881 resultados para electronic medical record
Resumo:
Thesis (M.S.)--University of Illinois at Urbana-Champaign.
Resumo:
Print ceases at v.48 (2007), then becomes online only.
Resumo:
Mode of access: Internet.
Resumo:
Mode of access: Internet.
Resumo:
Mode of access: Internet.
Resumo:
Beginning with 2d ser. a general t.-p. is pub. for each decade
Resumo:
"Rev. 8, 1999."
Resumo:
This study aimed to identify: i) the prevalence of malnutrition according to the scored Patient Generated-Subjective Global Assessment (PG-SGA); ii) utilization of available nutrition resources; iii) patient nutrition information needs; and iv) external sources of nutrition information. An observational, cross-sectional study was undertaken at an Australian public hospital on 191 patients receiving oncology services. According to PG-SGA, 49% of patients were malnourished and 46% required improved symptom management and/or nutrition intervention. Commonly reported nutrition-impact symptoms included: peculiar tastes (31%), no appetite (24%) and nausea (24%). External sources of nutrition information were accessed by 37%, with popular choices being media/internet (n=19) and family/friends (n=13). In a sub-sample (n=65), 32 patients were aware of the available nutrition resources, 23 thought the information sufficient and 19 patients had actually read them. Additional information on supplements and modifying side effects was requested by 26 patients. Malnutrition is common in oncology patients receiving treatment at an Australian public hospital and almost half require improved symptom management and/or nutrition intervention. Patients who read the available nutrition information found it useful, however awareness of these nutrition resources and the provision of information on supplementation and managing symptoms requires attention.
Resumo:
Ubiquitous access to patient medical records is an important aspect of caring for patient safety. Unavailability of sufficient medical information at the point-ofcare could possibly lead to a fatality. The U.S. Institute of Medicine has reported that between 44,000 and 98,000 people die each year due to medical errors, such as incorrect medication dosages, due to poor legibility in manual records, or delays in consolidating needed information to discern the proper intervention. In this research we propose employing emergent technologies such as Java SIM Cards (JSC), Smart Phones (SP), Next Generation Networks (NGN), Near Field Communications (NFC), Public Key Infrastructure (PKI), and Biometric Identification to develop a secure framework and related protocols for ubiquitous access to Electronic Health Records (EHR). A partial EHR contained within a JSC can be used at the point-of-care in order to help quick diagnosis of a patient’s problems. The full EHR can be accessed from an Electronic Health Records Centre (EHRC) when time and network availability permit. Moreover, this framework and related protocols enable patients to give their explicit consent to a doctor to access their personal medical data, by using their Smart Phone, when the doctor needs to see or update the patient’s medical information during an examination. Also our proposed solution would give the power to patients to modify the Access Control List (ACL) related to their EHRs and view their EHRs through their Smart Phone. Currently, very limited research has been done on using JSCs and similar technologies as a portable repository of EHRs or on the specific security issues that are likely to arise when JSCs are used with ubiquitous access to EHRs. Previous research is concerned with using Medicare cards, a kind of Smart Card, as a repository of medical information at the patient point-of-care. However, this imposes some limitations on the patient’s emergency medical care, including the inability to detect the patient’s location, to call and send information to an emergency room automatically, and to interact with the patient in order to get consent. The aim of our framework and related protocols is to overcome these limitations by taking advantage of the SIM card and the technologies mentioned above. Briefly, our framework and related protocols will offer the full benefits of accessing an up-to-date, precise, and comprehensive medical history of a patient, whilst its mobility will provide ubiquitous access to medical and patient information everywhere it is needed. The objective of our framework and related protocols is to automate interactions between patients, healthcare providers and insurance organisations, increase patient safety, improve quality of care, and reduce the costs.
Resumo:
We propose a digital rights management approach for sharing electronic health records in a health research facility and argue advantages of the approach. We also give an outline of the system under development and our implementation of the security features and discuss challenges that we faced and future directions.
Resumo:
Purpose: The aim of this study was to determine current approaches adopted by optometrists to the recording of corneal staining following fluorescein instillation. Methods: An anonymous ‘record-keeping task’ was sent to all 756 practitioners who are members of the Queensland Division of Optometrists Association Australia. This task comprised a form on which appeared a colour photograph depicting contact lens solution-induced corneal staining. Next to the photograph was an empty box, in which practitioners were asked to record their observations. Practitioners were also asked to indicate the level of severity of the condition at which treatment would be instigated. Results: Completed task forms were returned by 228 optometrists, representing a 30 per cent response rate. Ninety-two per cent of respondents offered a diagnosis. The most commonly used descriptive terms were ‘superficial punctate keratitis’ (36 per cent of respondents) and ‘punctate staining’ (29 per cent). The level of severity and location of corneal staining were noted by 69 and 68 per cent of respondents, respectively. A numerical grade was assigned by 44 per cent of respondents. Only three per cent nominated the grading scale used. The standard deviation of assigned grades was � 0.6. The condition was sketched by 35 per cent of respondents and two per cent stated that they would take a photograph of the eye. Ten per cent noted the eye in which the condition was being observed. Opinions of the level of severity at which treatment for corneal staining should be instigated varied considerably between practitioners, ranging from ‘any sign of corneal staining’ to ‘grade 4 staining’. Conclusion: Although most practitioners made a sensible note of the condition and properly recorded the location of corneal staining, serious deficiencies were evident regarding other aspects of record-keeping. Ongoing programs of professional optometric education should reinforce good practice in relation to clinical record-keeping.
Resumo:
Ultrasound is used extensively in the field of medical imaging. In this paper, the basic principles of ultrasound are explained using ‘everyday’ physics. Topics include the generation of ultrasound, basic interactions with material and the measurement of blood flow using the Doppler effect.
Resumo:
Teleradiology allows medical images to be transmitted over electronic networks for clinical interpretation, and for improved healthcare access, delivery and standards. Although, such remote transmission of the images is raising various new and complex legal and ethical issues, including image retention and fraud, privacy, malpractice liability, etc., considerations of the security measures used in teleradiology remain unchanged. Addressing this problem naturally warrants investigations on the security measures for their relative functional limitations and for the scope of considering them further. In this paper, starting with various security and privacy standards, the security requirements of medical images as well as expected threats in teleradiology are reviewed. This will make it possible to determine the limitations of the conventional measures used against the expected threats. Further, we thoroughly study the utilization of digital watermarking for teleradiology. Following the key attributes and roles of various watermarking parameters, justification for watermarking over conventional security measures is made in terms of their various objectives, properties, and requirements. We also outline the main objectives of medical image watermarking for teleradiology, and provide recommendations on suitable watermarking techniques and their characterization. Finally, concluding remarks and directions for future research are presented.