Hand Hygeine Research Papaer

In: People

Submitted By jt3458
Words 6478
Pages 26
Capstone Project Abstract
Hand washing and hand hygiene are consider to be the number one, cheap essential measure of preventing and controlling spread of hospital acquired infections (HAIs). Hand washing and hygiene can significantly reduce the burden of disease, in particular in hospitalized patient Unfortunately compliance to hand hygiene recommended standard procedures by the health care workers (HCWs) has been unacceptably poor. In order to design education program, identification of several risk factors associated with poor hand hygiene (HH) compliance is of extreme importance. Objective: The purpose of this study is to implement a hand hygiene program for increase compliance with hand hygiene among health care worker in 97 beds hospital. The key target for compliance to HH is not only health-care workers but also policy-makers and organizational leaders and managers. Methods.: Compliance to hand hygiene will be evaluated through direct observation of HCWs ,to helps pinpoint areas of strength or weaknesses in HH behavior, so as to develop training program that will help HCWs to complaint with HH . Evaluation will be based on direct observation and survey audit, observing the HCWs during routine patient care to ensure that hands hygiene are performed before and after getting in contact with patient and patient environment. In addition, survey audit based on the HCWs perception, knowledge and attitude, including patient and family observation of HCWs about hand hygiene. Intervention will be education and training using visual poster, power point, base on feedback of the results, the program estimated to take six months. Conclusion: Regular cleansing of hands by HCWs reduces the risk of transmitting nosocomial pathogens between patients and thus reduce the risk of exogenously- acquired…...

Similar Documents

No Papaer

...site of the more important yearly budget goal. Many companies like Huntsman’s Corp update their yearly budget on a monthly basis so that they can keep their shareholders happy and also to make their budget more feasible to balance. Self-Imposed Budget A self-imposed budget can sometimes be useful to the success of the company. A lot of the times companies create budgets from the top down. In a self-imposed budget lower management has a say in how the budget is managed. When lower management gets a say in what is being done they are more likely to comply and do everything in the power to balance the budget. Also when a budget is set up by those doing the actually work the budget is going to be more précises because the people with the hands on know how of what they are doing and the cost of their process. The last benefit to a self-imposed budget is that you can cut out the excuses. Many times when a budget is passed down from the top employees have the excuses of an unrealistic budget but when the manager creates his own budget to meet the goals of upper management that excess becomes invalid. Self-imposed budgets also create difficult in budget process as well. When someone creates their own budget they many times make it easier to achieve the budget by adding extra money here in their where it is tight. This extra money can be wasted making it harder to hit the goal that the shareholders want, but when someone is going to be held accountable for there own self-imposed...

Words: 2564 - Pages: 11

Research Papaer

...1) Why windows server 2008 comes in different versions? What is the significance of each version? The reason Windows Server 2008 many different versions are to meet the needs of its customers. They provide many 7 different versions ranging from the basic entry level software for a small business to very large corporations that require immense computing power. The Microsoft website states “Each Windows Server 2008 R2 edition provides key functionality to support any sized business and IT challenge.” (Microsoft.com, 2010) Windows Server 2008 R2 (Foundation) – Is the basic starter server package. Windows Server 2008 R2 (Standard) – Is well built, with the average tools and flexibility. Windows Server 2008 R2 (Enterprise) – Specialized to meet the needs of very unique applications. Windows Server 2008 R2 (Datacenter) – Has a Very large capacity. Windows Server 2008 R2 (Web) – For internet applications only. Windows Server 2008 R2 (HPC Suite) – It is Customizable to get the most out of the system resources. Windows Server 2008 R2 (Itanium Based) – It is the most scalable. (Microsoft.com, 2010) 2) What are the new features or enhancements made to windows server 2008? How is windows server 2008 different from windows server 2003? Some of the new features according to Microsoft’s website are Powerful Hardware and Scaling Features, Reduced Power Consumption, Hyper-V in Windows server 2008 R2 SP1, Expand Desktop Deployment Options with VDI, and Easier and more......

