<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="research-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">JMIR Hum Factors</journal-id><journal-id journal-id-type="publisher-id">humanfactors</journal-id><journal-id journal-id-type="index">6</journal-id><journal-title>JMIR Human Factors</journal-title><abbrev-journal-title>JMIR Hum Factors</abbrev-journal-title><issn pub-type="epub">2292-9495</issn><publisher><publisher-name>JMIR Publications</publisher-name><publisher-loc>Toronto, Canada</publisher-loc></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">v13i1e92560</article-id><article-id pub-id-type="doi">10.2196/92560</article-id><article-categories><subj-group subj-group-type="heading"><subject>Original Paper</subject></subj-group></article-categories><title-group><article-title>Health Information Technology&#x2013;Related Loss of Central Surveillance Data in a Heart Intensive Care Unit: Multi-Framework Case Report</article-title></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name name-style="western"><surname>Jabin</surname><given-names>Md Shafiqur Rahman</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1">1</xref><xref ref-type="aff" rid="aff2">2</xref></contrib></contrib-group><aff id="aff1"><institution>Department of Medicine and Optomtery, Linnaeus University</institution><addr-line>Universitetsplatsen 1</addr-line><addr-line>Kalmar</addr-line><country>Sweden</country></aff><aff id="aff2"><institution>Faculty of Health and Social Care, University of Bradford</institution><addr-line>Bradford</addr-line><addr-line>England</addr-line><country>United Kingdom</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Kushniruk</surname><given-names>Andre</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>Recsky</surname><given-names>Chantelle</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Nalesso</surname><given-names>Federico</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Md Shafiqur Rahman Jabin, PhD, Department of Medicine and Optomtery, Linnaeus University, Universitetsplatsen 1, Kalmar, Sweden, 44 07915673612; <email>mdshafiqur.rahmanjabin@lnu.se</email></corresp></author-notes><pub-date pub-type="collection"><year>2026</year></pub-date><pub-date pub-type="epub"><day>9</day><month>4</month><year>2026</year></pub-date><volume>13</volume><elocation-id>e92560</elocation-id><history><date date-type="received"><day>31</day><month>01</month><year>2026</year></date><date date-type="rev-recd"><day>01</day><month>03</month><year>2026</year></date><date date-type="accepted"><day>10</day><month>03</month><year>2026</year></date></history><copyright-statement>&#x00A9; Md Shafiqur Rahman Jabin. Originally published in JMIR Human Factors (<ext-link ext-link-type="uri" xlink:href="https://humanfactors.jmir.org">https://humanfactors.jmir.org</ext-link>), 9.4.2026. </copyright-statement><copyright-year>2026</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Human Factors, is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://humanfactors.jmir.org">https://humanfactors.jmir.org</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://humanfactors.jmir.org/2026/1/e92560"/><abstract><sec><title>Background</title><p>Centralized electronic surveillance systems are widely used in intensive care settings to support continuous physiological monitoring and patient safety. Failures in health information technology (HIT) infrastructure can disrupt workflows, reduce situational awareness, and create latent risks for serious harm. Understanding such events requires analytic approaches that go beyond single-classification frameworks.</p></sec><sec><title>Objective</title><p>This study aimed to classify and analyze an HIT-related incident that involved loss of central surveillance data in a heart intensive care unit using multiple complementary patient safety and human factors frameworks.</p></sec><sec sec-type="methods"><title>Methods</title><p>This study is a qualitative case report analysis of an incident in which a central surveillance system intermittently lost server connectivity, resulting in unavailability and loss of monitoring data. The narrative was derived from an incident report and supporting documentation and was translated and linguistically adapted for publication. The incident was independently classified using 5 frameworks: the International Classification for Patient Safety (ICPS), the Health Information Technology Classification System (HIT-CS), Systems Engineering Initiative for Patient Safety (SEIPS) 2.0, the sociotechnical model by Sittig and Singh, and the Human Factors Analysis and Classification System for health care (HFACS-Healthcare). Findings were synthesized across frameworks.</p></sec><sec sec-type="results"><title>Results</title><p>All 5 frameworks characterized the event as an HIT-driven system failure involving information unavailability, delayed detection, and multi-patient impact. The HIT-CS identified a technical failure in system availability and recovery. The ICPS classified the event as a documentation or information incident with potential for severe harm. The SEIPS 2.0 and sociotechnical models highlighted disruptions to monitoring tasks and the organization's reliance on IT intervention. The HFACS-Healthcare attributed the event primarily to organizational influences and preconditions for unsafe acts, with no frontline unsafe acts identified. Convergence across frameworks emphasized system-level contributors.</p></sec><sec sec-type="conclusions"><title>Conclusions</title><p>HIT-related monitoring failures in high-acuity settings are best understood as sociotechnical system events rather than isolated technical faults or individual errors. A multi-framework approach provided complementary insights into detection, recovery, and governance vulnerabilities, supporting improved learning and resilience in clinical surveillance systems.</p></sec></abstract><kwd-group><kwd>safety incident analysis</kwd><kwd>clinical information systems</kwd><kwd>monitoring system downtime</kwd><kwd>system availability failure</kwd><kwd>technology-induced error</kwd><kwd>incident classification</kwd><kwd>resilience engineering</kwd><kwd>safety-critical systems</kwd><kwd>system recovery processes</kwd><kwd>intensive care informatics</kwd></kwd-group></article-meta></front><body><sec id="s1" sec-type="intro"><title>Introduction</title><p>Health information technology (HIT) is increasingly embedded in high-acuity clinical environments, where system reliability is critical for patient safety. Centralized electronic surveillance systems are widely used in intensive and cardiac care units to support continuous physiological monitoring, early detection of deterioration, and retrospective review of patient data [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. While such systems offer substantial safety benefits, failures in HIT infrastructure can disrupt clinical workflows, obscure patient status, and create latent risks for severe harm [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>]. Therefore, understanding and learning from HIT-related incidents remains a priority for patient safety research [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref6">6</xref>].</p><p>Incident reporting systems capture a wide range of adverse events and near-misses, but single-classification approaches often fail to fully capture the complexity of HIT-related failures [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref7">7</xref>]. To address this limitation, several complementary classification frameworks have been developed, each emphasizing different aspects of safety incidents. The World Health Organization&#x2019;s International Classification for Patient Safety (ICPS) provides a standardized, high-level taxonomy for categorizing incident types, patient outcomes, and contributing factors, supporting comparability across settings and jurisdictions [<xref ref-type="bibr" rid="ref8">8</xref>]. However, the ICPS does not explicitly focus on the mechanisms underlying HIT failures [<xref ref-type="bibr" rid="ref9">9</xref>].</p><p>To more precisely characterize HIT-related safety events, Magrabi, Jabin, and colleagues developed the Health Information Technology Classification System (HIT-CS), which focuses on information flow, technical failure modes, and outcome manifestations specific to HIT [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. The HIT-CS enables detailed identification of where and how HIT failures arise, such as system unavailability, data loss, or delayed detection, and has been widely used in analyses of technology-induced errors [<xref ref-type="bibr" rid="ref12">12</xref>-<xref ref-type="bibr" rid="ref14">14</xref>]. Previous research has highlighted limitations in existing incident reporting structures for HIT-related events and emphasized the need for refined classification systems to support meaningful learning and governance [<xref ref-type="bibr" rid="ref15">15</xref>]. Strengthening classification frameworks is particularly important in high-acuity environments where system-level failures may have multi-patient implications.</p><p>In parallel, human factors and systems engineering frameworks offer additional perspectives on how technology interacts with people, tasks, and organizations. The Systems Engineering Initiative for Patient Safety (SEIPS) 2.0 model conceptualizes patient safety as an emergent property of the work system, encompassing interactions among technology, tasks, people, organizational structures, environments, and processes [<xref ref-type="bibr" rid="ref16">16</xref>]. SEIPS supports the analysis of how HIT failures disrupt clinical work and contribute to unsafe conditions rather than focusing solely on technical faults [<xref ref-type="bibr" rid="ref17">17</xref>].</p><p>Similarly, the sociotechnical model proposed by Sittig and Singh [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>] emphasizes that HIT safety incidents arise from interdependencies among technical infrastructure, clinical content, human-computer interfaces, workflows, organizational policies, external pressures, and system monitoring. This framework is particularly useful for identifying latent conditions and design vulnerabilities that may not be apparent when incidents are examined through a single disciplinary lens [<xref ref-type="bibr" rid="ref20">20</xref>].</p><p>Finally, human factors classification systems such as the Human Factors Analysis and Classification System (HFACS) for health care (HFACS-Healthcare) provide a structured approach to examine human, supervisory, and organizational contributors to safety events [<xref ref-type="bibr" rid="ref21">21</xref>]. HFACS-Healthcare allows differentiation between frontline actions, preconditions for unsafe acts, supervisory factors, and organizational influences and is especially valuable for demonstrating when incidents are driven by system-level factors rather than individual error [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>].</p><p>This case report describes an HIT-related incident involving loss of central patient surveillance data in a heart intensive care unit. To provide a comprehensive and methodologically rigorous analysis, the incident was classified using 5 complementary frameworks: ICPS, HIT-CS, SEIPS 2.0, the Sittig and Singh sociotechnical model, and HFACS-Healthcare. By applying multiple classification systems to a single incident, this study aimed to illustrate how different frameworks contribute distinct and complementary insights into HIT-related patient safety risks and to support more comprehensive learning from HIT failures.</p></sec><sec id="s2" sec-type="methods"><title>Methods</title><sec id="s2-1"><title>Study Design</title><p>This study is a qualitative case report that describes and analyzes an HIT-related patient safety incident that occurred in a heart intensive care unit. A single-incident case design was chosen to enable an in-depth examination of technical, organizational, and human factors contributing to the event. Case reports are well suited for studying rare or complex HIT failures and for generating transferable safety insights when experimental or quantitative approaches are not feasible [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref24">24</xref>].</p></sec><sec id="s2-2"><title>Ethical Considerations</title><p>This study involved secondary analysis of a fully deidentified incident report obtained from a national incident reporting repository. The data contained no patient identifiers or confidential information. Ethical advice was obtained from the Ethical Advisory Board in southeast Sweden (Dnr 934&#x2010;2023). Based on the retrospective analysis of anonymized quality and safety data, formal ethical review and informed consent were not required under applicable regulations (the Swedish Ethical Review Act 2003:460) [<xref ref-type="bibr" rid="ref25">25</xref>].