Article Text

Download PDFPDF

Protocol
Role of security guards in healthcare settings: a protocol for a systematic review
  1. Lindokuhle Shongwe1,
  2. Saskia Hanft-Robert2,
  3. Qhama Cossie3,4,
  4. Philasande Sithole3,
  5. Tessa Roos3,4,
  6. Leslie Swartz1
  1. 1Department of Psychology, Stellenbosch University, Stellenbosch, South Africa
  2. 2Department for Medical Psychology, University Medical Center Hamburg-Eppendorf, Hamburg, Germany
  3. 3Department of Health & Wellness, Valkenberg Hospital, Cape Town, South Africa
  4. 4Department of Psychiatry and Mental Health, University of Cape Town, Cape Town, South Africa
  1. Correspondence to Saskia Hanft-Robert; s.hanft-robert{at}uke.de

Abstract

Introduction There is a paucity of literature on the comprehensive roles of security guards in healthcare, regardless of day-to-day observations of security guards playing an extensive role in this field. Thus, this review will systematically explore the roles of security guards in healthcare contexts to create a centred body of evidence.

Methods and analysis The study will systematically review existing quantitative and qualitative peer-reviewed literature on security guards in institutional healthcare so as to understand their roles. We will conduct the systematic review on 10 electronic databases: BioMed Central, SocIndex, ScienceDirect, Google Scholar, JSTOR, PsycARTICLES, PsycINFO, Scopus, Web of Science and PubMed. Data extraction will be in the form of a word document. Mendeley software will be used to keep track of references, while the systematic review software, Rayyan, will be used for the screening, inclusion and exclusion of articles. If necessary, reviewer number 3 will conduct a third review should any disputes arise between the two initial reviewers. Quality assessment of the articles will be measured with the Critical Appraisal Skills Programme tool for articles in terms of the research aims, methodology used, sample, data analysis, presentation of findings, values of the research, as well as trustworthiness if it is a qualitative study or reflexiveness if it is a quantitative study. Studies dating back 32 years will be incorporated for a comprehensive review.

Ethics and dissemination This systematic review will use publicly available peer-reviewed data from electronic databases and will, therefore, not require an ethical review, but rather, an ethics waiver. The systematic review protocol will be submitted for ethics waiver clearance from the Stellenbosch University Health Research Ethics Committee. The findings from this review will be disseminated through peer-reviewed publications and conferences.

PROSPERO registration number CRD42022353653.

  • PUBLIC HEALTH
  • Quality in health care
  • GENERAL MEDICINE (see Internal Medicine)
  • PSYCHIATRY
http://creativecommons.org/licenses/by-nc/4.0/

This is an open access article distributed in accordance with the Creative Commons Attribution Non Commercial (CC BY-NC 4.0) license, which permits others to distribute, remix, adapt, build upon this work non-commercially, and license their derivative works on different terms, provided the original work is properly cited, appropriate credit is given, any changes made indicated, and the use is non-commercial. See: http://creativecommons.org/licenses/by-nc/4.0/.

Statistics from Altmetric.com

Request Permissions

If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways.

STRENGTHS AND LIMITATIONS OF THIS STUDY

  • With the aim of providing a comprehensive overview, both quantitative and qualitative studies will be included.

  • In addition to the multidisciplinary databases, the reference sections of the included studies will be searched to find relevant articles that were missed by the search engines or not listed in the selected databases.

  • The implementation and reporting of the systematic review will follow the Preferred Reporting Items for Systematic Reviews and Meta-Analyses to ensure transparency and accuracy.

  • Studies which are published in languages other than English will not be included, which can lead to a linguistically caused bias.

  • This study employs a systematic review method of reviewing data. This approach that is rigorous, transparent and ensures results are trustworthy; however, additional results might be identified by following another design.