Words: 439 - Pages: 2

The Hand

...At the beginning of the story, the wife regarded the hand with young love and pride. She was excited to be lying next to her newlywed husband and she enjoyed having his hand next to her. She felt mature and proud to be married at such a young age to a handsome young man. She was happy, excited, and surprised of her new status. But throughout the story, her attitude began to change. It started when she realized qualities of his hand that she hadn’t from the beginning. She noticed how big his hand is, how powerful his knuckles are and how unsmoothed out the ridges of his nail buffer was. Little by little, she begins to notice shocking details about the hand she thought she knew well. She began comparing the hand to one of an animal, or even worse, a beast. The wife’s description of the hand makes me think that she might be scared of him as she begins to observe his hands with horror and disgust. She changes my thoughts of how she views his hands with every nasty detail she lists about it. The way she describes her hands make me feel like the hand (or the husband) suggests authority and power over her, or even oppressiveness. When she says “Oh!” in paragraphs 16 and 20, it is because she has faced with something slightly indecent which makes her feel uncomfortable. She has noticed this big change of perspective which shocked her and which she did not like. She thinks to herself how she didn’t realize this before, the missed and ignored details which revealed the real man......

Words: 786 - Pages: 4

Term Papaer

...accessed on desktop or notebook computers, or help them by making it easier to use the Internet on their portable devices. A mobile app may be a mobile Web site bookmarking utility, a mobile-based instant messaging client, Gmail for mobile, and many other applications. The attendance system is based around tracking student absences, since there should be fewer of them than presences. An attendance record is stored for a student only when they are absent (or late) from school. No record is stored when they are present. This is the easiest approach in terms of record entry. According to Paul Jordan Arbado, a Junior Programmer of Rizal Provincial Capitol, “Let’s say it is nice to have a handheld excel-like class record on your hand. Listing and updating your classes within your phone is convenient and very hassle-free, but still the capabilities and the features you can do with it is limited. Well you can save your list today, then access it through the Net at home or any where you can find a PC or a laptop with Net connection. That’s the general idea. But it can be better if the system can be personalized, maybe with Email capabilities, or can be integrated with other class record fields if possible. Well, those are suggestions from a professor.” The proposed system is a attendance and monitoring student performance with automated referral for college of computer studies professors. This system is also considered as mobile application that can import......

Words: 7822 - Pages: 32

Research Papaer

...UNIT VIII RESEARCH PAPER Student name: Nguyen Thi Ngoc Minh Student Number: 217527 School: Columbia Southern University I. Introduction At the beginning, Sacombank was just a small bank, established in 21st December 1991, with the initial chartered capital of 3 billion VND and operated within Ho Chi Minh City (Sacombank, 2012). After about 22 years’ operating, Sacombank is now one of the leading Vietnamese commercial joint stock banks with strong financial capacity and stable operation. Through all the ups and downs, changes in policies, economy, Sacombank has expanded the size, assets, equity, and especially Sacombank has the broadest network of business locations in Vietnam, Laos, and Cambodia. As a Sacombank’s staff, I would like to analyze my company to find out how to develop the bank as the mission to be the leading retail bank in Indochina. In this report, I will intro briefly about the Sacombank, go through the organization structure, operating activities, effectiveness and discussion about some problem appearing when the company in service with this organization structure. Moreover, recommendations will be given to solves the problems and allow the organization operate efficiently. II. Mission and objective: Sacombank through 22 year has created a good business network, modern technology system, and stable financial capacities which allow the bank to constantly maximize value for customers and shareholders, bring value to staff......

