What other information should the health care provider obtain from the patient?

Chapter 2. Patient Assessment

The purpose of obtaining a health history is to gather subjective data from the patient and/or the patient’s family so that the health care team and the patient can collaboratively create a plan that will promote health, address acute health problems, and minimize chronic health conditions. The health history is typically done on admission to hospital, but a health history may be taken whenever additional subjective information from the patient may be helpful to inform care (Wilson & Giddens, 2013).

Data gathered may be subjective or objective in nature. Subjective data is information reported by the patient and may include signs and symptoms described by the patient but not noticeable to others. Subjective data also includes demographic information, patient and family information about past and current medical conditions, and patient information about surgical procedures and social history. Objective data is information that the health care professional gathers during a physical examination and consists of information that can be seen, felt, smelled, or heard by the health care professional. Taken together, the data collected provides a health history that gives the health care professional an opportunity to assess health promotion practices and offer patient education (Stephen et al., 2012).

The hospital will have a form with assessment questions similar to the ones listed in Checklist 16.

Checklist 16: Health History Checklist
Disclaimer: Always review and follow your hospital policy regarding this specific skill.

Steps

Additional Information

Determine the following:

1. Biographical data

  • Source of history
  • Name
  • Age
  • Occupation (past or present)
  • Marital status/living arrangement
2. Reason for seeking care and history of present health concern
  • Chief complaint
  • Onset of present health concern
  • Duration
  • Course of the health concern
  • Signs, symptoms, and related problems
  • Medications or treatments used (ask how effective they were)
  • What aggravates this health concern
  • What alleviates the symptoms
  • What caused the health concern to occur
  • Related health concerns
  • How the concern has affected life and daily activities
  • Previous history and episodes of this condition
3. Past health history
  • Allergies (reaction)
  • Serious or chronic illness
  • Recent hospitalizations
  • Recent surgical procedures
  • Emotional or psychiatric problems (if pertinent)
  • Current medications: prescriptions, over­-the­-counter, herbal remedies
  • Drug/alcohol consumption
4. Family history
  • Pertinent health status of family members
  • Pertinent family history of heart disease, lung disease, cancer, hypertension, diabetes, tuberculosis, arthritis, neurological disease, obesity, mental illness, genetic disorders
5. Functional assessment (including activities of daily living)
  • Activity/exercise, leisure and recreational activities (assess for falls risk)
  • Sleep/rest
  • Nutrition/elimination
  • Interpersonal relationships/resources
  • Coping and stress management
  • Occupational/environmental hazards
6. Developmental tasks
  • Current significant physical and psychosocial changes/issues
7. Cultural assessment
  • Cultural/health-related beliefs and practices
  • Nutritional considerations related to culture
  • Social and community considerations
  • Religious affiliation/spiritual beliefs and/or practices
  • Language/communication
Data source: Assessment Skill Checklists, 2014

  1. You are taking a health history. Why is it important for you to obtain a complete description of the patient’s present illness?
  2. You are taking a health history. What is one reason it is important for you to obtain a complete description of the patient’s lifestyle and exercise habits?

A blockchain solution for the privacy of patients’ medical data

Riya Sapra, Parneeta Dhaliwal, in Machine Learning, Big Data, and IoT for Medical Informatics, 2021

2.3 Healthcare providers (doctors, nurses, hospitals, nursing homes, clinics, etc.)

Healthcare providers include hospitals, doctors, nursing staff, clinics, nursing homes, medical practitioners, nutritionists and dieticians, and many more. Hospitals, clinics, and nursing homes are the places where patients come for getting diagnosis for any injury or disease. Doctors and other medical staff ensure that patients are given proper care and right diagnosis. Hospitals need to keep track of the patients, their records, diagnosis provided, medical expenses, and other details. E-platforms help manage all the details of patients and their records. These records need to be shared with insurance companies for the payments via insurance claims. Blockchain-based platforms ease the task of sharing the records and reports with the insurance companies and maintain the security of the data as well.

Many a times these records need to be shared with other health agencies or doctors to consult about a particular scenario or disease, and blockchain applications can ensure prevention of any misuse of data. The access controls of sharing data are with patients, so patients can control the use and spread of data anytime. Also with the use of applications, doctors, and nurses can track the progress of diagnosis and check for summarized reports. This helps them in better understanding of the situation in less time.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128217771000252

Risk Analysis

Paul Cerrato, in Protecting Patient Information, 2016

The ONC approach to risk analysis and security management

ONC suggests healthcare providers consider these 7 steps—but does not mandate this approach:

Lead your culture, select your team, and learn

Document your process, findings, and actions

Review existing security of ePHI (perform security risk analysis)

Develop an action plan

Manage and mitigate risks

Attest for meaningful use security-related objective

Monitor, audit, and update security on an ongoing basis

Step 1

For many practices and hospitals, the first step is usually the hardest because reshaping the workplace culture is challenging, especially in medicine, which is conservative and often resistant to change. Promoting a culture that truly sees the value of protecting patient privacy and security can also prove difficult for another reason: Making PHI more secure often means making it harder not just for unauthorized persons to get to the information but harder for clinicians as well. Tightening up policies on passwords, for instance, or locking out authorized users to an electronic health record 5 min after they walk away from the workstation can be inconvenient, especially in an ER, where the nature of the work requires clinicians to move around a lot. We will go into a more detailed discussion about creating a security conscious culture in chapter 8: Educating Medical and Administrative Staff.

Step 1 also involves the establishment of a team that has oversight of the risk analysis, as well as other aspects of your security initiative. ONC also recommends choosing a security officer, discussing your security needs with the EHR vendor, reading up on the HIPAA rules, and perhaps bringing in a qualified professional to help conduct the risk analysis—if there is no one on your team capable of handling the responsibility. If you decide to bring in a third party, be certain that consultant has the right credentials. Both the Healthcare Information and Management Systems Society (HIMSS) and the American Health Information Management Association (AHIMA) have certification systems in place to help you determine who is and is not right for the job.

AHIMA bestows a stamp of approval referred to as CHPS, indicating that the person is Certified in Healthcare Privacy and Security. In addition to passing an exam, it also requires IT professionals to have a college degree and several years’ experience working in the specialty. HIMSS offers the CPHIMS credentials, which means the person is a Certified Professional in Healthcare Information and Management Systems. HIMSS requires CPHIMS specialists to either have a bachelor’s degree and at least 3 years of experience in healthcare IT or a graduate degree and two years in healthcare IT.

