Download patient identification errors are not uncommon

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts

Health equity wikipedia , lookup

Medical ethics wikipedia , lookup

Rhetoric of health and medicine wikipedia , lookup

Adherence (medicine) wikipedia , lookup

Patient advocacy wikipedia , lookup

Electronic prescribing wikipedia , lookup

Patient safety wikipedia , lookup

Transcript
Efficiency, Thoroughness, and the Patient Identification Process***
Jenna L. Marquard, PhDa ([email protected])
Philip L. Henneman, MDb ([email protected])
Tuan A. Phama ([email protected])
Megan M. Campbellc ([email protected])
Donald L. Fisher, PhDa ([email protected])
a. Department of Mechanical and Industrial Engineering
University Massachusetts Amherst
219 Engineering Laboratory
160 Governors Drive
Amherst, MA 01003
b. Baystate Medical Center; Tufts University School of Medicine
759 Chestnut Street
Springfield, MA 01199
c. School of Nursing
University Massachusetts Amherst
Skinner Hall
651 North Pleasant Street
Amherst, MA 01003
Corresponding author:
Jenna L. Marquard
University of Massachusetts Amherst
219 Engineering Laboratory
160 Governors Drive
Amherst, MA 01002
Tel: (413) 545-0646
Fax: (413) 545-1027
[email protected]
***Preliminary and Incomplete Draft
Abstract
The main objective of this study was to develop and test a methodology, based on the efficiencythoroughness trade-off (ETTO) principle, to evaluate whether and how health care workers balance
efficiency and thoroughness while completing patient care tasks. Health care workers’ abilities to
complete patient care tasks in a timely manner is essential for the provision of safe care, as untimeliness
can result in care provided too late or not at all. Additionally, health care workers’ thoroughness in
completing tasks is paramount to providing safe care, as workers play a key role in preventing and
intercepting medical errors.
This paper details the proposed methodology and tests its effectiveness by attending to one vital
health care process (verifying a patient’s identity) in a complex yet critical subsystem of the health care
system (the Emergency Department). Patient identification errors – a topic of national interest – are a root
cause of medication, surgical, charting, dietary, and other medical errors. Research shows patient
identification errors are relatively common, providers are not good at noticing identification errors, and
the failure to correctly identify a patient can result in serious subsequent errors.
Study researchers observed emergency department (ED) employees (N=61) as they completed three
common patient-related tasks in a simulated patient care space while wearing an eye tracking device.
Each HCW performed a common patient care task on three researchers acting as patients, with one patient
having an incorrect identity. The results of the study show that workers who detected the identification
error were less efficient in completing the process than workers who did not detect the error. Additionally,
this paper describes why some workers fail while following well-defined standard processes, where others
succeed while following non-standard processes.
Relevance to industry: The ETTO principle is a useful mechanism to understand why some health
care workers detect patient identification errors and why others do not. The approach described in this
paper can be extended to empirically test how individuals detect and mediate other types of medical
errors. Based on the findings of this study, and coupled with existing literature, identifying within-group
differences related to individuals’ efficiency levels and ability to detect identification errors will guide
more thoughtful job design interventions.
Keywords
Efficiency; Thoroughness; Patient Identification; Medical Errors; Eye Movements
1. Introduction
Heath care processes are complex – or ‘messy’ – for various reasons: demand is largely stochastic,
resources are constrained, and health care workers (e.g. physicians, RNs, etc.) with imperfect information
must act autonomously while functioning seamlessly in teams, with all workers focused on improving
patient outcomes [1-3]. Additionally, health care workers are expected to make judgments and complete
tasks in an attentive, thorough manner while conducting their work with a high level of efficiency.
The nature of the health care system and related processes can be described using Perrow’s [4]
system dimensions: coupling and interactiveness. Coupling means the degree to which processes are
connected to or closely rely on one another, usually in a time-dependant manner [4]. While hospitals
exhibit tight coupling, much of the health care system currently exhibits loose coupling, evidenced by
siloed information systems and repeated tests and scans, for instance [5, 6]. Interactiveness, whether
linear or complex, means the degree to which events are expected or unexpected, familiar or unfamiliar,
and visible or invisible [4]. The health care system exhibits complex as opposed to linear interactiveness,
because events tend to be unexpected and unfamiliar, and individuals largely cannot foresee the
downstream consequences of their actions [4]. Finally, the health care system can be considered
intractable. That is, the principles of the system’s functioning are largely unknown, and the system
descriptions are extremely detailed. Further, the system changes as these descriptions are produced [7, 8].
Intractable systems, as opposed to tractable systems, are difficult (and occasionally impossible) to control
[7].
This paper aims to develop and test a methodology to evaluate how individuals embedded in the
aforementioned complex sociotechnical system balance efficiency and thoroughness, while completing
patient care tasks. The paper details the proposed methodology and tests its effectiveness by using the
methodology to evaluate one complex, human-in-the-loop process – emergency department workers
verifying a patient’s identity. This paper also outlines how the methodology can be used to identify
appropriate job design interventions that improve patient safety, given how health care workers currently
balance efficiency and thoroughness while completing patient care tasks. Health care workers’ abilities to
complete patient care tasks in a timely manner is essential for the provision of safe care, as untimeliness
can result in care provided too late or not at all. Additionally, health care workers’ thoroughness in
completing tasks is paramount to providing safe care, as workers must still prevent or intercept errors.
