Applying Meaningful Use Principles On Information Management Systems Essay

Regular and Regimented Activity Project for Overweight, Obese and |Diabetic Veterans The Project Committee or team will be composed of:

The Project Manager who designs and develops the project with the team and oversees all activities leading to its completion (ITS, 2015). It is also his task to secure sponsorship and to deal with stakeholders. He handles all communications and reports, takes the risks and addresses the issues incurred in the implementation of the plan. In the overall, he assures that the Project is completed on schedule, as committed and within the budget allotted (ITS).

The Project Team Members are from the different disciplines of the nature of the target of the Project. They have their individual contributions to the Project with pre-arranged specifications from and by the Project Manager (ITS, 2015; Hofstrand, 2015). They are experts or authorities in their respective fields or professions. Some of them are regular members in that their participation is basic to the Project. The rest are ad hoc in that they are needed only when the discussions or activities call for their direct participation and/or inputs. They regular members are:

The Electronic Medical Records or EMR and Network Security Expert who is a central project member as the nature of the project is his field of expertise. He provides the team with all the information on EMR, network security and Meaningful Use goals.

An Information Technology or IT expert who provides the team with the information and skills in hardware and software and management information systems. He extends background support to the EMR and Network Security expert. He also implements the main activities of the project along with the EMR and network security expert.

The Recorder and Overall Assistant to the Project Manager who keeps all the minutes of meetings, all records gathered and produced by all the members of the team. He or she establishes connections with outside entities, such as the media and both public and private sector entities. Because of the expanse of his or her responsibilities and connections, she coordinates directly with and performs assistant functions to the Manager. He or she takes his place during his temporary absence during meetings. He also performs editorial and press work for the team in preparing publications and releasing news to the media.

the Treasurer / Accountant/Miscellaneous Assistant to the Manager who handles the budget, payments, and reimbursements as well as purchases the needed and physical logistics, such as supplies, equipment, tools, films, rentals of locations, halls, transportation and other miscellaneous items needed at meetings and other activities.

The ad hoc or occasional Project members are:

an official General Practitioner at the Department at the Veterans Affairs who provides the team with the background, reports, statistics, and updates on the health conditions of the veterans. He is also the link of the Project Committee with the Department for interviews, communications and case studies or surveys.

a Gerontologist, a medical practitioner who specializes on the conditions of aging individuals. His valuable inputs on the diseases of the aging, such as diabetes and obesity, are central to the Project

a legal consultant who informs the team about pertinent laws and ordinances affecting the Project (ITS, Hofstrand).

B. Two Real-Life Computerized Management Systems

a. One is a management reporting system, which is a database of reports and figures on the operations and finances of all the management levels of an organization (Williams, 2015). This works for Projects as well. Department managers use it to write reports, compare financial and operational performances as a way of evaluating progress and to measure managerial and supervisory competence and achievement. Upper management uses their reports to make the same assessment of operations and financing and better decisions. The integration of reporting for these purposes represents the advantages of this information system. Its disadvantages, on the other hand, include the possible poor quality of the system if the quality of data generated is poor and security issues from hackers (Williams).

The other is office automation enterprise through which managers can control the flow of information throughout the company or project (Williams, 2015). All the means falling under this system include all electronic communication, such as landline telephones, cellular phones, the internet, multimedia, voice mails and emails, file sharing and video conferencing. They are used between and among managers and employees. Its advantages include savings on time and company resources and the company or group's reliance on it for accuracy of data. Disadvantages, however, include the difficulties incurred by users when...

...

Both systems are necessary to the Project, although the first applies more to larger groups and more extensive programs. In comparison, office automation is usable to both large and small group activities, such as this Project. It is, therefore, the better information system to use in meeting the requirements of Meaningful Use in all its three stages in accomplishing the specific goals of the Project.
c. The Project consists of three stages aligned with those of Meaningful Use. The first is the capture and sharing of certified EMRs of veterans, monitoring their major clinical conditions and communicating these conditions to care coordinators, reporting of these as public health information on diabetes and obesity among veterans and of clinical quality measures; and getting the veteran patient and his family involved in his own care through this information. The second stage consists of vigorous and sustained exchange of updated information on the conditions of these veteran sufferers of diabetes and obesity; transmission of case summaries to various recipients. And the third stage consists of diabetic and obese patients' access to self-management tools for their improvement or symptom control; their access to thorough data through HIE; and the achievement of the goal of improved health among diabetic and obese veterans (Blumenthal & Taverna, 2010).

d. This system's goals are aligned with those of Meaningful use. It will impact patient care and documentation by improving the quality, safety and efficiency and reducing health care disparities in the specific case of diabetic and obese veterans; by getting the target veterans themselves and their families in the implementation of the Project; improving the coordination of the care of these veterans; improving their overall health; and insuring the maximum privacy and security of their personal health records (DeSalvo, 2011; Schein, 2015; Yu, 2011).

e. Its access information will impact the quality and delivery of nursing care and patient outcomes in a way that precisely meets the goal of nursing care. As it is, the national healthcare delivery system suffers from many problems. Among these are the fragmented provider base and low-level communication between healthcare providers and patients. The widespread application and access to EMRs meets most of the needs and addresses many difficulties in extending better care for less (Yu, 2011). This is just as true to a select vulnerable sector like the diabetic and obese veterans, who are the targets of this Project.

