SAFETY OF PUBLIC HOSPITALS IN SOUTH AFRICA: AN EXAMINATION OF SAFETY AND SECURITY MEASURES AT FIVE PUBLIC HOSPITALS IN GAUTENG, SOUTH AFRICA
Abstract
Research Paper
DOI: 10.37458/ssj.3.2.1
Public hospitals are regularly confronted by safety and security breaches that expose employees, patients, and visitors to serious and violent crimes such as assault, rape, murder and theft. Furthermore, assets such as computer equipment, medical files, medical equipment, and medicines are frequently stolen from state hospitals. This paper is aimed at is aimed at identifying security gaps and shortcomings in the provision of security services so that recommendations can be formulated to address the assessed risks and other threats. Furthermore, the paper described the effectiveness of safety and security measures that are currently employed in public hospitals. A qualitative study was conducted at five public hospitals in the province of Gauteng. Data was collected through one-on-one in-depth interviews with 30 key participants who were selected through purposive sampling. Additionally, safety and security documents were analysed, followed by observation of security personnel in the control rooms. The research confirmed that inadequate security systems regarding perimeter fences, closed‑circuit television and trained security personnel at the research sites made it difficult to deter, detect and detain perpetrators. Furthermore, the use of a Security Risk Management Model developed specifically for public hospitals during this research is recommended.
References
Anon. (2017). World patient safety day 2017. 17 September. Available at: http://www.gov.za/ [Accessed on: 23/06/2017].
Anon. (2017). Parts of ceilings collapse in wards at Tempisa and Pholosong hospitals. TimesLive, 22 July. Available at: https://www.timeslive.co.za/news/south-africa/2017-07-22-parts-of-ceilings-collapse-in-wards-at-tembisa-and-pholosong-hospitals/ [Accessed on: 03/10/2020].
Antonucci, D. (2017). The cyber risk handbook: Creating and measuring effective cybersecurity capabilities. Canada: John Wiley & Sons, Inc.
Appknox. 2022. Top Healthcare Cybersecurity Trends for 2022. Available at: https://www.appknox.com/hubfs/Ebooks%202022/Top%20Healthcare. [Accessed on 26/10/2022].
Arwui, C.C., Tshivhase, V.M. & Nchodu, R.M. (2016). Modeling a physical protection system for the 444 TBq 60Co irradiation source at the Center for Applied Radiation Science and Technology, Mafikeng, South Africa. Journal of Physical Security, 9(1):54.
Besenyő, J., Márton, K., Shaffer, R., 2021. Hospital Attacks Since 9/11: An Analysis of Terrorism Targeting Healthcare Facilities and Workers, Studies in Conflict & Terrorism. 2021, pp 1–19. DOI: 10.1080/1057610X.2021.1937821.
Bloom, J. (2014). Safety at Helen Joseph questioned. Politicsweb, 3 October. Available at: https://northcliffmelvilletimes.co.za/185253/safety-at-helen-joseph-questioned/ [Accessed on 17/10/2020].
Bloom, J. (2017). R500 million irregular security contracts extended at Gauteng hospitals. Politicsweb, 6 July. Available at: https://www.politicsweb.co.za/politics/r500-million-irregular-security-contracts-extended [Accessed on: 11/10/2020].
Boaz, G., Miri H., Wernli, 2013. Terrorist Attacks against Hospitals: Case Studies, Working Paper no. 25, Herzliya: International Institute for Counter-Terrorism. p 4.
Burmahl, B. Morgan, J. & Hoppszallern, S. (2016). Announcement of prevention: Survey shows hospitals beefing up training to address security concerns. Trustee, 69(10):13-16.
Chemick, L. (2017). Spike in attacks on Gauteng hospitals staff. IOL News, 11 May. Available at: https://www.iol.co.za/news/south-africa/gauteng/spike-in-attacks-on-gauteng-hospital-staff-9058111 [Accessed on: 24/06/2017].
Child, K. (2017). Babies are not safe from kidnappers due to a lack of security outside maternity ward. SowetanLive, 05 July. Available at: https://www.sowetanlive.co.za/news/2017-05-07-count-the-ways-sa-state-hospitals-are-badly-managed/ [Accessed on: 17/10/2020].
Delport, C.S.L. & Roestenburg, W.J.H. (2016). Quantitative data-collection methods: Questionnaires, checklists, structured observation and structured interview schedules. In A.S. de Vos, H. Strydom, C.B. Fouchė & C.S.L. Delport, eds. Research at grass roots: For the social sciences and human service professions (pp. 171-205). Pretoria: Van Schaik.
Donald, C. (2020). CCTV surveillance needs are critical in defining types of camera development. Hi-Tech Security Solutions, 26(15).
Fayers, F. (2017). Hospersa highlights dismal health standards at Gauteng hospital. Hospersa, 8 June. Available at: https://www.hospersa.co.za/news/hospersa-highlights-dismal-health-standards-at-gauteng-hospital/ [Accessed on: 03/10/2020].