Step 2

Ask any healthcare attorney about documentation, and they will agree that it is essential in almost every aspect of patient care. No less so in managing security risks. In step 2, ONC suggests setting up a master folder in your computer system that contains all your security findings, decisions, and actions, along with a copy of the risk analysis itself.

Step 3

This step in the ONC approach is the risk analysis itself. ONC suggests the use of the SRA tool, which will help small to middle size practices and which is discussed in more detail below. As you prepare this analysis, keep in mind that the risks of exposing PHI will differ in an office-based EHR versus and internet-hosted EHR. Fig. 4.1 illustrates some of the differences in security risks between the two types of EHRs.

What other information should the health care provider obtain from the patient?

Figure 4.1. Examples of potential information security risks with different types of EHR hosts.

http://www.healthit.gov/sites/default/files/privacy-and-security-guide.pdf.

Also keep in mind that government auditors will expect you to not only protect PHI in an EHR but in every other component of your record keeping systems. That means the practice management program, revenue cycle management system, as well as in any data in motion, for example, any emails, text messages, and files sent to Dropbox or other file sharing application. It also means protecting paper files, including their disposal. More than one healthcare organization has been fined for not following common sense precautions when discarding paper patient records.

Step 4

In this step, the action plan should be designed to mitigate the problems identified in the risk analysis, says ONC. Chapter 5: Reducing the Risk of a Data Breach will go into more depth on preventive strategies to mitigate the risk of a HIPAA violation or data breach, but ONC offers a helpful list of low-cost, highly effective measures that will get the action plan off the ground:

Say “no” to staff requests to take home laptops containing unencrypted ePHI. (Some security specialists believe, however, that it is best to never say “no” but to say “Let’s find a secure way to do what you want to do.”)

Remove hard drives from old computers before you get rid of them.

Do not email ePHI unless you know the data is encrypted.

Make sure your server is in a room accessible only to authorized staff, and keep the door locked.

Make sure the entire office understands that passwords should not be shared or easy to guess.

Notify your office staff that you are required to monitor their access randomly.

Maintain a working fire extinguisher in case of fire.

Check your EHR server often for viruses and malware.

As you put together your action plan, also consider some basic questions such as:

Who has the keys to your practice? It may be necessary to change the physical locks and computer passwords when employees or contractors leave your practice if they still have access to patient information.

Where, when, and how often do you back up? Do you have at least one backup kept offsite? Can your data be recovered from the backups? Remember, losing patient records will not only cripple your day-to-day functioning, it will also deprive patients of their information, which they are entitled to by law.

What is your contingency/disaster plan when/if your server crashes and you cannot directly recover data?

The last item on the ONC list is especially important, namely: monitoring, auditing, and updating security on an ongoing basis. Some healthcare organizations have made the mistake of doing a detailed security risk analysis, tucking it away in their computer system and never giving it another thought for years. The HIPAA rule is very specific, however, in insisting that risk analysis must be an ongoing process. As new technology is incorporated into a practice or hospital, the potential for PHI to be compromised increases, requiring more advanced safeguards in some cases.

The Office of the National Coordinator for Health Information Technology is not the only group encouraging healthcare decision makers to replace their compliance mentality with a risk management approach. Gartner, one of the world’s largest IT research and advisory companies, has been urging C-suite executives to make the switch as well. In its view, compliance is part of a much larger risk management program that balances the need to adhere to security regulations with the needs of the business as a whole. Two of Gartner’s key recommendations are the following:

“Create a formal and defensible program of controls based on the specific situation and risks unique to each organization.

Build a formal program that can adapt to the changing landscape of regulatory requirements that also protects you from reasonably anticipated risks” [7].

Gartner point outs that the HIPAA regulations themselves encourage this shift from a compliance point of view to a broader risk management approach by instructing healthcare organizations to do a risk analysis and to put reasonable controls in place that take into account reasonably anticipated risks. A simple security checklist is not enough to make that paradigm shift. The IT research firm goes on to outline a detailed roadmap to help businesses move from reactive old school thinking about security through a 5-phase evolution that eventually arrives at a more sophisticated “adaptive” model. Said roadmap is illustrated on their web site [7].

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128043929000046

Disease Modelling and Public Health, Part B

Natasha K. Martin, Lara K. Marquez, in Handbook of Statistics, 2017

7.3.2 Perspective

This analysis takes a healthcare provider perspective, in that only costs to the healthcare provider are considered (such as hospitalization and treatment costs). Any additional societal costs, such as the cost associated with an individual's transport to treatment, or economic benefits due to increased work productivity as a result of HCV cure are not included. Costs are valued in 2010 UK pounds and health outcomes are expressed in quality-adjusted life years (QALYs). Costs and health benefits are discounted at 3.5% per year in the base case according to UK guidelines (National Institute for Health and Care Excellence, 2013).

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/S0169716117300214

Healthcare Industry

Timothy Virtue, Justin Rainey, in HCISPP Study Guide, 2015

1.

A healthcare provider is:

a.

A provider of medical or health services in the normal course of business

b.

Synonymous with a covered entity under HIPAA

c.

Any organization or corporation that directly handles PHI

d.

None of the above

2.

A covered entity is:

a.

A provider of medical or health services in the normal course of business

b.

Synonymous with a healthcare provider under HIPAA

c.

Any organization or corporation that directly handles PHI

d.

None of the above

3.

EDI is:

a.

Electric data interchange

b.

Electronic dental interchange

c.

Electronic data interchange

d.

Electronic data import

4.

Business associates:

a.

Provide medical services

b.

Provide support services to medical providers

c.

Are not required to comply with HIPAA

d.

Both b and c

5.

HIT is an acronym for:

a.

Healthcare information technician

b.

Health information technology

c.

Healthcare information technology

d.

Health information technician

6.

Medical devices are classified into:

a.

Three regulatory categories

b.

Six regulatory categories

c.

One regulatory category

d.

None of the above

7.

An EHR is:

a.

An electronic health record

b.

Different from a personal health record

c.

Synonymous with a personal health record

d.

Both a and b

8.

Meaningful use is:

a.

A major driver of health information technology

b.

Optional for smaller organizations

c.

Only beneficial for healthcare organizations

d.

None of the above

9.

The two basic types of health insurance are:

a.

PPO and POS

b.

Medicare and Medicaid

c.

Public and private

d.

HMO and PPO

10.

Healthcare coding is:

a.

Essential to the transactional aspect of healthcare delivery

b.

Required under HIPAA

c.

Only important to large healthcare organizations who use third-party billing services

d.

