Search Results

= Members only

Current search

4020 results.

1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 15 16 >>

Work Outside Your Comfort Zone

Author: Martin, Melissa

Source: Journal of AHIMA

Publication Date: February 2016



Have you ever taken on a special project outside of your comfort zone? My special project this year has been building an outpatient surgery center (OSC) from the ground up. Leadership, Strategic/Organizational Management, Change Management, and Project Management are all curriculum domain....

Working to Make RECs Sustainable

Author: Dimick, Chris

Source: Journal of AHIMA - website

Publication Date: November 07, 2011





The regional extension centers—created through federal grants to help small providers and hospitals select, implement, and use health IT—have several years remaining on their contracts. However, they are already considering business models that would make them self....

Working Smarter with APCs

Author: Thoman, Deborah J.

Source: Journal of AHIMA

Publication Date: May 2001




Are HIM professionals ready to make the most of APCs? This article suggests some strategies to improve the way we work with APCs, focus on complete and accurate coding, and improve our expertise.
Are HIM professionals ready for the next step in APCs? Are we ready to use APC data....

Working Online: Hazards Ahead

Author: Burrington-Brown, Jill

Source: Journal of AHIMA

Publication Date: January 2005


HIM professionals know that as we move from paper to an electronic environment, our mission of privacy and security remains the same. As the medium changes, however, we must evaluate new threats to information.

The growth of the Internet has been proportionate to the growth of its at....

Workflow for Breach Notification

Author: Walsh, Tom

Source: Journal of AHIMA

Publication Date: April 2010


Federal regulations that took effect in September 2009 require HIPAA covered entities and their business associates to notify individuals if their protected health information (PHI) was accessed or disclosed in an unauthorized manner or by unauthorized individuals. Certain exemptions apply, su....

1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 15 16 >>