<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMI</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Med Inform</journal-id>
      <journal-title>JMIR Medical Informatics</journal-title>
      <issn pub-type="epub">2291-9694</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
    <article-id pub-id-type="publisher-id">v7i1e12465</article-id>
    <article-id pub-id-type="pmid">30632973</article-id>
    <article-id pub-id-type="doi">10.2196/12465</article-id>
    <article-categories>
      <subj-group subj-group-type="heading">
        <subject>Original Paper</subject>
      </subj-group>
      <subj-group subj-group-type="article-type">
        <subject>Original Paper</subject>
      </subj-group>
    </article-categories>
    <title-group>
      <article-title>Improving Digital Hospital Transformation: Development of an Outcomes-Based Infrastructure Maturity Assessment Framework</article-title>
    </title-group>
    <contrib-group>
      <contrib contrib-type="editor">
        <name>
          <surname>Eysenbach</surname>
          <given-names>Gunther</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="reviewer">
        <name>
          <surname>McCauley</surname>
          <given-names>Vincent</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Qiu</surname>
          <given-names>Yan</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="author" id="contrib1" corresp="yes" equal-contrib="yes">
      <name name-style="western">
        <surname>Williams</surname>
        <given-names>Patricia AH</given-names>
      </name>
      <degrees>BSc (Hons), GradCert, MSc, PhD</degrees>
      <xref rid="aff1" ref-type="aff">1</xref>
      <address>
        <institution>Flinders Digital Health Research Centre</institution>
        <institution>College of Science and Engineering</institution>
        <institution>Flinders University</institution>
        <addr-line>Flinders at Tonsley</addr-line>
        <addr-line>GPO Box 2100</addr-line>
        <addr-line>Adelaide, SA 5001</addr-line>
        <country>Australia</country>
        <phone>61 82012023</phone>
        <email>trish.williams@flinders.edu.au</email>
      </address>  
      <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-3479-3523</ext-link></contrib>
      <contrib contrib-type="author" id="contrib2" equal-contrib="yes">
        <name name-style="western">
          <surname>Lovelock</surname>
          <given-names>Brendan</given-names>
        </name>
        <degrees>BSc, PhD</degrees>
        <xref rid="aff2" ref-type="aff">2</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-5855-4506</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib3" equal-contrib="yes">
        <name name-style="western">
          <surname>Cabarrus</surname>
          <given-names>Tony</given-names>
        </name>
        <xref rid="aff2" ref-type="aff">2</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-2313-6579</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib4" equal-contrib="yes">
        <name name-style="western">
          <surname>Harvey</surname>
          <given-names>Marlon</given-names>
        </name>
        <xref rid="aff3" ref-type="aff">3</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-0826-2657</ext-link>
      </contrib>
    </contrib-group>
    <aff id="aff1">
    <label>1</label>
    <institution>Flinders Digital Health Research Centre</institution>
    <institution>College of Science and Engineering</institution>  
    <institution>Flinders University</institution>  
    <addr-line>Adelaide</addr-line>
    <country>Australia</country></aff>
    <aff id="aff2">
      <label>2</label>
      <institution>Cisco Systems Australia</institution>
      <addr-line>Melbourne, Victoria</addr-line>
      <country>Australia</country>
    </aff>
    <aff id="aff3">
      <label>3</label>
      <institution>Cisco Systems</institution>
      <addr-line>Toronto, ON</addr-line>
      <country>Canada</country>
    </aff>
    <author-notes>
      <corresp>Corresponding Author: Patricia AH Williams 
      <email>trish.williams@flinders.edu.au</email></corresp>
    </author-notes>
    <pub-date pub-type="collection"><season>Jan-Mar</season><year>2019</year></pub-date>
    <pub-date pub-type="epub">
      <day>11</day>
      <month>01</month>
      <year>2019</year>
    </pub-date>
    <volume>7</volume>
    <issue>1</issue>
    <elocation-id>e12465</elocation-id>
    <!--history from ojs - api-xml-->
    <history>
      <date date-type="received">
        <day>10</day>
        <month>10</month>
        <year>2018</year>
      </date>
      <date date-type="rev-request">
        <day>1</day>
        <month>11</month>
        <year>2018</year>
      </date>
      <date date-type="rev-recd">
        <day>29</day>
        <month>11</month>
        <year>2018</year>
      </date>
      <date date-type="accepted">
        <day>9</day>
        <month>12</month>
        <year>2018</year>
      </date>
    </history>
    <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
    <copyright-statement>©Patricia AH Williams, Brendan Lovelock, Tony Cabarrus, Marlon Harvey. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 11.01.2019.</copyright-statement>
    <copyright-year>2019</copyright-year>
    <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
      <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Medical Informatics, is properly cited. The complete bibliographic information, a link to the original publication on http://medinform.jmir.org/, as well as this copyright and license information must be included.</p>
    </license>  
    <self-uri xlink:href="http://medinform.jmir.org/2019/1/e12465/" xlink:type="simple"/>
    <abstract>
      <sec sec-type="background">
        <title>Background</title>
        <p>Digital transformation in health care is being driven by the need to improve quality, reduce costs, and enhance the patient experience of health care delivery. It does this through both the direct intervention of technology to create new diagnostic and treatment opportunities and also through the improved use of information to create more engaging and efficient care processes.</p>
      </sec>
      <sec sec-type="objective">
        <title>Objective</title>
        <p>In a modern digital hospital, improved clinical and business processes are often driven through enhancing the information flows that support them. To understand an organization’s ability to transform their information flows requires a clear understanding of the capabilities of an organization’s information technology infrastructure. To date, hospital facilities have been challenged by the absence of uniform ways of describing this infrastructure that would enable them to benchmark where they are and create a vision of where they would like to be. While there is an industry assessment measure for electronic medical record (EMR) adoption using the Healthcare Information and Management Systems Society Analytics EMR Adoption Model, there is no equivalent for assessing the infrastructure and associated technology capabilities for digital hospitals. Our aim is to fill this gap, as hospital administrators and clinicians need to know how and why to invest in information infrastructure to support health information technology that benefits patient safety and care.</p>
      </sec>
      <sec sec-type="methods">
        <title>Methods</title>
        <p>Based on an operational framework for the Capability Maturity Model, devised specifically for health care, we applied information use characteristics to define eight information systems maturity levels and associated technology infrastructure capabilities. These levels are mapped to user experiences to create a linkage between technology infrastructure and experience outcomes. Subsequently, specific technology capabilities are deconstructed to identify the technology features required to meet each maturity level.</p>
      </sec>
      <sec sec-type="results">
        <title>Results</title>
        <p>The resulting assessment framework clearly defines 164 individual capabilities across the five technology domains and eight maturity levels for hospital infrastructure. These level-dependent capabilities characterize the ability of the hospital’s information infrastructure to support the business of digital hospitals including clinical and administrative requirements. Further, it allows the addition of a scoring calculation for each capability, domain, and the overall infrastructure, and it identifies critical requirements to meet each of the maturity levels.</p>
      </sec>
      <sec sec-type="conclusions">
        <title>Conclusions</title>
        <p>This new Infrastructure Maturity Assessment framework will allow digital hospitals to assess the maturity of their infrastructure in terms of their digital transformation aligning to business outcomes and supporting the desired level of clinical and operational competency. It provides the ability to establish an international benchmark of hospital infrastructure performance, while identifying weaknesses in current infrastructure capability. Further, it provides a business case justification through increased functionality and a roadmap for subsequent digital transformation while moving from one maturity level to the next. As such, this framework will encourage and guide information-driven, digital transformation in health care.</p>
      </sec>
    </abstract>
    <kwd-group>
      <kwd>medical informatics</kwd>
      <kwd>information infrastructures</kwd>
      <kwd>digital hospitals</kwd>
      <kwd>eHealth</kwd>
      <kwd>implementation</kwd>
      <kwd>capability maturity modelling</kwd>
      <kwd>security</kwd>
    </kwd-group></article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Digital transformation in health care is being driven by the need to improve quality and reduce costs in health care delivery, while taking advantage of the benefits that advances in emerging technology can provide to patient care, the patient experience, workforce performance, and value and efficiency in health care delivery [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. The recognition that digital transformation is important to health care is reflected in increasing discussions on what the digital health care future looks like and how we are moving to virtualized care venues, smart monitoring, and new trials using the Internet of things and cloud services [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref3">3</xref>]. Several studies have indicated that specific clinical initiatives require the improved support of health information technology infrastructure [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>]. However, it is not the digital transformation itself that is the goal, but the capabilities and advances that this transformation can realize. While the fee-for-service health care funding model has been predominant in many countries, particularly outside of public hospitals, there is a shift to value-based health care funding with payment based on patient health outcomes. Hence, this shift necessitates assessment of the infrastructure to support new technologies and how the infrastructure aligns to clinical and administrative business value. Indeed, digital transformation will be critical to the survival of health care organizations [<xref ref-type="bibr" rid="ref6">6</xref>].</p>