Introduction

Background

Many healthcare facilities employ security guards as part of their security strategy.1 Adeniyi and Puzi2 attribute this to violent and aggressive behaviours that are not uncommon in many healthcare institutions, including hospitals and psychiatric and emergency units.3–6 Such behaviours are among the key reasons for the employment of security guards.7 Other reasons include the protection of valuable property held in healthcare facilities, public visitation control and perimeter patrols to protect the privacy and dignity of patients, and the provision of information in large facilities regarding where to find particular wards or units and the rules of visitation and entry. Security guards filter access control and protect the institution through the checking of visitor appointment cards and entry to the correct facility within institutions.8

An important function of security guards is safety intervention when patients threaten to harm themselves, staff or other patients, or when there is a need for physical restraint or de-escalation.1 9 Thus, a key role is to ensure patient and staff safety by managing violent and aggressive behaviour.10–12

Security guards are more likely than healthcare professionals to be injured at work, with many attacks occurring at night. Clearly, they are on the front line, commonly being deployed to reinforce the overall security programme of health facilities and being called in to situations of elevated risk.13 In a study on security guards in Finland, 39% reported at least one incident of verbal aggression against them per month, 19% reported at least one threat of physical aggression per month and 15% experienced at least one act of physical aggression per month.14

In addition to the official tasks that security guards are contracted for, they may also take on other roles, even if informally.15 It is clear, therefore, that security guards take on numerous roles and perform several tasks, including, in some instances, tasks for which they are not adequately trained.16 For instance, security guards may be asked to perform the role of informal interpreters when clinicians are not able to communicate with patients who speak languages which clinicians do not understand.17 18 A study, conducted in South Africa at a psychiatric hospital, investigated the potential consequences for diagnostic assessments mediated by ad hoc interpreters who were employed as healthcare workers and household aides. The study found errors in the interpretations, which consequently affected the goals and outcomes of the clinical sessions, some potentially resulting in incorrect diagnoses of the severity of patient psychiatric illness. Within the context of the current research protocol, security guards may be assigned to carry out informal interpreting in the absence of training and support in interpreting skills, and, in addition, these security guards may be unfamiliar with technical medical and psychiatric terminology.17

Sefalafala and Webster19 note that security guards are often among the lower paid staff members at a healthcare facility. Given these pressures, some studies suggest that security guards may be prone to behavioural problems and mental health problems such as substance abuse, antisocial behaviour, physical aggression and anger.20 Notwithstanding, it appears that little attention has been given to the work of security guards in healthcare despite the fact that security guards are part of the broader healthcare workforce.20

This review seeks to systematically examine and synthesise research on the role of security guards in healthcare. To our knowledge, this will be the first review on this topic. We aim to understand critical processes and outcomes related to the use of security guards in healthcare. It is possible that the review may lead to recommendations for adequate training and support for this cadre of workers, as well as guidelines and policy recommendations.

Methods and analysis

Types of studies

Qualitative, quantitative and mixed-method studies on the roles of security guards will be incorporated in this review. Scientific studies published in English will be included. Any studies reporting on the roles of security guards and their experience of these roles will be included. There is no geographical restriction—we will search for studies from high-income, middle-income and low-income countries. All studies included must have been peer-reviewed.

Type of participants

Studies must report on the roles and experiences of security guards but there are no other restrictions, for example, studies on healthcare workers’ perceptions of the roles and experiences of security guards will be included.

Search methods for identification of studies

We will conduct the systematic review on 10 electronic databases: BioMed Central, SocIndex, ScienceDirect, Google Scholar, JSTOR, PsycARTICLES, PsycINFO, Scopus, Web of Science and PubMed. Data extraction will be in the form of a Word document. Mendeley referencing software will be used to manage searched articles, thereafter transferred to the systematic review software, Rayyan, where duplicates will be removed. We have developed a search strategy that will be adapted to different search engines (see table 1). In addition to database search results, reference sections of the included journal articles will be reviewed to identify any relevant articles that were missed by search engines.

Table 1

Search strings for electronic databases

Search strategy

The keywords listed in table 1 will guide the searches. These strings will be expanded based on the information retrieved from selected articles.

Time period

Articles reviewed will include those published from 1990 to 2022 to provide a comprehensive examination and synthesisation of the existing research.

Exclusion criteria

This review will exclude grey literature, unpublished articles, opinion pieces, case reports and publications that do not have primary data and a clear description of the methods used. In cases where studies analysing the same data are published in more than one journal, we will include the most recent and complete publication. Any articles, research and data prior to 1990 will be excluded, as will studies in languages other than English. Studies that focus on medical personnel and not on security guards will also be excluded (see table 2).

Table 2

Overall approach to inclusion and exclusion criteria

Inclusion criteria

Studies published in English peer-reviewed journals and open sources accessed from the Stellenbosch University library website will be included. In addition, this study will focus on all age groups and studies reported in English from 1990 to 2022. This will allow for a comprehensive scope in this niche area (see table 2).