1.1. Health Care System Safety
Health care researchers and practitioners, referred to here as domain experts are accounting for the
aforementioned system components – coupling, interactiveness, and intractability – when designing
interventions to improve patient safety. They are focused on reducing medical errors, adverse events, and
near misses, by designing interventions that improve patient safety. For instance, domain experts are
addressing the tightly-coupled inpatient setting by focusing on team communication strategies, shift handoffs, and supporting technologies, such as electronic medical records and barcode medication
administration systems, so as to ensure timely coordination of patient care [9-12]. Individuals are
addressing the loosely-coupled outpatient setting through health information exchange and personal
health record initiatives, in an attempt to strengthen coordination across disparate organizations and
patient populations [5, 6]. Individuals are addressing health care’s complex interactiveness by instituting
standard procedures and methods such as quality reporting measures and error reporting systems [13] in
order to provide feedback to individuals and organizations. Finally, individuals are addressing health
care’s intractability through approaches such as root cause analysis and failure modes and effects
analysis, both of which aim to understand and evaluate health care’s underlying structure and processes
[14-16]. In general, domain experts are making progress in their work to improve health care processes,
tools and technologies, and physical and organizational working environments, so as to prevent or reduce
errors, or lessen their consequences. [12, 17-20]. Their approaches align with the Resilience Engineering
domain’s concept of safety, where safety is not a state variable (i.e. a system’s current level of safety or
quality) but a process variable (i.e. a system’s set of attributes and practices that promote safety and
quality) [21].
According to Hollnagel, system safety means “freedom from unacceptable risks” [7, 22]. Because
risk in the health care system cannot be eliminated entirely, decision-makers at the strategic and policy
levels, tactical and managerial levels, and at the operational level must acknowledge and define what
degree(s) of risk are acceptable [7, 22]. Once acceptable and unacceptable risks are defined, domain
experts can then redesign the health care system and its numerous subsystems to prevent unexpected
events and protect against unwanted outcomes – thus controlling the system to the best of their abilities.
1.2. Patient Identification Errors
This paper seeks to improve system safety by attending to one vital health care process (verifying a
patient’s identity) in a complex yet critical subsystem of the health care system (the Emergency
Department). Health care system domain experts, and many members of the general public, are aware of
the pervasiveness and costs of medical errors [23-27]. Given the need to reduce errors and costs, leaders
in the patient safety domain identify process and task design flaws as contributors to medical errors. In
2005 the Joint Commission, which accredits all hospitals, established the following National Patient
Safety Goal to reduce medical errors: “improve the accuracy of identifying patients” [28].
Patient identification errors – a topic of national interest – are a root cause of medication, surgical,
charting, dietary, and other medical errors. The failure to correctly identify a patient can result in serious
subsequent errors. In a study of blood transfusion errors, the most frequent error leading to a fatal
outcome was “administration to other than the intended recipient;” this specific error accounted for 49%
of fatal cases [29]. While this process may seem simple, evidence shows it is indeed complex and that
workers perform the task poorly [30]. In a recent study, physicians performed a computerized physician
order entry task, where the patient had the same name but a different date of birth than the one listed in
the system [30]. Twenty-three of the 25 physicians ordered tests on an incorrect patient [30]. The
consequences of misidentifying a patient are significant, as this task has high risk consequences including death. Additionally, the instances where misidentification can occur are wide spread, as this
task is typically performed before every health care intervention (e.g. selecting a medical record,
performing a test or a procedure, or giving a medication).
Identification errors are not rare; mislabeled laboratory specimens are a commonly reported medical
error [31, 32]. These findings are especially disturbing if coupled with a study in which phlebotomists
looked at 2.46 million patient wrist bands at 712 hospitals [33]. Of these bands, 9% (approx 216,000) had
erroneous data, 8% (approx 192,000) of the patients had multiple bands with different information and
0.5% (approx 12,000) of the patients were wearing wrist bands with another patient’s identity information
[33]. The 2006 National Hospital Discharge Survey [34] states that the total number of discharges from
short-stay hospitals in 2006 was 34,854,000. Scaling the rates shown above using this discharge data,
these figures would translate to 3,136,860 bands with erroneous data, 2,788,320 patients wearing multiple
bands, and 174,270 bands with another patient’s information.
1.3. The Efficiency-Thoroughness Trade-Off Principle
A range of methods exist to aid domain experts in delineating how particular chains of events lead to
health care system failures or malfunctions – namely medical errors, adverse events, and near misses.
This paper aims to evaluate a cognitive approach to understanding system errors and malfunctions,
specifically the patient identification process, as opposed to the commonly used systems analysis
methods: fault tree, event tree, FMEA, and root cause analyses.
Fault tree analysis details “how combinations of individual faults can lead to failure” of a system [15,
35-37]. For instance, a patient may be wearing a wrong ID band, and a provider may not notice – two
faults that may result in the patient being given an incorrect medication. Whereas a fault tree focuses on
combinations of faults leading to a failure, an event tree is a “graphical representation of the paths to
success and failure” which determines all possible outcomes that could result from an event [15, 35-37].
An example of an event tree might start with the event of a pharmacy mislabeling an IV bag. The tree
then outlines possible outcomes resulting from that initial event. Failure modes and effects analysis
(FMEA), popularly used to evaluate high-risk health care processes, provides a structure to identify what
can go wrong in a process (failure modes), and the consequences of those failure modes (failure effects)
[14, 16, 37]. FMEA is typically used to analyze a system before a given failure takes place, and includes
additional assessments such as the frequency of the failure mode, the likelihood of the effect, and the
criticality of the failure mode. A team could, for example, undertake an FMEA analysis to determine all
combinations of failure modes and effects leading to the incorrect administration of a medication. Finally,
root cause analysis (RCA) identifies the causes of a failure or malfunction that has already taken place –
taking place after a wrong medication has been administered, for instance [38, 39].
