Skip to main content

Contemporary Informatics Tools

  • Chapter
  • First Online:
  • 1573 Accesses

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

There are many new tools, systems and approaches that comprise a contemporary approach to health informatics. Given space limitations and the enormous change in this regard in the past few years I am emphasizing those new approaches that I believe will lead us forward with little emphasis on the more traditional technologies and approaches. This is the most technical chapter in the book but it is written as simply and clearly as possible to be comprehensible to the non-technical reader.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    We’ll discuss encryption in more detail in the security section of this chapter but it typically involves two “digital keys” (long strings of characters). You encrypt a message to someone using their public key but you need a private key – something that only the recipient should have – to un-encrypt it. This insures that only the intended recipient can read the message.

  2. 2.

    WellPoint and Kaiser are the others but Kaiser has a substantially different business model and would not likely consider becoming a technology supplier.

  3. 3.

    There are many health data standards. I’ve listed the major ones in the glossary and have chosen to use SNOMED as the example because it is the most clinically powerful. The Glossary contains the names, acronyms and a brief description of the commonly used standards.

  4. 4.

    However, a human would not want to sit down and read an XML document as one would read a book. The problem of visualizing the information in an XML document most usefully for humans is still an area of active research and development.

  5. 5.

    The technically inclined might go to reference 26 and click the Download the CCD QSG (Quick Start Guide) link. It provides two full CCD examples and a guide to study.

  6. 6.

    We’ve not previously discussed a predecessor of the CCD, the CCR, because the CCD has been accepted as the US standard format for an electronic patient summary. At present an EHR can be certified if it can generate either the CCD or CCR format but the trend is in the direction of the CCD. The differences are quite technical [26] but, most importantly, the CCD was developed within the CDA architecture.

  7. 7.

    Eclypsis, now part of Allscripts, McKesson Provider Technologies and Siemens

References

  1. Licklider JCR (1963) Memorandum for Members and Affiliates of the Intergalactic Computer Network http://www.kurzweilai.net/memorandum-for-members-and-affiliates-of-the-intergalactic-computer-network. Accessed 19 July, 2012

  2. http://www.meddserve.com/ Accessed 19 July, 2012

  3. http://www.exleaz.com/ Accessed 19 July, 2012

  4. McDonald CJ, et al (2005) The Indiana Network For Patient Care: A Working Local Health Information Infrastructure. Health Aff 24:5 1214–1220

    Article  Google Scholar 

  5. http://wiki.directproject.org/ Accessed 19 July, 2012

  6. Brull R (2012) Six Questions to Consider About Merging a CCD http://www.hl7standards.com/blog/2012/01/24/merging-a-ccd/ Accessed 19 July, 2012

  7. http://www.connectopensource.org/ Accessed 19 July, 2012

  8. http://www.stanford.edu/group/psylawseminar/HIPAAguide.htm Accessed 19 July, 2012

  9. http://wiki.siframework.org/Data%2B;Segmentation%2B;for%2B;Privacy%2B;Homepage Accessed 19 July, 2012

  10. Goldstein MM and Rein AL (2010) Data Segmentation in Electronic Health Information Exchange: Policy Considerations and Analysis http://healthit.hhs.gov/portal/server.pt?open=512%26;mode=2%26;cached=true%26;objID=1147 Accessed 19 July, 2012

  11. Schneider S et al (2009) Consumer Engagement in Developing Electronic Health Information Systems. Prepared for: Agency for Health Research and Quality. AHRQ Pub No. 09-0018-EF

    Google Scholar 

  12. Mohan A, Bauer D, Blough DM, Ahamad M, et al (2009) A Patient-centric, Attribute-based, Source-verifiable Framework for Health Record Sharing. GIT CERCS Technical Report No. GIT-CERCS-09-11

    Google Scholar 

  13. http://www.hipaasolutions.org/news/US%20Attorney%20Charges%20Two%20With%20HIPAA%20Violations.pdf Accessed 19 July, 2012

  14. http://articles.latimes.com/2008/aug/05/local/me-health5 Accessed 19 July, 2012

  15. http://www.courierpress.com/news/2006/nov/25/women-alerted-to-id-theft-risk/?print=1 Accessed 19 July, 2012

  16. Kaliski B The Mathematics of the RSA Public-Key Cryptosystem http://mathaware.org/mam/06/Kaliski.pdf Accessed 19 July, 2012

  17. Gray BH et al (2011) Electronic Health Records: An International Perspective on “Meaningful Use” http://www.commonwealthfund.org/∼/media/Files/Publications/Issue%20Brief/2011/Nov/1565_Gray_electronic_med_records_meaningful_use_intl_brief.pdf Accessed 19 July, 2012

  18. Dorenfest SI (1989) The Decade of the 1980’s: Large Expenditures Produce Limited Progress in Hospital Automation. US Healthc 6(12):20–2.

    Google Scholar 

  19. Yuan MJ (2011) Watson and healthcare: How natural language processing and semantic search could revolutionize clinical decision support. http://www.ibm.com/developerworks/industry/library/ind-watson/ Accessed 19 July, 2012

  20. http://www.cms.gov/Medicare/Coding/ICD10/index.html?redirect=/ICD10/ Accessed 19 July, 2012

  21. http://imagic.nlm.nih.gov/imagic/code/map Accessed 19 July, 2012

  22. http://vtsl.vetmed.vt.edu/ Accessed 23 September, 2012

  23. http://services.bidmc.org/geekdoctor/johnhalamkaccddocument.xml Accessed 19 July, 2012

  24. http://geekdoctor.blogspot.com/ Accessed 19 July, 2012

  25. http://www.hitsp.org/ConstructSet_Details.aspx?&PrefixAlpha=4&PrefixNumeric=83 Accessed 19 July, 2012

  26. http://www.himssehra.org/ASP/CCD_QSG_20071112.asp Accessed 19 July, 2012

  27. http://publicaa.ansi.org/sites/apdl/hitspadmin/Matrices/HITSP_09_N_451.pdf Accessed 19 July, 2012

  28. Weed LL (1987) Problem-knowledge Coupling. Med Instrum. 21(5):284–7

    Google Scholar 

  29. Pryor TA and Hripcsak G (1993) The Arden Syntax for Medical Logic Modules. Int J Clin Monit Comput. 10(4):215–24

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Braunstein, M.L., Braunstein, M.L. (2013). Contemporary Informatics Tools. In: Health Informatics in the Cloud. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5629-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5629-2_3

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5628-5

  • Online ISBN: 978-1-4614-5629-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics