Free Essay

The Need for Information Security, Technical Innovation and Clinical Change

In:

Submitted By kcosner
Words 2351
Pages 10
The Need for Information Security, Technical Innovation and Clinical Change. 1

The Need for Information Security, Technical Innovation and Clinical Change

ISM 3011– Information Systems Management

Abstract The Tri-County Life Care of the Treasure Coast (TLC) is a non-profit organization providing in-home health-care services throughout Florida's Indian River, Brevard, and northern St. Lucie Counties. TLC has been serving this community for over thirty years, but what truly makes us unique is our tradition of providing comprehensive health-care—whenever and wherever our patients need it. Tri-County Life Care, Inc. offers the highest quality and most reliable in home wellness care in the convenience and comfort of client home. (TLC) have been providing superior service to there clients and have help them in achieving their goals. Whatever your needs are, TLC home health team will design a plan that is specific to you and your situation. Whenever your health needs can be met at home, TLC staff is on-call 24 hours a day, 7 days a week. Owners and officers representing TLC are Chief Executive Officer - Eric Maar, Chief Financial Officer - Satchell Peterkin, Chief Technology Officer - Raquel Queen, and Chief Information Officer - Kerry Cosner. These individuals are committed to providing the clinical staff with the most technologically advanced tools available to effect patient care in the most advantageous way possible. This article will address some of the challenges faced by the Information Systems department and its’ relationship with the clinical field staff that support the needs of the patients in the communities the TLC serves. A few of those challenges involve the following: · Enhancing the privacy and security of the patient information stored on and transmitted by the laptop field devices used by the visiting clinical staff. · The need to upgrade and change the technology and software utilized by the clinical associates to increase productivity and ease of use without sacrificing security and privacy. Mobile computers are quickly emerging as the industry standard in technology for increasing the efficiency and productivity of a mobile clinical field staff. However, the portable nature of these devices poses an increase in the possibility of loss or theft. Consequent exposure of sensitive data can result in financial loss, legal ramifications, and damage to the agency’s brand and reputation. Field devices such as laptops and PDAs used in charting patient health-care records in their homes are at an elevated risk of loss and theft due to their portability (Thomas 2007). Some of the environmental factors that affect the decision outcome are the increasing amount of medical information susceptible to security breaches and the state and federal guidelines imposed by the Health Insurance Portability and Accountability Act (HIPAA) for security 1 and privacy 2 of protected health information as well as the new 2009 Health Information Technology for Economic and Clinical Health Act (HITECH)3 for breach notification as part of American Recovery and Reinvestment Act of 2009 (ARRA)4.
TLC’s current information systems policies are compliant with state and federal health-care guidelines and procedure states that: In the event of loss or theft of a portable device (laptop, PDA) all patients whose data had been stored on device must be notified of the incident as well as provided with two years of credit and Medicare monitoring and protection. In all instances where the data breach affects more than 500 people located within the same region, the notification must be published in the local newspapers as well as mailed to the affected individuals (HIPAA 2009). If a percentage of the mailed notifications are returned due to address change and the correct address cannot be determined, the notification must also be published on the company’s web site for up to a year. In order to protect the access to the patient data stored on the portable devices TLC utilizes dual factor authentication for device and application user names and passwords, which meets the minimum HIPAA state and federal administrative safeguards.
Taking these two mere facts into consideration, it begs two questions for our organization to deliberate:

• Can we do more to protect our patient’s data? o What more can be done to protect the data stored in and transmitted from the clinician’s laptop field device? We appear to be doing what is necessary by HIPAA technical and administrative standards but, there may be opportunities to put additional measures into effect that will benefit the patient as well as the overall agency’s interests • What is the risk if we do nothing more? o Immediate compliancy issues are being met by our current security strategy, but there are future standards placed on health-care organizations by the new HITECH Act that are more stringent than those currently imposed by HIPAA. These new regulations will be in effect in February 2010, but we should consider the advantages in implementing policies and procedures regarding these regulations before they become mandatory.
According to a national survey completed in September 2008, portable electronic data accounted for 37% of the data that is susceptible to a theft or breach in security (see Figure 1, for data regarding medical information susceptible to security breaches).
This was compared to similar susceptible risks in medical information recorded in paper files stored in medical records (40%) and in on-line data repositories (15%) as illustrated in Figure-1 (Surveys say: 2008).
In an attempt to further address this risk we will us a SWOT situational analysis to establish the need for strategic change by evaluating the strengths, weaknesses, opportunities, and threats in both the clinical and information systems departments in respect to the challenges previously mentioned. I will also evaluate the potential advantages we can gain agency wide by examining current and future innovation streams and considering a plan involving technological discontinuity.
Strengths:
The information systems department has enforced dual factor user authentication on all clinical charting devices that are portable from the confines of the agency. The devices chosen to house the clinical software client for the clinical field staff are the Fujitsu LifeBook eight inch touch screen laptop. When the users power on the device they are confronted with the standard Microsoft Windows authentication using a user-name, password and domain. Once Windows has accepted the proper combination of these three credentials it loads a standard user desktop that includes icons for their clinical software, Outlook email, and remote VPN connectivity to the agency domain. Each of these requires, at a minimum, a secondary set of user credentials separate from their initial Windows authentication. The strength of these credentials is increased by the thirty day change frequency of the password as well as the eight character minimum length that must contain a combination of letters, numbers and special characters. This form of dual factor authentication combined with change frequency and complexity keeps the agency compliant with one of the administrative guidelines imposed by the Health Insurance Portability and Accountability Act (HIPAA) that we must abide by as a health-care covered entity.
Weaknesses:
One of the few weaknesses in the above mentioned authentication process is that the length and complexity of the password often causes the clinician to write down the password each time it changes. They will refer back to their written not until they feel comfortable remembering the password. During that time the access process is at risk if the laptop is lost or stolen with the password clearly available on the device or in its secured carrying bag.
Opportunities:
There are many opportunities during the clinician’s visits to the agency to take advantage of times for education and re-education regarding privacy and security of patient information and the policies in place to safeguard it. These opportunities present themselves at new-hire orientation as well as intermittent times during the course of the year. We also have the opportunity to strengthen the protective measures without adding more to the clinician’s authentication process by adding new encryption software or advanced biometric authentication hardware.
Threats:
The most common threat is device theft for the purpose of identity theft and fraud, often resulting from insider theft. The second most common form of identity theft stems from the infection of the computer’s data by computer hacking and malware and virus attacks. The data below in Table-1 from the Identity Theft Resource Center (ITRC) shows that data breaches involving health and medical data has remained virtually unchanged from 2006 to 2008, unlike Government and Military data breaches which show a sharp decline during the same period (Data Breaches 2008). Declining health-care budgets have led to outdated IT security infrastructures and limited training resources for network support staff (see Table-1, for data breaches from 2006 to 2008).
Proposed solutions: · Add an extra layer of data protection:
An external appliance could be added to the login process of each device making the data on the device un-readable unless accompanied by the appliance and the proper user’s authentication credentials. (Utamico 2001) o Possible appliances: ▪ USB biometric fingerprint reader 5 ▪ USB data encryption smartcard and reader 6 · Encryption software could be added prior to the login process of each device, encrypting the data at the disc storage level making the data on the device un-readable unless accompanied by the appropriate user’s proper authentication credentials. Two types of encryption are currently available to user organizations: self-encrypting hard drives and software-based full-disk encryption. Together, these two techniques can provide a high level of protection by ensuring that there will be no loss of data can occur if a third party retrieves a mobile device. o The following are possible encryption software configuration solutions: ▪ Individual data file encryption ▪ Full data disk encryption
The following are comparable solution costs for 170 field devices: · USB biometric fingerprint reader solution: $6,460 - $9,180 o Hardware: $31 - $47 per device o Software: Included o Annual Maintenance Support: $7.00 per device · USB data encryption smartcard solution: $7,750 o Hardware: $34 per device o Software: Included o Security Card: $6 per device o Annual Maintenance Support: $5.00 per device · PGP Whole Disk Encryption Software: $6,500 o Proactively secure confidential data on both disks and removable media. o Hardware: None o Software: $27 application per device o Annual Maintenance Support: $11 per application
The following is the recommended resolution: · Data storage on portable devices should be encrypted using full disk and file encryption to fully comply with and, where possible, exceed HIPAA state and federal regulations and to ensure the maximum protection of our patient’s privacy. · Added advantages: o Encryption software is the more affordable solution. o Without the necessity for additional hardware we eliminate the possibility of technical malfunction, minimizing potential downtime and maximizing the clinical staff’s productivity with their mobile devices. As custodian of our patient’s health care records, TLC should take all measures possible to protect all patient data as it is entered, stored and transmitted by the clinician’s field device. Although the dual factor authentication process meets the minimum state and federal guidelines imposed by HIPAA and HITECH, TLC's own policy is to take any additional precautions to safeguard the patient’s privacy and, in so doing, protect the company’s long standing trust within the medical community it serves. Adding full disc encryption to each field device enables us to implement these additional protective measures in an affective, efficient and affordable way. With the encryption enabled the data is unable to be read in the event of loss or theft. Under HIPAA guidelines a covered entity such as the TLC is no longer required to notify the patients whose personal health-care information was stored on a lost or stolen device when the device is protected in this manner. The covered entity is also no longer required to provide credit reporting and monitoring to those same patients. When so much of proper health-care relies on the trust between the patient and their caregiver as well as the trust of their family and physician, this decision has been determined to be the most appropriate.
References