</p></sec><sec id="s2-3"><title>Data Source and Incident Selection</title><p>The incident analyzed in this study was obtained from a national incident reporting repository that captures medical device&#x2013;related and HIT-related events reported by health care professionals and clinical engineering staff. The incident reports in the repository typically include structured fields and free-text narratives describing the incident, the results of any internal investigation, and measures taken in response [<xref ref-type="bibr" rid="ref26">26</xref>-<xref ref-type="bibr" rid="ref28">28</xref>]. A single incident was selected for analysis on the basis of the following criteria:</p><list list-type="bullet"><list-item><p xml:lang="en-gb">involvement of a medical device with embedded software,</p></list-item><list-item><p xml:lang="en-gb">manifestation of the incident during active clinical care,</p></list-item><list-item><p xml:lang="en-gb">relevance to HIT-mediated information loss, and</p></list-item><list-item><p xml:lang="en-gb">availability of sufficient narrative detail to support qualitative analysis.</p></list-item></list><p>The incident report included 3 core narrative components: an incident description, a summary of investigation findings, and a summary of measures. These components formed the primary data for analysis (<xref ref-type="other" rid="box1">Textbox 1</xref>). The incident description was translated and linguistically adapted from the original incident report to improve clarity and readability, without altering the factual content.</p><boxed-text id="box1"><title> Description of a health information technology&#x2013;related incident involving loss of central patient surveillance data in a heart intensive care unit, including incident description, investigation findings, and implemented or proposed safety measures.</title><p><bold>Incident description</bold></p><p>On January 18, 2026, the central surveillance system in a heart intensive care unit lost connection with its server on 2 occasions, around 11 AM and 1 PM. During these periods, real-time patient monitoring data were unavailable and not stored. The issue was not detected immediately and became apparent at 4 PM when staff attempted to review recorded surveillance data. A trained superuser attempted to restart the system using previously distributed instructions, but the restart command did not respond, and the system interface subsequently froze. The IT department was contacted and performed a restart of the main computer.</p><p><bold>Summary of investigation</bold></p><p>The investigation identified a failure in the health information technology infrastructure, specifically the loss of server connectivity affecting the central surveillance system. The incident was compounded by delayed detection, as there were no real-time alerts indicating loss of data capture or system disconnection. Restart procedures that relied on local user action were ineffective, and the system entered an unresponsive state requiring IT intervention. The event highlighted dependencies between clinical monitoring, server availability, and recovery procedures, as well as limitations in system resilience and monitoring transparency.</p><p>In a heart intensive care unit, continuous centralized surveillance supports early detection of life-threatening arrhythmias, hemodynamic instability, and acute clinical deterioration. Therefore, loss of real-time and stored monitoring data creates a risk that critical physiological changes may go unnoticed or recognition may be delayed, particularly in settings where centralized monitoring complements bedside observation. Although no confirmed patient harm was identified in this case, the interruption of surveillance constituted a significant patient safety vulnerability.</p><p><bold>Summary of measures</bold></p><p>Immediate measures included restarting the central surveillance system with assistance from the IT department to restore functionality. Planned and recommended measures focused on improving system reliability and patient safety, including implementation of automated alerts for loss of server connectivity, clarification and testing of restart and recovery procedures, improved collaboration between clinical staff and IT services, and evaluation of redundancy or fail-safe mechanisms to prevent loss of monitoring data during system downtime.</p></boxed-text></sec><sec id="s2-4"><title>Data Preparation and Deidentification</title><p>The original incident report was written in a language other than English and contained informal clinical and technical expressions typical of voluntary incident reporting. The report was translated into English using a direct linguistic translation approach focused on preserving semantic accuracy. No interpretive synthesis or restructuring of factual content was performed. Following translation, minor language editing was undertaken to improve clarity, including grammatical corrections and standardization of terminology, without altering the original meaning or sequence of events. The translated version was reviewed by a clinical engineer experienced in medical device incident management to ensure technical accuracy and contextual fidelity.</p><p>To ensure confidentiality and compliance with ethical and publication standards, all potentially identifying information, including names of individuals, institutions, manufacturers, locations, dates, and device identifiers, was removed prior to analysis. The final narrative was reviewed to confirm that it remained fully deidentified while retaining sufficient detail for analytical purposes [<xref ref-type="bibr" rid="ref29">29</xref>].</p></sec><sec id="s2-5"><title>Analytical Approach</title><p>To provide a comprehensive and systems-oriented analysis, the incident was classified using five complementary patient safety and human factors frameworks: (1) ICPS, (2) HIT-CS, (3) the SEIPS 2.0 model, (4) the sociotechnical model for HIT safety proposed by Sittig and Singh, and (5) HFACS-Healthcare.</p><p>Each framework was applied independently to the same incident narrative to capture different dimensions of the event, including incident type and outcome (ICPS), HIT-specific failure mechanisms (HIT-CS), work system interactions (SEIPS 2.0), sociotechnical dependencies (Sittig and Singh sociotechnical model), and human and organizational contributors (HFACS-Healthcare).</p></sec><sec id="s2-6"><title>International Classification for Patient Safety</title><p>The ICPS was used to classify the incident at a high level, including incident type, detection, patient outcome, and degree of harm. It provides an internationally standardized taxonomy for patient safety incidents and supports comparison across settings and reporting systems [<xref ref-type="bibr" rid="ref8">8</xref>]. The framework was applied descriptively to characterize the incident without attributing causality.</p></sec><sec id="s2-7"><title>Health Information Technology Classification System</title><p>The HIT-CS, developed by Magrabi, Jabin, and colleagues, was used to classify the HIT-specific characteristics of the incident, including the primary issue type, secondary technical issues, outcome manifestation, workflow location, and impact scale [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. The HIT-CS focuses on information flow and technical failure modes and is particularly suited for identifying technology-induced risks and system unavailability events [<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref31">31</xref>].</p></sec><sec id="s2-8"><title>SEIPS 2.0 Work System Analysis</title><p>The SEIPS 2.0 framework was applied to examine how the incident affected and emerged from interactions among technology, tasks, people, organizational structures, environment, and processes [<xref ref-type="bibr" rid="ref16">16</xref>]. This analysis emphasized that the surveillance system failure disrupted continuous monitoring and retrospective data review and that recovery depended on organizational coordination with IT services.</p></sec><sec id="s2-9"><title>Sociotechnical Classification</title><p>The sociotechnical model proposed by Sittig and Singh [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>] was used to analyze interdependencies among technical infrastructure, clinical content, human-computer interfaces, workflows, organizational policies, and system monitoring. This framework was applied to identify latent conditions such as lack of system status visibility and centralized architecture that contributed to delayed detection and multi-patient impact [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref20">20</xref>].</p></sec><sec id="s2-10"><title>HFACS-Healthcare Classification</title><p>HFACS-Healthcare was applied to examine human and organizational contributors to the incident across 4 levels: unsafe acts, preconditions for unsafe acts, unsafe supervision, and organizational influences [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. This framework was used to distinguish between frontline performance and system-level factors and to assess whether human error contributed to the incident. HFACS-Healthcare was applied analytically rather than punitively, consistent with its use in health care safety research [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref33">33</xref>].</p><p><xref ref-type="fig" rid="figure1">Figure 1</xref> illustrates the conceptual relationship among the 5 classification frameworks applied in this study and their complementary roles in characterizing the incident.</p><fig position="float" id="figure1"><label>Figure 1.</label><caption><p>Multi-framework conceptual mapping of the HIT-related incident. HFACS, Human Factors Analysis and Classification System; HIT, health information technology; HIT-CS, Health Information Technology Classification System; ICPS, International Classification for Patient Safety; SEIPS, Systems Engineering Initiative for Patient Safety.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="humanfactors_v13i1e92560_fig01.png"/></fig></sec></sec><sec id="s3" sec-type="results"><title>Results</title><sec id="s3-1"><title>Overview of Incident Classification</title><p>The incident was analyzed using 5 complementary classification frameworks to capture its patient safety, technical, sociotechnical, and human factors dimensions. This section summarizes the classification results according to each framework. Together, these analyses demonstrated that the incident was primarily driven by HIT system failures and latent organizational and design factors rather than by frontline human error.</p><sec id="s3-1-1"><title>ICPS Classification</title><p>Using the ICPS, the incident was primarily classified as a documentation/information incident, with unavailable and lost patient monitoring data as the central safety concern. A secondary classification under medical device/equipment reflected the role of a centralized electronic surveillance system in clinical monitoring. Detection was classified as delayed, as the system failure was identified retrospectively during data review rather than at the time of occurrence. No confirmed patient harm was identified; however, the incident was classified as having potential for severe harm due to the risk of missed or delayed recognition of life-threatening cardiac events. <xref ref-type="table" rid="table1">Table 1</xref> presents the detailed ICPS classification, including incident type, detection, degree of harm, and contributing factors.</p><table-wrap id="t1" position="float"><label>Table 1.</label><caption><p>Classification of the incident according to the International Classification for Patient Safety (ICPS).</p></caption><table id="table1" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">ICPS domain and classification</td><td align="left" valign="bottom">Description applied to this incident</td></tr></thead><tbody><tr><td align="left" valign="top">Incident type (primary)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Documentation/information</td><td align="left" valign="top">Unavailable and lost patient monitoring data due to a loss of connection between the central surveillance system and the server</td></tr><tr><td align="left" valign="top">Incident type (secondary)</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Medical device/equipment (health information technology)</td><td align="left" valign="top">Failure of a central electronic surveillance system supporting physiological monitoring</td></tr><tr><td align="left" valign="top">Patient outcome</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>No harm (outcome unknown)</td><td align="left" valign="top">No confirmed patient injury was identified; patient impact could not be fully assessed due to missing data.</td></tr><tr><td align="left" valign="top">Degree of harm</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>No harm/potential harm</td><td align="left" valign="top">Potential for severe harm due to the risk of missed or delayed detection of life-threatening cardiac events</td></tr><tr><td align="left" valign="top">Detection</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Delayed detection</td><td align="left" valign="top">The incident was identified retrospectively when staff attempted to review stored monitoring data.