Objective: to evaluate the implementation of the Results Control, Monitoring and Evaluation System (e-Car) at the Health Surveillance Secretariat (SVS), Brazilian Ministry of Health, in the period 2012-2015.
Methods: this was an evaluation study using mixed methods for collection of primary and secondary data, followed by definition of the system's degree of implementation and analysis of the influence of the political-organizational context.
Results: the e-Car System was considered to have been implemented (75.4%) at SVS; the worst scores for its structure dimension related to the computer and operating system maintenance service, as well as little knowledge of the system manual; as for the system's process dimension, the existence of collegiate bodies was considered beneficial for monitoring.
Conclusion: the e-Car System had been implemented at SVS; however, its sustainability was fragile, and SVS was recommended to institutionalize and strengthen its monitoring and evaluation practices.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.5123/S1679-49742019000200006 | DOI Listing |
Pediatr Blood Cancer
January 2025
Division of Hematology, Children's National Hospital, Washington, District of Columbia, USA.
Background: Sickle cell disease (SCD) confers neurological risks that contribute to cognitive and academic difficulties. Clinical guidelines state that cognition should be monitored using signaling questions. However, evidence is lacking regarding the extent to which signaling questions accurately identify children with cognitive issues.
View Article and Find Full Text PDFJMIR Med Inform
January 2025
Department of Medical Informatics, Amsterdam University Medical Center, University of Amsterdam, Amsterdam, the Netherlands.
Background: The field of digital health solutions (DHS) has grown tremendously over the past years. DHS include tools for self-management, which support individuals to take charge of their own health. The usability of DHS, as experienced by patients, is pivotal to adoption.
View Article and Find Full Text PDFJ Egypt Natl Canc Inst
January 2025
Department of Biochemistry, Faculty of Pharmacy, Cairo University, Cairo, 11562, Egypt.
Background: Colorectal cancer (CRC) is a major public health concern. Animal models play a crucial role in understanding the disease pathology and development of effective treatment strategies. Chemically induced CRC represents a cornerstone in animal model development; however, due to the presence of different animal species with different genetic backgrounds, it becomes mandatory to study the susceptibility of different mice species to CRC induction by different chemical entities such as 1,2-dimethylhydrazine (DMH).
View Article and Find Full Text PDFEnviron Manage
January 2025
North Carolina State University, Department of Parks, Recreation and Tourism Management, Raleigh, NC, USA.
Citizen science has been increasingly utilized for monitoring resource conditions and visitor use in protected areas. However, the quality of data provided by citizen scientists remains a major concern that hinders wider applications in protected area management. We evaluated a prototype, citizen science-based trail assessment and monitoring program in Hong Kong using an integrated evaluative approach with a specific focus on the congruence of data collected by trained volunteers and managers.
View Article and Find Full Text PDFSci Rep
January 2025
Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh, 11543, Saudi Arabia.
The Internet of Medical Things (IoMT) has revolutionized healthcare by bringing real-time monitoring and data-driven treatments. Nevertheless, the security of communication between IoMT devices and servers remains a huge problem because of the inherent sensitivity of the health data and susceptibility to cyber threats. Current security solutions, including simple password-based authentication and standard Public Key Infrastructure (PKI) approaches, typically do not achieve an appropriate balance between security and low computational overhead, resulting in the possibility of performance bottlenecks and increased vulnerability to attacks.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!