (4) 11/8/1/-Branch On FP True...

Words: 2042 - Pages: 9

Free Essay

The Power Line Poles

...THE POWER LINE POLES If you were in the position of Gordon Yarrow how would you deal with the bid exceptions requested? If I was Mr. Yarrow, I would request Henry Nelson Co. that several pre-award meetings are held to discuss the exceptions made with the goal of setting final agreements on these exceptions prior contracting the services. I would also make sure that these discussions are recorded as minutes of the meetings so that the document(s) can become an integral part of Henry Nelson’s quote and eventually included in the contract agreement. With regards to each of the exceptions requested (Exhibit 2), my comments are: • Exception 1: To handle this exception, Moren should request Henry Nelson and for that matter all bidders, to include in their quote a Jobsite delivery. Although most of the companies in the US are more familiar with the UCC transportation terms, Moren should request that the latest version of Incoterms (developed by the ICC) should be used as the applicable transportation terms of the contract. By enforcing the use of Incoterms, Moren may even specify that the quoted terms should be DDP-Jobsite which would indicate Henry Nelson and all other bidders that the supplier “must” carry the responsibility and risk of delivering the equipment to the jobsite by the requested date. With this in mind, Henry Nelson and other bidders should include as part of their cost estimate the costs for using DDP-Jobsite delivery terms. This way, the sales price to Moren is...

Words: 913 - Pages: 4