Due to the dynamic nature of the health care system, the aforementioned methods may fail to account
for how underlying attributes of individuals affect system safety. For instance, the same action (e.g.
verifying an order with an MD), may be appropriate in one situation and inappropriate in another
situation. In one situation, verifying an order with an MD would mitigate an error; in another case without
an error, this behavior would make the ordering process less efficient. Thus, an individual largely cannot
foresee the downstream consequences of his/her actions. Therefore, it is unclear how individuals will
determine whether an action is appropriate in a given situation. This paper therefore focuses on
identifying how one underlying characteristic of individuals causes those individuals to determine which
actions they choose in completing patient care tasks [7].
The efficiency-thoroughness trade-off (ETTO) principle, as described by Hollnagel [7], states that:
In their daily activities, at work or at leisure, people routinely make a choice between being efficient
and being thorough, since it rarely possibly to be both at the same time. If demands for productivity
or performance are high, thoroughness is reduced until the productivity goals are met. If demands for
safety are high, efficiency is reduced until safety goals are met.
Knowing that health care workers are not good at catching identification errors [30], the aim of this
paper is to empirically test whether the ETTO principle can help explain whether and why some health
care workers catch patient identification errors and why others do not. Given this knowledge, the paper
also aims to outline how job design interventions can account for the rules individuals use to balance
efficiency and thoroughness while verifying a patient’s identity.
While the meanings of ‘thoroughness’ and ‘efficiency’ change depending on context, we focus on
definitions as they relate to frontline health care workers. By efficiency, we mean a health care worker’s
ability to achieve a desired outcome with as few resources as possible [7, 41]. By thoroughness, we mean
a health care worker’s knowledge of what outcomes are to be achieved, the current status of the system,
and the actions needing to be taken to ensure desired outcomes are met [7].
Efficiency and thoroughness must be balanced to help ensure patient safety – no matter which health
care process is of interest. Health care workers’ ability to complete patient care tasks in a timely manner
is essential for the provision of safe care. Untimeliness can result in care provided too late or not at all,
and can cause serious implications for patient safety (e.g. delayed medication administration) and patient
satisfaction [42]. Additionally, health care workers’ thoroughness in completing tasks is paramount to
providing safe care. Health care workers play a key role in preventing and intercepting medical errors,
and are now often supported in their tasks by technology [25]. Yet, they must still be thorough in
conducting their work, to prevent or intercept latent errors that can occur because of the technology [11,
43, 44]. This change in the nature of health care workers’ jobs, which now includes understanding, using,
and trusting technology, can lead to new errors often rooted in the misunderstanding, misuse, and/or
mistrust of the technologies [12, 45].
2. Methods
2.1. Setting and Participants
We observed emergency department (ED) employees (N=61) as they completed three common
patient-related tasks in a simulated patient care space while wearing an eye tracking device. The
participants were ED employees at a 600 bed, urban, level 1 trauma, pediatric and tertiary referral center
in Western Massachusetts with an annual ED census > 100,000. Of the 61 employees, 28 were RNs
(RNs), 17 were clerks (ESAs), and 16 were technicians (TAs).
Participants volunteered to participate in the study during one of their day or evening shifts.
Participants were told that the purpose of the study was to evaluate how expert health care workers
(HCWs) use visual cues to perform common, patient care tasks. Study participants were told that they
would wear an eye tracking device that would capture a video of the field in front of them and place cross
hairs on the video showing precisely where they were looking throughout the scenarios. HCWs were not
aware that the purpose of the study was to investigate the process of verifying a patient’s identity (ID).
The study was approved by the hospital’s institutional review board (IRB) and all participants read and
signed an informed consent form, while having any questions answered by a study researcher.
2.2. Study Overview
Each HCW performed a common patient care task on three researchers acting as patients. RNs
completed a scenario in which they acted as if they were to give intravenous medications to the patients.
The ESAs’ scenario involved placing an ID band on the patients. TAs completed a scenario in which they
acted as if they drew, labeled, and sent a blood specimen to the laboratory. Each HCW was asked to
perform the task the same way he or she does every day in the ED except for giving an actual medication
or drawing blood.
All participants performed their tasks on the same three patients. The third patient seen by the RN and
TA participants had the same name but different date of birth (DOB) and medical record number (MRN)
on the ID band than the artifacts (e.g., medication or blood labels) they brought into the room. The third
patient seen by the ESAs had the same name but a different DOB than the ID band the ESAs brought into
the room.
2.3. Study Procedure
Participants wore an eye-tracking device while completing the scenarios. The ASL Mobile Eye
(Applied Science Laboratories, Bedford, MA) is a tetherless eye tracking system that allows freedom of
movement and can be worn by participants who must move freely through a study environment. The eye
tracker shown in Figure 1, weighing 76 grams, includes a scene camera, optics, and reflecting mirror all
mounted on safety glasses. The device’s scene camera records a video of the area in front of the wearer
and uses pupil–corneal reflection to measure the position of the eye – sampled at 25 Hz. With the head
stable, the device is accurate to within 0.5 degrees of visual angle, with a resolution of 0.10 degrees of
visual angle; the visual range of the eye-tracking device is 50 degrees horizontally and 40 degrees
vertically with respect to the head.
To calibrate the eye-tracking device for each participant, participants looked at twelve specific
reference points in their field of view, with marks of their fixation adjusted to correspond to the reference
points. The Mobile Eye software program, after calibration, overlays cross hairs (plus signs) at the exact
locations in a scene where the individual is gazing throughout the scenario.
A researcher then led the HCW to a series of numbered patient rooms, and gave the participant a list
of patients in rooms six through eleven. The simulated patients were located in the first three rooms. For
each patient, a researcher gave the HCW a clipboard with patient specific materials. RNs received an
order sheet, a documentation page and an intravenous medication. ESAs received an ID band and a
documentation page, and the TAs received a blood specimen label and a documentation page.
