Search Results

= Members only

Current search

56 results.

[1] 2 3

Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment

Author: Williams, Patricia A.H

Source: Journal of AHIMA

Publication Date: April 2017



Information sharing between healthcare organizations increasingly includes the use of electronic health records (EHRs) as well as data from medical devices that have been integrated into existing networks. When exchanging such data, providers should be mindful not only of the interoperabil....

Biometric Technology Offers Secure Solutions

Author: Wheeler, Doug

Source: In Confidence (newsletter)

Publication Date: May 02, 2002


The latest information from the Centers for Disease Control and Prevention on emergency department visits indicates that the number of patient visits continues to climb. If the current increase in patient volume continues, emergency departments across the US will handle approximately 115 mill....

Smart Cards for Healthcare: a Follow-up Visit

Author: Ross, Bruce

Source: In Confidence (newsletter)

Publication Date: March 02, 2000


Smart cards are a peculiar subject when it comes to healthcare in the United States. They are viewed as everything from an up-andcoming product to an inscrutable and hard to integrate backwater technology. Today, all that is rapidly changing. As shown by its adoption by Microsoft, Sun Micro,....

Perils of Customization

Author: Rollins, Gina

Source: Journal of AHIMA

Publication Date: June 2006


Increasingly, providers are resisting the temptation to customize software. Many have learned the hard way that unique modifications lead to unique costs and unique complications.
We all like to think we’re special. But when it comes to implementing software, providers are usually b....

Predicting 30- to 120-Day Readmission Risk among Medicare Fee-for-Service Patients Using Nonmedical Workers and Mobile Technology

Author: Ostrovsky, Andrey; O’Connor, Lori; Marshall, Olivia; Angelo, Amanda; Barrett, Kelsy; Majeski, Emily; Handrus, Maxwell; Levy, Jeffrey

Source: Perspectives in Health Information Management

Publication Date: 2016


Abstract


Objective: Hospital readmissions are a large source of wasteful healthcare spending, and current care transition models are too expensive to be sustainable. One way to circumvent cost-prohibitive care transition programs is complement nurse-staffed care transition program....

Sequestering EHR Data in IT Systems

Author: Miaoulis, William M

Source: Journal of AHIMA

Publication Date: May 2009


There can be three situations under which healthcare organizations may need to sequester (or segregate) certain data within a medical record: placing a legal hold in connection with litigation, limiting disclosures of a record pursuant to a request by a patient, and restricting access to sensi....

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003


As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

[1] 2 3