</td></tr><tr><td align="left" valign="top">Contributing factors/hazards</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Organizational/system factors</td><td align="left" valign="top">Lack of automated alerts for system disconnection; reliance on a centralized monitoring infrastructure</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Technical factors</td><td align="left" valign="top">Server connectivity failure; ineffective restart function; system freeze requiring IT intervention</td></tr><tr><td align="left" valign="top">Mitigating factors</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Human factors</td><td align="left" valign="top">Presence of a trained superuser who attempted recovery procedures</td></tr><tr><td align="left" valign="top">Ameliorating actions</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>System-level response</td><td align="left" valign="top">Restart of the main system by the IT department and review of system recovery procedures</td></tr></tbody></table></table-wrap><p>No confirmed patient harm was identified; however, the incident was classified as having potential for severe harm due to the risk of missed or delayed recognition of life-threatening cardiac events. In high-acuity cardiac care, even short periods of absent surveillance may increase the risk of undetected arrhythmias or delayed response to clinical deterioration.</p></sec><sec id="s3-1-2"><title>HIT-CS Classification</title><p>Using the HIT-CS, the incident was classified as a technical HIT failure that affected system availability and connectivity. The primary issue type was classified as a software/hardware (technical) failure, specifically loss of system availability due to server disconnection. A secondary technical issue involved a system recovery failure: user-initiated restart commands did not function, and the system became unresponsive. The outcome manifestation was classified as information unavailable/data loss, reflecting both an interruption of real-time monitoring and a permanent loss of stored surveillance data.</p><p>The HIT-CS analysis also highlighted the workflow location of the failure within continuous physiological surveillance and retrospective data review, as well as a multi-patient scale characteristic, given that the central surveillance system supported simultaneous monitoring of multiple patients. Similar multi-patient propagation patterns following HIT failures have been reported in Swedish incident analyses, where system-level disruptions affected care management across multiple patients simultaneously [<xref ref-type="bibr" rid="ref30">30</xref>]. <xref ref-type="table" rid="table2">Table 2</xref> summarizes the HIT-CS classification dimensions and their application to the incident.</p><table-wrap id="t2" position="float"><label>Table 2.</label><caption><p>Classification of the incident using the Health Information Technology Classification System (HIT-CS) framework.</p></caption><table id="table2" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">HIT-CS dimension</td><td align="left" valign="bottom">HIT-CS category</td><td align="left" valign="bottom">Specific subtype (per HIT-CS)</td><td align="left" valign="bottom">How it applies to this incident</td></tr></thead><tbody><tr><td align="left" valign="top">Primary issue type</td><td align="left" valign="top">Software/hardware (technical)</td><td align="left" valign="top">System availability/connectivity failure</td><td align="left" valign="top">Loss of connection between the central surveillance system and the server caused intermittent unavailability of real-time and stored patient monitoring data.</td></tr><tr><td align="left" valign="top">Secondary technical issue</td><td align="left" valign="top">Software/hardware (technical)</td><td align="left" valign="top">System recovery/restart failure</td><td align="left" valign="top">Restart commands initiated via the system interface did not execute, and the system entered an unresponsive (frozen) state requiring IT intervention.</td></tr><tr><td align="left" valign="top">Outcome manifestation</td><td align="left" valign="top">Information (machine/output)</td><td align="left" valign="top">Information unavailable/data loss</td><td align="left" valign="top">Patient monitoring data were not displayed in real time or stored, resulting in permanent gaps in surveillance records.</td></tr><tr><td align="left" valign="top">Optional contributing factor</td><td align="left" valign="top">Information (use/human)</td><td align="left" valign="top">Delayed detection/delayed monitoring</td><td align="left" valign="top">The system failure was not immediately apparent and was detected retrospectively when staff attempted to review recorded data several hours later.</td></tr><tr><td align="left" valign="top">Workflow location (contextual)</td><td align="left" valign="top">HIT-mediated<sup><xref ref-type="table-fn" rid="table2fn1">a</xref></sup> clinical monitoring workflow</td><td align="left" valign="top">Continuous physiological surveillance/data review</td><td align="left" valign="top">The failure occurred at the stage where the central surveillance system transmits, displays, and archives physiological data.</td></tr><tr><td align="left" valign="top">Scale characteristic</td><td align="left" valign="top">HIT system behavior</td><td align="left" valign="top">Multi-patient impact</td><td align="left" valign="top">The central surveillance system supports the simultaneous monitoring of multiple patients; therefore, the loss of functionality affected all monitored patients during downtime.</td></tr></tbody></table><table-wrap-foot><fn id="table2fn1"><p><sup>a</sup>HIT: health information technology.</p></fn></table-wrap-foot></table-wrap></sec><sec id="s3-1-3"><title>SEIPS 2.0 Classification</title><p>Using the SEIPS 2.0 framework, the incident was characterized as a disruption of the clinical work system arising from interactions among technology, tasks, people, organization, environment, and processes. The technology domain captured the central surveillance system&#x2019;s loss of reliability. The task analysis showed that neither continuous monitoring nor retrospective data review could be performed as intended. The people domain indicated appropriate user actions, with staff following established restart instructions without success.</p><p>At the organizational level, system recovery depended on escalation to IT services, highlighting the reliance on centralized technical support. The environment domain reflected dependency on a single central surveillance workspace, while the processes domain identified delayed incident detection and reactive response as key characteristics. The outcome domain captured the potential for patient harm due to unavailable monitoring data. The SEIPS 2.0 classification is presented in <xref ref-type="table" rid="table3">Table 3</xref>.</p><table-wrap id="t3" position="float"><label>Table 3.</label><caption><p>Classification of the incident according to Systems Engineering Initiative for Patient Safety (SEIPS) 2.0.</p></caption><table id="table3" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">SEIPS 2.0 domain</td><td align="left" valign="bottom">Classification</td><td align="left" valign="bottom">How it applies to this incident</td></tr></thead><tbody><tr><td align="left" valign="top">Technology and tools</td><td align="left" valign="top">Central surveillance system reliability</td><td align="left" valign="top">Loss of server connectivity and failure of system restart functionality rendered the monitoring system unavailable.</td></tr><tr><td align="left" valign="top">Tasks</td><td align="left" valign="top">Continuous physiological monitoring and data review</td><td align="left" valign="top">Real-time surveillance and retrospective review of patient monitoring data could not be performed as intended.</td></tr><tr><td align="left" valign="top">People</td><td align="left" valign="top">Clinical staff and superusers</td><td align="left" valign="top">Staff appropriately followed established restart instructions but were unable to recover system functionality.</td></tr><tr><td align="left" valign="top">Organization</td><td align="left" valign="top">IT support and escalation pathways</td><td align="left" valign="top">Resolution depended on the IT department&#x2019;s intervention, highlighting the reliance on centralized technical support.</td></tr><tr><td align="left" valign="top">Environment</td><td align="left" valign="top">Central surveillance workspace</td><td align="left" valign="top">The monitoring environment depended on a single central system, amplifying the impact of system failure.</td></tr><tr><td align="left" valign="top">Processes</td><td align="left" valign="top">Incident detection and response</td><td align="left" valign="top">The lack of automated alerts led to delayed detection and a reactive response after a retrospective data review.</td></tr><tr><td align="left" valign="top">Outcomes</td><td align="left" valign="top">Potential patient harm</td><td align="left" valign="top">Risk of missed or delayed detection of life-threatening cardiac events due to unavailable monitoring data</td></tr></tbody></table></table-wrap></sec><sec id="s3-1-4"><title>Sociotechnical Classification (Sittig and Singh Model)</title><p>The sociotechnical analysis identified multiple interacting system components contributing to the incident. Hardware and software infrastructure failures resulted in system unavailability and data loss, while deficiencies in the human-computer interface limited users&#x2019; ability to understand the system state or recover functionality. The workflow and communication dimensions revealed delayed awareness and escalation due to the absence of system status alerts.</p><p>At the organizational level, recovery procedures depended on IT intervention, and the system lacked redundancy or fail-safe mechanisms to maintain monitoring during outages. The system measurement and monitoring dimension highlighted the absence of automated alerts for loss of connectivity or for data capture failures. These interacting sociotechnical factors created latent conditions that amplified the impact of the technical failure and increased patient safety risk. <xref ref-type="table" rid="table4">Table 4</xref> presents a comprehensive sociotechnical classification of the incident.</p><table-wrap id="t4" position="float"><label>Table 4.</label><caption><p>Sociotechnical classification of the incident (Sittig and Singh model).</p></caption><table id="table4" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Sociotechnical dimension</td><td align="left" valign="bottom">Classification</td><td align="left" valign="bottom">How it applies to this incident</td></tr></thead><tbody><tr><td align="left" valign="top">Hardware and software computing infrastructure</td><td align="left" valign="top">System connectivity and availability failure</td><td align="left" valign="top">Loss of connection between the central surveillance system and the server caused intermittent system unavailability and data loss.</td></tr><tr><td align="left" valign="top">Clinical content</td><td align="left" valign="top">Availability and completeness of monitoring data</td><td align="left" valign="top">Physiological monitoring data were unavailable in real time and not stored, resulting in gaps in clinical information.</td></tr><tr><td align="left" valign="top">Human-computer interface</td><td align="left" valign="top">Lack of system feedback and controllability</td><td align="left" valign="top">Restart commands produced no visible response, and the system interface became unresponsive, preventing user-led recovery.</td></tr><tr><td align="left" valign="top">People</td><td align="left" valign="top">Roles, training, and system use</td><td align="left" valign="top">A trained superuser followed established restart instructions appropriately but was unable to restore functionality.</td></tr><tr><td align="left" valign="top">Workflow and communication</td><td align="left" valign="top">Monitoring, review, and escalation processes</td><td align="left" valign="top">The absence of real-time alerts delayed detection; escalation occurred only after a retrospective review of missing data.</td></tr><tr><td align="left" valign="top">Internal organizational policies and procedures</td><td align="left" valign="top">System recovery and downtime procedures</td><td align="left" valign="top">Recovery depended on contacting IT services, indicating limited local recovery capability and unclear resilience to downtime.</td></tr><tr><td align="left" valign="top">External rules, regulations, and pressures</td><td align="left" valign="top">Patient safety and monitoring requirements</td><td align="left" valign="top">Continuous cardiac monitoring is a regulatory and clinical safety expectation; system failure undermined this requirement.</td></tr><tr><td align="left" valign="top">System measurement and monitoring</td><td align="left" valign="top">System health visibility and alerting</td><td align="left" valign="top">No automated alerts indicated loss of server connectivity or data capture failure, contributing to delayed detection.</td></tr><tr><td align="left" valign="top">System configuration and upgrades</td><td align="left" valign="top">Configuration resilience</td><td align="left" valign="top">Centralized system architecture lacked redundancy or fail-safe mechanisms to maintain monitoring during server outages.