        <p>To take advantage of technologies that can improve information flow in the digital hospital environment and enhance processes to create a positive impact on both clinical and operational outcomes, an assessment of the capabilities of the existing environment is required. Only through this process can we create a map for improvement and possibilities. Currently, there is no language to describe hospital technology infrastructure and no accepted standard methodology to assess the state of the network and infrastructure in a hospital to support structured improvement aligned to business processes. While there is such an industry assessment measure for electronic medical record (EMR) adoption using the Healthcare Information and Management Systems Society (HIMSS) Analytics EMR Adoption Model (EMRAM) [<xref ref-type="bibr" rid="ref7">7</xref>], there is no equivalent for assessing the infrastructure and associated technology capabilities for digital hospitals. An infrastructure assessment framework is important to fill this gap as hospital administrators and clinicians need to know how and why to invest to support information infrastructure for the future. Such a framework will encourage and guide information-driven, digital transformation in health care.</p>
        <p>This paper defines what information infrastructure a digital hospital requires to mature and use technology to enable effective information flow and support the clinical and patient experience, now and in the future. The articulation and development process leading to the infrastructure maturity model and the information characteristics required to achieve the maturity objectives are given in the following section. This includes the mapping of systems capabilities to meet clinical process and patient experience, followed by a description of how we used a health care–specific capability mapping tool to devise a practical and industry best-practice assessment and scoring tool. The results demonstrate how this capability assessment mapping can be used to assess the maturity of a digital hospital to meet and improve its capabilities and how such a tool can be used for future planning of digital hospital technology requirements aligned to business and clinical outcomes.</p>
      </sec>
      <sec>
        <title>Defining Information Maturity in Health Care</title>
        <p>This section describes the reasoning behind, and formulation of, the maturity levels used to define infrastructure maturity, as well as the dimensions of information needed to place “information” in a position of enabling and supporting health care processes and decision making. It details the technology and technology services required to achieve those information dimensions and how those capabilities are aggregated into a set of naturally evolving levels. This description includes the research process of deconstruction of the associated technology requirements into a framework to determine the maturity of digital hospital infrastructure.</p>
      </sec>
      <sec>
        <title>Information Dimensions to Enable and Support the Health Care Process</title>
        <p>“Enabling information” means information that intrinsically possesses qualities to ensure it contributes effectively to health care delivery and decision making. This refers to both administrative and clinical data. The characteristics of enabling information in health care are analogous with data quality and comprise similar elements. Indeed, “information quality plays an important role as a mediator between clinical information technology and health care quality” [<xref ref-type="bibr" rid="ref8">8</xref>]. Further, in different contexts, data quality may mean different things. For instance, administrative data are used both within the hospital environment for planning and funding, and also by the managing jurisdictions for services planning and policy making. Routine hospital data used outside the organization require standardization and homogenization for comparison within and across jurisdictions [<xref ref-type="bibr" rid="ref9">9</xref>]. Further, data of lower quality can significantly influence business processes as well as clinical care [<xref ref-type="bibr" rid="ref10">10</xref>]. A range of characteristics define information features and qualities that support patient care and its associated workflow processes [<xref ref-type="bibr" rid="ref11">11</xref>]; this is a multidimensional concept [<xref ref-type="bibr" rid="ref8">8</xref>]. Russ et al [<xref ref-type="bibr" rid="ref11">11</xref>] categorize such data quality characteristics into four domains: trustworthy and reliable, effectively displayed, adaptable to work demand, and ubiquitous. Each of these domains further defines the data characteristics that support that domain. For instance, the trustworthy and reliable domain consists of the data characteristics complete, consistent, correct, current, and secure. These characteristics are closely aligned to data quality characteristics.</p>
        <p>In the context of health care, there are numerous definitions of what core quality characteristics should consist of, including accuracy, completeness, currency, and consistency, yet the associated characteristics of reliability, availability, usability, relevancy, and secureness are also important, in addition to trust, usefulness, and redundancy [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref12">12</xref>-<xref ref-type="bibr" rid="ref16">16</xref>]. All these characteristics are accepted quality metrics throughout the literature. This paper does not, however, present a discourse on the ontology of data quality characteristics but instead accepts the premise that such characteristics exist and form the basis for extrapolation of the use of data with such embedded characteristics. These embedded characteristics provide the foundation for enabling information in health care.</p>
        <p>There is an overlap between many of the data qualities. Therefore, each quality cannot be considered in isolation as a discrete concept because qualities come together in the context of use rather than through definitional articulation. There are numerous qualities that can describe data and information; however, in the health care environment these are not orthogonal or mutually exclusive. The selection of the following six higher-level characteristics used in this research reflects the usability of such characteristics when applied to health care:</p>
        <list list-type="order">
          <list-item>
            <p>Completeness: the information contains all the context required for decision making</p>
          </list-item>
          <list-item>
            <p>Relevancy: the information required for the task at hand</p>
          </list-item>
          <list-item>
            <p>Usability: information delivered on/in an appropriate device/format</p>
          </list-item>
          <list-item>
            <p>Availability: information is available where it is required and exists in accessible systems</p>
          </list-item>
          <list-item>
            <p>Reliability: information is sufficiently complete, error free, and consistent in distributed settings</p>
          </list-item>
          <list-item>
            <p>Security: the information process is protected against extraction or tampering</p>
          </list-item>
        </list>
        <p>These six characteristics give an insight at a high level into the importance of information in clinical application and are consistent with research into the use of patient information in electronic form [<xref ref-type="bibr" rid="ref11">11</xref>] and how this influences operational and clinical workflow and service delivery. Further, each of the six dimensions have multiple interdependencies (see <xref ref-type="table" rid="table1">Table 1</xref>). <xref ref-type="table" rid="table1">Table 1</xref> is based on the work of del Pilar and Garcia-Ugalde [<xref ref-type="bibr" rid="ref14">14</xref>] with correlation from Russ et al [<xref ref-type="bibr" rid="ref11">11</xref>] and Lee et al quality assessment characteristics [<xref ref-type="bibr" rid="ref17">17</xref>].</p>
        <p>A systematic review by Lee et al [<xref ref-type="bibr" rid="ref17">17</xref>] identified accuracy as an intrinsic information quality across all studies analyzed. Using accuracy as one characteristic to explain these interdependencies, accuracy appears as a component of several dimensions but not one of the primary data quality dimensions in <xref ref-type="table" rid="table1">Table 1</xref>, because while accurate information is needed, on its own it does not enable health care delivery. However, accuracy is a primary element of the dimension of relevancy. Relevance refers to the information being appropriate for the task at hand, and information cannot be appropriate without being suitably accurate.</p>
        <p>The interdependence of dimensions, such as accuracy and completeness (another intrinsic element that applies to multiple dimensions), demonstrates that attempting to definitively separate the dimensions is problematic and not productive. It should be noted that the dimension of “security” is a special case that supports all other dimensions.</p>
        <p>The data quality dimensions (ie, characteristics of usable information) described in <xref ref-type="table" rid="table1">Table 1</xref> are applied in this research to structure a scale of information maturity levels in an organization. They provide a loose set of guiding principles on how a hospital improves its use of information as it digitally matures. The characteristics are linked to the hospitals’ supporting information technology and technology services through the Capability Maturity Modeling (CMM) process described in the following section.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Data quality dependencies adapted from [<xref ref-type="bibr" rid="ref14">14</xref>].</p>