3. a. Two ways by which QI data from the system can track and identify problems and errors:

One, a nurse has two possible places of documenting the family history of one diabetic or obese veteran's family history. The documentation done in one section is not visible from the other section. Moreover, the data from these two sections are kept in different sections of the database. A quality report can derive or extract data from only one location and automatically exclude whatever document may be in the other, which is in another location (Schein, 2015)

It is unfortunate that the system cannot guide the user to document specific data, such as those of the diabetic and obese veteran samples of the Project. Some users may be able to document information in the correct location. But others can do so only manually into another section. Similar to the preceding way or example, a status report on the diabetic and obese veterans of a certain period derived from one location will exclude vital information that may be in another or other locations (Schein).

b. Security Standards and Methods, Data Storage Integrity and Data Backup and Recovery

This system will adopt measures to secure the data gathered from the subject diabetic and obese veterans, their families and the Department itself. At the same time, it has established measures for backup and recovery. These are:

Select access schemes like passwords and personal information numbers. Stored data on the health information of these veteran population can be accessed only by those who have or are given the authority to access it (DeSalvo, 2011).

Encrypting stored data on the subject population. The data cannot be read or understood only by those with the key to decrypting it.

A kind of audit detection and trail tool. This documents every user who accesses any information and any changes made and when.

Federal law protects all patient information from un-authorized access even by doctors, hospitals and other healthcare providers by notifying the system of any breach of this law. Federal law requires the healthcare provider to inform the Secretary of Health and Human Services if…

Sources Used in Documents:

BIBLIOGRAPHY

Blumenthal, D and Taverna, M. (2010). The meaningful use regulations for electronic health records. Vol 363, Perspectiv: New England Journal of Medicine. Retrieved on June 29, 2015

from http://www.nejm.org/doi/full/10.1056/NEJMp1006114

DeSalvo, K. B, ( 2011). Privacy, security and electronic health records. Health IT buzz.

Retrieved on June 29, 2015 from http://www.halthit.gov/buzzblog/privacy-ad-security-of-ehrs/privacy-security-electronic-health-records
Iowa State University Extension: Iowa State University. Retrieved on June 29, 2015 from http://www.extension.iastate.edu/agdm/whotefarm/html/c5-110.html
Cornell University. Retrieved on June 29, 2015 from http://www.cit.cornell.edu/computer/robohelp
NDEP (2015). Manage population health. National Diabetes Education: NIDDK. Retrieved on June 29, 2015 from http://www.ndep.nih.gov/hcp-businesses-and-schools/practice-transformation/information-systems/population-health.aspx
Vol. 27 # 9, Journal of General Internal Medicine: PubMed. Retrieved on June 29, 2015 from http://www.ncbi.nlm.nih.gov/pmc/artuckes/PMC1831589
from http://www.ncbi.nlm.nih.gov/pubmed/20407300
Systems, Inc. Retrieved on June 29, 2015 from http://www.miromd.com/emr/advantages.html
Retrieved on June 29, 2015 from http://www.ehow.com/about_5194585_types-management-information-systems.html
American Society of Clinical Oncology. Retrieved on June 29, 2015 from http://www.europepmc.org/articles/PMC31404


Cite this Document:

"Applying Meaningful Use Principles On Information Management Systems" (2015, June 30) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/applying-meaningful-use-principles-on-information-2151387

"Applying Meaningful Use Principles On Information Management Systems" 30 June 2015. Web.24 April. 2024. <
https://www.paperdue.com/essay/applying-meaningful-use-principles-on-information-2151387>

"Applying Meaningful Use Principles On Information Management Systems", 30 June 2015, Accessed.24 April. 2024,
https://www.paperdue.com/essay/applying-meaningful-use-principles-on-information-2151387

Related Documents

It was then important to see the degree at which technology and training played a role in combating each fire. 1.2.4.Rationale of the Study What is that can be gained from this study? The reasoning behind such a study is born out of a need to provide better training for fire fighters so that fire management systems will improve and reduce the amount of loss due to the fire. By studying

Soft Systems Techniques in the Preparation of Information Technology as a Systems Manager Company Systems Consulting process and model Systems approach, client relationships Company Culture Client defenses, attachments to existing systems Interaction with the company culture in order to facilitate change System and Culture working together Dependancy issues Lewin Company Systems Consulting process and model Systems approach, client relationships Company Culture Client defenses, attachments to existing systems Interaction with the company culture in order to facilitate change System and Culture working together Dependency issues Lewin's model of

76). As automation increasingly assumes the more mundane and routine aspects of work of all types, Drucker was visionary in his assessment of how decisions would be made in the years to come. "In the future," said Drucker, "it was possible that all employment would be managerial in nature, and we would then have progressed from a society of labor to a society of management" (Witzel, p. 76). The

Information Assurance
PAGES 10 WORDS 2565

Role of Time in Information Assurance The society at large is on the verge of a new era. This new era is the information age which is marked with a major paradigm shift in the area of information assurance. Information assurance has three main attributes: confidentiality, integrity, and availability. All the three tenants of information assurance must be well guarded and maintained in order to bring a marked improvement of both

Abstract A case study of a tech start-up reveals some of the challenges associated with implementing systems theory in new product development. This area of study hold promise, but there are some implementation issues in the real world that have been identified and perhaps in need of further exploration. Introduction Systems thinking focuses on the interrelatedness of different systems, different roles and different disciplines. The system is not simply a set of parts,

Health Information System Promoting Action Design Research to create value in healthcare through IT Recently there has been varying proof showing that health IT reduces costs while improving the standard of care offered. The same factors that had caused delays in reaping benefits from IT investment made in other sectors (i.e. time consuming procedural change) are also very common within the healthcare sector. Due to the current transitive nature of the Healthcare