</td></tr><tr><td align="left" valign="top">Outcomes and consequences</td><td align="left" valign="top">Potential patient harm</td><td align="left" valign="top">Risk of missed or delayed detection of life-threatening cardiac events affecting multiple patients simultaneously.</td></tr></tbody></table></table-wrap></sec><sec id="s3-1-5"><title>HFACS-Healthcare Classification</title><p>The HFACS-Healthcare analysis demonstrated that the incident was not associated with unsafe acts by frontline staff. At the level of preconditions for unsafe acts, technological environment factors such as poor system feedback and centralized system dependency reduced situational awareness and limited recovery options. At the unsafe supervision level, reliance on manual detection and the absence of real-time system oversight contributed to the delayed recognition of the failure.</p><p>At the organizational level, resource management and system design decisions, including limited redundancy and reliance on centralized IT support for recovery, were identified as key contributors. Overall, the HFACS-Healthcare analysis indicated that the incident arose primarily from latent system and organizational factors rather than from individual human error. The HFACS-Healthcare classification is summarized in <xref ref-type="table" rid="table5">Table 5</xref>.</p><table-wrap id="t5" position="float"><label>Table 5.</label><caption><p>Classification of the incident according to the Human Factors Analysis and Classification System (HFACS)-Healthcare.</p></caption><table id="table5" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">HFACS-Healthcare level and category</td><td align="left" valign="bottom">Classification</td><td align="left" valign="bottom">How it applies to this incident</td></tr></thead><tbody><tr><td align="left" valign="top">Level 1: unsafe acts</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Errors</td><td align="left" valign="top">No unsafe acts identified</td><td align="left" valign="top">Clinical staff and the superuser acted appropriately and followed established restart procedures; no misuse or deviation was identified.</td></tr><tr><td align="left" valign="top">Level 2: preconditions for unsafe acts</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Technological environment</td><td align="left" valign="top">Poor system feedback and controllability</td><td align="left" valign="top">The surveillance system provided no feedback when restart commands were issued and became unresponsive, limiting users&#x2019; ability to understand or manage the system state.</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Physical/technological environment</td><td align="left" valign="top">Centralized system dependency</td><td align="left" valign="top">A single central surveillance system supported multiple patients, thereby increasing the impact when it failed.</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Cognitive factors</td><td align="left" valign="top">Reduced situational awareness</td><td align="left" valign="top">Staff were unaware of the system failure until retrospective review, indicating diminished awareness of system status rather than clinical oversight.</td></tr><tr><td align="left" valign="top">Level 3: unsafe supervision</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Inadequate supervision</td><td align="left" valign="top">Insufficient monitoring of system health</td><td align="left" valign="top">There was no active oversight mechanism or real-time alerting to detect loss of server connectivity or data capture.</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Planned inappropriate operations</td><td align="left" valign="top">Reliance on manual detection</td><td align="left" valign="top">Continued operation without automated system status alerts assumed that failures would be noticed through routine use.</td></tr><tr><td align="left" valign="top">Level 4: organizational influences</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Resource management</td><td align="left" valign="top">Limited redundancy and resilience</td><td align="left" valign="top">The surveillance architecture lacked redundancy or fail-safe mechanisms to maintain monitoring during server outages.</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Organizational climate</td><td align="left" valign="top">Separation between the clinical and IT domains</td><td align="left" valign="top">Recovery depended on IT intervention, reflecting organizational boundaries that limited frontline recovery capacity.</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Organizational processes</td><td align="left" valign="top">Downtime and recovery procedures</td><td align="left" valign="top">Restart instructions existed but were insufficient for nonresponsive system states, requiring escalation beyond clinical control.</td></tr></tbody></table></table-wrap></sec></sec><sec id="s3-2"><title>Cross-Framework Synthesis</title><p>Across all 5 classification frameworks, the incident was consistently characterized as an HIT-driven system failure with delayed detection, multi-patient impact, and potential for severe harm. While each framework emphasized different aspects of the incident, all converged on the absence of frontline human error and the presence of latent technical, organizational, and design vulnerabilities. The combined use of the ICPS, HIT-CS, SEIPS 2.0, sociotechnical, and HFACS-Healthcare frameworks provided a comprehensive and complementary understanding of the incident and its patient safety implications. To facilitate comparison across frameworks and to synthesize key findings, <xref ref-type="table" rid="table6">Table 6</xref> presents an alignment of major incident characteristics as identified by the ICPS, HIT-CS, SEIPS 2.0, Sittig and Singh sociotechnical model, and HFACS-Healthcare. Despite differences in terminology and analytical focus, the frameworks showed strong convergence in identifying the incident as a technology-driven failure with delayed detection, multi-patient impact, and predominant system-level and organizational contributors rather than frontline human error.</p><table-wrap id="t6" position="float"><label>Table 6.</label><caption><p>Cross-framework alignment of key findings from the classification of a health information technology&#x2013;related incident using the ICPS<sup><xref ref-type="table-fn" rid="table6fn1">a</xref></sup>, HIT-CS<sup><xref ref-type="table-fn" rid="table6fn2">b</xref></sup>, SEIPS 2.0<sup><xref ref-type="table-fn" rid="table6fn3">c</xref></sup>, Sittig and Singh sociotechnical model, and HFACS<sup><xref ref-type="table-fn" rid="table6fn4">d</xref></sup>-Healthcare, highlighting convergent and complementary perspectives on incident nature, detection, human contribution, organizational factors, and impact.</p></caption><table id="table6" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Analytic theme</td><td align="left" valign="bottom">ICPS</td><td align="left" valign="bottom">HIT-CS</td><td align="left" valign="bottom">SEIPS 2.0</td><td align="left" valign="bottom">Sociotechnical (Sittig and Singh) model</td><td align="left" valign="bottom">HFACS-Healthcare</td></tr></thead><tbody><tr><td align="left" valign="top">Primary incident nature</td><td align="left" valign="top">Documentation/information</td><td align="left" valign="top">System availability failure</td><td align="left" valign="top">Technology domain</td><td align="left" valign="top">Infrastructure failure</td><td align="left" valign="top">Preconditions (technological environment)</td></tr><tr><td align="left" valign="top">Detection</td><td align="left" valign="top">Delayed detection</td><td align="left" valign="top">Delayed detection</td><td align="left" valign="top">Process failure</td><td align="left" valign="top">Lack of system monitoring</td><td align="left" valign="top">Unsafe supervision</td></tr><tr><td align="left" valign="top">Human contribution</td><td align="left" valign="top">Not specified</td><td align="left" valign="top">Appropriate use</td><td align="left" valign="top">People domain</td><td align="left" valign="top">Human-computer interface</td><td align="left" valign="top">No unsafe acts</td></tr><tr><td align="left" valign="top">Organizational factors</td><td align="left" valign="top">Contributing factors</td><td align="left" valign="top">Workflow location</td><td align="left" valign="top">Organization</td><td align="left" valign="top">Policies and procedures</td><td align="left" valign="top">Organizational influences</td></tr><tr><td align="left" valign="top">Scale of impact</td><td align="left" valign="top">Potential severe harm</td><td align="left" valign="top">Multi-patient impact</td><td align="left" valign="top">Outcome</td><td align="left" valign="top">Centralized architecture</td><td align="left" valign="top">Resource management</td></tr><tr><td align="left" valign="top">Recovery</td><td align="left" valign="top">Mitigation actions</td><td align="left" valign="top">Recovery failure</td><td align="left" valign="top">Processes</td><td align="left" valign="top">IT dependency</td><td align="left" valign="top">Supervisory dependence</td></tr></tbody></table><table-wrap-foot><fn id="table6fn1"><p><sup>a</sup>ICPS: International Classification for Patient Safety.</p></fn><fn id="table6fn2"><p><sup>b</sup>HIT-CS: Health Information Technology Classification System.</p></fn><fn id="table6fn3"><p><sup>c</sup>SEIPS: Systems Engineering Initiative for Patient Safety.</p></fn><fn id="table6fn4"><p><sup>d</sup>HFACS: Human Factors Analysis and Classification System.</p></fn></table-wrap-foot></table-wrap></sec></sec><sec id="s4" sec-type="discussion"><title>Discussion</title><sec id="s4-1"><title>Principal Findings</title><p>This case report demonstrates that an HIT failure in a high-acuity clinical setting can pose a substantial patient safety risk despite appropriate frontline actions. Across all 5 applied classification frameworks&#x2014;that is, ICPS, HIT-CS, SEIPS 2.0, the Sittig and Singh sociotechnical model, and HFACS-Healthcare&#x2014;the incident was consistently characterized as a system-driven failure involving loss of monitoring information, delayed detection, and multi-patient impact. The absence of frontline human error identified across frameworks aligns with prior research showing that many HIT-related safety events arise from latent system conditions rather than individual mistakes [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref19">19</xref>].</p><p>Importantly, the incident should not be interpreted as a benign technical malfunction. In high-acuity cardiac settings, centralized surveillance serves as a safety layer to detect arrhythmias and sudden physiological deterioration. Interruption of this layer introduces a window of vulnerability during which time-critical events may be missed or responses delayed, underscoring the clinical seriousness of HIT availability failures. Incident report analyses have demonstrated that software-related challenges frequently reflect latent system conditions rather than isolated user errors, reinforcing the importance of sociotechnical interpretation of HIT failures [<xref ref-type="bibr" rid="ref34">34</xref>].</p><p>The alignment of findings across frameworks (<xref ref-type="table" rid="table6">Table 6</xref>) illustrates how different taxonomies emphasize complementary dimensions of the same event. The ICPS provided a standardized patient safety classification [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref8">8</xref>], the HIT-CS enabled precise characterization of HIT-specific failure mechanisms [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref10">10</xref>], and the SEIPS, sociotechnical, and HFACS-Healthcare frameworks highlighted how interactions among technology, workflows, supervision, and organizational context shaped the emergence and impact of incidents [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref19">19</xref>].</p></sec><sec id="s4-2"><title>Methodological Contribution</title><p>This study contributes methodologically by demonstrating the value of multi-framework incident classification. Prior work has noted that reliance on a single taxonomy may obscure important aspects of HIT-related risk [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. In this case, the HIT-CS clarified technical failure modes; the SEIPS and sociotechnical models contextualized the disruption to clinical work; and the HFACS-Healthcare provided a structured explanation of how organizational and supervisory factors contributed to the disruption, without attributing blame to frontline staff [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>].</p><p>The integrative alignment table (<xref ref-type="table" rid="table6">Table 6</xref>) supports synthesis across frameworks and reduces interpretive fragmentation. Similar alignment approaches have been recommended to strengthen learning from complex safety events and to improve translation of analytic findings into practice [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref24">24</xref>].