          </caption>
          <table width="1000" cellpadding="7" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="500"/>
            <col width="500"/>
            <thead>
              <tr valign="top">
                <td>Data quality dimension</td>
                <td>Interdependencies</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Completeness</td>
                <td><list list-type="bullet"><list-item><p>Coverage, density, relevancy, and sufficiency</p></list-item></list></td>
              </tr>
              <tr valign="top">
                <td>Relevancy</td>
                <td><list list-type="bullet"><list-item><p>Current, timely, correct, and sufficient</p></list-item></list></td>
              </tr>
              <tr valign="top">
                <td>Usability</td>
                <td><list list-type="bullet"><list-item><p>Usefulness consisting of relevance accuracy and completeness</p></list-item><list-item><p>Easy to use and organized</p></list-item></list></td>
              </tr>
              <tr valign="top">
                <td>Availability</td>
                <td><list list-type="bullet"><list-item><p>Accessible, compatible, interpretable, and locatable</p></list-item></list></td>
              </tr>
              <tr valign="top">
                <td>Reliability</td>
                <td><list list-type="bullet"><list-item><p>Unbiased</p></list-item><list-item><p>Reputation traceability including data source and provenance</p></list-item><list-item><p>Data producer with previous experience and correction of mistakes</p></list-item><list-item><p>Credibility inclusive of accuracy and completeness</p></list-item><list-item><p>Consistency</p></list-item></list></td>
              </tr>
              <tr valign="top">
                <td>Security</td>
                <td><list list-type="bullet"><list-item><p>Supports all other dimensions</p></list-item></list></td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Capability Maturity Model</title>
        <p>In the 1980s, CMM was devised as a tool to assess internal and external improvement processes [<xref ref-type="bibr" rid="ref18">18</xref>], enabling a transformation from chaotic and ad hoc process implementation to definitive and disciplined process execution. CMM has an established background in software engineering, as well as applications to user-centered design [<xref ref-type="bibr" rid="ref19">19</xref>], education [<xref ref-type="bibr" rid="ref20">20</xref>], and information systems planning [<xref ref-type="bibr" rid="ref21">21</xref>], for example.</p>
        <p>The CMM methodology is based on ongoing improvement of capability and is constructed using:</p>
        <list list-type="bullet">
          <list-item>
            <p>Maturity levels. These provide a structured template for persistent improvement. They promote the ability to assess new practice implication and success.</p>
          </list-item>
          <list-item>
            <p>Key process areas and their associated goals. A key process area is a set of related activities that can achieve the stated goal for that key process area.</p>
          </list-item>
          <list-item>
            <p>Common features. These are categories of key process areas and reflect the effectiveness and repeatability of that key process area. The CMM common features are commitment to performing, ability to perform, activities performed, measurement and analysis, and verifying implementation.</p>
          </list-item>
          <list-item>
            <p>Key practices. The implementation and persistent achievement in a key process area are defined by the procedures, practices, and communications implemented called key practices [<xref ref-type="bibr" rid="ref22">22</xref>].</p>
          </list-item>
        </list>
        <p>The adaptation of this CMM methodology into an operational framework (<xref ref-type="fig" rid="figure1">Figure 1</xref>) that can assess security technology, process, and human contribution in a medical environment in a simple and straightforward manner was developed by Williams [<xref ref-type="bibr" rid="ref22">22</xref>].</p>
        <p>This adaptation enables us to assess capability, competency, and maturity as a development of function, through the construction of a matrix of capability against competency that defines the maturity level reached (<xref ref-type="table" rid="table2">Table 2</xref>). The operational CMM framework (<xref ref-type="fig" rid="figure1">Figure 1</xref>) has been successfully applied to practical cybersecurity assessment of primary health care in Australia [<xref ref-type="bibr" rid="ref23">23</xref>]. <xref ref-type="table" rid="table2">Table 2</xref> is an example of this application in Australian primary health care, using back-up activities to articulate the key practice of back-up within the key process area of business continuity. As demonstrated in <xref ref-type="table" rid="table2">Table 2</xref>, the levels (1-5) define increasing competency in specific, deconstructed back-up activities.</p>
        <p>A comprehensive discussion on the development of this framework can be found in Williams [<xref ref-type="bibr" rid="ref22">22</xref>]. The framework was adapted to the context of this research as it relates to digital hospital infrastructure (described in the Methods section).</p>
      </sec>
      <sec>
        <title>Enabling Information Mapping Using Capability Maturity Modeling</title>
        <p>The HIMSS EMRAM maturity model, which measures the degree to which hospitals have replaced paper-based processes with technology, omits the ability to understand the supporting information and communication infrastructure required to achieve each level of maturity. The HIMSS EMRAM maturity levels were used as the starting point from which to devise the capabilities required to support digital technologies to deliver optimal operational experience and business value. Using the principles of CMM, an eight-level (rather than the traditional five-level CMM) information systems Infrastructure Maturity Model (IMM) was developed (<xref ref-type="fig" rid="figure2">Figure 2</xref>). This was developed using Cisco Systems Australia’s extensive experience in designing and building hospital infrastructure, by articulating the definition of infrastructure capability to support key domains, clinical services, and the application stack required to meet models such as HIMSS EMRAM. This was further enhanced through a series of observational ethnographic studies of hospital emergency departments that investigated how hospitals link the use of information with information technology and services that support a hospital’s information-driven processes. These studies looked at the way technology is integrated into the clinical process, from simple to complex, with reference to the HIMSS EMRAM structure and level of sophistication required at each layer [<xref ref-type="bibr" rid="ref24">24</xref>].</p>
        <p>The IMM provides a framework for determining the preparedness of a hospital facility to support existing and planned process rollouts of digital infrastructure by classifying the way hospitals manage their digital infrastructure and by reflecting the sophistication of the information processes used within the organization. Each of the maturity levels is characterized in terms of the experiences they generate for key stakeholders (<xref ref-type="table" rid="table3">Table 3</xref>). The expected stakeholder experience at each of the maturity levels incorporates the patient experience, clinical process and quality, and associated productivity outcomes at a business level. This was tested, refined, and socialized with hospital Chief Information Officers through Cisco contacts to ascertain its relevancy and applicability.</p>
        <p>Subsequently, the technology features and services (systems capability) for each maturity level were identified from the stakeholder experiences. These features demonstrate how technology can facilitate increased sophistication in health care delivery and the expected experience, reflecting the integration of technology and services (<xref ref-type="table" rid="table4">Table 4</xref>).</p>
      </sec>
      <sec>
        <title>Summary</title>
        <p>To demonstrate the business value of the IMM, <xref ref-type="fig" rid="figure3">Figure 3</xref> shows how the initial five levels increase information access. Once the five levels have been achieved, the value can be seen through process and business improvement.</p>
        <p>It is important to make the distinction between access value and process value. Improving the ability to access information enables the potential to create new and improved processes. However, these processes may not be realized because the supporting infrastructure that enables the application of this information may not exist. Articulation of the IMM into the Infrastructure Maturity Assessment (IMA) defines the outcomes a hospital could aspire to (ie, Levels 6-8) from enabling full utilization of the information accessed in Levels 1-5.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Representation of Capability Maturity Model as an operational framework.</p>
          </caption>
          <graphic xlink:href="medinform_v7i1e12465_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Extract of operational Capability Maturity Modeling (CMM) matrix for back-up capability [<xref ref-type="bibr" rid="ref22">22</xref>].</p>
          </caption>
          <table width="1000" cellpadding="7" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="160"/>
            <col width="160"/>
            <col width="160"/>
            <col width="160"/>
            <col width="160"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td>Back-up capability (activities)</td>
                <td>Level 1 Initial</td>
                <td>Level 2 Repeatable</td>
                <td>Level 3 Defined</td>
                <td>Level 4 Managed</td>
                <td>Level 5 Optimized</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Back-up frequency</td>
                <td>None or manual initiation on ad hoc basis, or unknown</td>
                <td>Manual initiation ad hoc, weekly, or every few days</td>
                <td>Manual initiation daily</td>
                <td>Automatic initiation daily</td>