<<Insert Figure 1 about here>>
Figure 1: ASL Mobile Eye Tracker
All materials were labeled with patient specific information in exactly the same way. Labels were
specifically designed to look realistic, yet allow the eye tracking device to differentiate the specific ID
information at which the HCW was looking. The patient’s name, DOB and MRN were each placed on a
different vertical and/or horizontal axis on the labels.
The patients wore an ID band during scenarios completed by the RNs and TAs. The patients did not
wear an ID band during scenarios completed by the ESAs, as the task involved placing an ID band on the
patient. All patients, including the third patient with the ID error, would state their correct name and DOB
if asked. For the RNs and TAs, the patient’s stated name and DOB matched the name and DOB on the ID
band the patient was wearing but the DOB and MRN on the ID band did not match the labels on the
artifacts they brought into the room. For the ESAs, the patient’s stated name and the name on the ID band
matched, but the stated DOB did not match the DOB on the ID band.
HCWs were asked to not discuss the study with any colleagues over the 4 days the study was
conducted.
2.4. Data Collection
One member of the research team observed the HCW interacting with each patient while completing
a standardized data sheet. The data sheet documented whether the HCW introduced himself or herself;
whether they asked for the patient’s name, or if the patient’s name was “X”; whether they asked for the
patient’s DOB, or if the patient’s DOB was “Y”; and whether they identified the ID error on the third
simulated patient and stopped their assigned task. The research team defined “identifying the patient ID
error” as stopping the assigned task with or without voicing that the patient had a different identification
than the artifact labels or ID band they brought into the room. The observer also recorded additional notes
on the data sheet as necessary. A second observer completed the same data sheet for ten percent of the
HCW to ensure accuracy of data collection. There was 100% agreement between the two independent
observers.
Two researchers independently reviewed all eye-tracker videos to assess whether the HCW looked or
did not look at each of the patient identifiers on the artifact labels and ID bands. The researchers reviewed
the videos in 0.4 second intervals to determine precisely which patient identifiers the participant looked
at. There was 91% agreement between the two independent observers reviewing the eye tracking data,
and a third researcher resolved disagreements between the two researchers. The researchers determined
that a HCW looked at a specific patient identifier if the cross hairs on the video were within a box that
covered the patient identifier information on the calibrated video during a 0.4 second interval.
The researchers used the observational and eye tracking data to determine if a HCW verified the
patient to their ID band and/or verified the artifact to the patient or their ID band. Forty-nine of the 183
patient scenarios (27%) did not have eye tracking data. The reasons for the eye tracking failures included:
no cross hairs on the video image (31/49), glare or poor focus obscuring the ID information (15/49), and
inability to wear the eye tracking device over participants’ glasses (3/49). For the purpose of this study,
only those participants with eye tracking data were included when determining if the RN and ESA
verified the artifact to the patient or their ID band and the TA verified the ID band to the patient.
Using the eye tracker videos, the researchers were able to detail all steps completed by the participant,
in the order of completion. This analysis was important, as the observation sheets included only a few key
steps and did not signify the order in which participants completed the steps. The researchers also
separated the process steps for each participant into three time frames: steps completed before entering
the patient room, steps completed while in the patient room, and steps completed after the participant
caught the error. For this analysis, the research team disregarded the steps after the participant caught the
error, as these steps were only present for the subgroup that caught the error.
3. Results
While the steps completed by ESAs, RNs, and TAs were similar, ESAs completed a one step
identification process (i.e. patient to ID band), while RNs and TAs completed a two step identification
process (i.e. patient to ID band and patient or ID band to artifact). In addition, RNs and TAs used
different artifacts – a medication label or blood label, respectively – while completing their task. For this
reason, the research team analyzed the process of verifying a patient’s identity separately for each roletype, but addressed whether there were consistent findings across the groups.
3.1. The Standard Patient Identification Process
To verify the patient’s identity, participants had to 1) verify the information on the patient’s ID band
and 2) verify an artifact to the patient or patient’s ID band - using two available patient identifiers (i.e.,
name, DOB or MRN). For the purpose of this study, a participant could verify a patient’s name by only
asking for his/her last name, but not by only asking for his/her first name. As the only artifact used by the
ESAs was the patient’s ID band, steps one and two of the verification process were the same for the
ESAs. ESAs could therefore only do this task in one way - asking the patient’s name and DOB and
matching them to the artifact – as patients would not yet know their MRN. RNs and TAs could complete
this task in 8 different ways, shown in <<Insert Table 1 about here>>
Table 1.
<<Insert Table 1 about here>>
Table 1: The Standard Process for Verifying a Patient’s Identity (ID)
We used the standard process outlined in <<Insert Table 1 about here>>
Table 1 and data about whether each participant caught the identification error in the third scenario to
separate participants into four categories. Participants either followed the standard process outlined in
<<Insert Table 1 about here>>
Table 1, or they did not follow the standard process. Additionally, participants either caught the
identification error or did not catch the identification error. These participant subgroups are shown in
Figure 2.
<<Insert Figure 2 about here>>
Figure 2: Participant Subgroups
Expected Success participants completed the process as outlined in <<Insert Table 1 about here>>
Table 1, and caught the identification error. Likewise, Expected Failure participants did not complete
the process as outlined in <<Insert Table 1 about here>>
Table 1, and did not catch the error. Non-Vigilant participants completed the process as outlined in
<<Insert Table 1 about here>>
Table 1, but did not catch the error – presumably because they looked at the correct identifiers and/or
asked the patient for the correct information, but failed to perceive or retain the identification information
adequately. Finally, Process Variant participants did not complete the process as outlined in <<Insert
Table 1 about here>>
Table 1, but caught the error – presumably because they caught the error in an unexpected way.