Data breaches skyrocket in 2008. (DATA SECURITY)(Statistical data). March-April 2009 v43 i2 p15(1)Information Management Journal 43, 2. p. 15(1). Retrieved October 10, 2009, from Computer Database via Gale: http://find.galegroup.com/gtx/start.do?prodId=CDB
HIPAA violation costs CVS $2.25 million.(PRIVACY)(Health Insurance Portability and Accountability Act of 1996)(CVS Caremark Corp.). May-June 2009 v43 i3 p15(1)Information Management Journal, 43, 3. p.15(1). Retrieved October 11, 2009, from Computer Database via Gale: http://find.galegroup.com/gtx/start.do?prodId=CDB
Surveys say: HIPAA affects health care IT decisions. (2008, September 3). Healthcare Risk Management, Retrieved September 21, 2009, from CINAHL Plus with Full Text database: http://search.ebscohost.com/login.aspx?direct=true&db=rzh&AN= 2010019296&site=ehost-live
Thomas, G., & Botha, R A (Fall 2007). Secure mobile device use in healthcare guidance from HIPAA and ISO17799.(Author abstract). Information Systems Management, 24, 4. p.333(10). Retrieved October 11, 2009, from Computer Database via Gale: http://find.galegroup.com/gtx/start.do?prodId=CDB
Utimaco Safeware releases biometric technology-based authentication system. May 10, 2001 pNATelecomworldwire, p.NA. Retrieved October 1, 2009, from Computer Database via Gale: http://find.galegroup.com/itx/start.do?prodId=CDB Web Sites Referenced 1. HIPAA Security Guidelines: http://www.cms.hhs.gov/SecurityStandard/Downloads/SecurityGuidanceforRemoteUseFinal122806rev.pdf
2. Understanding HIPAA Privacy: http://hhs.gov/ocr/privacy/hipaa/understanding/index.html
3. Health Information Technology for Economic and Clinical Health (HITECH) Breach Notification Act: http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities /breachnotificationifr.html
4. American Recovery and Reinvestment Act of 2009 (ARRA): http://www.hhs.gov/news/press/2009pres/09/20090917a.html
5. Utimaco Safeware releases biometric technology-based authentication system: http://find.galegroup.com/itx/start.do?prodId=CDB
6. One-Time Passwords: Security Analysis Using SmartCard Authentication. A. Yazici and C. Sener (Eds.): ISCIS 2003, LNCS 2869, pp 794 – 801, 2003. Retrieved September 17, 2009 from: http://www.springerlink.com/content/f5u1p913j5u82abm/fulltext.pdf?page=1

Figure 1

[pic] Table 1
[pic]