                <td>Automatic initiation. Continuous/real time with checks in place</td>
              </tr>
              <tr valign="top">
                <td>Back-up type</td>
                <td>None or partial (data only) or incremental</td>
                <td>Partial (data and set-up files)</td>
                <td>Full – all data</td>
                <td>Full – all data and programs</td>
                <td>Full systems back-up or imaging, including operating system</td>
              </tr>
              <tr valign="top">
                <td>Back-up encryption</td>
                <td>None</td>
                <td>None</td>
                <td>Encrypted</td>
                <td>Encrypted with password</td>
                <td>All back-ups encrypted and password-protected. Appropriate password protection control</td>
              </tr>
              <tr valign="top">
                <td>Back-up reliability</td>
                <td>None or back-up not checked, or unknown</td>
                <td>Back-up checked for completion</td>
                <td>Back-up periodically checked for reliability</td>
                <td>Back-up periodically checked for reliability and outcome tracked</td>
                <td>Back-up reliability tested with automatic notification. Every back-up outcome tracked</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Information systems Infrastructure Maturity Model.</p>
          </caption>
          <graphic xlink:href="medinform_v7i1e12465_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Extract of stakeholder experience for the eight levels of data use maturity.</p>
          </caption>
          <table width="1000" cellpadding="7" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="200"/>
            <col width="800"/>
            <thead>
              <tr valign="top">
                <td>Maturity level for data use</td>
                <td>Stakeholder experience description</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Level 8: Orchestrated</td>
                <td>The clinical and patient experiences can be molded not only to the role of the person but to their location, who is around them, and the requirements of the individual clinician or patient. The patient can be dynamically guided to where their next appointment is, advised if the appointment is running late, and prompted just before the doctor is ready to see them. They can be delivered educational material at the most appropriate time as well as advice on support services they may need as they exit the hospital. These types of services can come to their bedside terminal if they are a patient or to their personal phone if they are an inpatient. The same types of customized services can be delivered to clinical and operational staff in the hospital, enabling them to better manage their tasks and access the most important information or people they require for the task at hand.</td>
              </tr>
              <tr valign="top">
                <td>Level 7: Contextualized</td>
                <td>The clinical information is now customized to specific roles. There is a high level of data interoperability between clinical systems, and clinicians can get a single pane view of the patient. Task management and alerts are available and implemented according to operational and model of care requirements. Task management and alerts are closed loop, that is, there are escalation paths when tasks and alerts are not appropriately processed. Tasks and alerts are sent directly to the required individual’s mobile device rather than to their desktop. Patients can access information at their bedside terminal, which is customized to the individual patient’s needs. This includes building services such as catering, lighting, temperature, and other support services. Patient and staff needs can be centrally monitored and support delivered as required either from the nursing station or a centralized service delivery hub.</td>
              </tr>
              <tr valign="top">
                <td>Level 2: Tactical</td>
                <td>The hospital is starting to use information technology for clinical purposes. They have several clinical applications that are not linked (typically patient administration system [PAS], pharmacy, pathology, and radiology), and the network has sufficient speed to support these applications where they are required. There is a recognition of the importance of their PAS, and there are robust disaster recovery processes in place. The clinical applications are not always available to the clinical staff. Ordering results and general reporting are via paper and forms. The PAS system provides the central information resource. The information from the PAS is limited to a restricted number of operational and clinical staff. The requirements of the biometric devices in the facility have driven the deployment of data grade wireless where it is clinically required. The voice communications process is seen as an increasingly important element of clinical collaboration, and there is basic Internet Protocol telephony with a full featured console.</td>
              </tr>
              <tr valign="top">
                <td>Level 1: Administrative</td>
                <td>Hospitals do not use information technology for clinical use in any significant fashion. They do use information technologies for operational and financial purposes. These hospitals are paper-based in their clinical processes. They use fax, mail, and desk phones for communication and collaboration. Ordering and reporting are via forms. Information retrieval is via paper patient notes and internal paper courier services.</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Technology features and services in the Infrastructure Maturity Model (IMM).</p>
          </caption>
          <table width="1000" cellpadding="7" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="200"/>
            <col width="200"/>
            <col width="600"/>
            <thead>
              <tr valign="top">
                <td>Maturity level</td>
                <td>Data use</td>
                <td>Technology services</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Level 8</td>
                <td>Orchestrated</td>
                <td><list list-type="bullet"><list-item><p>Ability to link and coordinate processes in a centralized and automated fashion</p></list-item><list-item><p>Agile infrastructure, adaptable to the changing needs of the facility</p></list-item></list></td>
              </tr>
              <tr valign="top">
                <td>Level 7</td>
                <td>Contextualized</td>
                <td><list list-type="bullet"><list-item><p>Clinical processes customized to role and context</p></list-item><list-item><p>Closed loop alerts and tasks</p></list-item><list-item><p>Patient, staff, physical devices, and other resource location identification</p></list-item><list-item><p>Analytics and dynamic resource management</p></list-item></list></td>
              </tr>
              <tr valign="top">
                <td>Level 6</td>
                <td>Integrated</td>
                <td><list list-type="bullet"><list-item><p>Clinical processes on mobile devices</p></list-item><list-item><p>Combined info views for staff and patients</p></list-item><list-item><p>Bring your own device for staff and patients</p></list-item><list-item><p>Building Management Systems integration</p></list-item><list-item><p>Location services for key staff</p></list-item></list></td>
              </tr>
              <tr valign="top">
                <td>Level 5</td>
                <td>Externalized</td>
                <td><list list-type="bullet"><list-item><p>Ability to virtualize the major clinical and operational hospital services for delivery independent of location</p></list-item></list></td>
              </tr>
              <tr valign="top">
                <td>Level 4</td>
                <td>Mobile</td>
                <td><list list-type="bullet"><list-item><p>Clinical data available on mobile devices</p></list-item><list-item><p>Widely used mobile voice communications</p></list-item><list-item><p>Video services where needed</p></list-item><list-item><p>High level of collaboration services</p></list-item><list-item><p>Intelligent patient services</p></list-item><list-item><p>Duress services widely available</p></list-item><list-item><p>Locations services for equipment</p></list-item></list></td>
              </tr>
              <tr valign="top">
                <td>Level 3</td>
                <td>Fixed</td>
                <td><list list-type="bullet"><list-item><p>Broad digital clinical data availability</p></list-item><list-item><p>Ordering and reporting largely paper</p></list-item><list-item><p>Results online, clinical data repository</p></list-item><list-item><p>Integrated and distributed telephony services</p></list-item><list-item><p>High performance personal computers</p></list-item></list></td>
              </tr>
              <tr valign="top">
                <td>Level 2</td>
                <td>Tactical</td>
                <td><list list-type="bullet"><list-item><p>Department level apps to selected staff</p></list-item><list-item><p>Ordering/reporting/accessing are paper-based</p></list-item><list-item><p>Centralized high-quality telephony services</p></list-item></list></td>
              </tr>
              <tr valign="top">
                <td>Level 1</td>
                <td>Administrative</td>
                <td><list list-type="bullet"><list-item><p>Limited clinical applications</p></list-item><list-item><p>Paper-based systems</p></list-item><list-item><p>Analogue voice communications</p></list-item></list></td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>The characterization of a hospital’s infrastructure maturity using such a framework enables (1) identification of weaknesses in Information and Communications Technology (ICT) infrastructure capability, (2) definition of a business case justification of ICT investment, (3) provision of a roadmap for digital transformation in health care, and (4) measurement of international benchmarking of hospital infrastructure performance.</p>
        <p>The usefulness of such a structure for characterizing health care ICT comes from the ability to link maturity levels and experience statements with the technology and services that need to be in place to deliver them. This research addresses the gap in the articulation of this technology infrastructure and services into practical and measurable capabilities.</p>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Value outcomes of infrastructure maturity.</p>
