• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What are the concerns of practitioners and patients on Electronic Medical Records?

Extracts from this document...

Introduction

International Baccalaureate Information Technology in a Global Society Portfolio http://www.technewsworld.com/images/rw571641/medical-records.jpg What are the concerns of practitioners and patients on Electronic Medical Records? (Health) November, 2009 Tran Thai Bao Khanh The British International School Vietnam News Item: Technology News, 2009, Building a Better Health Data Network http://www.technewsworld.com/story/science/68285.html [April, 2009] A. Presentation of the issue In the United States of America, many medical centers have begun to have electronic records for the patients. The almost immediate access gives the doctors the advantage in saving time and the undoubtedly understanding of the patients' medical histories. According to Dr. James E. Sanders from the article "Building a Better Health Data Network" I just read recently on TechNewsWorld, the electronic medical records system helps him to flawlessly treat any patients who from different regions in different states, however, when the patients are not in the system, hours, or even days, are spent on searching for crucial information. Medical practitioners all around the country are encouraged to have the EMR (Electronic Medical Records) systems installed as they help save a huge amount of time, decrease errors yet reduce the cost. ...read more.

Middle

The picture below is an example. The form is displayed on the screen; this is the very first step when the technicians or nurses follow the format using the keyboard to type in the patient's information. For further identity and recognition, a webcam is used to take picture of the patient's face. The information is then saved into the system, for later examination, practitioners can search for the patients' names alphabetically. (http://ambas.net/Screenshots.aspx) Additionally, for hospitals or large group practice, a link for the network is required so that all the computers can access to the EMR. Therefore, XML - a set of codes that can format the documents electronically, is used to integrate between networks of the patients' record on the internet. Moreover, DICOM (the picture below is an example of how the whole medical system works)- Digital Imaging and Communications in Medicines, which is a basic program in the EMR system, includes a file format definition and a network communications protocol being responsible for transmitting medical information and images. A DICOM file can be interchanged between the two systems that are able to receive the medical data in DICOM format. ...read more.

Conclusion

Patients have been concerned about their personal data being read, stolen, changed, etc. by hackers or any strangers who intend to do something appalling to the patients, the negative consequences like are inevitable. There is also the confidential issue of the patients who are afraid of listing out their sensitive symptoms for the public to see, causing the doctors and patients' work uncompromised. (Computerworld Security, 2009) D. A Solution to a problem arising from the issue Many patients are worried about the security of the data and privacy of their information. To answer this question, there have been legislations restricting the access of specifics to the personal data; only doctors, nurses and billing clerks can have the access to system. However, there are certain levels of access and rules, in which only doctors can have the ultimate access to all the documents not nurses, and billing clerks can only have the access to the contact information and other personal expenses not the medical histories. Institutions and providers have made it strict for the EMR network authentication, privacy and safety requirements. Additionally, the EMR systems always have back-ups; hence, there is hardly any loss or damage of one's data. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    float prospectus for Ocado, which is aiming for a market valuation of �1.37bn when it lists on the stock exchange later this month. Amazon said its new "grocery store" would offer 22,000 lines with big consumer goods firms Kraft, Nestl� and Procter & Gamble among the suppliers involved.

  2. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    3Human touch would be lost between clients and doctors as the doctors will no longer be commenting based on their personal observations in their own words, but instead, ticking off boxes or filling out forms in a vague manner. Solution for the Issue: Ways of protecting health information can be

  1. ITGS portfolio Extension

    The popularity of this technology is increasing day by day and airports, hotels, restaurants are offering free Wi-Fi to attract customers and slowly Wi-Fi is replacing local area networks which require wires for connection to the internet. 5) What kind of security loopholes is a Wi-Fi network open to?

  2. Information Technology in a Global Society - Is integrity a difficulty when students use ...

    PHP only parses code within its delimiters and anything which is outside of it is sent directly to the output and is not processed by PHP. The most common delimiter are <?php to open and ?> to close PHP sections.

  1. Information Technology in a Global Society - analysis of an article &amp;quot;Using data mining ...

    The decision tree shown in the diagram below [Diagram 2] is built from the very small graph of 9 patients' information [Table 1]. In this table each row represents to a patient record and is referring as a data instance.

  2. Information Technology in a Global Society - article commentary &amp;quot;What are the security risks ...

    And the top two activities of the top four activity happens to be camera and mp3, which are not activities which should be used in workplaces. Diagram 1 (Survey3, 2009) : Most Common Mobile Contact activities of Smartphone Owners Worldwide.

  1. GCSE Welsh Baccalaureate Completed Diary Pages

    Also, many homeless people were victims to social violence and neglect. Homelessness is particular a big issue for many cities, however, homelessness can occur anywhere. Apparently Pembrokeshire has one of the highest rates of homelessness, which I did not expect as I have never noticed anyone on the streets.

  2. Can the work of architect Le Corbusier be explored in the context of the ...

    These pilotis act as the supports for the house, leading to the free facade walls.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work