971 resultados para electronic records
Resumo:
OBJETIVO: Caracterizar as indicações das gestantes que procuraram o serviço de Medicina Fetal do Hospital das Clínicas da Faculdade de Medicina da Universidade de São Paulo para realização de procedimentos invasivos diagnósticos e avaliar os resultados dos cariótipos fetais e de suas gestações. MÉTODOS: Estudo observacional retrospectivo das gestantes que realizaram biópsia de vilo corial (BVC), amniocentese e cordocentese no período de fevereiro de 2005 a dezembro de 2009. Não foram incluídos outros procedimentos diagnósticos ou procedimentos terapêuticos. O resultado da gestação foi obtido através de consulta de prontuário eletrônico e/ou físico e/ou contato telefônico. RESULTADOS: Foram realizados 713 procedimentos (113 BVC, 340 amniocenteses e 260 cordocenteses). A principal indicação para a realização dos procedimentos invasivos foi a presença de alterações estruturais nos fetos, seguido por valores aumentados da translucência nucal e pela idade materna avançada. O cariótipo fetal esteve alterado em 186 casos (26,1%). A trissomia do cromossomo 18 foi a aneuploidia mais comum, seguida pela trissomia do 21, a monossomia do X e a trissomia do cromossomo 13. Ocorreram 4,9% de abortamento, 25,7% de natimortos e 13% de neomortos. Oito gestantes optaram pela interrupção judicial, e 99% das gestantes cujos fetos não apresentavam malformação e que apresentavam cariótipo fetal normal tiveram nativivos.
Resumo:
Objective To audit the records of a group of patients who had previously benefited from cognitive behavioural therapy (CBT) for dental phobia.Aim To ascertain if they had returned to the use of intravenous (IV) sedation to facilitate dental treatment. Ten years ago these patients were routinely requiring IV sedation to facilitate dental treatment due to severe dental phobia.Method Sixty patients entered the original pilot project. Of those, 30 were offered CBT and 21 attended. Twenty of those patients (95.2%) were subsequently able to have dental treatment without IV sedation. In this follow-up study the electronic records of 19 of the 20 patients who had originally been successful with CBT were re-audited. Our purpose was to see if there was any record of subsequent IV sedation administration in the intervening ten years.Results Of the 19 successful CBT patients available to follow-up, 100% had not received IV sedation since the study ten years ago. This may suggest the initial benefit of CBT has endured over the ten-year period.Conclusion This study indicates that the use of CBT for patients with dental phobia proves beneficial not only in the initial treatment but that the benefits may endure over time. This results in a significant reduction in health risks to the patient from repeated IV sedation. It may also translate into significant financial savings for dental care providers. Our evidence for CBT as treatment for dental phobia suggests dental services should be implementing this approach now rather than pursuing further research. © 2011 Macmillan Publishers Limited. All rights reserved.