</p></sec><sec id="s4-3"><title>Technological Failures as System-Level Safety Events</title><p>Failure of centralized HIT should be interpreted through the lens of systemic safety governance, rather than isolated technical faults. Complex care, such as extracorporeal treatments, requires structured communication, protocols, and organizational support to mitigate clinical risk. Nalesso et al [<xref ref-type="bibr" rid="ref35">35</xref>] emphasize the importance of proactive and reactive safety management in critical care settings, including multidisciplinary risk assessment, procedural checklists, and safety culture tools to reduce clinical incidents in high-risk technologies.</p><p>High-risk technologies in critical care demand governance approaches that extend beyond device functionality to include organizational coordination, communication, and monitoring infrastructure. In complex therapies such as extracorporeal blood purification, safety governance includes structured protocols, feedback loops, and systematic risk analysis to prevent latent failures that could lead to patient harm [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. Digital incident reporting systems themselves require quality governance to ensure meaningful learning from HIT failures. Prior work has demonstrated variability in documentation quality and analytic depth within digital reporting systems, underscoring the need for structured governance frameworks [<xref ref-type="bibr" rid="ref28">28</xref>].</p></sec><sec id="s4-4"><title>Remote Monitoring and Alerting: Benefits and Limitations</title><p>Remote monitoring and device control can improve patient care and staff safety, but such systems must be interpreted in context with cognitive load and alert management. Garzotto et al [<xref ref-type="bibr" rid="ref36">36</xref>] describe how remote control of medical devices reduced risk and unnecessary interventions in the intensive care unit during the COVID-19 pandemic, highlighting operational benefits and the potential for remote surveillance to support safety in critical settings [<xref ref-type="bibr" rid="ref37">37</xref>].</p><p>Remote monitoring and control of medical devices can reduce direct exposure risks and streamline clinical workflows, particularly during infectious outbreaks. Garzotto et al [<xref ref-type="bibr" rid="ref36">36</xref>] reported that remote device control decreased unnecessary interventions and supported patient safety in intensive care environments [<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. However, as with all automated systems, trade-offs such as increased alert burden and clinician cognitive load must be considered to ensure that alerting improves situational awareness without inducing fatigue [<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>].</p></sec><sec id="s4-5"><title>Telemedicine and Remote Surveillance Concepts</title><p>Although not specific to intensive care unit central surveillance, telemedicine and remote monitoring paradigms offer conceptual bridges for understanding distributed monitoring and alerting across care settings. Ricci and Ronco [<xref ref-type="bibr" rid="ref39">39</xref>] describe telemedicine support for peritoneal dialysis, illustrating how continuous remote surveillance of treatment data provides clinical oversight and improves outcomes in chronic care. These principles parallel the reliability of centralized surveillance; both involve automated data capture, transmission, and interpretation to support timely clinical decisions [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref41">41</xref>].</p><p>Concepts from telemedicine and continuous remote monitoring provide relevant frameworks for ensuring the reliability of centralized surveillance. Remote monitoring of chronic therapies such as peritoneal dialysis involves continuous data transmission and clinician oversight, improving the detection of therapy deviations and enabling timely intervention [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref>].</p></sec><sec id="s4-6"><title>IT and Safety in Critical Care Therapies</title><p>Early literature emphasizes that IT in critical care therapies (such as continuous renal replacement therapy) impacts patient safety, monitoring, and documentation. Ricci and Ronco [<xref ref-type="bibr" rid="ref39">39</xref>] underscored that IT contributes to practice variation, patient assessment, monitoring, and documentation in critical care, highlighting the potential for technology to influence safety outcomes when integrated with governance and quality systems [<xref ref-type="bibr" rid="ref4">4</xref>].</p><p>IT implementation in critical care therapies can enhance patient assessment, documentation, and therapeutic monitoring, but it also introduces new failure modes that must be governed within broader safety and quality infrastructures [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref39">39</xref>].</p></sec><sec id="s4-7"><title>Implications for Clinical Practice</title><sec id="s4-7-1"><title>Early Detection of HIT Failures</title><p>Delayed detection emerged as a dominant theme across all classification approaches. Similar delays in recognizing HIT failures have been described in prior studies, particularly in settings that rely on retrospective review rather than real-time system monitoring [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. These findings underscore the importance of implementing automated system status alerts and monitoring dashboards to support timely detection of connectivity loss, data capture failure, or system degradation [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref26">26</xref>].</p><p>From a practical perspective, health care organizations should consider the following:</p><list list-type="bullet"><list-item><p>Deployment of automated system status alerts distinct from physiological alarms</p></list-item><list-item><p>Real-time monitoring dashboards accessible to both clinical units and IT services</p></list-item><list-item><p>Clear escalation pathways triggered by connectivity or data integrity failures</p></list-item></list><p>However, implementation of automated alerts must be carefully designed to avoid unintended consequences such as alert fatigue and increased cognitive load among clinical staff. Excessive or nonspecific alerts may desensitize users and reduce responsiveness, particularly in intensive care environments already characterized by high alarm burden [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. Therefore, system status alerts for surveillance failures should be prioritized, clearly distinguishable from routine physiological alarms, and integrated into existing workflows to balance early detection with usability and clinician attention.</p></sec><sec id="s4-7-2"><title>Managing Operational Vulnerabilities in HIT Environments</title><p>Similar operational disruptions following software modifications, including security patching, have been documented in health care settings, illustrating how even routine IT maintenance may introduce unintended workflow vulnerabilities [<xref ref-type="bibr" rid="ref27">27</xref>]. This reinforces the need for structured change management processes and proactive risk assessment before implementing system updates in high-acuity environments.</p><p>Evidence from quality improvement interventions in radiology demonstrates that structured system redesign and multidisciplinary engagement are more effective than isolated procedural adjustments, further supporting system-level corrective strategies for HIT-related failures [<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref44">44</xref>]. Accordingly, mitigation efforts should emphasize the following:</p><list list-type="bullet"><list-item><p xml:lang="en-gb">Multidisciplinary planning for HIT upgrades and maintenance</p></list-item><list-item><p xml:lang="en-gb">Prospective hazard analysis before system changes</p></list-item><list-item><p xml:lang="en-gb">Integration of IT governance with clinical safety leadership</p></list-item></list></sec><sec id="s4-7-3"><title>Recovery Capacity and Local Resilience</title><p>The case also highlights limitations in frontline recovery capacity. Despite appropriate use by trained superusers, recovery required IT intervention, reflecting a lack of graduated recovery mechanisms at the clinical unit level. Human factors research emphasizes that resilient systems should support adaptation and recovery close to the point of failure, rather than relying solely on centralized escalation [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>].</p><p>Designing HIT systems that provide meaningful feedback during recovery attempts and clearly guide escalation pathways may reduce downtime and associated patient risk. Practical measures may include the following:</p><list list-type="bullet"><list-item><p>Transparent system status indicators during restart attempts</p></list-item><list-item><p>Tiered recovery protocols with defined thresholds for escalation</p></list-item><list-item><p>Simulation-based training for downtime scenarios</p></list-item></list></sec><sec id="s4-7-4"><title>Governance, Redundancy, and Architectural Risk</title><p>From an organizational perspective, the incident illustrates the safety implications of centralized HIT architectures without redundancy. Central surveillance systems offer efficiency but can amplify harm when failures occur, a phenomenon previously described in analyses of large-scale HIT incidents [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. Explicit assessment of single points of failure and investment in redundancy or fail-safe monitoring strategies are therefore critical in intensive care environments.</p><p>Broader analyses of digital technology implementation during crisis conditions have demonstrated that technological reliability, equity, and organizational readiness are critical determinants of safe digital transformation in health care systems [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref46">46</xref>]. These findings support the need for the following:</p><list list-type="bullet"><list-item><p xml:lang="en-gb">System-level governance structures overseeing HIT safety</p></list-item><list-item><p xml:lang="en-gb">Regular auditing of architectural vulnerabilities</p></list-item><list-item><p xml:lang="en-gb">Investment in redundancy for high-acuity monitoring systems</p></list-item><list-item><p xml:lang="en-gb">Integration of clinical, technical, and leadership oversight</p></list-item></list></sec><sec id="s4-7-5"><title>Translation of Multi-Framework Findings Into Action</title><p>Building on the findings from the multi-framework analysis and the implications outlined above, a set of corrective and preventive strategies were devised to mitigate the risk of similar HIT-related surveillance failures in high-acuity care settings (see <xref ref-type="other" rid="box2">Textbox 2</xref>). These strategies were developed by synthesizing insights from the ICPS, HIT-CS, SEIPS 2.0, the sociotechnical model of Sittig and Singh, and HFACS-Healthcare, with an emphasis on system-level resilience, early detection, recovery capacity, and organizational coordination rather than on individual performance.</p><boxed-text id="box2"><title> Preventive and corrective strategies to mitigate health information technology&#x2013;related central surveillance failures.</title><p><bold>System reliability and infrastructure resilience</bold></p><list list-type="bullet"><list-item><p>Establish redundancy for central surveillance systems, including failover servers or mirrored systems, to reduce the impact of single points of failure in high-acuity settings.</p></list-item><list-item><p>Implement automatic buffering or local storage of monitoring data to prevent data loss during temporary server connectivity disruptions.</p></list-item><list-item><p>Ensure routine stress testing and resilience testing of surveillance systems under peak load and failure scenarios.</p></list-item></list><p><bold>System monitoring, detection, and alerting</bold></p><list list-type="bullet"><list-item><p>Implement real-time system health monitoring with automated alerts for loss of server connectivity, data transmission failure, or interruption of data storage.</p></list-item><list-item><p>Ensure that system status indicators are clearly visible to clinical users, indicating whether monitoring data are actively being captured and stored.</p></list-item><list-item><p>Configure alerts to notify both clinical units and IT services simultaneously to enable parallel awareness and response.</p></list-item></list><p><bold>Recovery procedures and contingency planning</bold></p><list list-type="bullet"><list-item><p>Develop and validate clear, stepwise recovery procedures for surveillance system failures, including criteria for escalation to IT support.</p></list-item><list-item><p>Design restart and recovery functions that provide explicit user feedback (eg, confirmation messages or error notifications) to avoid ambiguity during recovery attempts.</p></list-item><list-item><p>Formalize fallback monitoring workflows during downtime, such as increased bedside monitoring or alternative documentation processes, to maintain patient surveillance.</p></list-item></list><p><bold>Human factors and training</bold></p><list list-type="bullet"><list-item><p>Provide regular training for clinical staff and designated superusers on recognition of abnormal system behavior, limits of local recovery actions, and early escalation pathways.