<<Insert Table 2 about here>>
Table 2 outlines a sample process for one part from each subgroup. In particular, the Process Variant
participant caught the error using an unexpected artifact – the patient’s chart and as shown, the NonVigilant participant completed all expected steps but did not catch the error.
<<Insert Table 2 about here>>
Table 2: Sample Process for Each Subgroup
Each role-type (RN, ESA, TA) varied as to whether participants fell into the four subgroups. As
shown in Figure 3, ESA participants fell into three groups: Expected Success, Non-Vigilant, or Expected
Failure. Thus, some ESAs followed the standard process but failed to catch the error. Furthermore, all
ESAs who did not follow the standard process failed to catch the error. RN participants fell into three
groups: Expected Success, Process Variant, and Expected Failure. Thus, no RNs who followed the
standard process failed to catch the error. Surprisingly, some RNs who did not follow the standard
process did catch the error. Finally, TAs fell into two groups: Expected Successes and Process Variants.
Thus, all TAs caught the identification error.
<<Insert Figure 3 about here>>
Figure 3: Participant Subgroups by Role-Type
3.2. Efficiency, Thoroughness, and the Patient Identification Process
For the purpose of this study, efficiency is defined as the number of steps it took a participant to
complete the process of verifying the patient’s identity – specifically in the third scenario with the
embedded patient identification error. This proxy for efficiency aligns with Hollnagel’s definition of
efficiency, which is a worker’s “ability to achieve the desired outcome with as few resources as possible”,
with the desired outcome in this case being completion of the task given to the participants and the
resource being time.[7] In this study, thoroughness meant the participant completed the task in a way that
led to his/her catching the identification error.
We measured the efficiency of each subgroup in Figures 4-6, using the average number of steps it
took participants to complete the assigned task.
<<Insert Figure 4 about here>>
Figure 4: Average Number of Steps Completed by ESA Participants
<<Insert Figure 5 about here>>
Figure 5: Average Number of Steps Completed by RN Participants
<<Insert Figure 6 about here>>
Figure 6: Average Number of Steps Completed by TA Participants
<<Insert Table 3 about here>>
Table 3 shows the relationships between groups within each role-type. For this exploratory study, we
used a high p-value of 0.1 to test for significant difference for two reasons. First, as participants were
divided into four subgroups within each role-type, all subgroups consisted of sample sizes less than ten
participants. Knowing that further study with a larger sample size is required to confirm the findings
presented here, we are therefore more willing to accept a false positive finding (Type I error) than false
negative finding (Type II error). In other words, we would rather conclude that there is a difference and
explore this issue further, rather than concluding there is no difference and not proceed accordingly.
Across the two role-types, ESAs and RNs, where Expected Success and Expected Failure participants
could be compared, Expected Success participants completed significantly more process steps than
Expected Failure participants. Additionally, across RNs, and TAs, the two role-types where Expected
Success and Process Variant participants could be compared, Expected Success participants completed
significantly more process steps than Process Variant participants. The only Non-Vigilant participants
were ESAs, and there was no statistically significant difference in the number of steps completed by NonVigilant participants and either Expected Success or Expected Failure participants.
<<Insert Table 3 about here>>
Table 3: Subgroup T-tests for Total Number of Steps
Based on the above analysis, the subgroups of health care workers can be plotted according to their
relative levels of thoroughness and efficiency, shown in Figure 7. Expected success and Process Variant
participants are considered more thorough than Non-Vigilant and Expected Failure participants because
they caught the identity error. The Non-Vigilant participants are outlined with a dashed line to indicate
that while the research team suspects the Non-Vigilant participants to fall in the less-efficient, lessthorough quadrant, this study did not provide sufficient evident to suggest where on the efficiency
continuum Non-Vigilant participants fall.
<<Insert Figure 7 about here>>
Figure 7: Subgroup Locations on Efficiency-Thoroughness Plot
In practice, health care workers will likely remain unaware as to whether they miss an identification
error – unless the implications of that error are significant enough to warrant inspection into the cause of
the incident. If health care workers were to have feedback about whether they missed an identification
error, these subgroups may have different feelings about the efficiency-thoroughness trade-off they made.
According to Hollnagel [7], Expected Success participants are likely to feel vindicated - that they wisely
used their efforts. Process variant participants may feel relief that they succeeded while being relatively
efficient. Expected failure participants may regret not having been thorough in carrying out the task.
Finally, Non-Vigilant participants may feel that their efforts were in vain.
4. Discussion
There is a wealth of historical research to help explain why health care workers differ in their
efficiency-thoroughness trade-offs. Klein’s recognition-primed decision-making (RPD) model, stemming
from the field of Naturalistic Decision Making, posits that individuals use their experience to match a
current situation with previous situations, to generate a plausible course of action [46]. Because patient
identification errors are high-risk, low-probability events, health care workers’ experiences in identifying
and mitigating identification errors may be lacking. Some health care workers may rely on a body of
experience void of encounters with identification errors, or they may have missed identification errors in
the past that were never discovered, a fact that suggests efficiency was weighted more heavily than
thoroughness. Likewise, health care workers who have encountered or experienced identification errors
may weigh thoroughness more heavily.
Research on schema or schemata describes the cognitive structures used by individuals to understand
a situation [47, 48]. Schemas are the mental representations used in the RPD model – to which an
individual matches his/her past experiences. In addition to having insufficient experiences to match with
their schema, an individuals’ schema can itself be flawed. Individuals whose schema is simple and
encompasses only the primary task (i.e. giving a medication, putting a wrist band on a patient, drawing
and labeling blood) may weight efficiency over thoroughness. Those whose schema is more complex,
including both the primary task and the secondary task of verifying the patient’s identity, may weigh
thoroughness over efficiency.
