Category Archives: Uncategorized
Wendy Swanson, also known as Seattle Mama Doc, writes a blog for Seattle Children’s Hospital. At the Social Media Summit 2010, she led a panel discussion, asking questions that got at the cost of social media: time. However, in this video she also discusses the importance of social media for connecting with patients.
The GIFT (the GNU Image-Finding Tool) is a Content Based Image Retrieval System (CBIRS: http://en.wikipedia.org/wiki/CBIR). It enables you to do Query By Example (QBE: http://en.wikipedia.org/wiki/QBE) on images, giving you the opportunity to improve query results by relevance feedback. For processing your queries the program relies entirely on the content of the images, freeing you from the need to annotate all images before querying the collection.
The GIFT is an open framework for content-based image retrieval. We explicitly have taken into account the possibility of adding new ways of querying to the framework. Our communication protocol for client-server communication, MRML, is XML based and fully documented (http://www.mrml.net). This aims at promoting code reuse among researchers and application developers. Inquiries about APIs and how to integrate new clients/servers into the framework are welcome (send questions to http://mail.gnu.org/mailman/listinfo/help-gift or the maintainer mailto:Wolfgang.Mueller@wiai.uni-bamberg.de).
Also, see this review article on Query Based Image Retrieval in Medical Sciences
A recent survey, which was conducted over four-months polled over 30,000 healthcare records professionals, physician practice administrators, and hospital leaders in the information technology arenas, asking them to name their preferred EHRs.. The survey employs eighteen key performance indicators targeted at ensuring high product and service performance through comparing vendors from the customer experience.
]The top three customer-experience ranked EHR vendors for hospitals under 100 beds:
- Healthland Clinicals
Top three ranked EHR vendors for community hospitals 101-249 beds:
Top three ranked EHR vendors for academic teaching hospitals and major medical centers 250+ beds:
Benefits of ePrescribing
Simply stated, ePrescribing is a process by which prescription information is electronically transmitted from the physician directly to the patient’s pharmacy. At the point of prescribing, the physician has access to the patient’s medication history and to relevant insurance coverage information. The ePrescribing system alerts the physician if it detects a potential adverse drug reaction to the medication being prescribed (eg, drug-drug interactions or drug allergies). With real-time access to information, the physician can modify the prescription to avoid potential adverse effects.
Any issue regarding the use or cost of the medicine can be discussed with the patient while he or she is still in the examination room and before the prescribing process is completed.
Because ePrescribing is an integral component of electronic medical records, many of the transcription errors that occur with handwritten prescriptions are eliminated, improving patient safety by providing physicians with clinical information concerning drug effectiveness and safety. Also, because the ePrescribing process facilitates dialogue with their physicians, patients gain a better understanding of the medication’s purpose and the importance of following the prescribed drug therapy.
IMIA Code of Ethics for Health Information Professionals | International Medical Informatics Association
The International Medical Informatics Association has approved the endorsement of the IMIA Code of Ethics for Health Information Professionals at its General Assembly meeting on October 4, 2002 in Taipei, Taiwan. Over the years , it has been updated as required.The latest update is on 31st January, 2011.
The “code” is the culmination of several years of a global collaborative effort led by IMIA’s working Group on Data Protection in Health Information, Chaired by Prof Ab Baker of the Netherlands. In addition to the “code”, a detailed handbook of explanations that go along with the principles and clauses of the code has been prepared. Downloads in Ten Languages and Accompanying Handbook in English:
- Skin Problems
- Heart Disease
- Sleep Disorders
Three of the most common myths of Cloud Computing in HCIT:
Myth #1: Identity management in the cloud is less secure. Quite the opposite, says Sroka. The cloud is often more secure and, in most cases, offers a more reliable and more scalable facility for healthcare organizations. Most information is encrypted in the cloud, whereas when solutions are deployed on-premise it is not uncommon for sensitive information to remain unencrypted, such as administrative credentials coded into scripts or configuration files, and personally-identifiable information.
Myth #2: One has to dramatically change infrastructure to accommodate identity management (IdM) in the cloud. No infrastructure changes are necessary for an organization to take advantage of cloud-based IdM services. Integration with existing IT systems can be accomplished seamlessly, as if the IdM solution were running on-premise.
Myth #3: Cloud-based identity management solutions are less capable than on-premise solutions
Cloud-based IdM solutions don’t have to be different from on-premise solutions and can deliver the same functionality. However, cloud-based IdM solutions have a business driver making them different. The hosting provider will want to drive down the cost of hosting to take advantage of hardware/software/technical resource consolidation. In order to do so, IdM solutions running in the cloud must have a better design and they must be easier to maintain.
Three of the most common risks of Cloud Computing in HCIT:
Risk #1: Inadequate Access Control Policies. Failure to clearly articulate and enforce department and organization-wide IT security policies and procedures creates both internal and external confusion, which can lead to ongoing threats and vulnerabilities.
Risk #2: Lack of Education. When employees and other users are not educated on the “do’s and don’ts” of IT security, they are less likely to take the proper steps to secure their own information. For a CIO and his/her IT department, an uneducated user base can quickly become your worst enemy.
Risk #3: Insider Threat. Most data breaches are the result of an internal user (yes, even employees, says Sroka) with access to sensitive information who unwittingly acts as an accomplice or an enabler to an external threat.
Simply Fill in the Lab values for PT, PTT, APTT, and other investigations and it spews out a list of probable diagnosis. Makes it difficult to overlook or ignore any diagnosis. Neat.
The app also provides step-by-step suggestions for appropriate lab tests to narrow possible diagnoses.Very much classifiable as a Clinical Decision Support System on an iPhone.
How Monseau and his team did it:
* Start small, with noncontroversial topics. Monseau and his team created a corporate blog talking about the 120-year history of the company. This relatively “safe” blog helped prove the concept and gain the confidence of legal and compliance teams.
* Create helpful policies. Good policies help you establish a consistent approach across the many voices or brands of your company and can streamline the approval process.
* Create plans for when and how to respond. Johnson & Johnson has a specific process for deciding what, when, and how to respond to comments on third-party sites.