Healthcare Information Systems: Challenges of the New Millennium: Challenges of the New MillenniumArmoni, Adi Idea Group Inc (IGI), 1 juli 1999 - 243 sidor Healthcare information systems are crucial to the effective and efficient delivery of healthcare, to the performance of healthcare organizations and to patient care and welfare. Medical information systems drive and impact many aspects of the healthcare system, including structure, economics and performance. Health-care Information Systems: Challenges of the New Millennium reports on the implementation of these systems, looking at both the success stories as well as the reasons for failure in the design, development and implementation of these systems. |
Innehåll
2 | |
3 | |
Healthcare Process Redesign A Case Study | 27 |
Information Security Framework for Health Information Systems | 50 |
Health Information Management and Individual Privacy Applilcaiton of New Zealands Privacy Legislation | 80 |
Understanding Success and Failure of Health Care Information Systems | 96 |
The Use of Artifical Intelligence Techniques and Applications in the Medical Domain | 129 |
An Intelligent Data Mining System to Detect Healthcare Fraud | 148 |
Diabetes MellitusEvaluating the Diagnostic Probabilities | 170 |
Telemedicine and the Information Highway | 179 |
ClientServer Computing Lessons Learned and an Application in the Healthcare Industry | 221 |
About the Authors | 236 |
Index | 241 |
Andra upplagor - Visa alla
Healthcare Information Systems: Challenges of the New Millennium Adi Armoni Ingen förhandsgranskning - 2000 |
Vanliga ord och fraser
activities allow analysis applications approach areas artificial central client clinical collection communication complexity conceptions consultation cooperation cost countries database decision detection diagnosis dimensions discuss disease doctors document effective electronic estimations evaluation example existing expert failure field Figure findings fraud gaps groups HCIS health information healthcare hospital identify images implementation important improve includes individual information systems initiatives integrated intelligence introduced issues knowledge medical information medical service medicine nurses objects operating organization organizational patient performance person physician planning possible practice present probabilities problems procedures reality received records reengineering reported requirements rules sector server structure success tasks techniques telemedicine tests tion transfer treatment types University values various Zealand
Populära avsnitt
Sida 32 - Re-engineering is defined as: 'the fundamental rethinking and radical redesign of business processes to achieve dramatic improvements in critical, contemporary measures of performance, such as cost, quality, service and speed.
Sida 156 - Medicare, the most common forms of fraud include billing for services not furnished, misrepresenting the diagnosis to justify payment...
Sida 70 - The heart of a trusted computer system is the Trusted Computing Base (TCB) which contains all of the elements of the system responsible for supporting the security policy and supporting the isolation of objects (code and data) on which the protection is based. The bounds of the TCB equate to the "security perimeter" referenced in some computer security literature.
Sida 153 - Review of Neural Network Applications in Medical Imaging and Signal Processing.
Sida 153 - Pople, HE (1985). Evolution of an expert system : from internist to caduceus. In : De Lotto I, Stefanelli M, eds.
Sida 176 - Geographic variation in mortality rates from breast cancer among white women in the United States. Journal of the National Cancer Institute 87, 1846-1853.
Sida 69 - Discretionary security is the principal type of access control available in computer systems today. The basis of this kind of security is that an individual user, or program operating on his behalf, is allowed to specify explicitly the types of access other users may have to information under his control. Discretionary security differs from mandatory security in that it implements an access control policy on the basis of an individual's need-to-know as opposed to mandatory controls which are driven...