Verified Document

Healthcare Informatics A Client Arrives Thesis

Periodically I would want to make sure the data was audited to make sure the underlying processes and systems used for capturing it were working correctly. In conjunction with these measures of ensuring patient data is being correctly captured processes for data reliability assessment would be used (Alhaqbani, Josang, Fidge, 2009). While these two areas of capturing patient data accurately, auditing it to make sure the underlying processes are in fact working correctly, and then layering in reliability assessment analyses would serve as the foundation for the types of software applications that would be used for automating patient information capturing. The specific types of applications would be business process management (BPM)-based so that if necessary the underlying processes of patient information capture could be re-engineered over time. The use of BPM and business process re-engineering (BPR) within the context of software applications would also ensure they would continually be able to scale and stay agile to the healthcare providers' needs over time (Hebda, Czar, 2008). Relying on applications to redefine the process, audit it on occasion to ensure its correct functioning, and the use of BPM and BPR-based applications to make the underlying workflows more efficient over time would be the first phase of application support. The second phase would concentrate on the use of an enterprise content management system that would include support for electronic medial record, health record, patient record, and personal...

The enterprise-wide system would have the ability to integrate with the patient monitoring, patient quality assurance, hospital financial systems and quality management systems state and federal agencies rely on to ensure compliance of the medical facility (Poston, Reynolds, Gillenson, 2007). In addition to all of these requirements the need for patient records security is critical (Miller, Tucker, 2009). With all of these factors taken into account an enterprise-wide series of applications could be defined and implemented.
References

Alhaqbani, B., Josang, a., & Fidge, C..(2009). A Medical Data Reliability Assessment Model. Journal of Theoretical and Applied Electronic Commerce Research, 4(2), 64-78.

Hebda, Toni, & Czar, Patricia (2008). Handbook of Informatics for Nurses & Health Care Professionals. Upper Saddle River, NJ: Prentice-Hall.

Zack Martin. (2007, May). Evidence-Based I.T. In the Delivery Room. Health Data Management, 15(5), 62, 64.

Miller, a., & Tucker, C. (2009). Privacy Protection and Technology Diffusion: The Case of Electronic Medical Records. Management Science, 55(7), 1077-1093.

Carsten Osterlund (2007). Genre Combinations: A Window into Dynamic Communication Practices. Journal of Management Information Systems, 23(4), 81-108.

Robin S. Poston, Rebecca B. Reynolds, & Mark L. Gillenson. (2007). Technology Solutions for Data Accuracy and Availability…

Sources used in this document:
References

Alhaqbani, B., Josang, a., & Fidge, C..(2009). A Medical Data Reliability Assessment Model. Journal of Theoretical and Applied Electronic Commerce Research, 4(2), 64-78.

Hebda, Toni, & Czar, Patricia (2008). Handbook of Informatics for Nurses & Health Care Professionals. Upper Saddle River, NJ: Prentice-Hall.

Zack Martin. (2007, May). Evidence-Based I.T. In the Delivery Room. Health Data Management, 15(5), 62, 64.

Miller, a., & Tucker, C. (2009). Privacy Protection and Technology Diffusion: The Case of Electronic Medical Records. Management Science, 55(7), 1077-1093.
Cite this Document:
Copy Bibliography Citation

Related Documents

Mcg Explain the OSI Reference Model and
Words: 603 Length: 2 Document Type: Essay

MCG Explain the OSI reference model and TCP/IP protocol architecture. The Open Systems Interconnection reference model is made up of seven layers to establish reliable communication between nodes. The first layer, the physical layer, controls how the digital information is transmitted between nodes while things such as encoding techniques, connector types, and data rate are established. The second layer, the data-link layer, is responsible for framing data, error detection and maintaining flow

Credit Risk in Banking in Agreement With the Basel Accords
Words: 13816 Length: 50 Document Type: Thesis

Credit Risk Management Banks are an important part of the economy of any nation. Traditionally, the banks operate as financial intermediaries serving to satisfy the demand of people in need of various forms of financing. Through this, banks enable people to purchase home and businesses to expand. These financial institutions therefore facilitate investment and spending that are responsible for fueling the growth of the economy. In spite of their vital role

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now