Both a and b

11.

HCPCS is an acronym for:

a.

Healthcare Communication Procedure Coding System

b.

Healthcare Common Procedure Communication System

c.

Healthcare Common Procedure Coding System

d.

None of the above

12.

SNOMED CT is an acronym for:

a.

Systematized Nomenclature of Medicine Clinical Terms

b.

Systematized Nomenclature of Medicine Clerical Terms

c.

Systematized Naming of Medical Clinical Terms

d.

None of the above

13.

TCS is an acronym for:

a.

Transactions and Code Sets

b.

Technology and Code Sets

c.

Transfer and Code Sets

d.

None of the above

14.

SNOWMED CT often includes:

a.

Diagnosis-Related Groups (DRGs)

b.

Ambulatory Patient Groups (APGs)

c.

Resource Utilization Groups (RUGs)

d.

All of the above

15.

The National Uniform Billing Committee:

a.

Is a voluntary committee

b.

Is coordinated through the American Hospital Association

c.

Manages standards for uniform billing

d.

All of the above

16.

A healthcare clearinghouse:

a.

Provides patient care

b.

Only processes Medicare and Medicaid claims

c.

Only processes private insurance claims

d.

None of the above

17.

Public Health Reporting Regulations:

a.

Are addressed under HIPAA

b.

Require patient authorization

c.

Only apply to public health insurance programs

d.

None of the above

18.

Health records management:

a.

Is important from beginning to end of the health record

b.

Addresses data and quality management

c.

Addresses record destruction

d.

All of the above

19.

Data characterization includes:

a.

Classification

b.

Taxonomy

c.

Analytics

d.

All of the above

20.

DICOM is an acronym for:

a.

Digital Imaging and Compliance in Medicine

b.

Digital Integrity and Communications in Medicine

c.

Digital Imaging and Communications in Medicine

d.

Direct Imaging and Communications in Medicine

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128020432000021

Myths and misconceptions of PCI DSS

Branden R. Williams, ... Derek Milroy, in PCI Compliance (Fourth Edition), 2015

Myth #1 PCI doesn’t apply to me

Myth #1 is pretty simple, but, sadly, very common: “PCI DSS just doesn’t apply to us, because we are small, or we are a University, or we don’t do e-commerce, or we outsource ‘everything,’ or we don’t store cards, or we are not a permanent entity, etc.” More recent versions include “we use tokenization,” “we use EMV” (yeah right! – most of our US-based readers would say – even if that may change after 2015) or “we encrypt end to end.” “We outsource everything and thus have no PCI responsibilities” may in fact occasionally be true, but in most cases that is just that – a myth.

This myth takes over an organization and makes it oblivious to PCI DSS requirements and, almost always, to information risks and security requirements in general.

Another example is more blatant: health care providers have been so busy with Healthcare Information Portability and Accountability Act (HIPAA) that many became oblivious of PCI DSS arrival. A paper in “SC Magazine” called “PCI-DSS: Not on health care provider’s radar” [1] (notice the incorrectly hyphened “PCI–DSS” in the title…) reports:

However, since Medicare reimbursement is not at risk with PCI-DSS compliancy, it has been virtually ignored. It doesn’t help that major health care publications are openly misinterpreting the PCI-DSS standards for health care providers, with statements such as: “[Providers] do not have to worry about compliance with PCI standards… they aren’t storing any card numbers” [1].

A Perfect Example of Myth #1 at Work!

PCI DSS is not about storing cardholder data; it is about those who accept payment cards or capture, store, transmit, or process such card data. Want to guess whether most health care providers accept cards? Didn’t think so – the number is probably close to 100.00%, as most US readers can attest from their experiences. Indeed, the paper mentioned earlier [1] confirms: “In 2009, virtually all health care providers take credit cards—and virtually none of them are PCI compliant.” Now in 2014, the situation has barely changed. While HIPAA enforcement seems to have increased across health care providers, PCI DSS still remains “a big black hole” for many of them. Additionally, most such health care providers do not run a compliance program that can accommodate the needs of multiple regulations. They deal solely with HIPAA and adjusting the controls and practices to another regulation becomes fairly hard for them.

Note

Question: If I only accept cards from June to August each year and I only use a dial-up terminal, I am “safe from PCI,” right?

Answer: Wrong. Even though your scope of PCI DSS validation is very, very small, you are definitely subject to its rules because you – surprise! – accept payment cards. PCI DSS applies to those who “accept, capture, store, transmit, or process credit and debit card data.” If you do, it applies to you – end of the story. No myths can change that.

Interestingly enough, one of the data elements required to be protected under HIPAA is customer payment information, which often means “credit card data.” This means that HIPAA technically preceded PCI DSS when it comes to cardholder data security! However, this doesn’t stop health care providers from ignoring both regulations in one fell swoop.

Note

Question: If I use external tokenization and cardholder information never enters my environment, am I “PCI OK?”

Answer: Possibly! If your merchant agreement does not mention PCI DSS, none of your employees can see the data, and it is not handled anywhere on your systems, your PCI responsibility might be nonexistent.

The reality, as we mentioned earlier is pretty simple: PCI DSS does apply to your organization if you accept payment cards or capture, store, process, or transmit any sensitive payment card data (such as Primary Account Number (PAN)) with no exceptions. If the data touches your systems, they are in scope for PCI DSS assessment and, obviously, your organization has PCI DSS responsibilities. Whether you cure, educate, rent, offer, sell, or provide services doesn’t matter – what matters is whether you charge! If you do, PCI DSS does apply. Hopefully, if you picked up this book while being unsure whether PCI DSS applies to your organization, reading this book convinced you that becoming compliant and secure is indeed in your future if you deal with payment cards.

Admittedly, different things need to happen at your organization if you have absolutely no electronic processing or storage of digital cardholder data compared to having an Internet-connected payment application system. The scope of compliance validation will be much more limited in the former case and so your PCI project will be much, much simpler. For example, if a small merchant “does not store, process, or transmit any cardholder data on merchant premises but relies entirely on third-party service providers to handle these functions” he is only responsible for validating a small part of PCI DSS. Specifically, he would be responsible for the parts of “Requirement 9: Restrict physical access to cardholder data” as well as a small part of “Requirement 12: Maintain a policy that addresses information security for employees and contractors” via a small self-assessment questionnaire (SAQ) Type A.

Let’s explore this example in more detail. As we covered in Chapter 3 payment card brands such as Visa and MasterCard label merchants that process fewer than 20,000 e-commerce transactions a year or fewer than 1 million card present transactions as “Level 4.” As you now know, such merchants currently are recommended to validate their PCI compliance using an SAQ.