Resumo:
A Radioterapia é um dos tratamentos disponíveis para tratar o cancro seja com intuito curativo ou paliativo. O objectivo da radioterapia paliativa consiste em controlar os sintomas apresentados pelos doentes com doença avançada, como por exemplo a dor provocada pela presença de metástases ósseas, que é o sintoma em estudo neste trabalho. A Radioterapia deve causar o mínimo de efeitos secundários e o mínimo desconforto possível aos doentes, não devendo aumentar a morbilidade, mas antes proporcionar maior qualidade de vida aos doentes. Recentemente, vários estudos investigaram a utilização da radioterapia em fim de vida, proporcionando uma linha orientadora nesta área, a partir das condições clínicas dos doentes submetidos a radioterapia perto do final da vida. A escolha do tema deste trabalho resulta de uma inquietação sentida no dia-a-dia, aquando da realização dos tratamentos de radioterapia a doentes paliativos com dor óssea e com mau estado geral. Exigindo a radioterapia um posicionamento e imobilização precisos e rigorosos pode, por vezes, causar algum desconforto aos doentes. No caso dos doentes com necessidades paliativas, nomeadamente com dor moderada a forte, é importante inferir acerca do real benefício de um tratamento que ao invés de promover alívio, lhes pode provocar mais dor e desconforto, indo contra às boas práticas preconizadas em cuidados paliativos. Considera-se que o tema é relevante para a melhoria dos cuidados prestados ao doente oncológico a realizar tratamentos de radioterapia, na medida em que permite realizar uma reflexão acerca da eficácia deste tratamento em fim de vida e sua aplicabilidade quando estamos perante doentes com prognóstico de vida limitado. O estudo em causa é um estudo descritivo exploratório, tendo sido realizada uma análise sistemática da informação contida nos processos electrónicos dos doentes, disponíveis na rede hospitalar, de acordo com os critérios de inclusão estabelecidos, no sentido de averiguar a eficácia do tratamento de radioterapia no alívio da dor. O estudo permitiu concluir que a radioterapia é um tratamento eficaz no controlo da dor em doentes com metástases ósseas, não vindo alterar as conclusões avançadas por outros estudos e outros autores internacionais. No entanto, é importante a realização de um prognóstico mais preciso na tomada de decisão terapêutica para que doentes que não vão beneficiar do tratamento de radioterapia possam ser referenciados para cuidados paliativos mais precocemente. Quanto à escolha do esquema terapêutico, o esquema de fracção única deveria ser mais comummente utilizado pela sua demonstrada eficácia, como o comprovam os diversos estudos referenciados neste trabalho.
Resumo:
Ubiquitous access to patient medical records is an important aspect of caring for patient safety. Unavailability of sufficient medical information at the point-ofcare could possibly lead to a fatality. The U.S. Institute of Medicine has reported that between 44,000 and 98,000 people die each year due to medical errors, such as incorrect medication dosages, due to poor legibility in manual records, or delays in consolidating needed information to discern the proper intervention. In this research we propose employing emergent technologies such as Java SIM Cards (JSC), Smart Phones (SP), Next Generation Networks (NGN), Near Field Communications (NFC), Public Key Infrastructure (PKI), and Biometric Identification to develop a secure framework and related protocols for ubiquitous access to Electronic Health Records (EHR). A partial EHR contained within a JSC can be used at the point-of-care in order to help quick diagnosis of a patient’s problems. The full EHR can be accessed from an Electronic Health Records Centre (EHRC) when time and network availability permit. Moreover, this framework and related protocols enable patients to give their explicit consent to a doctor to access their personal medical data, by using their Smart Phone, when the doctor needs to see or update the patient’s medical information during an examination. Also our proposed solution would give the power to patients to modify the Access Control List (ACL) related to their EHRs and view their EHRs through their Smart Phone. Currently, very limited research has been done on using JSCs and similar technologies as a portable repository of EHRs or on the specific security issues that are likely to arise when JSCs are used with ubiquitous access to EHRs. Previous research is concerned with using Medicare cards, a kind of Smart Card, as a repository of medical information at the patient point-of-care. However, this imposes some limitations on the patient’s emergency medical care, including the inability to detect the patient’s location, to call and send information to an emergency room automatically, and to interact with the patient in order to get consent. The aim of our framework and related protocols is to overcome these limitations by taking advantage of the SIM card and the technologies mentioned above. Briefly, our framework and related protocols will offer the full benefits of accessing an up-to-date, precise, and comprehensive medical history of a patient, whilst its mobility will provide ubiquitous access to medical and patient information everywhere it is needed. The objective of our framework and related protocols is to automate interactions between patients, healthcare providers and insurance organisations, increase patient safety, improve quality of care, and reduce the costs.