          </caption>
          <graphic xlink:href="medinform_v7i1e12465_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <p>In order to translate the requirements into assessable capabilities, we used the Williams Operational CMM Framework (<xref ref-type="fig" rid="figure1">Figure 1</xref>), by contextualizing it for this research (<xref ref-type="fig" rid="figure4">Figure 4</xref>). The adaptation consisted of extending the number of maturity levels from 5 to 8, numbering the boxes and paths to reflect process steps below, and adding scoring components (6 Criticality and 7 Weighting). We also added text for correlated infrastructure terminology: Key Process Areas became (box 2) Key Process Areas (technology domains), Goals became (box 3) Goals (subdomains), Key Practices became (box 4) Key Practices (capabilities), and Activities became (box 5) Activities (assessable outcomes).</p>
      <p>Using this framework (<xref ref-type="fig" rid="figure4">Figure 4</xref>), the process steps to create an operational infrastructure maturity assessment tool were as follows:</p>
      <list list-type="bullet">
        <list-item>
          <p>Step 1 Maturity Levels: Define maturity levels, which means identifying and defining maturity levels appropriate to the target context (as described in <xref ref-type="table" rid="table3">Table 3</xref>).</p>
        </list-item>
        <list-item>
          <p>Step 2 Key Process Areas (Technology Domains): Identify key process areas (technology domains) means identifying the technology domains needed to support the outcomes for each of the maturity levels (from Step 1).</p>
        </list-item>
        <list-item>
          <p>Step 3 Goals (Subdomain Functions): Generate goals (subdomain function) comprises deconstructing each domain (from Step 2) into distinct, although not necessarily discrete functions, of that domain, called subdomains.</p>
        </list-item>
        <list-item>
          <p>Step 4 Key Practices (Capabilities): Devise key practices (capabilities) involves deconstructing each subdomain (from Step 3) into capabilities expected to meet each goal (subdomain function).</p>
        </list-item>
        <list-item>
          <p>Step 5 Activities (Measurable Outcomes): Articulate activities (measurable outcomes) means articulating measurable outcomes for each key practice capability (from Step 4) for each maturity level. The outcomes of this step also specify improvement from one maturity level to the next. This is represented as a capability matrix.</p>
        </list-item>
      </list>
      <p>To facilitate a numeric scoring calculation of assessed infrastructure maturity, additional steps for assessment were devised.</p>
      <list list-type="bullet">
        <list-item>
          <p>Step 6 Critical/Noncritical Capabilities: Identify the critical and noncritical capabilities for each key practice (from Step 4).</p>
        </list-item>
        <list-item>
          <p>Step 7 Assign Weightings: Assign weightings of importance to the goal subdomain (from Step 3) for each capability (from Step 4).</p>
        </list-item>
      </list>
      <p>The research team consisted of the researcher, two Cisco infrastructure engineers and a health care technology expert, all with extensive experience in health care and the hospital environment in Australia and the United States. The construction of the framework was purposely constructed as nonproprietary and therefore industry generalizable. All capabilities researched and found to be Cisco specific were omitted from the capabilities. These capabilities may be explored for future revisions of the framework and for driving future technical innovation.</p>
      <fig id="figure4" position="float">
        <label>Figure 4</label>
        <caption>
          <p>Contextualized operational Capability Maturity Model for infrastructure maturity assessment.</p>
        </caption>
        <graphic xlink:href="medinform_v7i1e12465_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Step 1: Maturity Levels</title>
        <p>Eight maturity levels were identified and defined as appropriate to the digital hospital context. This definition and underlying reasoning for the eight levels of infrastructure maturity are explained in <xref ref-type="table" rid="table3">Table 3</xref>.</p>
      </sec>
      <sec>
        <title>Step 2: Key Process Areas (Technology Domains)</title>
        <p>In defining the technology landscape to articulate the key process areas (technology domains), existing categories of outcome-based functionality were apparent. To manage the large scale of a hospital landscape, it was logical to group the technology and services into existing categories of outcomes-based functionality. These categories reflect five technology domains: (1) Transport, (2) Collaboration, (3) Security, (4) Mobility, and (5) Data Center.</p>
      </sec>
      <sec>
        <title>Step 3: Goals (Subdomain Functions)</title>
        <p>The subdomains are the division of each domain into distinct, although not necessarily discrete (for that domain), functions of that domain. The methodology, by definition, looks at the delivery of services through infrastructure and therefore includes some services as infrastructure.</p>
        <p>To illustrate the results of this methodology, the subdomain, “Transport” is used as an example. In the Transport domain, six specific functions (subdomains) of transport in infrastructure were identified: (1) Campus Connectivity, (2) Secure Remote Access, (3) Traffic Optimization–Quality of Service (QoS), (4) Disruption Tolerance and High Availability, (5) Management, and (6) Extensibility.</p>
      </sec>
      <sec>
        <title>Step 4: Key Practices (Capabilities)</title>
        <p>The technology subdomains are further subdivided into key practices called capabilities. Each capability is described by a set of related information systems outcomes. The technology and technology services required to deliver those outcomes are then sequenced from Levels 1-8 of the IMA framework. <xref ref-type="table" rid="table5">Table 5</xref> is an extract from the Transport domain using the Campus Connectivity subdomain and three of the capabilities from this subdomain together with the measures of capability (activities) at each maturity level. Levels 1 and 8 are presented as examples, together with the abbreviated descriptor of each capability.</p>
        <table-wrap position="float" id="table5">
          <label>Table 5</label>
          <caption>
            <p>Extract of Transport domain, Campus Connectivity subdomain, with capability descriptors and measurable outcomes.</p>
          </caption>
          <table width="1000" cellpadding="7" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="170"/>
            <col width="400"/>
            <col width="200"/>
            <col width="230"/>
            <thead>
              <tr valign="bottom">
                <td>Capability</td>
                <td>Descriptor (abbreviated)</td>
                <td>Level 1<sup>a</sup></td>
                <td>Level 8</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Cabling standard</td>
                <td>ANSI/TIA-1179-A “Healthcare Facility Telecommunications Infrastructure” specifies recognized cabling and cabling category recommendations for health care facilities.</td>
                <td>Category 6A cabling is ≤30%</td>
                <td>Category 6A cabling &#62;91%</td>
              </tr>
              <tr valign="top">
                <td>Virtualization</td>
                <td>The concept of virtualization applies tags to network packets that create the appearance and functionality of network traffic that is physically on a single network but acts as if it is split between separate networks.</td>
                <td>No layer 2/3 virtualization implemented</td>
                <td>Access controlled, policy-based micro segmentation of campus infrastructure based on virtual extensible local area network</td>
              </tr>
              <tr valign="top">
                <td>Access port design and policy</td>
                <td>A well-defined access port policy is based on the requirements of the end devices and the access of the applications and services by that end device.</td>
                <td>No access port policy</td>
                <td>Software defined automation access port configuration per software defined networking (SDN) policy</td>
              </tr>
              <tr valign="top">
                <td>SDN integration</td>
                <td>The SDN controller should support integration using application programming interfaces (APIs). Representational State Transfer (REST) APIs enable automation, integration, and innovation. All controller functionality should be exposed through these REST APIs.</td>
                <td>No SDN</td>
                <td>Demonstration of SDN contextual workflow using API integration</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table5fn1">
              <p><sup>a</sup>Levels 2-7 (no entries) define increasing maturity assessment criteria.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Step 5: Activities (Measurable Outcomes)</title>
        <p>The activities (<xref ref-type="table" rid="table5">Table 5</xref>) express measurable outcomes (technology/technology services) for each capability at each maturity level, thus creating a capability matrix. In doing so, this matrix also specifies improvement from one maturity level to the next, which may be through increasing functionality, quality, or provision of a technology/service. The placement of each measurable outcome to a maturity level is based on best practice, in-depth knowledge, and experience by the Cisco design and implementation engineers and the external contributor to the project with expertise in health care technologies, networking, and CMM in the health care environment.</p>
      </sec>
      <sec>
        <title>Step 6: Critical / Noncritical Capabilities</title>
        <p>As demonstrated throughout this paper, a digital hospital’s infrastructure is complex with many facets. To provide a collated assessment of the maturity to meet the business goals, a measure of essential and nonessential capability is required. Once these capability measures were defined, the critical and noncritical capabilities were identified for each capability within a domain and subdomain. These decisions were based on the importance of a specific capability to meet the business outcomes at that maturity level and the risk to the associated service delivery in not achieving this capability at this level. The critical capabilities are defined as essential criteria and a requirement that hospital facilities must meet to be placed at this level, regardless of other components reached at that level. If a capability is noncritical, then it is desirable but not essential for the maturity level.</p>
