Feeds

Munro report: Child protection staff hindered by IT

Social workers say present ICT systems 'obstacles to good practice'

Reducing security risks from open source software

A number of social workers interviewed for a government-commissioned review (177-page PDF/2.1MB) of child protection in England said that their locally procured computer systems were "substantial obstacles" to good practice. The workers were participating in an online conversation as part of the report by Professor Eileen Munro.

The document says that any ICT redesign within child protection should be reviewed to determine if it helps or hinders frontline practice.

"This obviously will include any practice procedures and guidance, but more often ignored is the detail of business processes for finance, personnel and room bookings, for example. Most critical, however, is the provision, maintenance and review of ICT systems," says the report.

It acknowledges that the impact of technology on human performance is complex, and says that the conventional view is that new information technology and automation creates better ways of doing the same tasks.

"However, it is more accurate to say that any new technology is a change from one way of doing things to another. It alters the tasks that humans are expected to perform and it can, in subtle and unexpected ways, influence and distort the way they carry out their part of the process," it says.

It offers a number of recommendations in designing or procuring new software and says that local authorities should consider the following.

  • Recording systems for child and family social work should meet the critical need to maintain a systemic and family narrative, which describes all the events associated with the interaction between a social worker, other professionals and the child and their family.
  • ICT systems for child and family social work should be able to adapt with relative ease to changes in local child protection system needs, operational structures and data performance requirements.
  • And the analysis of requirements for ICT-based systems for child and family social work should primarily be based on a human-centred analysis of what is required by frontline workers, with any clashes between the functional requirements being resolved as quickly as possible.

It goes on to say that recording is a key social work task and its centrality to the protection of children cannot be underestimated. Getting effective recording systems in place to support practice is critical, it adds.

"Although mandatory requirements to use the prescribed recording system, endorsed by the previous government, have recently been removed, most systems currently in use were developed on that basis. A major challenge for local redesign is therefore to develop, with social workers, new ICT systems to meet their case recording needs," explains the review.

Data on performance is also singled out as being an important area that could be improved. Local government and its partners should use a combination of nationally and locally collected performance information to help benchmark performance, facilitate improvement and promote accountability, it says.

"Performance information should not be treated as a straightforward measure of good or bad practice but interrogated to see what lies behind it. A low number of children being removed from their birth families, for example, can arise from skilled help making the children safe or from a poor quality assessment of risk," it adds.

This article was originally published at Guardian Government Computing.

Guardian Government Computing is a business division of Guardian Professional, and covers the latest news and analysis of public sector technology. For updates on public sector IT, join the Government Computing Network here.

Maximizing your infrastructure through virtualization

More from The Register

next story
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.