Healthcare Informatics a Client Arrives Thesis

Total Length: 893 words ( 3 double-spaced pages)

Total Sources: 1+

Page 1 of 3

Periodically I would want to make sure the data was audited to make sure the underlying processes and systems used for capturing it were working correctly. In conjunction with these measures of ensuring patient data is being correctly captured processes for data reliability assessment would be used (Alhaqbani, Josang, Fidge, 2009). While these two areas of capturing patient data accurately, auditing it to make sure the underlying processes are in fact working correctly, and then layering in reliability assessment analyses would serve as the foundation for the types of software applications that would be used for automating patient information capturing. The specific types of applications would be business process management (BPM)-based so that if necessary the underlying processes of patient information capture could be re-engineered over time. The use of BPM and business process re-engineering (BPR) within the context of software applications would also ensure they would continually be able to scale and stay agile to the healthcare providers' needs over time (Hebda, Czar, 2008).

Stuck Writing Your "Healthcare Informatics a Client Arrives" Thesis?



Relying on applications to redefine the process, audit it on occasion to ensure its correct functioning, and the use of BPM and BPR-based applications to make the underlying workflows more efficient over time would be the first phase of application support. The second phase would concentrate on the use of an enterprise content management system that would include support for electronic medial record, health record, patient record, and personal health record analysis (Hebda, Czar, 2008). The enterprise-wide system would have the ability to integrate with the patient monitoring, patient quality assurance, hospital financial systems and quality management systems state and federal agencies rely on to ensure compliance of the medical facility (Poston, Reynolds, Gillenson, 2007). In addition to all of these requirements the need for patient records security is critical (Miller, Tucker, 2009). With all of these factors taken into account an enterprise-wide series of applications could be defined and implemented......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Healthcare Informatics A Client Arrives" (2009, September 28) Retrieved April 28, 2024, from
https://www.aceyourpaper.com/essays/healthcare-informatics-client-arrives-19090

Latest MLA Format (8th edition)

Copy Reference
"Healthcare Informatics A Client Arrives" 28 September 2009. Web.28 April. 2024. <
https://www.aceyourpaper.com/essays/healthcare-informatics-client-arrives-19090>

Latest Chicago Format (16th edition)

Copy Reference
"Healthcare Informatics A Client Arrives", 28 September 2009, Accessed.28 April. 2024,
https://www.aceyourpaper.com/essays/healthcare-informatics-client-arrives-19090