The body of research addressing speed-accuracy trade-offs, from physical movements to complex
work, shows that individuals must balance the speed and accuracy of tasks to be successful; otherwise,
individuals complete tasks very quickly but commit a lot of errors, or commit few errors, but complete
tasks very slowly [7, 49]. For a health care worker verifying a patient’s identity, (s)he will be penalized
for being at either extreme of the spectrum. Therefore, the individual must find an appropriate balance
between efficiency and accuracy, a similar concept to thoroughness. Yet, individuals still determine this
balance on their own.
The ETTO principle, which guided this research, provides direction for understanding how a health
care organizations’ focus on provider efficiency may impact health care workers’ perception of time
shortage and health care workers’ resulting efficiency-thoroughness choices. If providers feel short on
time, they are susceptible to several rules of thinking based on the ETTO principle and the
aforementioned bodies of literature. An individual may quickly refer to an insufficient body of past
experiences and decide the situation is “normally OK”, so there is “no need to check” [7]. The worker
may also weigh efficiency over accuracy when short on time by assuming the patient’s identity “will be
checked by someone else” or “has been checked by someone else” [7]. Finally, a worker may use too
simple a schema and incorrectly assess the situation, reasoning that “It looks like Y, so probably is Y” [7].
These insights can aid job design interventions. If catching errors is of paramount importance to
patient safety, organizations must be aware that job design interventions may cause a subgroup of workers
to become less efficient, particularly the expected error subgroup (those who did not complete the
standard process and did not catch the error). For the Non-Vigilant subgroup (those who completed the
standard process but did not catch the error), job design interventions must increase workers’ perception
and information processing capabilities, as opposed to correcting process-related problems. Finally, job
design interventions aimed at the Process Variant subgroup (those who did not complete the standard
process but did catch the error) must be thoughtfully constructed. This group may inform the redesign of
the standard process, as they maintained accuracy while increasing efficiency, compared to the Expected
Success group who conducted standard processes. Yet, this subgroup may also be taking shortcuts, such
as not checking specific identifiers, and thus be considered ‘near misses’ – health care workers at risk to
fall into the Expected Failure group.
In summary, the ETTO principle is a useful mechanism to understand why some health care workers
detect patient identification errors and why others do not. The approach described in this paper can be
extended to empirically test how individuals detect and mediate other types of medical errors. Based on
the findings of this study, and coupled with existing literature, identifying within-group differences
related to individuals’ efficiency levels and ability to detect identification errors will guide more
thoughtful job design interventions.
Acknowledgements
This research was supported in part by the National Science Foundation under awards CCF-0427071,
CCF-0829901, 0552548, and 0313747, and the Summer Scholars Program for the University
Massachusetts Amherst and Baystate Health. The authors acknowledge Elizabeth A. Henneman, Amy
Brady, and Qi Ming Lin for their contributions to the work outlined here.
References
[1]
T. J. K. Drinka, P. G. Clark, Health care teamwork: Interdisciplinary practice and teaching,
Auburn House Paperback, Westport, CT, 2000.
[2]
M. Gaynor, G. F. Anderson, Uncertain demand, the structure of hospital costs, and the cost of
empty hospital beds, Journal of Health Economics. 14 (1995) 291-317.
[3]
P. E. Plsek, T. Greenhalgh, The challenge of complexity in health care, British Medical Journal.
323 (2001) 625-628.
[4]
C. Perrow, Normal accidents : living with high-risk technologies : with a new afterword and a
postscript on the Y2K problem, Princeton University Press, Princeton, N.J., 1999.
[5]
W. Hersh, Health care information technology: progress and barriers, JAMA : the journal of the
American Medical Association. 292 (2004) 2273-4.
[6]
M. E. Frisse, R. L. Holmes, Estimated financial savings associated with health information
exchange and ambulatory care referral, Journal of biomedical informatics. 40 (2007) S27-32.
[7]
E. Hollnagel, The ETTO Principle: Efficiency-Thoroughness Trade-Off, Ashgate, Burlington,
VT, 2009.
[8]
J. M. Hoc, P. C. Cacciabue, E. Hollnagel, Expertise and technology: cognition & humancomputer cooperation, Lawrence Erlbaum, 1995.
[9]
S. Guerlain, R. B. Adams, F. B. Turrentine, T. Shin, H. Guo, S. R. Collins, J. F. Calland,
Assessing team performance in the operating room: development and use of a "black-box"
recorder and other tools for the intraoperative environment, Journal of the American College of
Surgeons. 200 (2005) 29-37.
[10]
E. S. Patterson, E. M. Roth, D. D. Woods, R. Chow, J. O. Gomes, Handoff strategies in settings
with high consequences for failure: lessons for health care operations, International journal for
quality in health care: journal of the International Society for Quality in Health Care / ISQua. 16
(2004) 125-32.
[11]
B. T. Karsh, Beyond usability: designing effective technology implementation systems to
promote patient safety, Quality & safety in health care. 13 (2004) 388-94.
[12]
R. Koppel, T. Wetterneck, J. L. Telles, B.-T. Karsh, Workarounds to barcode medication
administration systems: their occurrences, causes, and threats to patient safety, Journal of the
American Medical Informatics Association : JAMIA. 15 (2008) 408-23.
[13]
L. L. Leape, Reporting of adverse events, The New England journal of medicine. 347 (2002)
1633-8.
[14]
J. DeRosier, E. Stalhandske, J. P. Bagian, T. Nudell, Using health care Failure Mode and Effect
Analysis: the VA National Center for Patient Safety's prospective risk analysis system, The Joint
Commission journal on quality improvement. 28 (2002) 248.