Resumo:
Establishing a nationwide Electronic Health Record system has become a primary objective for many countries around the world, including Australia, in order to improve the quality of healthcare while at the same time decreasing its cost. Doing so will require federating the large number of patient data repositories currently in use throughout the country. However, implementation of EHR systems is being hindered by several obstacles, among them concerns about data privacy and trustworthiness. Current IT solutions fail to satisfy patients’ privacy desires and do not provide a trustworthiness measure for medical data. This thesis starts with the observation that existing EHR system proposals suer from six serious shortcomings that aect patients’ privacy and safety, and medical practitioners’ trust in EHR data: accuracy and privacy concerns over linking patients’ existing medical records; the inability of patients to have control over who accesses their private data; the inability to protect against inferences about patients’ sensitive data; the lack of a mechanism for evaluating the trustworthiness of medical data; and the failure of current healthcare workflow processes to capture and enforce patient’s privacy desires. Following an action research method, this thesis addresses the above shortcomings by firstly proposing an architecture for linking electronic medical records in an accurate and private way where patients are given control over what information can be revealed about them. This is accomplished by extending the structure and protocols introduced in federated identity management to link a patient’s EHR to his existing medical records by using pseudonym identifiers. Secondly, a privacy-aware access control model is developed to satisfy patients’ privacy requirements. The model is developed by integrating three standard access control models in a way that gives patients access control over their private data and ensures that legitimate uses of EHRs are not hindered. Thirdly, a probabilistic approach for detecting and restricting inference channels resulting from publicly-available medical data is developed to guard against indirect accesses to a patient’s private data. This approach is based upon a Bayesian network and the causal probabilistic relations that exist between medical data fields. The resulting definitions and algorithms show how an inference channel can be detected and restricted to satisfy patients’ expressed privacy goals. Fourthly, a medical data trustworthiness assessment model is developed to evaluate the quality of medical data by assessing the trustworthiness of its sources (e.g. a healthcare provider or medical practitioner). In this model, Beta and Dirichlet reputation systems are used to collect reputation scores about medical data sources and these are used to compute the trustworthiness of medical data via subjective logic. Finally, an extension is made to healthcare workflow management processes to capture and enforce patients’ privacy policies. This is accomplished by developing a conceptual model that introduces new workflow notions to make the workflow management system aware of a patient’s privacy requirements. These extensions are then implemented in the YAWL workflow management system.
Resumo:
Ubiquitous access to patient medical records is an important aspect of caring for patient safety. Unavailability of sufficient medical information at the patient point-of-care could possibly lead to a fatality. In this paper we propose employing emergent technologies such as Java SIM Cards (JSC),Smart Phones (SP), Next Generation Networks (NGN), Near Field Communications (NFC), Public Key Infrastructure (PKI), and Biometric Identification to develop a secure framework and related protocols for ubiquitous access to Electronic Health Records (EHRs). A partial EHR contained within a JSC can be used at the patient point-of-care in order to help quick diagnosis of a patient’s problems. The full EHR can be accessed from an Electronic Healthcare Records Centre (EHRC).
Resumo:
A patient-centric DRM approach is proposed for protecting privacy of health records stored in a cloud storage based on the patient's preferences and without the need to trust the service provider. Contrary to the current server-side access control solutions, this approach protects the privacy of records from the service provider, and also controls the usage of data after it is released to an authorized user.
Resumo:
For more than a decade research in the field of context aware computing has aimed to find ways to exploit situational information that can be detected by mobile computing and sensor technologies. The goal is to provide people with new and improved applications, enhanced functionality and better use experience (Dey, 2001). Early applications focused on representing or computing on physical parameters, such as showing your location and the location of people or things around you. Such applications might show where the next bus is, which of your friends is in the vicinity and so on. With the advent of social networking software and microblogging sites such as Facebook and Twitter, recommender systems and so on context-aware computing is moving towards mining the social web in order to provide better representations and understanding of context, including social context. In this paper we begin by recapping different theoretical framings of context. We then discuss the problem of context- aware computing from a design perspective.
Resumo:
Security and privacy in electronic health record systems have been hindering the growth of e-health systems since their emergence. The development of policies that satisfy the security and privacy requirements of different stakeholders in healthcare has proven to be difficult. But, these requirements have to be met if the systems developed are to succeed in achieving their intended goals. Access control is a fundamental security barrier for securing data in healthcare information systems. In this paper we present an access control model for electronic health records. We address patient privacy requirements, confidentiality of private information and the need for flexible access for health professionals for electronic health records. We carefully combine three existing access control models and present a novel access control model for EHRs which satisfies requirements of electronic health records.