In addition, as described in PCI DSS standards, if a merchant matches the criteria below, he is considered to be “validation type 1” and needs to fill the SAQ Type A (the shortest). The criteria are as follows:

Merchant accepts ONLY card-not-present (i.e., eCommerce) transactions.

Merchant does not store, process, or transmit any cardholder data on merchant premises but relies entirely on third-party service providers to handle these functions.

The third-party service providers handling storage, processing, or transmission of cardholder data is confirmed to be PCI DSS compliant.

Merchant retains only paper reports or receipts with cardholder data, and such documents are not received electronically.

Merchant does not store any cardholder data in electronic format.

Explained simply, the aforementioned criteria describe a situation where a merchant accepts credit cards as payment, but does not have any electronic storage, processing, or transmission of cardholder data. Think about it for a moment! PCI DSS doesn’t apply if you do not store, process, or transmit any card data on your premises (or your systems located off your premises such as outsourced, hosted or shared cloud systems) at all! This example highlights that fact that card acceptance is sufficient to make the merchant to fall under PCI.

The exact scope of its validation as covered by SAQ Type A, which can be obtained from www.pcisecuritystandards.org.

The merchant needs to validate part of Requirement 9 and part of Requirement 12. Specifically, sections of Requirement 9 cover the storage of physical media (printouts, receipts, etc.) that has cardholder data. For example, quoting from PCI DSS SAQ Type A [2]:

9.5 Are all paper and electronic media that contain cardholder data physically secure?

9.6 Is strict control maintained over the internal or external distribution of any kind of media that contains cardholder data?

9.6.3 Are processes and procedures in place to ensure management approval is obtained prior to moving any and all media containing cardholder data from a secured area (especially when media is distributed to individuals)?

9.7 Is strict control maintained over the storage and accessibility of media that contains cardholder data?

9.8 Is media containing cardholder data destroyed when it is no longer needed for business or legal reasons?

All of the above deal with the physical media such as printouts that may contain card data. The merchant is also subject to one section of Requirement 12, which covers the merchant’s relationship with service providers that actually handle data (again, see PCI DSS SAQ Type A [2]):

12.8 If cardholder data is shared with service providers, are policies and procedures maintained and implemented to manage service providers, and do the policies and procedures include the following?

12.8.1 A list of service providers is maintained.

12.8.2 A written agreement is maintained that includes an acknowledgment that the service providers are responsible for the security of cardholder data the service providers possess.

12.8.3 There is an established process for engaging service providers, including proper due diligence prior to engagement.

12.8.4 A program is maintained to monitor service providers’ PCI DSS compliance status [2].

12.8.5 Information maintained about which PCI DSS requirements are managed by each provider and which are managed by you.

All of the above deal with the responsibilities of the third party that handles processing, storage, and transmission of data.

Overall, the choice is pretty simple: either you comprehend PCI DSS now and start working on security and PCI requirements or your acquirer will make it clear to you at some point when you won’t have much room to maneuver.

A subtle point brought to life by an increasing use of EMV Technologies needs to be clarified: payment card brands may relax some of the PCI DSS validation requirements if the merchant uses new (and presumably more secure) payment methods; however, merchants will still be required to maintain PCI compliance at all times. Now in 2014, many merchants dread the coming “liability shift” of 2015 (officially known as “Global Point of Sale Counterfeit Liability Shift”) when merchants not installing EMV systems may become liable for fake cards transactions.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128015797000248

Augmented reality in health and medicine

Tony Liao, ... SongYi Lee, in Technology and Health, 2020

AR health at home

One of the key challenges for healthcare providers is providing outpatient care after patients leave a medical facility. AR offers one technology to remedy this problem, as the “landscape has been transformed recently by the introduction of mass-produced but highly capable devices designed principally for the home entertainment market” (Borghese et al., 2014, p. 290). AR has been utilized as a tool for occupational therapists to walk through a home and visualize modifications that may need to occur to facilitate mobility and prevent falls for stroke patients (Bianco, Pedell, & Renda, 2016). AR has also been considered as a mobile interface for controlling smart home functions and appliances, which may be particularly useful for older adults or individuals with physical disabilities (Tang, Yang, Bateman, Jorge, & Tang, 2015). Each of these applications considers ways that AR can facilitate changes in the home, whether it is by helping therapists improve the spaces where people live or improving a patient's ability to control the functions of their home.

Other applications have considered AR in the home more explicitly as an extension of hospital rehabilitation practices. For victims of stroke, one important element of recovery is exercises for improving range of motion. Researchers have looked into AR systems that can track hand movements and create a virtual interface for performing wrist, elbow, and shoulder exercises (Hondori, Khademi, Dodakian, Cramer, & Lopes, 2013) and help stroke patients to maintain balance and improve gait (Lee, Kim, & Lee, 2014). Other visual applications for AR and motor function include helping children with cerebral palsy perform home-based rehabilitation (Munroe, Meng, Yanco, & Begum, 2016). AR has also been utilized to train and give movement cues to recovering Parkinson's patients to help improve their gait (Espay et al., 2010). These AR systems in patient's homes help improve rehabilitation allowing patients to engage in physiological beneficial practices in their own home at times and locations convenient for patients.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978012816958200006X

Butterworth Health System

Jamshid Gharajedaghi, in Systems Thinking (Third Edition), 2012

11.7 Core knowledge

Core knowledge is one of the two components of the input dimension of the architecture. Core knowledge is responsible for ensuring the availability of the appropriate service scope and number of providers to meet the whole spectrum of health-related care in its regions.

Core knowledge will be the system's center of expertise. It hosts and develops the provider resource of the system and helps the care system disseminate the state-of-the-art knowledge throughout the system. It will represent Butterworth's core competencies in medical practice.

Core knowledge will consist of the following health-care providers:

Medical staff (primarily consisting of physicians as independent contractors)

Advanced practice providers

Nurses

Technical health workers and other professionals/clinicians

Other professionals/technicians

The core knowledge network will be designed to accommodate a broad range of relationships. It will define and develop the structure for various types and degrees of membership in the system and the necessary operating procedures for members to interact.