</p></list-item><list-item><p>Conduct interdisciplinary simulation or tabletop exercises involving clinical staff and IT personnel to rehearse detection, response, and recovery from HIT failures.</p></list-item><list-item><p>Reinforce a nonpunitive reporting culture to encourage early reporting of HIT anomalies and near-misses.</p></list-item></list><p><bold>Organizational governance and coordination</bold></p><list list-type="bullet"><list-item><p>Clearly define roles and responsibilities between clinical units, IT services, and vendors for surveillance system maintenance, monitoring, and incident response.</p></list-item><list-item><p>Integrate HIT failure scenarios into organizational risk management and patient safety governance structures.</p></list-item><list-item><p>Ensure that timely communication mechanisms are in place to inform all affected clinical staff of unexpected system downtimes and recovery status.</p></list-item></list><p><bold>System design and integration</bold></p><list list-type="bullet"><list-item><p>Design surveillance systems to align with clinical workflows, minimizing reliance on retrospective data review for detection of system failures.</p></list-item><list-item><p>Ensure interoperability between bedside monitoring devices and central surveillance systems to support continuity of monitoring during partial system failures.</p></list-item><list-item><p>Incorporate human-centered design principles to improve system transparency, controllability, and usability in safety-critical situations.</p></list-item></list></boxed-text><p>The proposed strategies are grouped into key sociotechnical domains to facilitate practical implementation and learning.</p></sec></sec><sec id="s4-8"><title>Strengths and Limitations of the Study</title><p>A key strength of this study is the systematic application of 5 established classification frameworks to a single HIT-related incident, enabling a comprehensive and triangulated analysis. This approach aligns with calls for richer sociotechnical analyses of HIT safety events [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref16">16</xref>]. Additionally, focusing on an incident with high potential severity but no confirmed harm supports proactive safety learning, consistent with modern patient safety principles [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref23">23</xref>].</p><p>Several limitations should be acknowledged. The analysis is based on a single incident report, limiting generalizability and precluding causal inference. Patient outcomes could not be fully assessed due to missing monitoring data, which constrained the classification of harm under ICPS [<xref ref-type="bibr" rid="ref7">7</xref>]. Furthermore, while the frameworks used are well established, their application involves interpretive judgment; alternative analysts might emphasize different dimensions. Nevertheless, the strong convergence of findings across frameworks suggests robust analytical results.</p><p>In addition, the reconstruction of the event relied primarily on the narrative documented in the incident report; it is possible that relevant contextual factors were not recorded and therefore could not be captured within the analytic frameworks applied.</p></sec><sec id="s4-9"><title>Implications for Future Research</title><p>Future research should examine whether similar patterns of delayed detection, limited recovery capacity, and organizational dependency are observed across larger samples of HIT-related incidents using comparable multi-framework approaches [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. Comparative studies evaluating how different classification systems influence safety recommendations could further guide methodological choices in HIT safety research.</p><p>There is also a need for empirical evaluation of design and governance interventions, such as real-time HIT health monitoring, redundancy strategies, and improved IT-clinical coordination models, to assess their effectiveness in reducing risk in high-acuity settings [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref29">29</xref>]. Finally, integrating resilience-oriented concepts such as Safety-II into HIT safety analysis may offer additional insights into how systems can better support adaptive clinical work under failure conditions [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>].</p></sec><sec id="s4-10"><title>Conclusions</title><p>This case report demonstrates that HIT-related safety incidents in intensive care settings are best understood as emergent properties of complex sociotechnical systems rather than isolated technical malfunctions or individual errors. The combined application of ICPS, HIT-CS, SEIPS 2.0, the sociotechnical model, and HFACS-Healthcare revealed convergent system-level vulnerabilities involving delayed detection, limited recovery capacity, and architectural and organizational design factors. These findings underscore the importance of governance structures, redundancy planning, and human-centered alerting strategies in high-acuity monitoring environments. Integrative, multi-framework analysis may strengthen learning from HIT failures and support safer design, implementation, and resilience of clinical surveillance systems.</p></sec></sec></body><back><ack><p>The author thanks the health care professionals and medical technology staff for their contributions to incident reporting and investigation, which made this analysis possible. The author especially acknowledges Dr Abdullah Hassoun for his assistance in reviewing and verifying the translated incident narrative. The author also recognizes the important role of national incident reporting systems in facilitating learning from health information technology&#x2013;related safety events.</p><p>Artificial intelligence&#x2013;based tools were used to assist with language refinement and manuscript organization. The author reviewed and verified all content and takes full responsibility for the accuracy and integrity of the work.</p></ack><notes><sec><title>Funding</title><p>No specific funding was received for this study.</p></sec><sec><title>Data Availability</title><p>The data analyzed in this study consist of a deidentified incident report obtained from a national incident reporting repository. For ethical and confidentiality reasons, the underlying data are not publicly available. Reasonable requests for access to the deidentified data may be considered by the corresponding author, subject to applicable data governance and institutional policies.</p></sec></notes><fn-group><fn fn-type="con"><p>MSRJ developed the protocol, obtained ethical approval, and drafted the manuscript. MSRJ performed data analysis and devised the set of strategies. MSRJ reviewed and edited the manuscript and approved the final version.</p></fn><fn fn-type="conflict"><p>None declared.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">HFACS</term><def><p>Human Factors Analysis and Classification System</p></def></def-item><def-item><term id="abb2">HFACS-Healthcare</term><def><p>HFACS for health care</p></def></def-item><def-item><term id="abb3">HIT</term><def><p>health information technology</p></def></def-item><def-item><term id="abb4">HIT-CS</term><def><p>Health Information Technology Classification System</p></def></def-item><def-item><term id="abb5">ICPS</term><def><p>International Classification for Patient Safety</p></def></def-item><def-item><term id="abb6">SEIPS</term><def><p>Systems Engineering Initiative for Patient Safety</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Cvach</surname><given-names>M</given-names> </name></person-group><article-title>Monitor alarm fatigue: an integrative review</article-title><source>Biomed Instrum Technol</source><year>2012</year><volume>46</volume><issue>4</issue><fpage>268</fpage><lpage>277</lpage><pub-id pub-id-type="doi">10.2345/0899-8205-46.4.268</pub-id><pub-id pub-id-type="medline">22839984</pub-id></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Drew</surname><given-names>BJ</given-names> </name><name name-style="western"><surname>Harris</surname><given-names>P</given-names> </name><name name-style="western"><surname>Z&#x00E8;gre-Hemsey</surname><given-names>JK</given-names> </name><etal/></person-group><article-title>Insights into the problem of alarm fatigue with physiologic monitor devices: a comprehensive observational study of consecutive intensive care unit patients</article-title><source>PLoS One</source><year>2014</year><volume>9</volume><issue>10</issue><fpage>e110274</fpage><pub-id pub-id-type="doi">10.1371/journal.pone.0110274</pub-id><pub-id pub-id-type="medline">25338067</pub-id></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Magrabi</surname><given-names>F</given-names> </name><name name-style="western"><surname>Ong</surname><given-names>MS</given-names> </name><name name-style="western"><surname>Runciman</surname><given-names>W</given-names> </name><name name-style="western"><surname>Coiera</surname><given-names>E</given-names> </name></person-group><article-title>Using FDA reports to inform a classification for health information technology safety problems</article-title><source>J Am Med Inform Assoc</source><year>2012</year><volume>19</volume><issue>1</issue><fpage>45</fpage><lpage>53</lpage><pub-id pub-id-type="doi">10.1136/amiajnl-2011-000369</pub-id><pub-id pub-id-type="medline">21903979</pub-id></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ash</surname><given-names>JS</given-names> </name><name name-style="western"><surname>Berg</surname><given-names>M</given-names> </name><name name-style="western"><surname>Coiera</surname><given-names>E</given-names> </name></person-group><article-title>Some unintended consequences of information technology in health care: the nature of patient care information system-related errors</article-title><source>J Am Med Inform Assoc</source><year>2004</year><volume>11</volume><issue>2</issue><fpage>104</fpage><lpage>112</lpage><pub-id pub-id-type="doi">10.1197/jamia.M1471</pub-id><pub-id pub-id-type="medline">14633936</pub-id></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bates</surname><given-names>DW</given-names> </name><name name-style="western"><surname>Gawande</surname><given-names>AA</given-names> </name></person-group><article-title>Improving safety with information technology</article-title><source>N Engl J Med</source><year>2003</year><month>06</month><day>19</day><volume>348</volume><issue>25</issue><fpage>2526</fpage><lpage>2534</lpage><pub-id pub-id-type="doi">10.1056/NEJMsa020847</pub-id><pub-id pub-id-type="medline">12815139</pub-id></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="thesis"><person-group person-group-type="author"><name name-style="western"><surname>Jabin</surname><given-names>MSR</given-names> </name></person-group><article-title>Identifying and characterising problems arising from interactions between medical imaging and health information technology as a basis for improvements in practice [Dissertation]</article-title><year>2019</year><publisher-name>University of South Australia</publisher-name></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Runciman</surname><given-names>WB</given-names> </name><name name-style="western"><surname>Williamson</surname><given-names>JAH</given-names> </name><name name-style="western"><surname>Deakin</surname><given-names>A</given-names> </name><name name-style="western"><surname>Benveniste</surname><given-names>KA</given-names> </name><name name-style="western"><surname>Bannon</surname><given-names>K</given-names> </name><name name-style="western"><surname>Hibbert</surname><given-names>PD</given-names> </name></person-group><article-title>An integrated framework for safety, quality and risk management: an information and incident management system based on a universal patient safety classification</article-title><source>Qual Saf Health Care</source><year>2006</year><volume>15</volume><issue>Suppl 1</issue><fpage>i82</fpage><lpage>i90</lpage><pub-id pub-id-type="doi">10.1136/qshc.2005.017467</pub-id><pub-id pub-id-type="medline">17142615</pub-id></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="report"><article-title>Conceptual framework for the international classification for patient safety: final technical report</article-title><year>2010</year><access-date>2025-01-15</access-date><publisher-name>World Health Organization</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="https://iris.who.int/handle/10665/70882">https://iris.who.int/handle/10665/70882</ext-link></comment></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>McElroy</surname><given-names>LM</given-names> </name><name name-style="western"><surname>Woods</surname><given-names>DM</given-names> </name><name name-style="western"><surname>Yanes</surname><given-names>AF</given-names> </name><etal/></person-group><article-title>Applying the WHO conceptual framework for the International Classification for Patient Safety to a surgical population</article-title><source>Int J Qual Health Care</source><year>2016</year><volume>28</volume><issue>2</issue><fpage>166</fpage><lpage>174</lpage><pub-id