      </sec>
      <sec>
        <title>Step 7: Assign Weightings</title>
        <p>Weightings are also assigned to each capability reflecting the importance of the capability within the subdomain. This is in addition to the critical and noncritical status of the capability because the criticality measure is a binary measure, and where there is more than one critical and noncritical capability, their importance to the subdomain is not necessarily equal. This allows for the more granular calculation of weighting specifically related to the maturity levels and the expectations in a hospital environment of what that maturity level would allow the organization to undertake both clinically and administratively.</p>
      </sec>
      <sec>
        <title>Summary</title>
        <p>The collective set of matrices created using this methodology make up the IMA framework. Across the framework, there are a total of five domains, 34 subdomains, and 164 individual capabilities defined (see <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>).</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Considerations</title>
        <p>This research resulted in the identification of five key process area technology domains (Transport, Collaboration, Security, Mobility, and Data Center) each comprising multiple distinct subdomains. The 34 subdomains define functionality spread across the five technology domains. The articulation of this functionality into 164 measurable capabilities was achieved through the definition of each capability at each of the eight maturity levels.</p>
        <p>We anticipate that the framework would be used to guide organizations as they go through major digital transformations. These transformations can be driven by the implementation of major clinical systems (such as EMRs), the refurbishment of brownfield facilities, or the building of new hospitals or area health services.</p>
        <p>The assessment of capabilities is an uncomplicated exercise to match current practice to the best-fit maturity level, although technical knowledge of the implemented infrastructure environment is required. Each domain/subdomain identifies the capabilities that need to be in place. The measurable outcomes specify in detail how this is undertaken, reflecting the competency and maturity levels.</p>
        <p>The challenges in defining and deconstructing each domain and its capability included a common understanding of terminology from a technical perspective and expansion of this for a broader technology informed audience. In developing a capabilities matrix, particularly one with the necessary eight levels, the challenge is that some capabilities may not change across each individual level. Therefore, assigning a level for that capability and subsequently calculating its weighting can be problematic. Where this occurs in the assessment, the highest level that capability can be assigned is allocated. This does not impact the weighting calculation for the level attained because the highest level is fundamentally determined by whether the critical capabilities for the domain or subdomain are met.</p>
        <p>The process of using the IMA framework consists of (1) analysis of the hospital’s information systems infrastructure across the five technology domains, (2) classification matched to the eight-level maturity model against the relevant operational outcomes, (3) a roadmap and tailored objectives for each technology area outlining efforts needed to improve capability, (4) comparison and benchmarking of a digital hospital’s information infrastructure capabilities, and (5) recommendations for achieving business and IT goals to meet business and experience outcomes.</p>
      </sec>
      <sec>
        <title>Infrastructure Maturity Assessment Outputs</title>
        <p>The following examples demonstrate typical outputs of the IMA framework and how they could be used by C-Suite executives (Chief Executive Officer, Chief Information Officer, Chief Marketing Officer, Chief Medical Informatics Officer) as a reference point for decision making on infrastructure investment.</p>
        <p>The IMA output demonstrates the ability of the framework to create a benchmark for measuring the capabilities of a given hospital or health service. Further breaking the result down into technology subdomains and capabilities provides a detailed fingerprint of the ICT capabilities and how they relate to the requirements and aspirations of the health care provider.</p>
        <p><xref ref-type="fig" rid="figure5">Figure 5</xref> provides a picture of the current state of maturity across 25 de-identified Australian hospitals and demonstrates that most hospitals are operating at Level 3 (Fixed) infrastructure maturity. This level of capability creates significant limitations in the ability of the hospital facility to take advantage of technologies aimed at improving information flow and process operations within the hospital facility through achieving Level 4 (Mobile).</p>
        <p>Level 3 describes an organization with limitations in its wireless, transport, and collaboration capability, restricting the ability to reliably access, share, and act on clinical information throughout the facility. These limitations diminish the value of the information applications that the organization has invested in by restricting the availability of information to when the clinical staff have access to personal computer endpoints. Ultimately, this limits the ability to drive clinical and operational process automation that can be gained from making data mobile.</p>
        <p>As an example, <xref ref-type="fig" rid="figure6">Figure 6</xref> demonstrates a maturity assessment result for the Transport domain of one hospital, showing the individual result for each of the subdomains in the Transport domain.</p>
        <p>The potential improvement lies in incrementally improving each subdomain infrastructure capability (as defined in <xref ref-type="table" rid="table5">Table 5</xref>), thus increasing the value proposition to the next level. Analysis of each subdomain score allows reflection on the current infrastructure capability with the typically experienced limitations highlighted as follows using the Transport example:</p>
        <list list-type="bullet">
          <list-item>
            <p>The impact of the subdomain assessment scores needs careful consideration when assessing the value proposition of infrastructure investment. For instance, the high Campus Connectivity score indicates a Transport infrastructure that is approaching high performance capability. However, the lower scores in the associated subdomains indicate potential network unreliability, suboptimal management of data priority, and network failure. This defines an infrastructure that is unable to fully leverage its capabilities.</p>
          </list-item>
          <list-item>
            <p>While the challenges in Campus Connectivity faced by many hospital facilities are less reflected in this assessment result, challenges commonly include aged infrastructure particularly at the Access layer (5+ years), legacy campus designs that are inflexible, separate physical networks for medical devices and building management systems, a lack of properly defined segmentation policies and design, a lack of network visibility for contextual behavioral analytics, and a lack of API integration capability. These challenges collectively result in a deficiency to support advanced functionality, modularity, and scalability, which is a key requirement to support data use at higher maturity levels.</p>
          </list-item>
          <list-item>
            <p>The challenges in Traffic Optimization–QoS (a maturity Level 2 in <xref ref-type="fig" rid="figure6">Figure 6</xref>) are primarily a result of fragmented QoS designs, the problematic processes to design and implement new campus and wide area network QoS configurations, and no clear roadmap to define an End-to-End contextual Quality of Experience. A lower Traffic Optimization score is often the result of an isolated QoS approach that does not cope well with new services and the associated traffic prioritization requirements.</p>
          </list-item>
          <list-item>
            <p>Similarly, in the Disruption Tolerant Networking &#38; High Availability subdomain (scoring Level 1 in <xref ref-type="fig" rid="figure6">Figure 6</xref>), low scores are often a result of potential for single points of failure in the Core/ Distribution and Access layers of the infrastructure, where devices are locally configured, arising from a lack of comprehensive designs based on Application and Infrastructure interaction.</p>
          </list-item>
        </list>
        <p>These challenges provide a snapshot of how the IMA framework can describe the current architecture, identify the misalignment between existing capability and desired capability, and inform subsequent infrastructure planning.</p>
        <fig id="figure5" position="float">
          <label>Figure 5</label>
          <caption>
            <p>Example of the overall maturity assessment measure across 25 hospitals in Australia.</p>
          </caption>
          <graphic xlink:href="medinform_v7i1e12465_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure6" position="float">
          <label>Figure 6</label>
          <caption>
            <p>Example of Transport domain assessment output. QoS: quality of service.</p>
          </caption>
          <graphic xlink:href="medinform_v7i1e12465_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Framework Extensions</title>
        <p>One application of the IMA framework is that it could be mapped to the HIMSS EMRAM, as both frameworks provide a roadmap to support broader process changes in hospitals. Arguably the IMA framework levels could correspond to the application stack requirements to meet the EMRAM model. This would provide a new health care industry benchmark of the maturity of the clinical application deployment and use within hospitals that can be supported by a given level of ICT infrastructure maturity. Localization may be required in applying this framework to countries outside Australia.</p>