Without an infrastructure for collaborative effort, the scarce provider resource will tend to be defused and wasted. The supportive organization should therefore be flexible enough to enhance maintenance and utilization of provider resources. This would ideally require each member of the provider system to be a high-level learner/educator, practitioner, and a leader of systems development. The absence of any one of these critical and interrelated aspects will undermine the others and eventually compromise the capacity of Butterworth to perform as a fully functioning system. Sustaining such a balanced state of readiness will ensure the comprehensiveness and the flexibility of the system's response to emerging problems and opportunities and at the same time encourage professional pursuits of purposeful networking and results-oriented collaborative initiatives.

To enjoy constant access to a rich resource of expertise representing state-of-the-art health care, the organizational context of core knowledge will constantly welcome maximum flexibility for innovative collaboration and will remain open to existing and emerging inputs of relevance both from within and outside the system.

Membership in the core knowledge system will therefore take a wide variety of forms functioning at multiple levels of involvement. The types of membership will be both full- and part-time and will include the following:

Independent practitioners (retainer-based)

Associates (referral-based)

Partners

Nonaffiliates

To assure openness to external inputs of needed competence, the core knowledge system will operate as a confederation. Members of the confederation can be individuals as well as groups of providers. The status of the members of the core knowledge confederation may take the following form:

Integrated: full-time members of Butterworth Health System

Part-time: individuals with limited and predefined contributors

Strategic alliance: organization-based partners operating within an agreed upon framework

Core knowledge members may choose to assume or relinquish different degrees of autonomy in working with Butterworth Health System. The nature and terms of this voluntary association define the areas in which the parties will choose to compete, collaborate, or cooperate. Thus, core knowledge members and Butterworth are codependent parties; their commitment to, and freedom from, each other is mutually reciprocal.

Creation of mutual trust between the Butterworth Health System and the core knowledge dimension will be the keystone to the ultimate success of the system. They should represent a united front to competition. A prerequisite to this loyalty-based success will be an environment that minimizes and dissolves conflict, whether real or perceived. Such an environment will require the following:

All the members of core knowledge, regardless of their status, will have an equal voice within their panel, in the management of the group.

All the members of core knowledge, regardless of their status, will have equal access to the shared services, such as billing, which will be provided to them on a marginal cost basis.

An explicit internal system of conflict resolution will prevent, minimize, and dissolve potential conflicts before they are polarized.

The architecture of the core knowledge dimension will be a clone of the health system. It therefore has the same input, output, and market dimensions. The output dimension defines the types of contributions of the integrated, part-time, and strategic partners of core knowledge to the care system and health delivery modules. The market dimension defines the access mechanism by which core knowledge services are deployed. The input dimension represents those support services that are core-knowledge-specific and cannot, by definition, be provided by the system's shared services. The input dimension will provide its services on a marginal cost basis to its users.

To bring about a productive climate for continuous innovation and improvement of health-care delivery, the professional contributors will have to develop an additional vital dimension: the ability and desire for organization building. Traditionally, the complementary responsibility for designing and managing the contextual environment of HDS has been uncoupled and transferred to administrators who are removed from the actual provision of clinical services. Because of this separation, substantial amounts of energy have been wasted in settling the unnecessary incompatibilities in the structure, function, and process of health-care delivery.

The only way to dissolve the paralyzing effects of the structural conflict is to add the missing dimension of care management leadership to the health-related expertise of the clinical providers. Equipped with leadership and design capability, health-care professionals can properly influence and/or help design the necessary interface between the context and the mode of delivery. The dual capacity would not only remove bureaucratic compartmentalization, but would enhance the effectiveness of care services by tapping the potentials for experimenting with alternative ways of teaming and complementary relations.

Core knowledge will be responsible for the generation and distribution of the knowledge, deployment of expertise, and exercise of leadership. These three functions are described in the following list:

1.

Generation and dissemination of knowledge (learner/educators). The provider system will be responsible for continuous learning and self-renewal of its members. The members will be expected to represent the health profession's state-of-the-art expertise. They will conduct most of this high-level self-education through teaching themselves as well as participating in applied research activities. They will be learning by teaching and learning while earning.

A portion of the provider resource may be engaged in ongoing academic pursuits that are either an integral part of medical schools or activities complementing such faculty engagements.

Members of the provider system may also engage in educating those who have a stake in health-related activities. Those who will be taught will include peers, students, interns, consumers, and the public at large.

The core knowledge dimension, however, will be responsible for creating interfaces and developing active associations with other sources of research and learning, such as universities, research institutions, medical and paramedical education centers, and technological development organizations.

2.

Deployment (practice). As pointed out earlier, core knowledge is responsible for ensuring the adequate availability of and the appropriate scope of and level of providers required to meet the whole spectrum of health-related care in all its regions at all times.

Members of the provider system, operating within the framework and protocols set by the care system, will contribute their knowledge and expertise by participating in different long- or short-term projects/programs that are created and terminated within the care system or the health delivery modules. The practice will take place in inpatient care (hospitals), clinics, labs, local health centers, wellness centers, homes, and long-term-care institutions. Members of core knowledge can choose to function on a permanent or temporary basis on different programs and projects without losing their full-fledged membership, and the privileges that come with it, in the core knowledge group. Each member can work in multiple programs/projects at the same time.

The power of multidimensional architecture, as developed in this design, is that it intentionally avoids the danger of tying the fate of the providers and the programs inseparably together. Once created, there is a tendency for the programs and projects to become a permanent feature of the organizational landscape. Left to their own devices, they develop a life and a mind of their own. Their fate is sealed, however, when their personnel are permanently assigned to them. The seed of the problem is in identifying the product with the provider, as is done in a divisional structure commonly used in academic and industrial settings wherein a program or product, once initiated, can never be discontinued. As long as the termination of a program or project threatens one's job and all the hard-won advantages associated with it, it is only natural that the job holder, whether a manager or a simple worker, does his/her utmost to lengthen the life of the project at all costs. This explains the inner rationality of the seemingly irrational resistance and obsolete relics that somehow manage to survive in corporate life.

Dissolving the problem will require that the life of the programs and projects be uncoupled from the people who are assigned to them. One of the advantages of having a core knowledge dimension in the systems architecture is that it will serve as the permanent home base for the professional resources of Butterworth. Any other relationship and assignment will, by definition, be considered as contingent and temporary no matter how long it is expected to last. The permanence of the core knowledge home base, requiring continuous reassessment and renewal, and the impermanence of programs and projects, allowing continuous innovation and adaptation, remove the obstinate conditions that lead to inflated bureaucracies and entrenched resistance to change.

3.