pub-id-type="doi">10.1093/intqhc/mzw001</pub-id><pub-id pub-id-type="medline">26803539</pub-id></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Magrabi</surname><given-names>F</given-names> </name><name name-style="western"><surname>Baker</surname><given-names>M</given-names> </name><name name-style="western"><surname>Sinha</surname><given-names>I</given-names> </name><etal/></person-group><article-title>Clinical safety of England&#x2019;s national programme for IT: a retrospective analysis of all reported safety events 2005-2011</article-title><source>Int J Med Inform</source><year>2015</year><month>03</month><volume>84</volume><issue>3</issue><fpage>198</fpage><lpage>206</lpage><pub-id pub-id-type="doi">10.1016/j.ijmedinf.2014.12.003</pub-id><pub-id pub-id-type="medline">25617015</pub-id></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Jabin</surname><given-names>MSR</given-names> </name><name name-style="western"><surname>Magrabi</surname><given-names>F</given-names> </name><name name-style="western"><surname>Hibbert</surname><given-names>P</given-names> </name><name name-style="western"><surname>Schultz</surname><given-names>T</given-names> </name><name name-style="western"><surname>Bessen</surname><given-names>T</given-names> </name><name name-style="western"><surname>Runciman</surname><given-names>W</given-names> </name></person-group><article-title>Identifying and characterizing system issues of health information technology in medical imaging as a basis for recommendations</article-title><source>2019 IEEE International Conference on Imaging Systems and Techniques (IST)</source><year>2019</year><publisher-name>IEEE</publisher-name><fpage>1</fpage><lpage>6</lpage><pub-id pub-id-type="doi">10.1109/IST48021.2019.9010426</pub-id></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Coiera</surname><given-names>E</given-names> </name><name name-style="western"><surname>Magrabi</surname><given-names>F</given-names> </name></person-group><person-group person-group-type="editor"><name name-style="western"><surname>Coiera</surname><given-names>E</given-names> </name></person-group><article-title>Information system safety</article-title><source>Guide to Health Informatics</source><year>2015</year><edition>3</edition><publisher-name>CRC Press</publisher-name><fpage>195</fpage><lpage>220</lpage><pub-id pub-id-type="doi">10.1201/b13617</pub-id></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pan</surname><given-names>D</given-names> </name><name name-style="western"><surname>Nilsson</surname><given-names>E</given-names> </name><name name-style="western"><surname>Jabin</surname><given-names>MSR</given-names> </name></person-group><article-title>A review of incidents related to health information technology in Swedish healthcare to characterise system issues as a basis for improvement in clinical practice</article-title><source>Health Informatics J</source><year>2024</year><volume>30</volume><issue>3</issue><fpage>14604582241270742</fpage><pub-id pub-id-type="doi">10.1177/14604582241270742</pub-id><pub-id pub-id-type="medline">39116887</pub-id></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Jabin</surname><given-names>MSR</given-names> </name><name name-style="western"><surname>Magrabi</surname><given-names>F</given-names> </name><name name-style="western"><surname>Hibbert</surname><given-names>P</given-names> </name><name name-style="western"><surname>Schultz</surname><given-names>T</given-names> </name><name name-style="western"><surname>Runciman</surname><given-names>W</given-names> </name></person-group><article-title>Identifying and classifying incidents related to health information technology in medical imaging as a basis for improvements in practice</article-title><source>2019 IEEE International Conference on Imaging Systems and Techniques (IST)</source><year>2019</year><access-date>2026-04-01</access-date><publisher-name>IEEE</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8976373">https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8976373</ext-link></comment><pub-id pub-id-type="doi">10.1109/IST48021.2019.9010109</pub-id></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jabin</surname><given-names>MSR</given-names> </name></person-group><article-title>The need for a refined classification system and national incident reporting system for health information technology-related incidents</article-title><source>Front Digit Health</source><year>2024</year><volume>6</volume><fpage>1422396</fpage><pub-id pub-id-type="doi">10.3389/fdgth.2024.1422396</pub-id><pub-id pub-id-type="medline">39131183</pub-id></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Holden</surname><given-names>RJ</given-names> </name><name name-style="western"><surname>Carayon</surname><given-names>P</given-names> </name><name name-style="western"><surname>Gurses</surname><given-names>AP</given-names> </name><etal/></person-group><article-title>SEIPS 2.0: a human factors framework for studying and improving the work of healthcare professionals and patients</article-title><source>Ergonomics</source><year>2013</year><volume>56</volume><issue>11</issue><fpage>1669</fpage><lpage>1686</lpage><pub-id pub-id-type="doi">10.1080/00140139.2013.838643</pub-id><pub-id pub-id-type="medline">24088063</pub-id></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Carayon</surname><given-names>P</given-names> </name><name name-style="western"><surname>Wooldridge</surname><given-names>A</given-names> </name><name name-style="western"><surname>Hoonakker</surname><given-names>P</given-names> </name><name name-style="western"><surname>Hundt</surname><given-names>AS</given-names> </name><name name-style="western"><surname>Kelly</surname><given-names>MM</given-names> </name></person-group><article-title>SEIPS 3.0: Human-centered design of the patient journey for patient safety</article-title><source>Appl Ergon</source><year>2020</year><month>04</month><volume>84</volume><fpage>103033</fpage><pub-id pub-id-type="doi">10.1016/j.apergo.2019.103033</pub-id><pub-id pub-id-type="medline">31987516</pub-id></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sittig</surname><given-names>DF</given-names> </name><name name-style="western"><surname>Singh</surname><given-names>H</given-names> </name></person-group><article-title>A new sociotechnical model for studying health information technology in complex adaptive healthcare systems</article-title><source>Qual Saf Health Care</source><year>2010</year><month>10</month><volume>19 Suppl 3</volume><issue>Suppl 3</issue><fpage>i68</fpage><lpage>i74</lpage><pub-id pub-id-type="doi">10.1136/qshc.2010.042085</pub-id><pub-id pub-id-type="medline">20959322</pub-id></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Singh</surname><given-names>H</given-names> </name><name name-style="western"><surname>Sittig</surname><given-names>DF</given-names> </name></person-group><article-title>Measuring and improving patient safety through health information technology: the Health IT Safety Framework</article-title><source>BMJ Qual Saf</source><year>2016</year><month>04</month><volume>25</volume><issue>4</issue><fpage>226</fpage><lpage>232</lpage><pub-id pub-id-type="doi">10.1136/bmjqs-2015-004486</pub-id><pub-id pub-id-type="medline">26369894</pub-id></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ash</surname><given-names>JS</given-names> </name><name name-style="western"><surname>Sittig</surname><given-names>DF</given-names> </name><name name-style="western"><surname>Dykstra</surname><given-names>RH</given-names> </name><name name-style="western"><surname>Guappone</surname><given-names>KP</given-names> </name><name name-style="western"><surname>Carpenter</surname><given-names>JD</given-names> </name><name name-style="western"><surname>Seshadri</surname><given-names>V</given-names> </name></person-group><article-title>Categorizing the unintended sociotechnical consequences of computerized provider order entry</article-title><source>Int J Med Inform</source><year>2007</year><month>06</month><volume>76</volume><issue>Suppl 1</issue><fpage>S21</fpage><lpage>S27</lpage><pub-id pub-id-type="doi">10.1016/j.ijmedinf.2006.05.017</pub-id><pub-id pub-id-type="medline">16793330</pub-id></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Holden</surname><given-names>RJ</given-names> </name><name name-style="western"><surname>Scanlon</surname><given-names>MC</given-names> </name><name name-style="western"><surname>Patel</surname><given-names>NR</given-names> </name><etal/></person-group><article-title>A human factors framework and study of the effect of nursing workload on patient safety and employee quality of working life</article-title><source>BMJ Qual Saf</source><year>2011</year><month>01</month><volume>20</volume><issue>1</issue><fpage>15</fpage><lpage>24</lpage><pub-id pub-id-type="doi">10.1136/bmjqs.2008.028381</pub-id><pub-id pub-id-type="medline">21228071</pub-id></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Diller</surname><given-names>T</given-names> </name><name name-style="western"><surname>Helmrich</surname><given-names>G</given-names> </name><name name-style="western"><surname>Dunning</surname><given-names>S</given-names> </name><name name-style="western"><surname>Cox</surname><given-names>S</given-names> </name><name name-style="western"><surname>Buchanan</surname><given-names>A</given-names> </name><name name-style="western"><surname>Shappell</surname><given-names>S</given-names> </name></person-group><article-title>The Human Factors Analysis Classification System (HFACS) applied to health care</article-title><source>Am J Med Qual</source><year>2014</year><volume>29</volume><issue>3</issue><fpage>181</fpage><lpage>190</lpage><pub-id pub-id-type="doi">10.1177/1062860613491623</pub-id><pub-id pub-id-type="medline">23814026</pub-id></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Shappell</surname><given-names>S</given-names> </name><name name-style="western"><surname>Detwiler</surname><given-names>C</given-names> </name><name name-style="western"><surname>Holcomb</surname><given-names>K</given-names> </name><name name-style="western"><surname>Hackworth</surname><given-names>C</given-names> </name><name name-style="western"><surname>Boquet</surname><given-names>A</given-names> </name><name name-style="western"><surname>Wiegmann</surname><given-names>DA</given-names> </name></person-group><article-title>Human error and commercial aviation accidents: an analysis using the human factors analysis and classification system</article-title><source>Hum Factors</source><year>2007</year><month>04</month><volume>49</volume><issue>2</issue><fpage>227</fpage><lpage>242</lpage><pub-id pub-id-type="doi">10.1518/001872007X312469</pub-id><pub-id pub-id-type="medline">17447665</pub-id></nlm-citation></ref><ref id="ref24"><label>24</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Coiera</surname><given-names>E</given-names> </name></person-group><article-title>Why e-health is so hard</article-title><source>Med J Aust</source><year>2013</year><month>03</month><day>4</day><volume>198</volume><issue>4</issue><fpage>178</fpage><lpage>179</lpage><pub-id pub-id-type="doi">10.5694/mja13.10101</pub-id><pub-id pub-id-type="medline">23451947</pub-id></nlm-citation></ref><ref id="ref25"><label>25</label><nlm-citation citation-type="web"><article-title>What the act says</article-title><source>Etikpr&#x00F6;vningsmyndigheten</source><year>2003</year><access-date>2026-04-02</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://etikprovningsmyndigheten.se/en/what-the-act-says">https://etikprovningsmyndigheten.se/en/what-the-act-says</ext-link></comment></nlm-citation></ref><ref id="ref26"><label>26</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jabin</surname><given-names>MSR</given-names> </name><name name-style="western"><surname>Wepa</surname><given-names>D</given-names> </name><name name-style="western"><surname>Hassoun</surname><given-names>A</given-names> </name></person-group><article-title>A case report of system configuration issue in medical imaging due to system upgrade- changes in hardware and software</article-title><source>Front Digit Health</source><year>2024</year><volume>6</volume><fpage>1371761</fpage><pub-id pub-id-type="doi">10.3389/fdgth.2024.1371761</pub-id><pub-id pub-id-type="medline">39347445</pub-id></nlm-citation></ref><ref id="ref27"><label>27</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jabin</surname><given-names>MSR</given-names> </name></person-group><article-title>Operational disruption in healthcare associated with software functionality issue due to software security patching: a case report</article-title><source>Front Digit Health</source><year>2024</year><volume>6</volume><fpage>1367431</fpage><pub-id pub-id-type="doi">10.3389/fdgth.2024.1367431</pub-id><pub-id pub-id-type="medline">38550716</pub-id></nlm-citation></ref><ref id="ref28"><label>28</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jabin</surname><given-names>MSR</given-names> </name><name name-style="western"><surname>Steen</surname><given-names>M</given-names> </name><name name-style="western"><surname>Wepa</surname><given-names>D</given-names> </name><name name-style="western"><surname>Bergman</surname><given-names>P</given-names> </name></person-group><article-title>Assessing