Abstract
There are many new tools, systems and approaches that comprise a contemporary approach to health informatics. Given space limitations and the enormous change in this regard in the past few years I am emphasizing those new approaches that I believe will lead us forward with little emphasis on the more traditional technologies and approaches. This is the most technical chapter in the book but it is written as simply and clearly as possible to be comprehensible to the non-technical reader.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
We’ll discuss encryption in more detail in the security section of this chapter but it typically involves two “digital keys” (long strings of characters). You encrypt a message to someone using their public key but you need a private key – something that only the recipient should have – to un-encrypt it. This insures that only the intended recipient can read the message.
- 2.
WellPoint and Kaiser are the others but Kaiser has a substantially different business model and would not likely consider becoming a technology supplier.
- 3.
There are many health data standards. I’ve listed the major ones in the glossary and have chosen to use SNOMED as the example because it is the most clinically powerful. The Glossary contains the names, acronyms and a brief description of the commonly used standards.
- 4.
However, a human would not want to sit down and read an XML document as one would read a book. The problem of visualizing the information in an XML document most usefully for humans is still an area of active research and development.
- 5.
The technically inclined might go to reference 26 and click the Download the CCD QSG (Quick Start Guide) link. It provides two full CCD examples and a guide to study.
- 6.
We’ve not previously discussed a predecessor of the CCD, the CCR, because the CCD has been accepted as the US standard format for an electronic patient summary. At present an EHR can be certified if it can generate either the CCD or CCR format but the trend is in the direction of the CCD. The differences are quite technical [26] but, most importantly, the CCD was developed within the CDA architecture.
- 7.
Eclypsis, now part of Allscripts, McKesson Provider Technologies and Siemens
References
Licklider JCR (1963) Memorandum for Members and Affiliates of the Intergalactic Computer Network http://www.kurzweilai.net/memorandum-for-members-and-affiliates-of-the-intergalactic-computer-network. Accessed 19 July, 2012
http://www.meddserve.com/ Accessed 19 July, 2012
http://www.exleaz.com/ Accessed 19 July, 2012
McDonald CJ, et al (2005) The Indiana Network For Patient Care: A Working Local Health Information Infrastructure. Health Aff 24:5 1214–1220
http://wiki.directproject.org/ Accessed 19 July, 2012
Brull R (2012) Six Questions to Consider About Merging a CCD http://www.hl7standards.com/blog/2012/01/24/merging-a-ccd/ Accessed 19 July, 2012
http://www.connectopensource.org/ Accessed 19 July, 2012
http://www.stanford.edu/group/psylawseminar/HIPAAguide.htm Accessed 19 July, 2012
http://wiki.siframework.org/Data%2B;Segmentation%2B;for%2B;Privacy%2B;Homepage Accessed 19 July, 2012
Goldstein MM and Rein AL (2010) Data Segmentation in Electronic Health Information Exchange: Policy Considerations and Analysis http://healthit.hhs.gov/portal/server.pt?open=512%26;mode=2%26;cached=true%26;objID=1147 Accessed 19 July, 2012
Schneider S et al (2009) Consumer Engagement in Developing Electronic Health Information Systems. Prepared for: Agency for Health Research and Quality. AHRQ Pub No. 09-0018-EF
Mohan A, Bauer D, Blough DM, Ahamad M, et al (2009) A Patient-centric, Attribute-based, Source-verifiable Framework for Health Record Sharing. GIT CERCS Technical Report No. GIT-CERCS-09-11
http://www.hipaasolutions.org/news/US%20Attorney%20Charges%20Two%20With%20HIPAA%20Violations.pdf Accessed 19 July, 2012
http://articles.latimes.com/2008/aug/05/local/me-health5 Accessed 19 July, 2012
http://www.courierpress.com/news/2006/nov/25/women-alerted-to-id-theft-risk/?print=1 Accessed 19 July, 2012
Kaliski B The Mathematics of the RSA Public-Key Cryptosystem http://mathaware.org/mam/06/Kaliski.pdf Accessed 19 July, 2012
Gray BH et al (2011) Electronic Health Records: An International Perspective on “Meaningful Use” http://www.commonwealthfund.org/∼/media/Files/Publications/Issue%20Brief/2011/Nov/1565_Gray_electronic_med_records_meaningful_use_intl_brief.pdf Accessed 19 July, 2012
Dorenfest SI (1989) The Decade of the 1980’s: Large Expenditures Produce Limited Progress in Hospital Automation. US Healthc 6(12):20–2.
Yuan MJ (2011) Watson and healthcare: How natural language processing and semantic search could revolutionize clinical decision support. http://www.ibm.com/developerworks/industry/library/ind-watson/ Accessed 19 July, 2012
http://www.cms.gov/Medicare/Coding/ICD10/index.html?redirect=/ICD10/ Accessed 19 July, 2012
http://imagic.nlm.nih.gov/imagic/code/map Accessed 19 July, 2012
http://vtsl.vetmed.vt.edu/ Accessed 23 September, 2012
http://services.bidmc.org/geekdoctor/johnhalamkaccddocument.xml Accessed 19 July, 2012
http://geekdoctor.blogspot.com/ Accessed 19 July, 2012
http://www.hitsp.org/ConstructSet_Details.aspx?&PrefixAlpha=4&PrefixNumeric=83 Accessed 19 July, 2012
http://www.himssehra.org/ASP/CCD_QSG_20071112.asp Accessed 19 July, 2012
http://publicaa.ansi.org/sites/apdl/hitspadmin/Matrices/HITSP_09_N_451.pdf Accessed 19 July, 2012
Weed LL (1987) Problem-knowledge Coupling. Med Instrum. 21(5):284–7
Pryor TA and Hripcsak G (1993) The Arden Syntax for Medical Logic Modules. Int J Clin Monit Comput. 10(4):215–24
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 The Author(s)
About this chapter
Cite this chapter
Braunstein, M.L., Braunstein, M.L. (2013). Contemporary Informatics Tools. In: Health Informatics in the Cloud. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5629-2_3
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5629-2_3
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5628-5
Online ISBN: 978-1-4614-5629-2
eBook Packages: Computer ScienceComputer Science (R0)