Leadership. Leadership in this context is defined as the ability to influence those over whom one has no authority. Competency in medical and health technologies, although a crucial necessity, does not by itself guarantee the success of a health-care system. To be sufficiently effective, every professional member of the system should be an influential leader as well. Thus every provider should have the desire and the ability to positively impact the context, structure, and process of Butterworth. To achieve this vital task requires knowledge workers who (1) internally, seek to participate in the design and management of care modules and procedures for doing more with less and (2) externally, proactively influence the contextual environment of Butterworth to remove the obstructions and expand its potentials for doing more and better. Butterworth simply cannot afford the conventional, and dysfunctional, division of labor between clinical and management-related functions.

In the final analysis, a good provider, therefore, is a good learner/educator, a good practitioner, and a good leader. The success of Butterworth and its providers, and by the same token any health-care system, will ultimately depend on whether the members of the provider community have achieved this multifunctionality in addition to being competent practitioners.

Building multifunctionality into the provider community will convert obstruction into opportunities and replace aggregates with systems. Thus individual providers will become purposeful members of a highly interdependent system that will make a difference. They will effectively use their multiple competencies in managing upward and influencing other parts of and stakeholders in the health-care system over whom they do not have direct control but on whom the success of their professional effort will depend.

The multifunctionality will also give providers the capability and the possibility of designing and managing their practice in terms of affordable and user-friendly packages and programs that are both accessible and relevant to the consumers. They will cooperate with the care system in the development and continuous improvement of generic models, protocols, and procedures needed to manage the different aspects of HDS.

While the core knowledge group is responsible for medical research and education, it will replicate the three-dimensional scheme to create its own special shared services. Shared services in this context will include physician's office management and provider recruiting and credentialing.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780123859150000118

Software for Medical Systems

Jeff Geisler, in Mission-Critical and Safety-Critical Systems Handbook, 2010

6.2 Security and Privacy—HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) is U.S. law primarily concerned with portability of health insurance coverage when people change jobs. It also establishes standards for healthcare transactions. Where it is of interest from the point of view of software development is the intent of the HIPAA to protect the privacy of patients and the integrity and privacy of their medical records.

6.2.1 Who Must Comply

Protection of privacy is mostly the responsibility of the healthcare provider [43]; unless you are in the business of providing software that directly handles patient records for reporting or billing, compliance to the provisions of the HIPAA is usually indirect. The healthcare provider will be doing the heavy lifting, but the security provisions may impose requirements on the software that you are creating for their use. (Or it may provide market opportunities for devices useful for protecting medical data or authenticating users.)

The security aspects of the HIPAA are known as the security rule. The Department of Health and Human Services (HHS) under the U.S. government has published a series of introductory papers discussing the security rule on the website, www.cms.hhs.gov/SecurityStandard/. Quoting from the web page, “[the] rule specifies a series of administrative, technical, and physical security procedures for covered entities to use to ensure the confidentiality of electronic protected health information.”

The “covered entities” that the rule applies to are “any provider of medical or other health care services or supplies who transmits any health information in electronic form in connection with a transaction for which HHS has adopted a standard” [44]. The “transactions for which HHS has adopted a standard” is a reference to the Electronic Data Interchange (EDI) definitions having to do with health care that HHS has enumerated.

In fact, there is some ambiguity about to whom the security rule applies. There is an exemption for researchers, for example, provided they are not actually part of the covered entity's workforce. Insofar as a researcher is a covered entity and deals with Electronic Protected Health Information (EPHI), they would have to comply. Hence, companies researching whether their products are safe and effective in clinical trials would also have to comply if they access EPHI.

This also applies to vendors who have access to EPHI during “testing, development, and repair” [45]. In this circumstance, the vendor is operating as “business associate,” and must implement appropriate security protections. The methods for doing so are flexible, however, so it ought to be possible for the covered entity and the business associate to come up with reasonable methods.

One simple method to achieve compliance with the security rule for vendors or researchers is to “de-identify” the data. “If electronic protected health information [EPHI] is de-identified (as truly anonymous information would be), it is not covered by this rule because it is no longer electronic protected health information” [45]. By making the data anonymous, it is no longer technically electronic protected health information, and thus not subject to the regulations.

Not everything is EPHI anyway. If the data are not in electronic form, they are not covered by the security rule, which does, after all, only apply to electronic protected health information. “Electronic” in this sense are data stored in a computer which itself can be programmed. The issue is the accessibility of the computer, not so much the physical format of the data. Therefore, personal phone calls or faxes are exempt; whereas a system that returned a fax in response to a phone menu system would be EPHI and subject to the rule [45].

Patients themselves are not covered entities and thus are not subject to the rule [45]. It is nice to know that you are allowed to see your own health data, and discuss it with your doctor.

So even though your data may not be subject to the security rule, you would nevertheless want to make reasonable efforts to protect its data against loss, damage, or unauthorized access, if only to prevent competitors from seeing it. But you would not be required to maintain a complete security process including security risk assessment and a security management plan.

The provisions of the security rule may not be directly applicable to a medical device manufacturer. Nevertheless, they will be important to your customers. It may be necessary to provide the technical security solutions so that your customer can implement the required administrative policies. On the other hand, if the purpose of your software is to provide EPHI data handling, you will find that your customer is required to obtain satisfactory written assurances from your business that you will safeguard EPHI. You will need to follow the full set of regulations in the security rule including security risk assessment and a security management plan. If your hardware or software has access to EPHI, the healthcare provider will have to assess whether you also need to comply [46].

6.2.2 Recommended Security Practices

We have established some guidelines for determining the extent to which the security rule may impact your business. We next turn to a discussion of the type of issues that might be important.

Malicious Software. One aspect that may affect anyone providing software into the medical environment is the requirement for the “covered entity [to] implement: ‘Procedures for guarding against, detecting, and reporting malicious software.’ Malicious software can be thought of as any program that harms information systems, such as viruses, Trojan horses or worms” [46]. The reasoning is that malicious software could damage, destroy, or reveal EPHI data. This means that your customers will require of you assurances that your software is not an open door to malicious code that could harm the provider computer network or other devices. You may be required by the customer to provide assurances that your installation software is protected from viruses.

If your device is connected to the Internet, it may be necessary to provide anti-virus software along with regular updates to prevent just such an occurrence. It is probably insufficient to trust the healthcare provider employees to always engage in appropriate safe computing—you might want to consider using an input device special to your device or somehow protected from general use lest it acquire a virus and infect your system. For example, rather than using a standard USB thumb drive, you could use a device that does the same thing but with a custom connector, so that it could not be plugged into an unknown computer that may be infected with a virus.