      </sec>
      <sec>
        <title>Conclusion</title>
        <p>Digital hospitals need to take advantage of the technologies that can improve information flow and use to meet quality clinical and administrative outcomes. The necessity for the technology infrastructure to support these outcomes is clear. Yet such infrastructure is complex and continually evolving in its design and deployment particularly when this involves many stakeholders’ demands and expectations. The resultant assessment of such infrastructure to meet business outcomes and realize value to health care organization through its capability is equally complex.</p>
        <p>The use of the Williams CMM Operational Framework allows such capability to be deconstructed into manageable constituent elements and assessed individually. Through this process, it also identifies specific incremental improvement for each capability. The resulting IMA framework allows hospital management and technicians to clearly see how incremental improvements in their infrastructure can be achieved to support clinical and operation goals. Such a method assists hospitals to define an improvement pathway and maturity in delivering their organizational objectives.</p>
        <p>The IMA characterizes the technology services required to support a hospital’s information-driven processes. Thus, it provides a tool for determining the preparedness of a hospital facility to support existing or planned process rollouts. The IMA classifies the way hospitals manage their digital infrastructure into an eight-level model that reflects the sophistication of the information processes used within the facility. Each of these levels is characterized in terms of the experiences they generate for the key stakeholders and the technology services required to support those experiences.</p>
        <p>Importantly, the IMA framework articulates how hospitals can generate more value from their infrastructure as it defines the levels at which the critical “enabling information” characteristics for an organization are primarily delivered. It describes the stages of information use and resultant clinical/patient experience within a hospital and the ICT infrastructure requirements to reliably achieve those levels of experience. The framework is designed to stage the infrastructure development pathway so that clear benefits can be attributed to the incremental investment that is required to progress from one stage to the next. Consequently, robust business cases can be made for that investment. Ultimately, the purpose of the framework is to map a pathway where Chief Information Officers can see a logical sequence of infrastructure development that they need to take their hospital facility through to reach their desired level of clinical and operational competency.</p>
        <p>The development of a generalizable Infrastructure Maturity Assessment tool contributes to and supports the digital hospital industry, providing an international benchmarking standard.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <app id="app1">
        <title>Multimedia Appendix 1</title>
        <p>Infrastructure Maturity Assessment framework capabilities.</p>
        <media xlink:href="medinform_v7i1e12465_app1.pdf" xlink:title="PDF File (Adobe PDF File), 73KB"/>
      </app>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">API</term>
          <def>
            <p>application programming interface</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">CMM</term>
          <def>
            <p>Capability Maturity Model</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">EMR</term>
          <def>
            <p>electronic medical record</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">EMRAM</term>
          <def>
            <p>EMR Adoption Model</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">HIMSS</term>
          <def>
            <p>Healthcare Information and Management Systems Society</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">ICT</term>
          <def>
            <p>information and communications technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">IMA</term>
          <def>
            <p>Infrastructure Maturity Assessment</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">IMM</term>
          <def>
            <p>Infrastructure Maturity Model</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">PAS</term>
          <def>
            <p>patient administration system</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb10">QoS</term>
          <def>
            <p>quality of service</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb11">REST</term>
          <def>
            <p>Representational State Transfer</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb12">SDN</term>
          <def>
            <p>software defined networking</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>Cisco Systems Australia is acknowledged as sponsor of this research.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>BL and TC are employed by Cisco Systems Australia. MH is employed by Cisco Systems. PAHW is Cisco Chair at Flinders University and received a grant for this research.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Agarwal</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Gao</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>DesRoches</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Jha</surname>
            <given-names>AK</given-names>
          </name>
        </person-group>
        <article-title>The Digital Transformation of Healthcare: Current Status and the Road Ahead</article-title>
        <source>Information Systems Research</source>  
        <year>2010</year>  
        <month>12</month>  
        <volume>21</volume>  
        <issue>4</issue>  
        <fpage>796</fpage>  
        <lpage>809</lpage>  
        <pub-id pub-id-type="doi">10.1287/isre.1100.0327</pub-id></nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
        <source>SAP</source>  
        <year>2018</year>  
        <month>05</month>  
        <day>4</day>  
        <access-date>2018-10-10</access-date>
        <comment>A future in digital health 2017 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.sap.com/industries/healthcare.html">https://www.sap.com/industries/healthcare.html</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="733iSNn1u"/></comment> </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Ashton</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <source>Making sense of IoT: How the Internet of Things became humanity's nervous system</source>  
        <year>2017</year>  
        <month>02</month>  
        <day>10</day>  
        <access-date>2018-10-10</access-date>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.scribd.com/document/346619901/HPE-Aruba-IoT-eBook">https://www.scribd.com/document/346619901/HPE-Aruba-IoT-eBook</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="75J7R3ud3"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Trtovac</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>The Use of Technology in Identifying Hospital Malnutrition: Scoping Review</article-title>
        <source>JMIR Med Inform</source>  
        <year>2018</year>  
        <month>01</month>  
        <day>19</day>  
        <volume>6</volume>  
        <issue>1</issue>  
        <fpage>e4</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://medinform.jmir.org/2018/1/e4/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/medinform.7601</pub-id>
        <pub-id pub-id-type="medline">29351894</pub-id>
        <pub-id pub-id-type="pii">v6i1e4</pub-id>
        <pub-id pub-id-type="pmcid">PMC5797288</pub-id></nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Choi</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>JK</given-names>
          </name>
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>SJ</given-names>
          </name>
          <name name-style="western">
            <surname>Cho</surname>
            <given-names>SC</given-names>
          </name>
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>IN</given-names>
          </name>
        </person-group>
        <article-title>Satisfaction Levels and Factors Influencing Satisfaction With Use of a Social App for Neonatal and Pediatric Patient Transfer Information Systems: A Questionnaire Study Among Doctors</article-title>
        <source>JMIR Med Inform</source>  
        <year>2016</year>  
        <month>08</month>  
        <day>04</day>  
        <volume>4</volume>  
        <issue>3</issue>  
        <fpage>e26</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://medinform.jmir.org/2016/3/e26/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/medinform.5984</pub-id>
        <pub-id pub-id-type="medline">27492978</pub-id>
        <pub-id pub-id-type="pii">v4i3e26</pub-id>
        <pub-id pub-id-type="pmcid">PMC4990714</pub-id></nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Walsh</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Rumsfeld</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Leading the Digital Transformation of Healthcare: The ACC Innovation Strategy</article-title>
        <source>J Am Coll Cardiol</source>  
        <year>2017</year>  
        <month>11</month>  
        <day>28</day>  
        <volume>70</volume>  
        <issue>21</issue>  
        <fpage>2719</fpage>  
        <lpage>2722</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S0735-1097(17)41117-X"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.jacc.2017.10.020</pub-id>
        <pub-id pub-id-type="medline">29169479</pub-id>
        <pub-id pub-id-type="pii">S0735-1097(17)41117-X</pub-id></nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
        <source>HIMSS Analytics</source>  
        <year>2018</year>  
        <access-date>2018-10-10</access-date>
        <comment>Electronic Medical Record Adoption Model: HIMSS Analytics EMRAM 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.himssanalytics.org/emram">https://www.himssanalytics.org/emram</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="733iiwXJG"/></comment> </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Byrd</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Byrd</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>Developing an instrument for information quality for clinical decision making</article-title>
        <year>2012</year>  
        <month>01</month>  
        <day>04</day>  
        <conf-name>45th Hawaii International Conference on System Sciences</conf-name>
        <conf-date>Jan. 4-7, 2012</conf-date>
        <conf-loc>Maui, Hawaii</conf-loc>
        <publisher-name>IEEE</publisher-name>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/6149169"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1109/HICSS.2012.210</pub-id></nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bernal-Delgado</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <article-title>Data quality assurance approaches using administrative data in healthcare performance assessment</article-title>
        <source>European Journal of Public Health</source>  
        <year>2017</year>  
        <volume>27</volume>  
        <issue>3</issue>  
        <fpage>-</fpage>  
        <pub-id pub-id-type="doi">10.1093/eurpub/ckx187.755</pub-id></nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Batini</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Scannapieco</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Batini</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Data quality dimensions</article-title>
        <source>Data and Information Quality. Data-Centric Systems and Applications</source>  
        <year>2016</year>  
        <publisher-loc>Cham, Switzerland</publisher-loc>
        <publisher-name>Springer International Publishing</publisher-name>
        <fpage>21</fpage>  
        <lpage>51</lpage> </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Russ</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Saleem</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Justice</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Woodward-Hagg</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Woodbridge</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Doebbeling</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>Electronic health information in use: Characteristics that support employee workflow and patient care</article-title>
        <source>Health Informatics J</source>  
        <year>2010</year>  
        <month>12</month>  
        <volume>16</volume>  
        <issue>4</issue>  
        <fpage>287</fpage>  
        <lpage>305</lpage>  
        <pub-id pub-id-type="doi">10.1177/1460458210365981</pub-id>
        <pub-id pub-id-type="medline">21216808</pub-id>
        <pub-id pub-id-type="pii">16/4/287</pub-id></nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Batini</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Scannapieco</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Batini</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Scannapieco</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Information Quality Dimensions for Maps and Texts</article-title>
        <source>Data and Information Quality. Data-Centric Systems and Applications</source>  
        <year>2016</year>  
        <publisher-loc>Cham, Switzerland</publisher-loc>
        <publisher-name>Springer International Publishing</publisher-name>
        <fpage>53</fpage>  
        <lpage>86</lpage> </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Cabitza</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Batini</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Batini</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Scannapieco</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Information quality in healthcare</article-title>
        <source>Data and Information Quality. Data-Centric Systems and Applications</source>  
        <year>2016</year>  
        <publisher-loc>Cham, Switzerland</publisher-loc>
        <publisher-name>Springer International Publishing</publisher-name>
        <fpage>403</fpage>  
        <lpage>419</lpage> </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>del Pilar Angeles</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>García-Ugalde</surname>
            <given-names>FJ</given-names>
          </name>
        </person-group>
        <article-title>Subjective assessment of data quality considering their interdependencies and relevance according to the type of information systems</article-title>
        <source>International Journal on Advances in Software</source>  
        <year>2012</year>  
        <volume>5</volume>  
        <issue>3-4</issue>  
        <fpage>389</fpage>  
        <lpage>400</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.iariajournals.org/software/soft_v5_n34_2012_paged.pdf"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
        <source>Organisation for Economic Co-operation and Development</source>  
        <access-date>2018-10-10</access-date>
        <comment>OECD Reviews of health care quality: Australia 2015 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.oecd.org/australia/oecd-reviews-of-health-care-quality-australia-2015-9789264233836-en.htm">http://www.oecd.org/australia/oecd-reviews-of-health-care-quality-australia-2015-9789264233836-en.htm</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="75J8Krnxy"/></comment> </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sebastian-Coleman</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <source>Measuring Data Quality For Ongoing Improvement. A Data Quality Assessment Framework</source>  
        <year>2013</year>  
        <publisher-loc>Burlington, MA</publisher-loc>
        <publisher-name>Morgan Kaufmann Publishers Inc</publisher-name></nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>YW</given-names>
          </name>
          <name name-style="western">
            <surname>Strong</surname>
            <given-names>DM</given-names>
          </name>
          <name name-style="western">
            <surname>Kahn</surname>
            <given-names>BK</given-names>
          </name>
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>RY</given-names>
          </name>
        </person-group>
        <article-title>AIMQ: a methodology for information quality assessment</article-title>
        <source>Information &#38; Management</source>  
        <year>2002</year>  
        <month>12</month>  
        <volume>40</volume>  
        <issue>2</issue>  
        <fpage>133</fpage>  
        <lpage>146</lpage>  
        <pub-id pub-id-type="doi">10.1016/s0378-7206(02)00043-5</pub-id></nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Galin</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Avrahami</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Are CMM Program Investments Beneficial? Analyzing Past Studies</article-title>
        <source>IEEE Softw</source>  
        <year>2006</year>  
        <volume>23</volume>  
        <issue>6</issue>  
        <fpage>81</fpage>  
        <lpage>87</lpage>  
        <pub-id pub-id-type="doi">10.1109/MS.2006.149</pub-id></nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Jokela</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>Evaluating the user-centredness of development organisations: conclusions and implications from empirical usability capability maturity assessments</article-title>
        <source>Interacting with Computers</source>  
        <year>2004</year>  
        <month>12</month>  
        <volume>16</volume>  
        <issue>6</issue>  
        <fpage>1095</fpage>  
        <lpage>1132</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.intcom.2004.07.006</pub-id></nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Boulet</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Dupuis</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Belkhiter</surname>
            <given-names>N</given-names>
          </name>
        </person-group>
        <article-title>Selecting continuous training program and activities for computer professionals</article-title>
        <source>Computers &#38; Education</source>  
        <year>2001</year>  
        <month>1</month>  
        <volume>36</volume>  
        <issue>1</issue>  
        <fpage>83</fpage>  
        <lpage>94</lpage>  
        <pub-id pub-id-type="doi">10.1016/S0360-1315(00)00057-9</pub-id></nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Saleh</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Alshawi</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>An alternative model for measuring the success of IS projects: the GPIS model</article-title>
        <source>Journal of Ent Info Management</source>  
        <year>2005</year>  
        <month>02</month>  
        <volume>18</volume>  
        <issue>1</issue>  
        <fpage>47</fpage>  
        <lpage>63</lpage>  
        <pub-id pub-id-type="doi">10.1108/17410390510571484</pub-id></nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Williams</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>A practical application of CMM to medical security capability</article-title>
        <source>Info Mngmnt &#38; Comp Security</source>  
        <year>2008</year>  
        <month>03</month>  
        <day>21</day>  
        <volume>16</volume>  
        <issue>1</issue>  
        <fpage>58</fpage>  
        <lpage>73</lpage>  
        <pub-id pub-id-type="doi">10.1108/09685220810862751</pub-id></nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>RACGP</collab>
        </person-group>
        <source>Computer and information security standards and workbook</source>  
        <year>2012</year>  
        <access-date>2018-10-10</access-date>
        <publisher-loc>Melbourne, Australia</publisher-loc>
        <publisher-name>Royal Australian College of General Practitioners</publisher-name>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.racgp.org.au/FSDEDEV/media/documents/Running%20a%20practice/Practice%20standards/Computer-and-information-security.pdf">https://www.racgp.org.au/FSDEDEV/media/documents/Running%20a%20practice/Practice%20standards/Computer-and-information-security.pdf</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="75J9C6cLO"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>Creative Intellect Consulting</collab>
        </person-group>
        <source>The network foundation for IOT and connected healthcare</source>  
        <year>2018</year>  
        <access-date>2018-10-09</access-date>
        <comment>CIC Healthcare Series 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.creativeintellectuk.com/download-from-cic/healthcare/progressing-the-patient-experience-in-iot-and-connected-healthcare/">https://www.creativeintellectuk.com/download-from-cic/healthcare/progressing-the-patient-experience-in-iot-and-connected-healthcare/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="733jiloEq"/></comment> </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
