Sharing data for the public good and protecting individual privacy: informatics solutions to combine different goals.
Author(s): Ohno-Machado, Lucila
DOI: 10.1136/amiajnl-2012-001513
Author(s): Ohno-Machado, Lucila
DOI: 10.1136/amiajnl-2012-001513
To determine how well statistical text mining (STM) models can identify falls within clinical text associated with an ambulatory encounter.
Author(s): McCart, James A, Berndt, Donald J, Jarman, Jay, Finch, Dezon K, Luther, Stephen L
DOI: 10.1136/amiajnl-2012-001334
Author(s): Malin, Bradley A, Emam, Khaled El, O'Keefe, Christine M
DOI: 10.1136/amiajnl-2012-001509
To assess patients' desire for granular level privacy control over which personal health information should be shared, with whom, and for what purpose; and whether these preferences vary based on sensitivity of health information.
Author(s): Caine, Kelly, Hanania, Rima
DOI: 10.1136/amiajnl-2012-001023
To test the feasibility of using text mining to depict meaningfully the experience of pain in patients with metastatic prostate cancer, to identify novel pain phenotypes, and to propose methods for longitudinal visualization of pain status.
Author(s): Heintzelman, Norris H, Taylor, Robert J, Simonsen, Lone, Lustig, Roger, Anderko, Doug, Haythornthwaite, Jennifer A, Childs, Lois C, Bova, George Steven
DOI: 10.1136/amiajnl-2012-001076
To model the financial effects of implementing a hospital-wide electronic medical record (EMR) system in a tertiary facility in Malawi.
Author(s): Driessen, Julia, Cioffi, Marco, Alide, Noor, Landis-Lewis, Zach, Gamadzi, Gervase, Gadabu, Oliver Jintha, Douglas, Gerald
DOI: 10.1136/amiajnl-2012-001242
Ensuring the security and appropriate use of patient health information contained within electronic medical records systems is challenging. Observing these difficulties, we present an addition to the explanation-based auditing system (EBAS) that attempts to determine the clinical or operational reason why accesses occur to medical records based on patient diagnosis information. Accesses that can be explained with a reason are filtered so that the compliance officer has fewer suspicious accesses [...]
Author(s): Fabbri, Daniel, Lefevre, Kristen
DOI: 10.1136/amiajnl-2012-001018
DNA samples are often processed and sequenced in facilities external to the point of collection. These samples are routinely labeled with patient identifiers or pseudonyms, allowing for potential linkage to identity and private clinical information if intercepted during transmission. We present a cryptographic scheme to securely transmit externally generated sequence data which does not require any patient identifiers, public key infrastructure, or the transmission of passwords.
Author(s): Cassa, Christopher A, Miller, Rachel A, Mandl, Kenneth D
DOI: 10.1136/amiajnl-2012-001366
In 2011, the US Supreme Court decided Sorrell v. IMS Health, Inc., a case that addressed the mining of large aggregated databases and the sale of prescriber data for marketing prescription drugs. The court struck down a Vermont law that required data mining companies to obtain permission from individual providers before selling prescription records that included identifiable physician prescription information to pharmaceutical companies for drug marketing. The decision was based [...]
Author(s): Petersen, Carolyn, Demuro, Paul, Goodman, Kenneth W, Kaplan, Bonnie
DOI: 10.1136/amiajnl-2012-001123
Implementation of Computerized Provider Order Entry (CPOE) has many potential advantages. Despite the potential benefits of CPOE, several attempts to implement CPOE systems have failed or met with high levels of user resistance. Implementation of CPOE can fail or meet high levels of user resistance for a variety of reasons, including lack of attention to users' needs and the significant workflow changes required by CPOE. User satisfaction is a critical [...]
Author(s): Hoonakker, Peter L T, Carayon, Pascale, Brown, Roger L, Cartmill, Randi S, Wetterneck, Tosha B, Walker, James M
DOI: 10.1136/amiajnl-2012-001114