the healthcare quality issues for digital incident reporting in Sweden: Incident reports analysis</article-title><source>Digit Health</source><year>2023</year><volume>9</volume><fpage>20552076231174307</fpage><pub-id pub-id-type="doi">10.1177/20552076231174307</pub-id><pub-id pub-id-type="medline">37188073</pub-id></nlm-citation></ref><ref id="ref29"><label>29</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Negash</surname><given-names>B</given-names> </name><name name-style="western"><surname>Katz</surname><given-names>A</given-names> </name><name name-style="western"><surname>Neilson</surname><given-names>CJ</given-names> </name><etal/></person-group><article-title>De-identification of free text data containing personal health information: a scoping review of reviews</article-title><source>Int J Popul Data Sci</source><year>2023</year><volume>8</volume><issue>1</issue><fpage>2153</fpage><pub-id pub-id-type="doi">10.23889/ijpds.v8i1.2153</pub-id><pub-id pub-id-type="medline">38414537</pub-id></nlm-citation></ref><ref id="ref30"><label>30</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jabin</surname><given-names>MSR</given-names> </name><name name-style="western"><surname>Pan</surname><given-names>D</given-names> </name><name name-style="western"><surname>Nilsson</surname><given-names>E</given-names> </name></person-group><article-title>Characterizing healthcare incidents in Sweden related to health information technology affecting care management of multiple patients</article-title><source>Health Informatics J</source><year>2022</year><volume>28</volume><issue>2</issue><fpage>14604582221105440</fpage><pub-id pub-id-type="doi">10.1177/14604582221105440</pub-id><pub-id pub-id-type="medline">35762538</pub-id></nlm-citation></ref><ref id="ref31"><label>31</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jabin</surname><given-names>MSR</given-names> </name><name name-style="western"><surname>Pan</surname><given-names>D</given-names> </name><name name-style="western"><surname>Nilsson</surname><given-names>E</given-names> </name></person-group><article-title>Characterizing patient details-related challenges from health information technology-related incident reports from Swedish healthcare</article-title><source>Front Digit Health</source><year>2024</year><volume>6</volume><fpage>1260521</fpage><pub-id pub-id-type="doi">10.3389/fdgth.2024.1260521</pub-id><pub-id pub-id-type="medline">38380372</pub-id></nlm-citation></ref><ref id="ref32"><label>32</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Roggow</surname><given-names>BJ</given-names> </name><name name-style="western"><surname>Zarei</surname><given-names>E</given-names> </name></person-group><article-title>Human Factors Analysis and Classification System (HFACS): development, tiers, nanocodes, application, and adaptations</article-title><source>Safety Causation Analysis in Sociotechnical Systems: Advanced Models and Techniques</source><year>2024</year><publisher-name>Springer</publisher-name><fpage>151</fpage><lpage>180</lpage><pub-id pub-id-type="doi">10.1007/978-3-031-62470-4_7</pub-id></nlm-citation></ref><ref id="ref33"><label>33</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jalali</surname><given-names>M</given-names> </name><name name-style="western"><surname>Dehghan</surname><given-names>H</given-names> </name><name name-style="western"><surname>Habibi</surname><given-names>E</given-names> </name><name name-style="western"><surname>Khakzad</surname><given-names>N</given-names> </name></person-group><article-title>Application of &#x201C;Human Factor Analysis and Classification System&#x201D; (HFACS) model to the prevention of medical errors and adverse events: a systematic review</article-title><source>Int J Prev Med</source><year>2023</year><volume>14</volume><fpage>127</fpage><pub-id pub-id-type="doi">10.4103/ijpvm.ijpvm_332_22</pub-id><pub-id pub-id-type="medline">38264566</pub-id></nlm-citation></ref><ref id="ref34"><label>34</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jabin</surname><given-names>MSR</given-names> </name><name name-style="western"><surname>Pan</surname><given-names>D</given-names> </name></person-group><article-title>Software-related challenges in Swedish healthcare through the lens of incident reports: a desktop study</article-title><source>Digit Health</source><year>2023</year><volume>9</volume><fpage>20552076231203600</fpage><pub-id pub-id-type="doi">10.1177/20552076231203600</pub-id><pub-id pub-id-type="medline">37744748</pub-id></nlm-citation></ref><ref id="ref35"><label>35</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Nalesso</surname><given-names>F</given-names> </name><name name-style="western"><surname>Garzotto</surname><given-names>F</given-names> </name><name name-style="western"><surname>Martello</surname><given-names>T</given-names> </name><etal/></person-group><article-title>The patient safety in extracorporeal blood purification treatments of critical patients</article-title><source>Front Nephrol</source><year>2022</year><volume>2</volume><fpage>871480</fpage><pub-id pub-id-type="doi">10.3389/fneph.2022.871480</pub-id><pub-id pub-id-type="medline">37675020</pub-id></nlm-citation></ref><ref id="ref36"><label>36</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Garzotto</surname><given-names>F</given-names> </name><name name-style="western"><surname>Comoretto</surname><given-names>RI</given-names> </name><name name-style="western"><surname>Ostermann</surname><given-names>M</given-names> </name><etal/></person-group><article-title>Preventing infectious diseases in intensive care unit by medical devices remote control: lessons from COVID-19</article-title><source>J Crit Care</source><year>2021</year><month>02</month><volume>61</volume><fpage>119</fpage><lpage>124</lpage><pub-id pub-id-type="doi">10.1016/j.jcrc.2020.10.014</pub-id><pub-id pub-id-type="medline">33157307</pub-id></nlm-citation></ref><ref id="ref37"><label>37</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Magrabi</surname><given-names>F</given-names> </name><name name-style="western"><surname>Ong</surname><given-names>MS</given-names> </name><name name-style="western"><surname>Runciman</surname><given-names>W</given-names> </name><name name-style="western"><surname>Coiera</surname><given-names>E</given-names> </name></person-group><article-title>Patient safety problems associated with heathcare information technology: an analysis of adverse events reported to the US Food and Drug Administration</article-title><source>AMIA Annu Symp Proc</source><year>2011</year><volume>2011</volume><fpage>853</fpage><lpage>857</lpage><pub-id pub-id-type="medline">22195143</pub-id></nlm-citation></ref><ref id="ref38"><label>38</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Tripodi</surname><given-names>A</given-names> </name><name name-style="western"><surname>Moia</surname><given-names>M</given-names> </name></person-group><article-title>The accuracy of the International Normalized Ratio and the American College of Chest Physicians recommendations on the use of vitamin K to reverse over&#x2010;anticoagulation</article-title><source>J Thromb Haemost</source><year>2012</year><month>10</month><volume>10</volume><issue>10</issue><fpage>2207</fpage><lpage>2208</lpage><pub-id pub-id-type="doi">10.1111/j.1538-7836.2012.04879.x</pub-id><pub-id pub-id-type="medline">22882756</pub-id></nlm-citation></ref><ref id="ref39"><label>39</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ricci</surname><given-names>Z</given-names> </name><name name-style="western"><surname>Ronco</surname><given-names>C</given-names> </name></person-group><article-title>Information technology for CRRT and dose delivery calculator</article-title><source>Contrib Nephrol</source><year>2007</year><volume>156</volume><fpage>197</fpage><lpage>202</lpage><pub-id pub-id-type="doi">10.1159/000102084</pub-id><pub-id pub-id-type="medline">17464128</pub-id></nlm-citation></ref><ref id="ref40"><label>40</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Claggett</surname><given-names>J</given-names> </name><name name-style="western"><surname>Petter</surname><given-names>S</given-names> </name><name name-style="western"><surname>Joshi</surname><given-names>A</given-names> </name><name name-style="western"><surname>Ponzio</surname><given-names>T</given-names> </name><name name-style="western"><surname>Kirkendall</surname><given-names>E</given-names> </name></person-group><article-title>An infrastructure framework for remote patient monitoring interventions and research</article-title><source>J Med Internet Res</source><year>2024</year><month>05</month><day>30</day><volume>26</volume><fpage>e51234</fpage><pub-id pub-id-type="doi">10.2196/51234</pub-id><pub-id pub-id-type="medline">38815263</pub-id></nlm-citation></ref><ref id="ref41"><label>41</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jansen</surname><given-names>AJS</given-names> </name><name name-style="western"><surname>Peters</surname><given-names>GM</given-names> </name><name name-style="western"><surname>Kooij</surname><given-names>L</given-names> </name><name name-style="western"><surname>Doggen</surname><given-names>CJM</given-names> </name><name name-style="western"><surname>van Harten</surname><given-names>WH</given-names> </name></person-group><article-title>Device based monitoring in digital care and its impact on hospital service use</article-title><source>NPJ Digit Med</source><year>2025</year><month>01</month><day>8</day><volume>8</volume><issue>1</issue><fpage>16</fpage><pub-id pub-id-type="doi">10.1038/s41746-024-01427-8</pub-id><pub-id pub-id-type="medline">39779761</pub-id></nlm-citation></ref><ref id="ref42"><label>42</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Safavi</surname><given-names>KC</given-names> </name><name name-style="western"><surname>Driscoll</surname><given-names>W</given-names> </name><name name-style="western"><surname>Wiener-Kronish</surname><given-names>JP</given-names> </name></person-group><article-title>Remote surveillance technologies: realizing the aim of right patient, right data, right time</article-title><source>Anesth Analg</source><year>2019</year><month>09</month><volume>129</volume><issue>3</issue><fpage>726</fpage><lpage>734</lpage><pub-id pub-id-type="doi">10.1213/ANE.0000000000003948</pub-id><pub-id pub-id-type="medline">31425213</pub-id></nlm-citation></ref><ref id="ref43"><label>43</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jabin</surname><given-names>MSR</given-names> </name><name name-style="western"><surname>Schultz</surname><given-names>T</given-names> </name><name name-style="western"><surname>Mandel</surname><given-names>C</given-names> </name><etal/></person-group><article-title>A mixed-methods systematic review of the effectiveness and experiences of quality improvement interventions in radiology</article-title><source>J Patient Saf</source><year>2022</year><volume>18</volume><issue>1</issue><fpage>e97</fpage><lpage>e107</lpage><pub-id pub-id-type="doi">10.1097/PTS.0000000000000709</pub-id><pub-id pub-id-type="medline">32433438</pub-id></nlm-citation></ref><ref id="ref44"><label>44</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jabin</surname><given-names>SR</given-names> </name><name name-style="western"><surname>Schultz</surname><given-names>T</given-names> </name><name name-style="western"><surname>Hibbert</surname><given-names>P</given-names> </name><name name-style="western"><surname>Mandel</surname><given-names>C</given-names> </name><name name-style="western"><surname>Runciman</surname><given-names>W</given-names> </name></person-group><article-title>Effectiveness of quality improvement interventions for patient safety in radiology: a systematic review protocol</article-title><source>JBI Database System Rev Implement Rep</source><year>2016</year><month>09</month><volume>14</volume><issue>9</issue><fpage>65</fpage><lpage>78</lpage><pub-id pub-id-type="doi">10.11124/JBISRIR-2016-003078</pub-id><pub-id pub-id-type="medline">27755318</pub-id></nlm-citation></ref><ref id="ref45"><label>45</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wepa</surname><given-names>D</given-names> </name></person-group><article-title>Digital disparities: tech solutions for indigenous communities</article-title><source>Open Access Gov</source><year>2025</year><volume>46</volume><issue>1</issue><fpage>26</fpage><lpage>27</lpage><pub-id pub-id-type="doi">10.56367/OAG-046-11905</pub-id></nlm-citation></ref><ref id="ref46"><label>46</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wepa</surname><given-names>D</given-names> </name><name name-style="western"><surname>Thomas</surname><given-names>S</given-names> </name><name name-style="western"><surname>Jabin</surname><given-names>MSR</given-names> </name></person-group><article-title>The experience and impact of digital technologies on Indigenous populations in New Zealand during the COVID-19 pandemic and Cyclone Gabrielle: The Kaupapa M&#x0101;ori methodology</article-title><source>JMIR Aging</source><year>2025</year><month>10</month><day>28</day><volume>8</volume><fpage>e73974</fpage><pub-id pub-id-type="doi">10.2196/73974</pub-id><pub-id pub-id-type="medline">41150869</pub-id></nlm-citation></ref></ref-list></back></article>