Similar Documents

Premium Essay

Technology and Social Change in Healthcare

...Technology and Social Change in Healthcare Today there are many technologies that have provided change in our social environments. For example, we have access to laptop/computers, the Internet, cell phones, and android pads. This is beneficial because we can use the Internet to obtain information almost instantly to assist in research and education as well as staying in communication with friends and family. I believe that every household should have access to these technologies but due to socioeconomic conditions that is not possible. I feel that the technology today has evolved from landline telephones and going to the library to being able to make calls anytime from anywhere and find information at the touch of our fingertips. The gap between social economic backgrounds needs to be closed so that everyone has the access to all technology. Influence of Technology on Social Change The Business Dictionary defines technology as “the purposeful application of information in the design, production, and utilization of goods and services, and in the organization of human activities.” In addition, they further breakdown the definition of technology into five categories “Tangible, Intangible, High, Intermediate, and Low.” Our life modes have been greatly changed over the years. A few examples include but not limited to education, government, healthcare and new communication inventions. The Encyclopedia Britannica defines Social Change “in sociology, the alteration of mechanisms...

Words: 1613 - Pages: 7

Premium Essay

Office of the National Coordinator for Health Information Technology (Onc)

...Office of the National Coordinator for Health Information Technology (ONC) Federal Health Information Technology Strategic Plan 2011 – 2015 Table of Contents Introduction Federal Health IT Vision and Mission Federal Health IT Principles Goal I: Achieve Adoption and Information Exchange through Meaningful Use of Health IT Goal II: Improve Care, Improve Population Health, and Reduce Health Care Costs through the Use of Health IT Goal III: Inspire Confidence and Trust in Health IT Goal IV: Empower Individuals with Health IT to Improve their Health and the Health Care System Appendix A: Performance Measures Appendix B: Programs, Initiatives, and Federal Engagement Appendix C: HIT Standards and HIT Policy Committees Information Flow Appendix E: Statutes and Regulations Appendix F: Goals, Objectives, and Strategies Appendix G: Acronyms ONC Acknowledgements Notes 3 6 7 8 21 28 36 49 51 65 67 70 74 77 77 78 Goal V: Achieve Rapid Learning and Technological Advancement 43 Federal Health IT Strategic Plan 3 Introduction he technologies collectively known as health information technology (health IT) share a common attribute: they enable the secure collection and exchange of vast amounts of health data about individuals. The collection and movement of this data will power the health care of the future. Health IT has the potential to empower individuals and increase transparency; enhance the ability to study care delivery and payment systems; and ultimately achieve...

Words: 36638 - Pages: 147

Premium Essay

Health Care Desicion Making

...of Health Care Information Systems HCI/500 Concepts of Health Care Informatics December 5th 2011 Decision-Making of Health Care Information Systems Today’s health care delivery model is undergoing an unprecedented evolution driven by industry-wide initiatives to improve patient safety, quality of care, and efficiency of delivery. At the heart of this evolution is Health care Information Technology. This paper discuss about the two types of health care information system are that includes an electronic medical record, known as the Veterans Health Information Systems and Technology Architecture (VistA) and PACS (picture archiving and communication systems): filmless radiology “A patient record system is a type of clinical information system, which is dedicated to collecting, storing, manipulating, and making available clinical information important to the delivery of patient care. The central focus of such systems is clinical data and not financial or billing information. Such systems may be limited in their scope to a single area of clinical information (e.g., dedicated to laboratory data), or they may be comprehensive and cover virtually every facet of clinical information pertinent to patient care for example it is computer-based patient record systems” (Institute of Medicine, 1997). As medical care gets more and more complex and new information is already overwhelming physician‘s capacity to treat patients with the latest information, physicians need new technologies...

Words: 1498 - Pages: 6

Premium Essay

Adsf Asfsa Dsaf

...Administrative Business • • • • • • • Breaks, bathrooms, food Slides Different presenters Purple folder Questions/participation Survey after each day Questionnaire Introduction Check Your Knowledge Introduction Agenda – Day One • • • • • • • • Research roles and responsibilities Policies and Procedures overview Institutional Review Board Office (IRB) NUCATS NURAP Conflict of Interest (COI) Export Controls Innovation & New Ventures Office (INVO) Introduction Introduction Research Administration Training The need for research administration training exists because of the large dollar amounts in research funding and the importance of compliance: • NU received $511.7 million in research funding in FY 2011 • NU ranked 25th in NIH research funding to universities in 2010 • Ensuring compliance remains a federal priority Source: Office for Research Annual Report. (2011): Northwestern University Introduction Research Administration Training Research Administration training helps Northwestern: • Decrease compliance risks • Administer grants more consistently & efficiently • Provide support for research administrators, faculty & staff • Meet federal government expectations regarding training and communication Introduction Training Objectives During this seminar we will: • Explain the research administration process • Discuss the roles & responsibilities of research faculty and staff • Describe the roles of the central research offices • Review...

