reklama - zainteresowany?

Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use - Helion

Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
ebook
Autor: Fred Trotter, David Uhlman
ISBN: 978-14-493-1880-2
stron: 248, Format: ebook
Data wydania: 2011-10-07
Księgarnia: Helion

Cena książki: 55,24 zł (poprzednio: 64,99 zł)
Oszczędzasz: 15% (-9,75 zł)

Dodaj do koszyka Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use

Ready to take your IT skills to the healthcare industry? This concise book provides a candid assessment of the US healthcare system as it ramps up its use of electronic health records (EHRs) and other forms of IT to comply with the government’s Meaningful Use requirements. It’s a tremendous opportunity for tens of thousands of IT professionals, but it’s also a huge challenge: the program requires a complete makeover of archaic records systems, workflows, and other practices now in place.

This book points out how hospitals and doctors’ offices differ from other organizations that use IT, and explains what’s necessary to bridge the gap between clinicians and IT staff.

  • Get an overview of EHRs and the differences among medical settings
  • Learn the variety of ways institutions deal with patients and medical staff, and how workflows vary
  • Discover healthcare’s dependence on paper records, and the problems involved in migrating them to digital documents
  • Understand how providers charge for care, and how they get paid
  • Explore how patients can use EHRs to participate in their own care
  • Examine healthcare’s most pressing problem—avoidable errors—and how EHRs can both help and exacerbate it

Dodaj do koszyka Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use

 

Osoby które kupowały "Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use", wybierały także:

  • Windows Media Center. Domowe centrum rozrywki
  • Ruby on Rails. Ćwiczenia
  • DevOps w praktyce. Kurs video. Jenkins, Ansible, Terraform i Docker
  • Przywództwo w Å›wiecie VUCA. Jak być skutecznym liderem w niepewnym Å›rodowisku
  • Scrum. O zwinnym zarzÄ…dzaniu projektami. Wydanie II rozszerzone

Dodaj do koszyka Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use

Spis treści

Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use eBook -- spis treści

  • Hacking Healthcare
  • Preface
    • Audience
    • Organization
    • Conventions Used in This Book
    • Using Code Examples
    • Safari Books Online
    • How to Contact Us
    • Acknowledgments
  • 1. Introduction
    • Health IT and Medical Science
    • Meaningful Use and What It Means to Be an EHR
    • Why So Late?
    • Health IT in Health Reform
    • Evolution of Meaningful Use
    • Accountable Care Organizations
    • EHR Functionality in Context
  • 2. An Anatomy of Medical Practice
    • How Patients Reach Healthcare Organizations
    • Lab Sample Collection Before a Visit or Admission Date
    • HIPAA and Patient Identification
    • Intake, Demographics, Visits, and Admissions
    • Precertification and Prior Authorization
    • Emergency Admissions
    • Prioritization and Triage
    • Outpatient Care
    • Inpatient Care
    • Labs
    • Imaging
    • Administration and Billing
  • 3. Medical Billing
    • Who Pays, and How
    • Claims
    • Eligibility
    • Treatment
    • Billing
      • The Billing Process
      • Complexities in Billing
    • Adjudication
    • The Patients Burden
  • 4. The Bandwidth of Paper
    • Workflow Tokens
    • Why Leave Paper?
    • Step 0: Health IT Humility
    • Normalized Data
    • Good Boundaries Mean Good Data
    • Data at Peace with Itself: Linked Data
    • Flexible Data
    • Assume Health Data Changes
    • Free Text Data
  • 5. Herding Cats: Healthcare Management and Business Office Operations
    • Major Business Office Activities
      • Insurance
      • Records
      • Demographics
      • Revenue Collection
      • Auditing
      • Accounting
      • Reporting
      • Licensing, Credentials, and Enrollments
      • Nonhealthcare Interactions
    • The Evolution of the Business Office
  • 6. Patient-Facing Software
    • The PHR as Platform
    • Sharing Data in Patient-Facing Software
    • Patients Using Normal Social Media
    • E-patients
    • The Quantified Self
    • Patient-Focused Social Media
    • Patient Privacy in PHR Systems
    • Specific PHR and Patient-Directed Meaningful Use Requirements
  • 7. Human Error
    • The Extent of Error
    • Dangerous Dosing
    • Discontents of Computerization
    • Process Errors and Organizational Change
    • Deep Medical Errors and EHR Solutions
    • Errors Caused by Human-Computer Mismatch
    • Best Practices
  • 8. Meaningful Use Overview
    • Outpatient Guidelines and Requirements
    • Inpatient Guidelines and Requirements
  • 9. A Selective History of EHR Technology
    • MUMPS: The Programming Language for Healthcare
    • Where Can We Buy Some Light Bulbs?
    • Fragmentation
    • In an Environment with Gag Clauses and No Consumer Reports
    • VistA History
  • 10. Ontologies
    • A Throw-Away Ontology
    • Learning from Our Example
    • CPT Codes, Sermo, and CMS
    • International Classification of Diseases (ICD)
    • E-patient-Dave-gate
    • Crosswalks and ICD Versions
    • Other Claims Codes
    • Drug Databases
    • SNOMED to the Rescue
      • SNOMED Example
      • SNOMED and the Semantic Web
    • UMLS: The Universal Mapping Metaontology
    • Extending Ontologies
    • Other Ontologies
    • Sneaky Ontologies
    • Ontologies Using APIs
    • Exercising Ontologies
  • 11. Interoperability
    • Some Lessons from Earlier Exchanges
    • The New HIE Rules
    • Strong Standards
    • Winning Protocols
    • The Billing Protocols
    • HL7 Version 2
    • First-Generation and Second-Generation HIEs
    • Continuity of Care Record
    • HL7 v3, RIM, CDA, CDD, and HITSP C32
    • The IHE Protocol
    • HIE with IHE
      • Managing Patient Identifiers with IHE
      • IHE Data Exchange, the Library Model
      • IHE in the NWHIN
    • The Direct Project/Protocol
    • The PCAST Report
    • The SMART Platform
    • Technology and Policy Were Sitting in the Tree
  • 12. HIPAA: The Far-Reaching Healthcare Regulation
    • Does HIPAA Cover Me?
    • Responsibilities of Covered Entities
    • HIPAA: A Reasonable Regulation
    • Duct-Tape HIPAA Strategies
    • Breach Notification Rules
    • In Summary
  • 13. Open Source Systems
    • Why Open Source?
    • Major Open Source Healthcare Projects
      • ClearHealth
      • Mirth Connect
    • VistA Variants and Other Certified Open Source EHR Systems
    • OpenMRS
  • A. Meaningful Use Implementation Assessment
  • About the Authors
  • Copyright

Dodaj do koszyka Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.