Explicit causal reasoning is preferred, but not necessary for pragmatic value.
Author(s): Lenert, Matthew C, Matheny, Michael E, Walsh, Colin G
DOI: 10.1093/jamia/ocz198
Author(s): Lenert, Matthew C, Matheny, Michael E, Walsh, Colin G
DOI: 10.1093/jamia/ocz198
Author(s): Sperrin, Matthew, Jenkins, David, Martin, Glen P, Peek, Niels
DOI: 10.1093/jamia/ocz197
Driven by beneficial patient-centered outcomes associated with patient portal use and the Affordable Care Act, portal implementation has expanded into safety nets-health systems that offer access to care to a large share of uninsured, Medicaid, and other vulnerable populations. However, little attention has been paid to the factors that affect portal accessibility by the vulnerable patients served by these health systems-including those who are limited English proficient (LEP).
Author(s): Casillas, Alejandra, Perez-Aguilar, Giselle, Abhat, Anshu, Gutierrez, Griselda, Olmos-Ochoa, Tanya T, Mendez, Carmen, Mahajan, Anish, Brown, Arleen, Moreno, Gerardo
DOI: 10.1093/jamia/ocz115
There is increasing awareness that the methodology and findings of research should be transparent. This includes studies using artificial intelligence to develop predictive algorithms that make individualized diagnostic or prognostic risk predictions. We argue that it is paramount to make the algorithm behind any prediction publicly available. This allows independent external validation, assessment of performance heterogeneity across settings and over time, and algorithm refinement or updating. Online calculators and apps [...]
Author(s): Van Calster, Ben, Wynants, Laure, Timmerman, Dirk, Steyerberg, Ewout W, Collins, Gary S
DOI: 10.1093/jamia/ocz130
Predictive analytics in health care has generated increasing enthusiasm recently, as reflected in a rapidly growing body of predictive models reported in literature and in real-time embedded models using electronic health record data. However, estimating the benefit of applying any single model to a specific clinical problem remains challenging today. Developing a shared framework for estimating model value is therefore critical to facilitate the effective, safe, and sustainable use of [...]
Author(s): Liu, Vincent X, Bates, David W, Wiens, Jenna, Shah, Nigam H
DOI: 10.1093/jamia/ocz088
Twitter posts are now recognized as an important source of patient-generated data, providing unique insights into population health. A fundamental step toward incorporating Twitter data in pharmacoepidemiologic research is to automatically recognize medication mentions in tweets. Given that lexical searches for medication names suffer from low recall due to misspellings or ambiguity with common words, we propose a more advanced method to recognize them.
Author(s): Weissenbacher, Davy, Sarker, Abeed, Klein, Ari, O'Connor, Karen, Magge, Arjun, Gonzalez-Hernandez, Graciela
DOI: 10.1093/jamia/ocz156
Extracting clinical entities and their attributes is a fundamental task of natural language processing (NLP) in the medical domain. This task is typically recognized as 2 sequential subtasks in a pipeline, clinical entity or attribute recognition followed by entity-attribute relation extraction. One problem of pipeline methods is that errors from entity recognition are unavoidably passed to relation extraction. We propose a novel joint deep learning method to recognize clinical entities [...]
Author(s): Shi, Xue, Yi, Yingping, Xiong, Ying, Tang, Buzhou, Chen, Qingcai, Wang, Xiaolong, Ji, Zongcheng, Zhang, Yaoyun, Xu, Hua
DOI: 10.1093/jamia/ocz158
The study sought to evaluate how availability of different types of health records data affect the accuracy of machine learning models predicting suicidal behavior.
Author(s): Simon, Gregory E, Shortreed, Susan M, Johnson, Eric, Rossom, Rebecca C, Lynch, Frances L, Ziebell, Rebecca, Penfold, And Robert B
DOI: 10.1093/jamia/ocz136
To investigate the effects of adjusting the default order set settings on telemetry usage.
Author(s): Rubins, David, Boxer, Robert, Landman, Adam, Wright, Adam
DOI: 10.1093/jamia/ocz137
Clinical corpora can be deidentified using a combination of machine-learned automated taggers and hiding in plain sight (HIPS) resynthesis. The latter replaces detected personally identifiable information (PII) with random surrogates, allowing leaked PII to blend in or "hide in plain sight." We evaluated the extent to which a malicious attacker could expose leaked PII in such a corpus.
Author(s): Carrell, David S, Cronkite, David J, Li, Muqun Rachel, Nyemba, Steve, Malin, Bradley A, Aberdeen, John S, Hirschman, Lynette
DOI: 10.1093/jamia/ocz114