Data driven patient safety and clinical information technology

Michael A. Rosen, Grace Tran, Howard Carolan, Mark Romig, Cynthia Dwyer, Aaron S. Dietz, George R. Kim, Alan Ravitz, Adam Sapirstein, Peter J. Pronovost

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Scopus citations


Healthcare information technology has improved the business of healthcare with mixed results for its impact on the delivery of care itself. As industry and regulatory pressures to improve the quality and safety of care through the reduction of preventable harms, it becomes imperative to align information systems to (a) collect real-time clinical data with patient care workflows and (b) provide quality and patient safety teams (and other stakeholders) easy access to meaningful process and outcomes data. To accomplish this, hospitals and other healthcare organizations must adopt emerging practices from the science of high reliability organizations (HROs). In addition, they must employ and adapt clinical IT systems to facilitate real-time collection, analysis and feedback of performance (on multiple levels) with data directly from care. An example, Project Emerge, from the Johns Hopkins Hospital, is presented.

Original languageEnglish (US)
Title of host publicationHealthcare Information Management Systems
Subtitle of host publicationCases, Strategies, and Solutions: Fourth Edition
PublisherSpringer International Publishing
Number of pages16
ISBN (Electronic)9783319207650
ISBN (Print)9783319207643
StatePublished - Sep 21 2015


  • Armstrong Institute for Patient Safety and Quality
  • Care quality
  • Critical care
  • Data reuse
  • High reliability organizations
  • Intensive care unit
  • Johns Hopkins Hospital
  • Patient safety
  • Patient/ family engagement in care
  • Project Emerge (safety)
  • Real-time patient monitoring
  • Surgical critical care
  • Ventilator associated events (VAE)

ASJC Scopus subject areas

  • General Medicine


Dive into the research topics of 'Data driven patient safety and clinical information technology'. Together they form a unique fingerprint.

Cite this