Malicious software is a more significant issue for software written to run on general-purpose computers. It is less an issue for many embedded systems whose programs execute from read-only memory and hence are difficult or impossible to infect.

Administrative Support. While monitoring log-ins and manage passwords is generally the responsibility of the healthcare provider, device makers sometimes want to limit the access to functionality in the device (i.e., information relevant to engineering or system diagnostics). If the engineering mode provided access to EPHI, a single password to your device that could not be changed would not be an adequate security safeguard.

The administrative policies of covered entities may also require regular reviews of information system activities for internal audits. To do this, they may need your device or software to provide records of log-ins, file accesses, and security accesses [45].

Physical Security. You must have the ability to back up the data or restore it in the event of a disaster, that is, somehow get the data out of the device and into a secure facility if the data are part of health information. For example, if your device contains “electronic medical records, health maintenance and case management information, digital recordings of diagnostic images, [or] electronic test results,” [46] the healthcare provider would need to be able to archive this information. It is also important to provide for obliterating EPHI data from your device at end of use or disposal.

As for physical safeguards, you would want to avoid doing anything that would make it impossible for an organization to impose some standards. For example, you wouldn't want to broadcast EPHI or make it available on a web page or some other method such that restricting it to only the people who need to know it becomes impossible.

This extends to physical media that might be used to store EPHI. The provider has to establish rules about how the media goes into or out of the facility, how it is re-used, and how it is disposed of so that protected data are not revealed to unauthorized personnel. In the case of re-use, “it is important to remove all EPHI previously stored on the media to prevent unauthorized access to the information” [47]. If you are making a storage device, the provider may want to be able to identify each device individually so that they can track them.

Risk Analysis. As is the case with risk analysis for the safety of the software or the device, depending on how close you are to the EPHI data, you may need to carry out a formal risk assessment, wherein you evaluate the potential threats and vulnerabilities to those threats and develop a risk management plan in response [48].

Threat is twofold: unauthorized access or loss of data. Both must be guarded against. CMS has a good discussion and example of risk analysis as applied to security concerns. Interestingly enough, many of the same issues and analytical practices are relevant to device risk analysis. The example has good hints for both. The document HIPAA Security Guidance for Remote Use of and Access to Electronic Protected Health Information, available at www.cms.hhs.gov/SecurityStandard/ is a useful specific discussion of remote vulnerabilities and possible risk management strategies.

The security rule is enforced by the Office for Civil Rights; violation may bring down civil monetary penalties, not to mention possible tort awards. Moreover, there is something of an ethical obligation for healthcare providers and others in the medical industry to exercise due care with private information.

While security is often not a direct concern to the manufacturers of medical devices, as information technology evolves and the desire to share information from individual diagnostic devices increases, it will become increasingly important. In addition, there are best practices for protecting data—such as guarding against viruses, unauthorized access, or data corruption—that are the sorts of things we should be doing anyway. We want our medical devices to be of the highest quality and serve customer needs; some measure of data integrity ought to be a given.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780750685672000044

Computational intelligence in Internet of things for future healthcare applications

Vandana Bharti, ... Kaushal Kumar Shukla, in IoT-Based Data Analytics for the Healthcare Industry, 2021

2.1 IoT for human healthcare

Healthcare services are often challenging because many diseases can arise unexpectedly. IoT has been widely used to interconnect available medical resources and provide reliable, effective, and smart healthcare services to chronic disease patients. Today's internet-connected apps are designed to improve efficiencies, reduce the cost of treatment, and achieve improved healthcare outcomes. As computing capacity and wireless capabilities increase, companies are capitalizing on the potential of Internet of Medical Things technologies (IMoT). These applications play a central role in tracking and preventing diseases such as COVID-19 for government agencies, patients, and clinicians and they are poised to evolve the future of care. The IoT has provided a variety of medical possibilities, as ordinary medical tools can gather useful additional data while they are linked to the Internet, provide unique information into symptoms and trends, enable remote care, and simply provide patients with better preventive treatment and more control over their lives. Fig. 3 demonstrates the key aspects of the emerging preventive healthcare framework. Several IoT instances of healthcare, showing the monitoring of various diseases, are proposed. Some of these are described in the following sections.

2.1.1 COVID-19 monitoring

The ongoing COVID-19 outbreak has prompted IoT healthcare providers to rapidly find solutions to meet the rising demand for high-quality virus protection devices. The rapid spread of COVID-19 has taken over the entire health ecosystem including pharmaceutical companies, drug makers, COVID-19 vaccine developers, health insurers, and hospitals. Applications such as telemedicine include remote patient monitoring, and interactive medicine is expected to gain traction during this time, along with inpatient monitoring. Further, digital contact tracing came to public attention during the COVID-19 pandemic, which is a form of contact tracing that depends on tracking systems, most often based on mobile devices, to establish the connection between the infected patient and the user. Such accomplishments have demonstrated the efficacy and exciting future of IoT in healthcare systems. Despite the obvious successes, there is also ambiguity, and there is still a technical challenge in the question of how to set up smart IoT-based healthcare systems quickly and systematically.

Artificial intelligence (AI) along with the IoT has successfully contributed to the battle against COVID-19. Since there is no specific treatment for coronaviruses, global monitoring of COVID-19-infected humans is desperately required. The IoT serves as a platform for public-health organizations to access data for the monitoring of the COVID-19 pandemic, such as the “Worldometer.” It gives a real-time report on the total number of people reported to have COVID-19 across the world. These smart disease monitoring systems may provide for continuous reporting and surveillance, end-to-end communication, tracking, and alerts. IoT and telemedicine will help provide not only affordable healthcare, but also help in collecting of data on the monitoring of drugs and vaccines that are currently being tested worldwide.

A lot of work has recently been published on COVID-19. Recently, the deep convolutional neural network-based COVID-Net was proposed for the detection of COVID-19 cases from chest X-ray (CXR) images [11]. The authors explored how COVID-Net makes predictions in an effort to gain a deeper insight into the crucial factors associated with COVID cases, which can help clinicians improve screening, as well as enhance confidence and consistency while using COVID-Net for rapid computer-aided screening. Ghoshal et al. [12] introduced a Bayesian Convolutional Neural Network for estimating the uncertainty of diagnosis in COVID-19 prediction, using patient X-ray images with COVID-19, acquired from an online COVID-19 dataset [13], and non-COVID-19 images, acquired from Kaggle's Chest X-Ray Images (Pneumonia). The experiment revealed that Bayesian inference enhanced the detection accuracy of the standard VGG16 model from 85.7% to 92.9%. The authors also generated saliency maps to demonstrate the locations of the deep network, improve the understanding of deep learning outcomes, and facilitate a more informed decision-making process. Recently, the authors in [14] introduced a schematic of an app for COVID-19 contact tracing, as shown in Fig. 4. In this app, contacts between Person A and all persons using the application are traced by Bluetooth with low-energy connections with other app users. Person A requests the SARS-CoV-2 test with the application, which causes immediate notification of those in close contact with each other of the positive test result of that person. The application recommends isolation for Person A and quarantine of the individual's contacts.