Gillies, V.C. (2014). Security guard stabbed to death. Eyewitness News, 05 October. Available at: https://ewn.co.za/2014/10/05/Security-guard-stabbed-to-death [Accessed on 17/10/2020].
Govender, D. (2018). Managing security information incidents, threats and vulnerabilities: A practical approach for security practitioners serving private and government entities in South Africa. Pretoria: Unisa Press.
Halibozek, E.P. & Kovacich, G.L. (2017). The manager’s handbook for corporate security: Establishing and managing a successful assets protection program. 2nd edition. Chennai: Candice Janco.
Holmes, J. (2020). Global security industry adopts servistisation models. Hi-Tech Security Solutions. 26 (33).
Hlatshaneni, S. (2017). More details on shock charlotte maxeke hospital roof collapse emerge. The Citizen , 2 March. Available at: https://citizen.co.za/news/south-africa/1445217/more-details-on-shock-charlotte-maxeke-roof-collapse-emerge/ [Accessed on: 17/102020].
Kole, O.J. (2015). Partnership policing between the South African Police Service and the private security industry in reducing crime in South Africa. Unpublished dissertation. University of South Africa, Pretoria.
Lauver, M.2021. Five trends in healthcare cybersecurity. Washington DC: Security magazine.
Mbatha, N. (2019). DA slams five hour waiting time at Chris Hani Baragwanath hospital. African News Agency, 2 October. Available at: https://www.iol.co.za/news/politics/da-slams-five-hour-waiting-time-at-chris-hani-baragwanath-hospital-33857447 [Accessed on: 1711/2019].
National Occupational Safety Association 2013. Available at: https://www.omicsonline.org/societies/nosa-national-occupational-safety-association/ [Accessed on: 19/10/2020].
Nugraha, Y. (2015). Security assurance requirements engineering (stare) for trustworthy service level agreements. In: 2015 IEEE 23rd International Requirements Engineering Conference (RE). (August 2015) pp. 398-399. IEEE. Available at: https://ieeexplore.ieee.org/abstract/document/7320458 [Accessed on: 03/10/2020].
Quinn, R., Holguin, N., Poster, B., Roach, C. & Van der Merwe, J.K. (2019). WASPP: Workflow automation for security policy procedures. In 2019 15th International Conference on Network and Service Management (CNSM), Halifax, NS, Canada, 2019, pp. 1-5. IEEE. Available at: https://ieeexplore.ieee.org/document/9012707 [Accessed on: 03/10/2020].
Ráczkevy-Deák, G. 2021. Violent acts against healthcare institutions and workers in Hungury. Contemporary Military Challenges, November 2021 (23: 4).
Rahlaga, M. 2016. Two health officials busted for suspected fraud at Chris Hani Bargwanath Hospital.EyewitnessLNews, 29 September. Available at: https://ewn.co.za/2016/09/29/Two-health-officials-busted-for-suspected-fraud-at-Chris-Hani-Baragwanath-hospital [Accessed on 17/10/2020].
Rispel L.C., de Jager P. & Fonn S. (2015). Exploring corruption in the South African health sector. Health Policy and Planning, 31(2):239-249. 22 June. Available at: https://www.rhap.org.za [Accessed on: 03/07/2017].
Seldon, A. (2020). You have to know it to manage it. Hi-Tech Security Solutions. 26 (18).
Schurink, W., Fouché, C.B. & De Vos, A.S. (2016). Qualitative data analysis and interpretation. In A.S. de Vos, H. Strydom, C.B. Fouchė & C.S.L. Delport, eds. Research at grass roots: For the social sciences and human service professions (pp. 397-423). Pretoria: Van Schaik.
Shange, N. & Alexandra, P. (2017). Half a million spent monthly on security at clinic were teen was raped. TimesLive, 08 June. Available at: https://www.timeslive.co.za/news/south-africa/2017-06-07-teen-raped-in-toilets-at-lenasia-south-clinic/ [Accessed on: 17/10/2020].
South Africa. (1985). Control of Access to Public Premises and Vehicles Act, No 53 of 1985. Available at https://www.saps.gov.za/resource_centre/acts/downloads/juta/a53of1985.pdf [Accessed on: 03/10/2020].
South Africa. (1993). Occupational Health and Safety Amendment Act, No. 181 of 1993. https://www.gov.za/sites/default/files/gcis_document/201409/act181of1993.pdf [Accessed on: 03/10/2020].
South Africa. (1998). Minimum information security standards. Available at: https://www.right2info.org/resources/publications/laws-1/SA_Minimum%20Information%20Security%20Standards.pdf [Accessed on: 17/10/2020].
TMG Digital, (2017). Child raped at a hospital. Times Live, 12 June. Available at: https://www.timeslive.co.za/news/south-africa/2017-03-15-child-raped-at-a-hospital/ [Accessed on: 17/10/2020]
Trim, P. & Upton, D. (2016). Cyber security culture: Counteracting cyber threats through organizational learning and training. New York: Routledge.
© 2020 Security Science Journal. All rights reserved