[15]
W. A. Hyman, E. Johnson, Fault Tree Analysis of Clinical Alarms, Journal of Clinical
Engineering. 33 (2008) 85.
[16]
D. H. Stamatis, Failure mode and effect analysis: FMEA from theory to execution, ASQC Quality
Press, Milwaukee, WI, 2003.
[17]
P. Carayon, Handbook of human factors and ergonomics in health care and patient safety,
Hillsdale, NJ: Lawrence Erlbaum Associates, 2006.
[18]
P. Carayon, Human factors of complex sociotechnical systems, Applied ergonomics. 37 (2006)
525-35.
[19]
M. I. Harrison, R. Koppel, S. Bar-Lev, Unintended consequences of information technologies in
health care--an interactive sociotechnical analysis, Journal of the American Medical Informatics
Association : JAMIA. 14 (2007) 542-9.
[20]
H. W. Hendrick, B. M. Kleiner, Macroergonomics: theory, methods, and applications, Human
Factors and Ergonomics Society, Santa Monica, CA, 2002.
[21]
D. D. Woods, E. Hollnagel, N. Leveson, Resilience engineering: concepts and precepts,
Burlington, VT: Ashgate, 2006.
[22]
E. Hollnagel, Barriers and accident prevention, Ashgate, Burlington, VT, 2004.
[23]
P. Aspden, J. Wolcott, J. L. Bootman, L. R. Cronenwett, Preventing Medication Errors: Quality
Chasm Series, The National Academies Press, Washington, DC, 2006.
[24]
L. T. Kohn, J. Corrigan, M. S. Donaldson, To err is human : building a safer health system,
Washington, DC: National Academy Press, 2000.
[25]
L. L. Leape, A systems analysis approach to medical error, J Eval Clin Pract. . 3 (1997) 213-22.
[26]
M. S. Bogner, Human error in medicine, Lawrence Erlbaum Associates, Hillsdale, NJ, 1994.
[27]
T. A. Brennan, L. L. Leape, N. M. Laird, L. Hebert, A. R. Localio, A. G. Lawthers, J. P.
Newhouse, P. C. Weiler, H. H. Hiatt, Incidence of adverse events and negligence in hospitalized
patients. Results of the Harvard Medical Practice Study I, The New England Journal of Medicine.
324 (1991) 370-6.
[28]
The Joint Commission. National Patient Safety Goals 2007. Accessed: July 7, 2009,
http://www.jointcommission.org/PatientSafety/NationalPatientSafetyGoals/07_hap_cah_npsgs.ht
m.
[29]
K. Sazama, Reports of 355 transfusion-associated deaths: 1976 through 1985, Transfusion. 30
(1990) 583-90.
[30]
P. L. Henneman, D. L. Fisher, E. A. Henneman, T. A. Pham, Y. Y. Mei, R. Talati, B. H.
Nathanson, J. Roche, Providers do not verify patient identity during computer order entry,
Academic emergency medicine. 15 (2008) 641-8.
[31]
F. S. J. Blank, P. Henneman, A. M. Maynard, D. Benson, Development and implementation of a
patient safety program in an academic, urban emergency department, Journal of emergency
nursing: JEN : official publication of the Emergency Department Nurses Association. 32 (2006)
491-6.
[32]
J. Fordyce, F. S. Blank, P. Pekow, H. A. Smithline, G. Ritter, S. Gehlbach, E. Benjamin, P. L.
Henneman, Errors in a busy emergency department, Annals of emergency medicine. 42 (2003)
324-33.
[33]
S. W. Renner, P. J. Howanitz, P. Bachner, Wristband identification error reporting in 712
hospitals. A College of American Pathologists' Q-Probes study of quality issues in transfusion
practice, Archives of pathology & laboratory medicine. 117 (1993) 573-7.
[34]
C. J. DeFrances, C. A. Lucas, V. C. Buie, A. Golosinskiy, 2006 National Hospital Discharge
Survey. National health statistics reports; no 5., National Center for Health Statistics, Hyattsville,
MD 2008.
[35]
L. Kanse, T. W. Van der Schaaf, N. D. Vrijland, H. Van Mierlo, Error recovery in a hospital
pharmacy, Ergonomics. 49 (2006) 503-516.
[36]
J. B. Battles, N. M. Dixon, R. J. Borotkanics, B. Rabin-Fastmen, H. S. Kaplan, Sensemaking of
patient safety risks and hazards, Health services research. 41 (2006) 1555.
[37]
Department of Defense, Agency for Healthcare Research and Quality, Trustees of Columbia
University. Patient Safety Analysis Training, New York, 2008. Accessed: August 20, 2009,
http://dkv.columbia.edu/demo/medical_errors_reporting/site/index.html.
[38]
J. P. Bagian, J. Gosbee, C. Z. Lee, L. Williams, S. D. McKnight, D. M. Mannos, The Veterans
Affairs root cause analysis system in action, Joint Commission Journal on Quality Improvement.
28 (2002) 531-545.
[39]
K. G. Shojania, B. W. Duncan, K. M. McDonald, R. M. Wachter, A. J. Markowitz, Making
health care safer: a critical analysis of patient safety practices, Evidence report/technology
assessment. 43 (2001) 290-97.
[40]
G. JR, Mistake-Proofing the Design of Health Care Processes. AHRQ Publication No. 07-0020,
Agency for Healthcare Research and Quality 2007.
[41]
AHRQ, Health Care Efficiency Measures: Identification, Categorization, and Evaluation. AHRQ
Publication No. 08-0030, Agency for Healthcare Research and Quality, Rockville, MD 2008.
[42]
R. W. Hall, Patient flow: reducing delay in healthcare delivery, Springer Verlag, New York,
2006.
