Disruptive Technology Of Electronic Medical Records EMR  Research Paper

Training staff members requires additional costs. There is also the 'time' cost of using the system on a daily basis. Furthermore, many find the demands of using the system -- typing into a machine as the patient talks -- to be profoundly impersonal and contrary to the true nature of practicing medicine. Doctors and nurses want to focus on people, not on machines, and they view EMR as a machine-driven intrusion into the way they practice medicine. However, supporters of electronic medical records contend that it is this desire to ignore the mundane side of medical record-keeping that often results in bad medicine. The great advantages of EMR are that they do require that providers enter all relevant data and ensure that patients sign necessary request forms. And patient health as a whole will be improved if by using EMR, there can be comparisons made between different patients. Data trends will become more readily apparent, complete, and easy to compare (Tennenhouse 2010).

The 'flip' side to this easy cross-comparison, however, is that there remain fears about compromised patient privacy. These are not unsubstantiated. "A December 2011 study of 72 healthcare institutions by the Ponemon Institute -- an independent privacy and data protection group -- found that 96% reported patient data had been lost, stolen or 'otherwise compromised' within the last two years" (the resistance: Small practices reluctant to implement EMR, 2012, Hit Exchange Media). Of course, HIPAA (Health Insurance Portability and Accountability Act) specifically protects patient privacy and was intended in part to answer some of patients' concerns regarding how their...

...

But physicians must ensure that there are controls put in place so the law is upheld in practice, such as encrypting data and properly training staff. Records must also be complete to be useful and even when using computers there can still be 'gaps' and inaccuracies in information. Also, data can be more difficult to retrieve in the event of an attack upon the system. All of these potential negatives are yet more reasons why EMR is such a 'disruptive' technology, even though ultimately its benefits likely outweigh its detriments.

Sources Used in Documents:

References

Koriwchak, Mike. (2010). Physician resistance to EMR and why CPT should be replaced.

Kevin MD. Retrieved: http://www.kevinmd.com/blog/2010/09/physician-resistance-emr-cpt-replaced.html

The resistance: Small practices reluctant to implement EMR. (2012). Hit Exchange Media.

Retrieved:
http://hitexchangemedia.com/articles/janfeb-2012/the-resistance-small-practices-reluctant-to-implement-emrs/
Retrieved: http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.html
http://westlawinsider.com/top-legal-news/electronic-health-records-pros-and-cons/


Cite this Document:

"Disruptive Technology Of Electronic Medical Records EMR " (2013, February 07) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/disruptive-technology-information-technology-healthcare-85754

"Disruptive Technology Of Electronic Medical Records EMR " 07 February 2013. Web.25 April. 2024. <
https://www.paperdue.com/essay/disruptive-technology-information-technology-healthcare-85754>

"Disruptive Technology Of Electronic Medical Records EMR ", 07 February 2013, Accessed.25 April. 2024,
https://www.paperdue.com/essay/disruptive-technology-information-technology-healthcare-85754

Related Documents

HIT Projects and Decision Makers Describe an example of a HIT project implemented at your organization and analyze how that project was identified and moved forward. One of the most commonly used health information technology (HIT) systems currently in use throughout America's medical industry is the SigmaCare electronic medical records (EMR) system. After being implemented within my organization over three years ago, the SigmaCare EMR system provided immediate enhancements to the hospital's

The teachers acknowledge that the other disruptive behaviors propagates the destruction of the school property therefore computer-based management results in the upstaging of the security of the school properties. This eminent vandalism is prominent in the cases where the students would like to have money selling the school properties. The teachers separately attribute the poor morals of the students to inexperience and the ignorance of the students. Involving of computer-based