Selection of studies to be included in the review

To define the inclusion criteria, most studies use the Population, Intervention, Comparison, Outcome model. This model is used for quantitative clinical research.21 This study, therefore, adopts the Sample, Phenomenon of Interest, Design, Evaluation, Research Type, which is a suitable framework for the inclusion of qualitative, quantitative and mixed studies22 (see table 3). Screening, inclusion and exclusion of articles will be carried out using Rayyan. The screening process involves title and abstract screening by two independent reviewers, followed by full-text screening by two independent reviewers. Where there are disagreements across the two reviewers, a third reviewer will carry out an independent review to resolve differences.

Table 3

SPIDER approach for selecting studies

The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) flow chart will be an additional retrieval strategy to document the search.23 The first step will be screening the literature. A title search will be conducted using the database and the study’s keywords, these being documented on the title extract and abstract search list. Only articles that fulfil the title inclusion criteria will advance to the second level, which is the abstract search. The PRISMA flow chart will account for the number of records identified or removed (see figure 1 below).

Figure 1

Preferred Reporting Items for Systematic Reviews and Meta-Analyses diagram of study selection process.

Quality appraisal and assessment of bias

On selecting articles which fulfil the title and abstract search criteria, articles included will be appraised. The Critical Appraisal Skills Programme (CASP) tool24 is commonly used,25 and an adapted version of the CASP tool, proposed by Laher and Hassem,26 will be used in this study. This tool consists of six items for theoretical articles, 11 items for quantitative articles and 10 questions for qualitative articles, which will be used as an appraisal tool in terms of the research aims, methodology used, sample, data analysis, presentation of findings, values of the research, as well as trustworthiness if it is a qualitative study and reflexivity if it is a quantitative study.26

The CASP tool itself proposes a cut-off for a study after a few questions/checklists, therefore, any scoring or grading is not recommended for studies being appraised.24 The first few questions on the CASP checklist are screening questions; if the answer to them is ‘yes’, then the study is worth proceeding to the remaining questions. An article must fulfil the full checklist in order to advance to the extraction phase.

Data extraction and management

To extract data, reviewer number 1 will conduct data extraction in Word. Extracted data will be tabularised to include study details (author, year of publication, country of study). In addition to author, year of publication, country of study, information on the roles and responsibilities of security guards in healthcare settings, including the scope of their work, how their roles as perceived by fellow healthcare workers and their impact on their workplace and patients will be extracted.

Data synthesis and analysis

A narrative analysis/synthesis will be conducted to extract text which will then be narrated.21 Popay et al27 outline four elements involved in reporting narratively, namely, (1) developing a theory of how the intervention works, why and for whom; (2) developing a preliminary synthesis of findings of included studies; (3) exploring similarities/relationships in the data and (4) assessing the robustness of the synthesis. For the purpose of this study, only elements 2–4 will be included as the aim is not to develop an intervention, but rather to synthesise the roles of security guards in healthcare. The data will be presented in the form of a qualitative narrative description, in table format. For transparent reporting, the analysis will be guided by the PRISMA statement.

The planned start of the review will be as soon as the protocol has been accepted (probably in March 2023) and is expected to be completed in April 2024.

Patient and public involvement

As this is a systematic review protocol, no patients or public will be involved.

Ethics and dissemination

This systematic review will use publicly available peer-reviewed data from the 10 identified search engines (BioMed Central, SocIndex, ScienceDirect, Google Scholar, JSTOR, PsycARTICLES, PsycINFO, Scopus, Web of Science and PubMed) and will therefore not require an ethical review, but rather, an ethics waiver. The systematic review protocol will be submitted for ethics waiver clearance from the Stellenbosch University Health Research Ethics Committee. The findings from this review will be disseminated through peer-reviewed publications and conferences.

Ethics statements

Patient consent for publication

References

Footnotes

  • Contributors LSh, LSw and SH-R conceptualised the study. LSh was responsible for drafting the protocol in close consultation with LSw and SH-R. QC, PS and TR provided significant edits to the protocol. All authors revised and approved the manuscript.

  • Funding The authors have not declared a specific grant for this research from any funding agency in the public, commercial or not-for-profit sectors.

  • Competing interests None declared.

  • Patient and public involvement Patients and/or the public were not involved in the design, or conduct, or reporting, or dissemination plans of this research.

  • Provenance and peer review Not commissioned; externally peer reviewed.