[43]
J. S. Ash, M. Berg, E. Coiera, Some unintended consequences of information technology in
health care: the nature of patient care information system-related errors, Journal of the American
Medical Informatics Association. 11 (2004/4//) 104-112.
[44]
K. H. Escoto, M. Hallock, J. Wagner, B.-T. Karsh, Using variance analysis to detect hazards in a
bar-code-assisted medication preparation process, Joint Commission journal on quality and
safety. 30 (2004) 622-8.
[45]
E. N. H. Montague, B. M. Kleiner, W. W. Winchester, Empirically understanding trust in medical
technology, International Journal of Industrial Ergonomics. 39 (2009) 628-634.
[46]
C. E. Zsambok, G. A. Klein, Naturalistic decision making, Lawrence Erlbaum, 1997.
[47]
U. Neisser, Cognition and reality: Principles and implications of cognitive psychology, Freeman
San Francisco, CA, 1976.
[48]
J. Reason, A Preliminary Classification of Mistakes, in: J. Rasmussen, K. Duncan, J. Leplat
(Eds.) New technology and human error, John Wiley & Sons, 1987.
[49]
D. G. MacKay, The problems of flexibility, fluency, and speed-accuracy trade-off in skilled
behavior, Psychological review. 89 (1982) 483-506.
Table 1
Table 1: The Standard Process for Verifying a Patient’s Identity (ID)
1. Verify patient to ID band
a. Ask patient their first and last name.
b. Confirm stated first and last name are an exact match to listed first and last name on ID band.
c. Ask patient their date of birth.
d. Confirm stated date of birth is an exact match to listed date of birth on ID band
2. Verify artifact to the patient
a. Confirm two identifiers from the artifact match the patient or the patient’s ID band
i. Stated name and DOB match artifact
ii. Stated name and listed MRN on artifact match ID band
iii. Stated name and listed DOB on artifact match ID band
iv. Stated DOB and listed MRN on artifact match ID band
v. Stated DOB and listed name on artifact match patient
vi. Listed name and DOB on artifact match ID band
vii. Listed name and MRN on artifact match ID band
viii. Listed DOB and MRN on artifact match ID band
Table 2
Table 1: Sample Process for Each Subgroup
Expected Success (TA 8)
Intended Artifact: Specimen Label
1. Looked at Name on Log Book
Label
2. Check Test on Log Book Label
3. Looked at Name on Log Book
Label
4. Check Test on Log Book Label
5. Looked at Name on Log Book
Label
6. Looked at Age on Specimen Label
7. Looked at Name on Specimen
Label
8. Looked at Age on Specimen Label
9. Entered Room
10. Asked for the patient's name
11. Q & A
12. Looked at Name on Log Book
Label
13. Ask patient to spell last name
14. Ask patient to spell first name
15. Looked at MRN on ID Band
16. Asked patient to state DOB
17. Looked at DOB on ID Band
18. Looked at MRN on ID Band
19. Looked at Name on ID Band
20. Looked at Name on Specimen
Label
21. Asked for the patient's name
22. Ask patient to spell last name
23. Ask patient to spell first name
24. Looked at Name on ID Band
25. Looked at DOB on ID Band
26. Asked patient to state DOB
27. Looked at MRN on ID Band
28. Looked at MRN on Specimen
Label
29. Noticed Error
Process Variant (RN 28)
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
Intended Artifact:
Medication Label
Before Entering Room:
Looked at Name on chart
Entered Room
Looked at DOB on chart
Looked at Age on chart
Asked for the patient's
name
Introduced self
Looked at Age on chart
Looked at DOB on chart
Q&A
Looked at DOB on chart
Asked patient to state
DOB
Looked at MRN on ID
Band
Looked at DOB on ID
Band
Noticed Error (Caught
error by asking for DOB &
looking at DOB on chart,
instead of DOB on
medication label)
Non-Vigilant (ESA 11)
Expected Failure (RN 11)
1. Looked at MRN on
ID band
2. Looked at DOB on
ID band
3. Looked at Age on ID
band
4. Looked at Name on
ID band
5. Entered Room
6. Asked
for
the
patient's name
7. Asked patient to
state DOB
8. Looked at DOB on
ID band
9. Q & A
10. Put ID band on
patient
(completed
process for ESAs, but
did not catch the
error)
11. Filled out and signed
chart
Intended Artifact:
Medication Label
1. Looked at MRN on chart
2. Looked at Name on
Medication Label
3. Entered Room
4. Asked for the patient's
name
5. Looked at Name on ID
Band
6. Q & A
7. Looked at DOB on chart
8. Looked at MRN on chart
9. Looked at Name on chart
10. Filled out and signed
chart
11. Gave
medication
to
patient (did not verify
DOB on patient, ID band,
or medication label)
Table 3
Table 1: Subgroup T-tests for Total Number of Steps
ESAs
RNs
TAs
p-value
T
df
SE
Sig (p<0.1)
ES > EF
0.0623
2.2854
6
2.407
Yes
NV > EF
0.2097
1.4389
5
4.575
No
NV > ES
0.8431
0.2085
5
5.196
No
ES > EF
0.0649
2.0732
10
9.707
Yes
ES > PV
0.0415
2.3074
11
9.246
Yes
EF > PV
0.7813
0.2827
15
4.275
No
ES > PV
0.0344
2.4903
9
5.983
Yes
Figure 1
Click here to download high resolution image
Figure 2
Click here to download high resolution image
Figure 3
Click here to download high resolution image
Figure 4
Click here to download high resolution image
Figure 5
Click here to download high resolution image
Figure 6
Click here to download high resolution image
Figure 7
Click here to download high resolution image