Search Results

= Members only

Current search

56 results.

Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment

Author: Williams, Patricia A.H

Source: Journal of AHIMA

Publication Date: April 2017



Information sharing between healthcare organizations increasingly includes the use of electronic health records (EHRs) as well as data from medical devices that have been integrated into existing networks. When exchanging such data, providers should be mindful not only of the interoperabil....

Biometric Technology Offers Secure Solutions

Author: Wheeler, Doug

Source: In Confidence (newsletter)

Publication Date: May 02, 2002


The latest information from the Centers for Disease Control and Prevention on emergency department visits indicates that the number of patient visits continues to climb. If the current increase in patient volume continues, emergency departments across the US will handle approximately 115 mill....

Smart Cards for Healthcare: a Follow-up Visit

Author: Ross, Bruce

Source: In Confidence (newsletter)

Publication Date: March 02, 2000


Smart cards are a peculiar subject when it comes to healthcare in the United States. They are viewed as everything from an up-andcoming product to an inscrutable and hard to integrate backwater technology. Today, all that is rapidly changing. As shown by its adoption by Microsoft, Sun Micro,....

Perils of Customization

Author: Rollins, Gina

Source: Journal of AHIMA

Publication Date: June 2006


Increasingly, providers are resisting the temptation to customize software. Many have learned the hard way that unique modifications lead to unique costs and unique complications.
We all like to think we’re special. But when it comes to implementing software, providers are usually b....

Predicting 30- to 120-Day Readmission Risk among Medicare Fee-for-Service Patients Using Nonmedical Workers and Mobile Technology

Author: Ostrovsky, Andrey; O’Connor, Lori; Marshall, Olivia; Angelo, Amanda; Barrett, Kelsy; Majeski, Emily; Handrus, Maxwell; Levy, Jeffrey

Source: Perspectives in Health Information Management

Publication Date: 2016


Abstract


Objective: Hospital readmissions are a large source of wasteful healthcare spending, and current care transition models are too expensive to be sustainable. One way to circumvent cost-prohibitive care transition programs is complement nurse-staffed care transition program....

Sequestering EHR Data in IT Systems

Author: Miaoulis, William M

Source: Journal of AHIMA

Publication Date: May 2009


There can be three situations under which healthcare organizations may need to sequester (or segregate) certain data within a medical record: placing a legal hold in connection with litigation, limiting disclosures of a record pursuant to a request by a patient, and restricting access to sensi....

Stealth Software Deters PHI Theft

Author: Kawles, Terrance L.

Source: Journal of AHIMA

Publication Date: July 2003


As the leading edge of digital portability advances, the protections afforded the “portability” portion of HIPAA become strained. Under the final security standards, covered entities (CEs) must establish procedures and mechanisms to protect the confidentiality, integrity, and availab....

Internet "Cookie Jar"

Author: Hughes, Gwen

Source: In Confidence (newsletter) | AHIMA Q and A

Publication Date: May 02, 2001


Q: What does the term “cookie”mean when used in reference to the Internet? Are cookies something I need to be concerned about?
A: Cookies are bits of code sent to your computer by the Web sites you visit. These cookies allow sites to collect and store information about your visits. Cook....

Smart Cards May Make Security a Non-Issue

Author: Deike, Karen

Source: In Confidence (newsletter)

Publication Date: November 02, 2000


Smart cards have long held enormous potential for governments in managing healthcare information and delivering benefits to clients with more efficiency, less fraud, and greater customer satisfaction. But critical to gaining acceptance of the cards is the ability to assure clients that the in....

Could the Pharmaceutical Industry Benefit from Full-Scale Adoption of Radio-Frequency Identification (RFID) Technology with New Regulations?

Author: Coustasse, Alberto; Kimble, Craig A; Stanton, Robert B; Naylor, Mariah

Source: Perspectives in Health Information Management

Publication Date: October 2016


Abstract


Healthcare regulators are directing attention to the pharmaceutical supply chain with the passage of the Drug Quality and Security Act (DQSA) and the Drug Supply Chain Security Act (DSCSA). Adoption of Radio-Frequency Identification (RFID) technology has the ability to im....

Implementing a Mobile Coding Solution

Author: Colgan, Peter

Source: In Confidence (newsletter)

Publication Date: July 02, 2001


Wireless computing technologies capable of enabling clinical and administrative decision support throughout the extended healthcare enterprise have arrived! Among the benefits of any wireless healthcare solution is the wide distribution of information throughout the enterprise. This benefit r....

Medical Device Security: Hollywood vs. Reality

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: April 2015




When former Vice President Dick Cheney revealed in 2013 that his heart surgeons modified the settings on his pacemaker to reduce the chances the device could be hacked by terrorists, the headlines were predictably alarmist. Fans of the Showtime hit “Homeland” immediately recognized th....

Key to Using Digital Certificates

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: April 02, 2002


This is the second article in a two-part series.
Background

For over 2,000 years, in all recorded histories and for all civilizations, sending secret messages required that both the sender and receiver share a common secret key. The key that decrypted a message was the same a....

Analytic Hierarchy Process–based Method to Rank the Critical Success Factors of Implementing a Pharmacy Barcode System

Author: Alharthi, Hana; Sultana, Nahid; Al-amoudi, Amjaad; Basudan, Afrah

Source: Perspectives in Health Information Management

Publication Date: January 2015


Abstract


Pharmacy barcode scanning is used to reduce errors during the medication dispensing process. However, this technology has rarely been used in hospital pharmacies in Saudi Arabia. This article describes the barriers to successful implementation of a barcode scanning system....

Watson vs. Big Data

Author: AHIMA Staff

Source: Journal of AHIMA

Publication Date: July 2015


It is the matchup of the century—the towering hulk of healthcare’s Big Data versus the super computer known as Watson. Will Watson be able to take on this lumbering, untamed mass of information and whip it into submission?


One year ago, the Journal of AHIMA reported on the IBM su....

Journal Q&A (1/99)

Author: AHIMA Staff

Source: AHIMA Q and A

Publication Date: January 02, 1999


Q: I hear a lot of technical terms being used lately by information systems staff and I feel like I'm not speaking their "jargon." Could you clarify the meaning of some of these terms? Specifically, they are SQL, Java, TCP/IP, and IPX.

A: SQL stands for structured query language, whi....

Word Power: a Glossary of Software Licensing Terms

Author: AHIMA

Source: Journal of AHIMA

Publication Date: April 2006


This Software license agreement is entered into by and between Sample Software, Inc, a Delaware corporation with principal offices located at 100 Maple Lane, Chicago, Illinois 60601 ("Sample") and _________________, a corporation with principal offices located at ________________ ("Licensee") a....