Search Results

The default setting for search results displays All Content. If you prefer to see recent content only, please adjust the date filter.

11 Results Found

How Hospitals Can Make the Best Use of Social Media

Discover how hospitals can effectively utilize social media to engage with patients and communities. Learn more about the benefits and strategies in this comprehensive guide.
Trustee Magazine Articles

Hospitals Against Violence

AHA launched Hospitals Against Violence, a board-initiated program that speaks to the mission-driven imperative of its members and the association: to address violence in our workplaces and communities so that a society of healthy communities, where all individuals reach their highest potential for health, is achievable.

10 health care trends for 2017

Trustee talking points Health care is undergoing rapid transformation, and developments in 2017 should prove no exception. Hospital trustees need to stay on

Hospitals use technology to improve emergency room performance

Hospitals are making greater use of new technologies to improve emergency department throughput.

Challenging Deeply Held Beliefs That Stymie Hospital Boards

Deeply held beliefs can blind boards to the true nature of change. It’s time to challenge the orthodoxies.

10 trends for 2018

Health care delivery and methods of paying for it will continue to evolve during 2018 in a changing economic, political, technological and demographic landscape.

Hospitals Boost Cybersecurity Efforts

2015 was the year of the health care security breach.

Are hospital boards paying enough attention to strategic planning?

In the 2017-2018 Public Company Governance Survey conducted by the National Association of Corporate Directors, 600 directors of publicly traded companies we

Investing in Innovation to Disrupt Health Cares Status Quo

Trustee Talking Points Trustee Talking Points Many hea

How Hospitals Can Prepare for Inevitable Breaches of Patient Data

Snapshot A series of high-profile breaches underscored the vulnerability of online records and the ability of cyber-criminals to