Words: 1966 - Pages: 8


...and Marcus (1986) even criticize the very idea that social scientificmethods can prove or disprove theories. In their quest for a monopoly on truth or science, scholars often use a Authors9 Note: An earlier version of this article was presented at the annual meetings of the American Sociological Association, Chicago, August 2002. Gregoire Mallard acknowledges the support of a graduate research fellowship from the Lurcy Foundation, which funded his work at Princeton University in 2002-2003. Michele Lamont acknowledges a generous grantfrom theNational Science Foundation (grant no. SES-0096880), which made this research possible, as well as a fellowship from theRadcliffe Institute for Advanced Studies and theCenter for Advanced Andrew W. Mellon Foundation (grant no. Study in theBehavioral Sciences, with the support of the 29800639). Joshua Guetzkow acknowledges the support of theRobert Wood Johnson Foundation inHealth Policy Research Program. We thank the following organizations for authoriz ing access to their funding panels: theAmerican Council of Learned Societies, the Social Science Research Council, the Woodrow Wilson National Fellowship Foundation, and two anonymous fellowship competitions. We are particularly indebted to Craig Calhoun, the late JohnD'Arms, Scholars Judith Pynch, Stanley Katz, Robert Weisbuch, and all the participants of this study formaking itpossible. We thank JohnBowen, Don Brenneis, Nina Eliasoph, David Frank, Howard Gardner, Patricia Gumport,......

Words: 14653 - Pages: 59


...Fall 2013 - Homework 5 In SPUFI, for the Input dataset, specify a member in DB2.SQL with the naming convention HW5Qn, where n is the question number. Example, for question 1 it would be DB2.SQL(HW5Q1). Save the output for each question in a separate output file labeled by the question number. For example: OUTPUT.SQL .HW5Q1 File transfer each file to your PC and print the output files to turn in or cut and paste to a document if the text is all shown. You must include both the SQL and the output. LABEL the output by hand for each question. Remember, you must let SQL do the work, (don’t figure it out and hard code). Below is the ERD for this assignment: 1) Create the following tablespace with the naming conventions as specified: Tablespace RnnnTSSU in your database (RnnnDB) (the STUDENT table will go in here) using stogroup UNTDISK. (3 pts.) 2) Create the STUDENT table with the specifications from the ERD (Remember, bolded attributes are not null). DOB should have a datatype of DATE (not DATETIME.) (3 pts.) 3) Create an index on the primary key of STUDENT using the UNTDISK storage group (2 pts.) 4) Perform catalog queries to ensure your tablespace, table, and index were created (1 ½ pts.) 5) Insert the following data into the STUDENT table: ( 3 pts.) S_ID S_LAST S_FIRST S_MI S_ADDRESS S_CITY S_STATE S_ZIP S_CLASS S_DOB S_PIN --------------------------------------------------------------------------------------------------------------------------JO100 JONES TAMMY R 1817...

Words: 359 - Pages: 2

Marketing and Sociology Hand in Hand

...Sociology and Marketing Hand in Hand Written By Yomna, Aiman, Anaa To excel in business, you need more than a solid grasp of math and economics. Business requires an understanding of people -- large populations in particular. Sociology provides the educational background needed for managers to understand their employees and customers. Business leaders that understand sociology are able to anticipate customer needs and respond to employee problems in ways others cannot. What is Sociology?  Sociology is the study of human social relationships and institution. Sociology is a subject that differentiate the alternating matter of society like from race to crime, family to social class, beliefs of similar culture and it talks about the social stability to radical change in the whole societies. The study of sociology helps the individual to understand how human act and realization both shape and shaped by the surrounding culture and social structure. Sociology is an exciting and helpful field to study that evaluates and explains the important matter in our personal live, our communities and the world. For our personal lives sociology studies the social cause and consequences of things like racial and gender identity, family conflict, aging and religious. As for the society level, sociology examines and explains matters like for example prejudice and discrimination, poverty and wealth, crime and law, school and education and social movements. With the help of the 4......