Words: 5758 - Pages: 24

Free Essay

Title

...US Health System Reform Business Technology Office The ‘big data’ revolution in healthcare Accelerating value and innovation January 2013 Peter Groves Basel Kayyali David Knott Steve Van Kuiken Contents The ‘big data’revolution in healthcare: Accelerating value and innovation 1 Introduction1 Reaching the tipping point: A new view of big data in the healthcare industry  2 Impact of big data on the healthcare system 6 Big data as a source of innovation in healthcare 10 How to sustain the momentum 13 Getting started: Thoughts for senior leaders 17 1 The ‘big data’ revolution in healthcare: Accelerating value and innovation Introduction An era of open information in healthcare is now under way. We have already experienced a decade of progress in digitizing medical records, as pharmaceutical companies and other organizations aggregate years of research and development data in electronic databases. The federal government and other public stakeholders have also accelerated the move toward transparency by making decades of stored data usable, searchable, and actionable by the healthcare sector as a whole. Together, these increases in data liquidity have brought the industry to the tipping point. Healthcare stakeholders now have access to promising new threads of knowledge. This information is a form of “big data,” so called not only for its sheer volume but for its complexity, diversity, and timeliness.1 Pharmaceutical-industry...

Words: 9757 - Pages: 40

Premium Essay

Teladoc Core Competencies

...distinguishable qualities and skills that an organization must possess that helps the business develop products to meet a target market. Penn (2016) explained that core competencies provide access to a wide variety of markets, the value behind end-product benefits, and provides unique attributes that make it difficult for competitors to imitate. Businesses leverage core competencies to delivery premium value to customers while also establishing competitive advantage in the market. Teladoc’s core competencies include a consumer-focused strategy, superior customer service, flexibility, and innovation. It is imperative to note that Teladoc’s consumers include patients, physicians, health care organizations, insurers, employers, and governments. Teladoc’s product design meets the needs of patients and physicians by improving access to high-quality patient care. Teladoc products also fulfill the needs of health care organizations, insurers, and governments by improving access to patient care at an affordable cost to payers....

Words: 1508 - Pages: 7

Premium Essay

Learning Outcome 1

...How do new technologies impact on workforce organisation? Rapid review of international evidence Report developed by The Evidence Centre for Skills for Health Contents Key Themes ............................................................................................................................................ 3 Scope .................................................................................................................................................................... 3 How are teams being organised?.......................................................................................................... 7 Substituting grades and roles ............................................................................................................................... 7 Reducing staff or team size .................................................................................................................................. 8 Empowering patients............................................................................................................................................. 9 Changing the place of care ................................................................................................................................. 10 Working across organisations ............................................................................................................................. 10 Working across regional areas .........................

Words: 19005 - Pages: 77

Premium Essay

Paper

...Expense Reporting, Time Reporting, and Invoice Management at BioClinica Rodney Scere Managerial Applications of Information Technology MIS-535-12075 DeVry University Keller Graduate School of Management September 15, 2014 Expense Reporting, Time Reporting, and Invoice Management at BioClinica using Databasics Business Problem Statement BioClinica has many issues in regards to handling of time entry at the company. The major issue is the actual recording system. There is no direct way to add worked hours for each employee into a web based system that would allow for view and report capabilities. Audience to whom you are presenting the recommendation(s) The proposal will be presented to the management team at the next quarterly meeting. If the management team is in agreement and accepts the proposal then the proposal will be submitted to the board and presented at the next Board meeting in Q1. Company Information BioClinca was first established 1990. It is a technology company that supports pharmaceutical and medical device innovation. Bioclinca has acquired several companies over a 15 year period. One of their first purchases was Quintiles Transnational Corporation. Quintiles services include image data management, data translation and digitization for submission of medical image data to the U.S. Food and Drug Administration and clinical sponsors using proprietary interactive software. In 2003, BioClinica acquired another company in which they developed...