Resumo:
Background This paper presents a novel approach to searching electronic medical records that is based on concept matching rather than keyword matching. Aim The concept-based approach is intended to overcome specific challenges we identified in searching medical records. Method Queries and documents were transformed from their term-based originals into medical concepts as defined by the SNOMED-CT ontology. Results Evaluation on a real-world collection of medical records showed our concept-based approach outperformed a keyword baseline by 25% in Mean Average Precision. Conclusion The concept-based approach provides a framework for further development of inference based search systems for dealing with medical data.
Resumo:
Introduction The onset of Personally Controlled Electronic Health Records in Australia demand healthcare decision making processes to comprise, understand and accept electronic health records (EHR). Nurses play a key, central role in the healthcare decision making process and their perceptions and attitudes of EHRs are significant [1], which develop during their academic life. However, studies aimed at nursing students’ attitudes of EHRs are very limited [2-4]. A proper understanding of these attitudes and how they evolve with academic progress is important. This paper presents results from a survey conducted at a leading University in Queensland, Australia as a first step to filling this gap.
Resumo:
This research was a step forward in developing a data integration framework for Electronic Health Records. The outcome of the research is a conceptual and logical Data Warehousing model for integrating Cardiac Surgery electronic data records. This thesis investigated the main obstacles for the healthcare data integration and proposes a data warehousing model suitable for integrating fragmented data in a Cardiac Surgery Unit.
Resumo:
Information privacy is a critical success/failure factor in information technology supported healthcare (eHealth). eHealth systems utilise electronic health records (EHR) as the main source of information, thus, implementing appropriate privacy preserving methods for EHRs is vital for the proliferation of eHealth. Whilst information privacy may be a fundamental requirement for eHealth consumers, healthcare professionals demand non-restricted access to patient information for improved healthcare delivery, thus, creating an environment where stakeholder requirements are contradictory. Therefore, there is a need to achieve an appropriate balance of requirements in order to build successful eHealth systems. Towards achieving this balance, a new genre of eHealth systems called Accountable-eHealth (AeH) systems has been proposed. In this paper, an access control model for EHRs is presented that can be utilised by AeH systems to create information usage policies that fulfil both stakeholders’ requirements. These policies are used to accomplish the aforementioned balance of requirements creating a satisfactory eHealth environment for all stakeholders. The access control model is validated using a Web based prototype as a proof of concept.
Resumo:
We present an approach to automatically de-identify health records. In our approach, personal health information is identified using a Conditional Random Fields machine learning classifier, a large set of linguistic and lexical features, and pattern matching techniques. Identified personal information is then removed from the reports. The de-identification of personal health information is fundamental for the sharing and secondary use of electronic health records, for example for data mining and disease monitoring. The effectiveness of our approach is first evaluated on the 2007 i2b2 Shared Task dataset, a widely adopted dataset for evaluating de-identification techniques. Subsequently, we investigate the robustness of the approach to limited training data; we study its effectiveness on different type and quality of data by evaluating the approach on scanned pathology reports from an Australian institution. This data contains optical character recognition errors, as well as linguistic conventions that differ from those contained in the i2b2 dataset, for example different date formats. The findings suggest that our approach compares to the best approach from the 2007 i2b2 Shared Task; in addition, the approach is found to be robust to variations of training size, data type and quality in presence of sufficient training data.
Resumo:
Electronic Medical Record (EMR) systems are being implemented increasingly worldwide. Saudi Arabia is one of the developing countries that commenced implementing such systems in 1988. Whilst EMR uptake has been low in Saudi Arabia until now, a number of hospitals have implemented EMR systems successfully. This paper analyses available studies (n = 28) in the literature regarding EMR implementation in Saudi Arabia to identify the progress of EMR implementation to date and to identify the facilitators and barriers to implementation.