Words: 1930 - Pages: 8


...other course equivalent to the said stream. Note: The duration of scholarship will be fixed as per above criteria and will not vary with the prolongation of session(s). l. The total number of scholarships, their amount and conditions governing each scholarship will be decided by the Board, from time to time. m. Merit list shall be circulated every year. Eligible candidates shall be required to apply for scholarship on the prescribed application forms, supplied to their institution by the Board, from where they appeared in the examination and in case of private candidates, these will be sent on their permanent home addresses. n. Initial award of scholarship/medals will be sanctioned by the Chairman and subsequent releases by the Director (Research). o. The Chairman will be empowered to settle time barred applications/bills for award of scholarships. 8.3 Award of medal/merit certificate/personal computer & cash prize a. Medals and merit certificates shall be awarded to the candidates each year who secure the first three positions in their own groups irrespective to gender discrimination. b. c. A candidate securing at least 60% marks shall be eligible for the medal. A private candidate shall also be given medal if otherwise eligible. d. The medals shall be awarded/based on the merit list prepared after the rechecking of answer books. e. The Chairman shall approve the design / cost of the medals. f. The medals and merit certificates shall be awarded in a special function......

Words: 1287 - Pages: 6

Term Papaer

...following four things: • Define a clear topic and stick to it throughout the paper, addressing a consistently defined audience. • Use the best available sources of information and acknowledge them appropriately. • Display careful organization and clear wording. • Follow scholarly standards for format, grammar, spelling, and other mechanical matters. If the paper reports original research or technical work, a large part of the grade is based on the quality of the work itself, but presentation still counts; if you can’t present your work well, you might as well not have done it. 3 Receiving and acknowledging help Getting help from the right sources is a useful skill. Real scientists do it all the time. 2 When writing a term paper or thesis, you are permitted to receive any amount of help from anyone, as long as you acknowledge the help so that your instructors can distinguish your work from the work of others. You can acknowledge help in an “Acknowledgments” section at the beginning of the paper, or in a footnote attached to the first sentence. Be sure to acknowledge grants if you are supported by research grant funds; this is usually done by a sentence such as, “This work was supported by National Science Foundation Grant ZZZ-99-99999, Michael A. Covington, Principal Investigator.” It is not necessary to acknowledge scholarships or fellowships. 4 Planning a term paper or thesis Before you start writing — in fact before you get very far gathering information......

Words: 5028 - Pages: 21


...indicators for the huge rise. [pic]Figure 6 In this scatter plot you can see that it lung cancer cases has indeed gone up with the rise of tobacco sales. This comes back to my hypothesis, that indeed tobacco sales are a primary indicator for future Lung Cancer cases (bronchus). [pic]Figure 7 The above graph shows that as the car sales go up, so does the amount of lung cancer cases go up. This comes back to my hypothesis that indeed car sales do cause lung cancer, but this leaves a question to the people that want to know why? How? Which also leaves me a question that how on earth can car sales cause lung cancer, but as the graph shows it does. As I am researching the study right now, I cannot find the answer to this, one has to research in this study for so many ears to just find the simple answer as to how. [pic]Figure 8 This graph is not as confusing as the car sales and lung cancer were, because in some way gas (petroleum) has a really little chance of causing lung cancer, because people believe that petroleum (jelly) do cause cancer, but the experts have found no studies that show that “yes indeed it does”. This graph is somewhat realistic because there is a chance that gas can cause cancer. [pic]Figure 9 This shows that as gas prices go up s does the sales of tobacco, and it is completely true because of everything getting expensive and the prices of everything are going up. But the tobacco sales have not gone up that high; it’s the taxes that are......

Words: 1620 - Pages: 7


...Era there was an article entitled screening your screen time. Its message encourages us to be wise with how we’re connected to the Internet, TV, and phones. Elder Ardern emphasizes that, “As good as these things are; we cannot allow them to push to one side those things of greatest importance. How saw would it be if the phone and computer with all their sophistication drowned out the simplicity of sincere prayer to a loving Father in Heaven. Let us be as quick to kneel as we are to text.” Having said that, this article tells us how others are plugging in and unplugging from technology to make a positive difference. First we will read the responses for plugging in for good. Elder Ardern says that he has found it helpful to access research articles, conference talks, and ancestral records, and to receive emails, Facebook reminders, tweets, and texts. A youth member said, “Technology ties the world together. I can listen to general conference at the click of a button. It also allows my family to communicate with each other. The Internet has helped me prepare a talk for church. It helps us to share the gospel worldwide.” Here are the responses for unplugging for balance in our life. You need to take time out to enjoy the world and talk to God, not just to your friends on Facebook. Technology itself isn’t bad, but if it distracts you from what’s important, then it is. Like everything else, “moderation in all things.” We do need to unplug every day, usually......

