Healthcare Information Systems: Challenges of the New Millennium: Challenges of the New Millennium

Framsida
Armoni, Adi
Idea Group Inc (IGI), 1 juli 1999 - 243 sidor

Healthcare information systems are crucial to the effective and efficient delivery of healthcare, to the performance of healthcare organizations and to patient care and welfare. Medical information systems drive and impact many aspects of the healthcare system, including structure, economics and performance.

Health-care Information Systems: Challenges of the New Millennium reports on the implementation of these systems, looking at both the success stories as well as the reasons for failure in the design, development and implementation of these systems.

Från bokens innehåll

Innehåll

Acknowledgments
2
Designing Hospital Information Systems Handling Complexity via a UserOriented DocumentBased Approach
3
Healthcare Process Redesign A Case Study
27
Information Security Framework for Health Information Systems
50
Health Information Management and Individual Privacy Applilcaiton of New Zealands Privacy Legislation
80
Understanding Success and Failure of Health Care Information Systems
96
The Use of Artifical Intelligence Techniques and Applications in the Medical Domain
129
An Intelligent Data Mining System to Detect Healthcare Fraud
148
Diabetes MellitusEvaluating the Diagnostic Probabilities
170
Telemedicine and the Information Highway
179
ClientServer Computing Lessons Learned and an Application in the Healthcare Industry
221
About the Authors
236
Index
241
Upphovsrätt

Andra upplagor - Visa alla

Vanliga ord och fraser

Populära avsnitt

Sida 32 - Re-engineering is defined as: 'the fundamental rethinking and radical redesign of business processes to achieve dramatic improvements in critical, contemporary measures of performance, such as cost, quality, service and speed.
Sida 156 - Medicare, the most common forms of fraud include billing for services not furnished, misrepresenting the diagnosis to justify payment...
Sida 70 - The heart of a trusted computer system is the Trusted Computing Base (TCB) which contains all of the elements of the system responsible for supporting the security policy and supporting the isolation of objects (code and data) on which the protection is based. The bounds of the TCB equate to the "security perimeter" referenced in some computer security literature.
Sida 153 - Review of Neural Network Applications in Medical Imaging and Signal Processing.
Sida 153 - Pople, HE (1985). Evolution of an expert system : from internist to caduceus. In : De Lotto I, Stefanelli M, eds.
Sida 176 - Geographic variation in mortality rates from breast cancer among white women in the United States. Journal of the National Cancer Institute 87, 1846-1853.
Sida 69 - Discretionary security is the principal type of access control available in computer systems today. The basis of this kind of security is that an individual user, or program operating on his behalf, is allowed to specify explicitly the types of access other users may have to information under his control. Discretionary security differs from mandatory security in that it implements an access control policy on the basis of an individual's need-to-know as opposed to mandatory controls which are driven...

Om författaren (1999)

[Editor]

Bibliografisk information