Words: 1846 - Pages: 8

Premium Essay

Ehr Implementation

...Health Information Technology (HIT) is becoming increasingly useful and implemented more frequently by health care providers throughout the United States. This technology may include Electronic Health Records (EHR) or Electronic Medical Records (EMR). The shift towards implementing Electronic Health Records has a significant influence on the quality of care provided by health care providers; however, some providers still stick to the basic paper documentation due to skepticism and disregard the benefits to adopting new technologies. Many questions arise when a health care provider is interested in adopting EHR’s, such as why adopt EHR’s? What are the benefits of EHR’s in relation to paper documentation? What steps need to be taken in order to adopt and implement EHR’s? What barriers will be encountered during the decision making process and how will these barriers be addressed? A health practice interested in adopting and implementing an EHR system must establish priorities, identify potential risks and how to avoid or overcome these risks, outweigh the pros and cons, set goals, and adhere to strict guidelines to ensure adopting a successful system. The terms Electronic Health Records (EHR) and Electronic Medical Records (EMR) are often used interchangeably by health care providers when in fact there is a subtle difference between EHRs and EMRs. Electronic Medical Records and Electronic Medical Records are both digital versions of a patient’s medical history and information;...

Words: 4391 - Pages: 18

Premium Essay

C156 Advanced Information Management

...C156 Advanced Information Management– Task 1 A2. Analysis of Technology Two organizations migrating to a common health information system would need a system that meets current regulatory requirements, meets the needs of the combined organization and their practice environment. The implementation of a common health information system would require an interdisciplinary group of forward thinking innovators, and an interoperable electronic medical record system that includes standard nursing terminology. The technology needed in this scenario that would make this combination successful consist of network security measures to ensure security of protected health information under the federal requirements of HIPPA and HITECH. The use of emerging technology such as cellphones, tablets and remote technology should also be included in the discussions of creating a telehealth system that would accommodate both of the combining organizations. Telehealth not only includes communication between patients and healthcare providers, but also communication between healthcare providers in both of the combining organizations. Video conferencing can save healthcare providers time and money by allowing them to collaborate with one another without being physically near one another. A3. Identification of Team The interdisciplinary team on the project committee will consist of four team members. Team member A would be the project team lead in which I would nominate myself...

Words: 3168 - Pages: 13

Premium Essay

Competiveness and Performance Effectiveness for Health Care It System

...Ilisher (Lisa) Ford Health Information Systems November 29, 2014 Competiveness and Performance Effectiveness for Health Care IT Systems Introduction With the rapid growth in technology, many healthcare organizations have embraced the use of healthcare information technologies. As such, the information technology department has various staffs that perform fundamental roles in the information technology-related activities. It ranges from activities of customizing a software to implementing and maintaining a network to ensure effective system backups. In addition, these healthcare information technologies bring about other activities, for example, managing information, managing technology among many others. Similarly, there are many personnel assigned different IT-related tasks, for example, the chief information officer and the chief technology officer (Tan, Payton, & Tan, 2010). Roles of CIO and CTO Chief Information Officer The CIO is the overall manager of the healthcare organization’s department. Apart from being the head, the CIO is an executive who can lead the organization in efforts of acquiring and implementing healthcare information technologies to advance organizational strategies. As such, the CIO fully manages the information and telecommunication technology functions by ensuring proper execution and support for medical and clinical systems. When the organization aims at advancing strategic planning in relation to information technology, the CIO takes...

Words: 1959 - Pages: 8

Premium Essay

Emr Research and Opinion Paper

...2013 EMR Research & Opinion Paper Produced by: Jeremy Averella EMR Course Fall 2013 TABLE OF CONTENTS I. Advantages of EHRs 2 a. Cost Containment 2 b. Empowerment 3 c. Improved Communication 4 d. Less Waste 4 e. Compliance 5 II. Disadvantages of EHRs 6 a. Lack of Standardization 6 b. Security & Privacy Concerns 7 c. System Infrastructure Issues 8 d. Risk of Liability and Patient Uncertainty 8 III. EHR Technology 9 a. EHR Benefits 10 b. EHR Types 11 c. EHRs Future Evolution 13 d. EHR Technology versus Handheld SMART devices 14 IV. Trends and Consequences 15 a. Aggressive Implementation 16 b. High Costs 16 c. Labor Investment 17 d. Opportunity Cost 17 e. Impact on Researchers, Policymaker and Educators 18 V. Final Opinion 19 VI. Bibliography 22 VII. Appendix I 28 VIII. Appendix II 31 I. Advantages of EHRs In an effort to reign in rising health care costs and increased health care disparity and inequality in the U.S., former president George W. Bush doubled the funding for Health Care Information Technology to 100 million in 2005 (The White House). It was part of a larger plan to utilize latest information technology to standardize patient and health records, which despite spending 1.6 trillion dollars, attributed to 98,000 medically related errors in 2004. The plan was part of his campaign promise and was reiterated in his January 20, 2004 State of the Union address when, President Bush remarked, “by computerizing...

