Presentation of the Morris F. Collen Award to Clement J. McDonald, MD.
Author(s): Overhage, J Marc
DOI: 10.1197/jamia.m1709
Author(s): Overhage, J Marc
DOI: 10.1197/jamia.m1709
This report provides an evaluation of the National Library of Medicine-sponsored Woods Hole Medical Informatics (WHMI) course and the extent to which the objectives of the program are achieved. Two studies were conducted to examine the participants' perceptions of both the short-term (spring 2002) and the long-term influences (1993 through 2002) on knowledge, skills, and behavior. Data were collected through the use of questionnaires, semistructured telephone interviews, and participant observation [...]
Author(s): Patel, Vimla L, Branch, Timothy, Cimino, Andria, Norton, Cathy, Cimino, James J
DOI: 10.1197/jamia.M1662
The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's [...]
Author(s): Collmann, Jeff, Alaoui, Adil, Nguyen, Dan, Lindisch, David
DOI: 10.1197/jamia.M1404
This multisite study compared the perceptions of three stakeholder groups regarding information technologies as barriers to and facilitators of clinical practice guidelines (CPGs).
Author(s): Lyons, Stacie Salsbury, Tripp-Reimer, Toni, Sorofman, Bernard A, Dewitt, Jane E, Bootsmiller, Bonnie J, Vaughn, Thomas E, Doebbeling, Bradley N
DOI: 10.1197/jamia.M1495
In this paper, the authors describe a methodology to transform programmatically structured reporting (SR) templates defined by the Digital Imaging and Communications for Medicine (DICOM) standard into an XML schema representation. Such schemas can be used in the creation and validation of XML-encoded SR documents that use templates. Templates are a means to put additional constraints on an SR document to promote common formats for specific reporting applications or domains [...]
Author(s): Zhao, Luyin, Lee, Kwok Pun, Hu, Jingkun
DOI: 10.1197/jamia.M1519
The aim of this study was to estimate the costs of implementing computerized physician order entry (CPOE) systems in hospitals in a rural state and to evaluate the financial implications of statewide CPOE implementation.
Author(s): Ohsfeldt, Robert L, Ward, Marcia M, Schneider, John E, Jaana, Mirou, Miller, Thomas R, Lei, Yang, Wakefield, Douglas S
DOI: 10.1197/jamia.M1553
The rapid advances in high-throughput biotechnologies such as DNA microarrays and mass spectrometry have generated vast amounts of data ranging from gene expression to proteomics data. The large size and complexity involved in analyzing such data demand a significant amount of computing power. High-performance computation (HPC) is an attractive and increasingly affordable approach to help meet this challenge. There is a spectrum of techniques that can be used to achieve [...]
Author(s): Carriero, Nicholas, Osier, Michael V, Cheung, Kei-Hoi, Miller, Perry L, Gerstein, Mark, Zhao, Hongyu, Wu, Baolin, Rifkin, Scott, Chang, Joseph, Zhang, Heping, White, Kevin, Williams, Kenneth, Schultz, Martin
DOI: 10.1197/jamia.M1571
Despite progress in creating standardized clinical data models and interapplication protocols, the goal of creating a lifelong health care record remains mired in the pragmatics of interinstitutional competition, concerns about privacy and unnecessary disclosure, and the lack of a nationwide system for authenticating and authorizing access to medical information. The authors describe the architecture of a personally controlled health care record system, PING, that is not institutionally bound, is a [...]
Author(s): Simons, William W, Mandl, Kenneth D, Kohane, Isaac S
DOI: 10.1197/jamia.M1592
The incorporation of genomic data into personal medical records poses many challenges to patient privacy. In response, various systems for preserving patient privacy in shared genomic data have been developed and deployed. Although these systems de-identify the data by removing explicit identifiers (e.g., name, address, or Social Security number) and incorporate sound security design principles, they suffer from a lack of formal modeling of inferences learnable from shared data. This [...]
Author(s): Malin, Bradley A
DOI: 10.1197/jamia.M1603
For over thirty years, there have been predictions that the widespread clinical use of computers was imminent. Yet the "wave" has never broken. In this article, two broad time periods are examined: the 1960's to the 1980's and the 1980's to the present. Technology immaturity, health administrator focus on financial systems, application "unfriendliness," and physician resistance were all barriers to acceptance during the early time period. Although these factors persist [...]
Author(s): Berner, Eta S, Detmer, Don E, Simborg, Donald
DOI: 10.1197/jamia.M1664