What other information should the health care provider obtain from the patient?

Fig. 4. A schematic of app-based COVID-19 contact tracing [14].

2.1.2 Cancer monitoring

As computers and tools become smarter when interacting with each other, AI systems, such as IBM's Watson, as well as robotic surgeons, can support doctors from diagnosis to treatment for cancer. In general, the earlier a doctor can recognize symptoms, the faster they can reach a diagnosis and start treatment. A number of early cancer signs are unclear and unrecognizable, so it is understandable that cancers can go undiagnosed in the first instance. The argument lies therein: AI and IoT will boost care for cancer, but they will function together. A patient monitoring system work flow on IoT is shown in Fig. 5.

What other information should the health care provider obtain from the patient?

Fig. 5. Patient monitoring system based on IoT [18].

Recently, the researchers have also been investigating the integrated framework of IoT, fog computing, CI, and cancer diagnosis. An IoT-based fog computing model for cancer detection and monitoring is proposed in [15] in which they used a mobile application interface to capture the symptoms of the patient and further applied a neutrosophic multicriteria decision-making approach for examining and forecasting of disease based on the reported symptoms. Similarly, in another work, the author also proposed an IoT-based healthcare framework for cancer care services along with the treatment options [16]. Further, authors also worked to monitor cancer patients in a secure home environment for which a multisensory IoT framework was proposed. Using an intelligent IoT sensor, the patient's physiological as well as mental status data were collected and shared with physicians for visualization and better understanding of current patient status for real-time decision-making. To ensure the secure transmission of private data, a blockchain and off-chain-based framework was adopted [17].

2.1.3 Depression monitoring

Depression and anxiety are two common psychological conditions that arise as a consequence of excessive tension and distress experienced every day by individuals. It is difficult to avoid the down periods of life and their consequences, but people respond to them in many different ways. The potential source of depression and anxiety may be a variation of psychological, biological, and social causes. Depression is one of the prevalent causes of major depressive disorder (MDD), which can lead to thoughts of death or suicide if not treated in a timely manner. Many studies have come up with a number of speculations linked to the occurrence, treatment, and control of depression and anxiety in individuals.

Recent research suggests that MDD can be monitored by a smartwatch device that patients use every day to monitor their moods and emotions. Wearable technology has a significant capacity for doing more than tracking steps; in this scenario, it may be used to measure the symptoms of depression in real time. Like other IoT wellness devices, a depression app might provide more insight into the condition for patients and healthcare providers. A fear induction task for 20 s was demonstrated in [19], using a wearable sensor on young children using machine learning, which resulted in a high fraction of accuracy that points to this diagnosing approach for children with internalizing disorders. In [20], the authors attempted to design a prototype of a wearable device to assist individuals with MDD by using speech recognition to determine their positive and negative phases by an emotional user interface. Further, a deep regression network known as DepressNet was presented in [21] to assimilate depression representation with a visual explanation, which provides a clinical prediction of the depression severity from facial images.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128214725000181

IoT data streams: concepts and models

Patrick Schneider, Fatos Xhafa, in Anomaly Detection and Complex Event Processing over IoT Data Streams, 2022

Data integrity, security and blockchain

A critical problem in preventing connected healthcare systems from different healthcare providers is data fragmentation. Stringent security requirements and trust must be addressed to realize the full potential of healthcare components. A radical breakthrough in solving data fragmentation has been achieved with the blockchain technology [35]. A key benefit of blockchain technology is that it helps healthcare organizations bridge traditional data repositories and facilitate the secure exchange of sensitive medical data. Blockchain technology increases transparency between patients and physicians and ensures efficient collaboration between healthcare providers and research institutions. Blockchain has an immutable “ledger” [66] that any involved actor of the system can view, verify, and control. It is guaranteed that once a record is entered into the ledger, it cannot be changed. Moreover, blockchain is built as a distributed technology operated by multiple units simultaneously, which means there is no single point of failure where digital assets or records could be compromised or hacked. Lastly, blockchain technology supports data exchange logic and contract rules through a flexible mechanism of smart contracts.

For example, a smart contract can manage identity and set different permissions for different EMRs stored on the blockchain. As another example, physicians are only allowed to access their assigned EMR profile. Many promising blockchain projects in healthcare use blockchain to manage EMRs, pharmaceutical supply chain, drug prescriptions, payment distribution, and clinical pathways. Yet another example is a system that triggered a smart contract when a handshake occurred between sensors and smart devices [26]. After that, all transactions were recorded in the blockchain. The proposed system supported real-time medical interventions and patient monitoring by automatically notifying the responsible healthcare worker when they needed urgent emergency services. All events were recorded in the blockchain, which addresses several security vulnerabilities associated with notification delivery remote patient monitoring for all stakeholders. Another three-tiered architecture for storing health data on a blockchain included medical professionals, healthcare facilities, and inpatients [9]. Data retrieval was strictly based on the individuals' role on the blockchain that ensured privacy and security and provided a promising way to avoid issues that prevented providers, researchers, and patients from taking full advantage of connected healthcare.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128238189000110

What information must be obtained from a new patient?

What's in New Patient Packet?.
Form 1: Demographic Information, Medical Release and Insurance Information..
Form 2: Basic Health Information – Family History, Concerns, Habits, Medications and previous care..
Form 3: HIPAA Notice and Privacy Practices..

What information should be given to patients?

The patient's diagnosis, prognosis and comorbidities; The likely effectiveness of the respective treatment options, their risks and side effects; The patient's health beliefs, goals and preferences; The patient's capacity to manage the treatment and its consequences.

Why is it important to obtain information from the patient?

The information can be used to help: understand more about disease risks and causes. improve diagnosis. develop new treatments and prevent disease.

What important information should you provide in a message for the physician from a patient?

A list of medications and supplements you are taking, recent symptoms and the dates at which they occurred, any recent tests and names of other doctors you are seeing can be useful information to share with your doctor. The better you are able to communicate your needs and concerns, the better your doctor can respond.