Words: 7955 - Pages: 32

Free Essay

Big Data

...McKinsey Global Institute June 2011 Big data: The next frontier for innovation, competition, and productivity The McKinsey Global Institute The McKinsey Global Institute (MGI), established in 1990, is McKinsey & Company’s business and economics research arm. MGI’s mission is to help leaders in the commercial, public, and social sectors develop a deeper understanding of the evolution of the global economy and to provide a fact base that contributes to decision making on critical management and policy issues. MGI research combines two disciplines: economics and management. Economists often have limited access to the practical problems facing senior managers, while senior managers often lack the time and incentive to look beyond their own industry to the larger issues of the global economy. By integrating these perspectives, MGI is able to gain insights into the microeconomic underpinnings of the long-term macroeconomic trends affecting business strategy and policy making. For nearly two decades, MGI has utilized this “micro-to-macro” approach in research covering more than 20 countries and 30 industry sectors. MGI’s current research agenda focuses on three broad areas: productivity, competitiveness, and growth; the evolution of global financial markets; and the economic impact of technology. Recent research has examined a program of reform to bolster growth and renewal in Europe and the United States through accelerated productivity growth; Africa’s economic potential;...

Words: 60035 - Pages: 241

Free Essay

Mcda Analysis

...McKinsey Global Institute June 2011 Big data: The next frontier for innovation, competition, and productivity The McKinsey Global Institute The McKinsey Global Institute (MGI), established in 1990, is McKinsey & Company’s business and economics research arm. MGI’s mission is to help leaders in the commercial, public, and social sectors develop a deeper understanding of the evolution of the global economy and to provide a fact base that contributes to decision making on critical management and policy issues. MGI research combines two disciplines: economics and management. Economists often have limited access to the practical problems facing senior managers, while senior managers often lack the time and incentive to look beyond their own industry to the larger issues of the global economy. By integrating these perspectives, MGI is able to gain insights into the microeconomic underpinnings of the long-term macroeconomic trends affecting business strategy and policy making. For nearly two decades, MGI has utilized this “micro-to-macro” approach in research covering more than 20 countries and 30 industry sectors. MGI’s current research agenda focuses on three broad areas: productivity, competitiveness, and growth; the evolution of global financial markets; and the economic impact of technology. Recent research has examined a program of reform to bolster growth and renewal in Europe and the United States through accelerated productivity growth; Africa’s economic potential;...

Words: 60035 - Pages: 241

Premium Essay

Trial Business Plan

...healthcare outcomes for patients. Market Overview The importance of technology and information technology (IT) systems in meeting the challenges placed on the health care system is becoming increasingly apparent. The NHS is currently driving a technological revolution with the vision of becoming paperless by 2018. As a result, there is an increase in demand for SME’s like PathWay to contribute to increasing efficiency and working systems in the NHS by providing technological solutions. Our aim is to launch our product one hospital at a time, beginning with UCLH. PathWay will address the problems faced in monitoring patient’s results in a busy healthcare setting. It will improve efficacy and resolve dependability on having to log on at selected terminals to receive patient results. As a result, it will allow healthcare professionals to provide immediate and timely care to patients at risk. This concept will be of great benefit not only to the product users, but also to patients as it improves healthcare outcomes by improving efficiency in the NHS. There is a great potential for growth for PathWay in the market of this NHS technological revolution. Product Overview PathWay is an integrated mobile phone application that will provide a platform for capturing real-time patient information and to live-stream patient data to a clinician, allowing them to interpret and respond to information remotely. As well as...

Words: 4039 - Pages: 17