Words: 3652 - Pages: 15

Tuskegee Research Papaer

...already switched over. I was hesitant of what my family would say so, I picked up a few class on the Dietetics curriculum for fall of 2013. Now, I was well off into nursing my expected graduation was spring of 2015 but, I had to make a decision please people or be true to myself. As time went I discovered that I had a passion for helping others throw nutrition so, I made the choice of changing my major spring 2014. That was first decision in the right direction but I had so many other layers I had to pull back of myself. Through this major and with God’s guidance has truly manifested my authentic self. I had to face fears of public speaking and more so I found myself in unfamiliar territory; in which I thrived. Now, back to the question at hand; “Who I am?” I am confident young women and at times I have a bashful side when I feel uncomfortable. I am strong I have perseverance of my ancestors that can thrive through the darkest times. I am a true believer in Christ Jesus in who I lean on and trust. I am a giver by nature but have small temper only if someone provokes me; in which I’m working on at the moment. I am someone who truly loves to love and receive in the way I give it. I am person full of laughter and take joy in making others laugh. I am small town country girl with a city girl persona. I am social light that like her space and peace of quite. I am still a young woman on this journey call life with so much more to discover. That’s who I am ...

Words: 687 - Pages: 3

Data Breach Research Papaer

...Secure or Breached? As technology is becoming more prevalent the manner in which we store information is changing. Gone are the days of information being stored into file cabinets. Instead information is stored in databases, a system of hard drives that stores information electronically normally accessible remotely. With this comes a rise in hackers and correspondingly a rise in security breaches, where hackers have access to sensitive information. Vulnerabilities are the root of all hacks. For businesses, they result in a decline in reliability. If an individual or a group wants to breach information, they will almost always find a way. With the increasing need for information databases, businesses have to weigh the risks of hacks. When an individual allows their information to be stored in a database, with or without their knowledge they are at risk. When this information enters the database, it becomes the business's responsibility to protect this information. With the amount of sensitive data being stored in databases, current cyber security measures and laws are not up to par. Infamous Data Breaches In 2015, there were 781 data breaches according to the Identity Theft Resource Center (ITRC). One of these infamous breaches being with Anthem, otherwise known as BlueCross BlueShield insurance company. In this breach, hackers stole over 80 million social security numbers and other sensitive information of customers was obtained by the hackers. Similar to Anthem, Target......

Words: 1455 - Pages: 6


...Pam Butusov Midterm 1160 Section A. Number One. The short story “Hands” written by author Sherwood Anderson is a story about a former school teacher named Wing Biddlebaum, with a troubled past. The story is narrated by his friend George. Wing, you see, has no control over the nervous movement of his hands. This has been a source of embarrassment for him since he relocated to the small conservative town he lives in. In an earlier part of his life, Wing taught at an all-boys school. He was gentle man, touched the boys shoulders and hair. This turned out to be misconstrued by one of the boys. The boy had dreams about his teacher and himself. When he told his father, he searched Wing out and beat him up. Is he a child molester is left to interpretation. After the beating from the father, Wing decided that his hands were the offending part. He started fidgeting them and never stopped until one day he was having a lively conversation with George about dreaming and thinking of more than the narrow minded town allowed. Wing touched George for the first time ever. Wing was completely freaked out by this and ran away in horror. Okay, but can you clearly identify the climax? What is the resolution? 20 Section B. Number 3. The theme of "A Rose for Emily" by William Faulkner is that people should let go of the past, and live in the present. Our first evidence is Emily lived in the past in her very old house, which she didn’t think she had to pay property taxes on. Second, she...

Words: 840 - Pages: 4