scholarly journals Tracking the patient journey by combining multiple hospital database systems

2014 ◽  
Vol 38 (3) ◽  
pp. 332 ◽  
Author(s):  
Andy Wong ◽  
Erhan Kozan ◽  
Michael Sinnott ◽  
Lyndall Spencer ◽  
Robert Eley

With new national targets for patient flow in public hospitals designed to increase efficiencies in patient care and resource use, better knowledge of events affecting length of stay will support improved bed management and scheduling of procedures. This paper presents a case study involving the integration of material from each of three databases in operation at one tertiary hospital and demonstrates it is possible to follow patient journeys from admission to discharge. What is known about this topic? At present, patient data at one Queensland tertiary hospital are assembled in three information systems: (1) the Hospital Based Corporate Information System (HBCIS), which tracks patients from in-patient admission to discharge; (2) the Emergency Department Information System (EDIS) containing patient data from presentation to departure from the emergency department; and (3) Operation Room Management Information System (ORMIS), which records surgical operations. What does this paper add? This paper describes how a new enquiry tool may be used to link the three hospital information systems for studying the hospital journey through different wards and/or operating theatres for both individual and groups of patients. What are the implications for practitioners? An understanding of the patients’ journeys provides better insight into patient flow and provides the tool for research relating to access block, as well as optimising the use of physical and human resources.

Author(s):  
Петр Юрьевич Филяк ◽  
Максим Константинович Постников ◽  
Семен Евгеньевич Федоров ◽  
Александр Григорьевич Остапенко ◽  
Андрей Петрович Преображенский

В условиях развития информационного общества (Knowledgeable society - KS) информационные системы стали неотъемлемой частью любой организации, даже самой малой, независимо от реализуемых ими бизнес-процессов. Такие информационные системы принято называть корпоративными информационными системами (КИС), или Corporate Information System (CIS). Особые требования при разработке КИС предъявляются к обеспечению их информационной безопасности, что может быть реализовано путем разработки КИС в защищенном исполнении. Технологии blockchain являются очень перспективными не только при применении их в традиционных сферах - производстве, сервисе, на транспорте, но и для решения проблем безопасности и информационной, в частности. Анализу данной проблемы и подходам к ее решению и посвящена данная статья. At present, in the context of the development of Knowledgeable society, information systems are at now an integral part of any organization, even the smallest, regardless of the business processes they implement. Such information systems are commonly referred to as Corporate Information Systems (CIS). Special requirements for the development of CIS are made to ensure their information security, which can be achieved by developing a protected version of the CIS. In this article is considered the analysis of this problem and approaches to its solution. Block Chain technologies are very promising not only when applying them in traditional spheres - manufacturing, service, transport, but also to solve security and information problems, in particular.


2018 ◽  
Vol 10 (3) ◽  
pp. 229-235 ◽  
Author(s):  
Rumbidzai N Mutsekwa ◽  
Russell Canavan ◽  
Anthony Whitfield ◽  
Alan Spencer ◽  
Rebecca L Angus

ObjectiveThe demand for outpatient gastroenterology medical specialist consultations is above what can be met within budgetary and staffing constraints. This study describes the establishment of a dietitian first gastroenterology clinic to address this issue, the patient journey and its impact on wait lists and wait times in a tertiary gastroenterology service.DesignA dietitian first gastroenterology clinic model was developed and a mixed-methods approach used to evaluate the impact of the service over a 21-month period.SettingGold Coast University Hospital, Queensland, Australia (a public tertiary hospital).Patients658 patients were triaged to the clinic between June 2016 and March 2018.InterventionA dietitian first gastroenterology clinic for low-risk gastroenterology patients.Main outcome measuresWe examined demographic, referral, wait list, wait time and service activity data, patient satisfaction and patient journey.ResultsAt the time of audit, 399 new (67.9% female) and 307 review patients had been seen. Wait times for eligible patients reduced from 280 to 66 days and the percentage of those in breach of their recommended wait times reduced from 95% to zero. The average time from referral to discharge was 117.8 days with an average of 2.4 occasions of service. 277 patients (69.4%) had been discharged to the care of their general practitioner and 43 patients (10.7%) had an expedited specialist medical review. Patient surveys indicated a high level of satisfaction.ConclusionA dietitian first gastroenterology model of care helps improve patient flow, reduces wait times and may be useful elsewhere to address outpatient gastroenterology service pressures.


2021 ◽  
Vol 273 ◽  
pp. 07007
Author(s):  
Olesya Golubeva ◽  
Alina Pogorelova

Modern trends in the creation and development of corporate information systems (CIS) are largely determined by their consumer quality. A model of building a corporate information system (CIS) of a universal open architecture is presented. The possibility of using CIS for managing the production processes of a shoe organization is demonstrated.


2021 ◽  
Vol 46 (2) ◽  
Author(s):  
I. S. Galuzin ◽  
◽  
G. G. Naiman

The article analyzes the problem of cybersecurity of corporate information systems and defines the purpose and objectives of their protection. The analysis of technology of management of vulnerabilities of corporate information systems is carried out. Methods and tools for managing vulnerabilities of corporate information systems based on the Qualys solution are studied. The purpose, main functions and composition of Qualys solution software are defined. A variant of managing corporate information system vulnerabilities based on the Qualys solution has been developed.


1985 ◽  
Vol 11 (2) ◽  
pp. 77-87 ◽  
Author(s):  
Billy P. Buckles ◽  
Frederick E. Petry

Information systems have evolved to the point where it is desirable to capture the vagueness and uncertainty of data that occurs in actuality. Approaches have been taken using various fuzzy set concepts such as degree of membership, similarity relations and possibility distributions. This leads to the concept of generalized information systems which are typically char acterized by heterogeneous data representations, weakly typed data domains and the requirement for semantic knowledge during query interpretation. A generalized information system is more likely to have a direct representation for larger classes of information at the cost of more complex data management and query processing. In general the various fuzzy database approaches that have been developed are overviewed in the paper and characterized with respect to the concept of a generalized information system.


Author(s):  
Rina Deviana Alit ◽  
Meri Chrismes Aruan ◽  
Andri Rahadyan

The purpose of this research is to design a medical service information system for Java-based human citeureup clinical patients to accelerate and manage patient data, search for medical service information systems and to produce medical service information systems in Java-based human clinical clinics. The research method used by researchers is a qualitative research method that is research on research conducted descriptive and using analysis. The results obtained were about medical service information systems to assist in processing patient data. The construction of this information system is expected to facilitate and provide maximum service to patients as well as facilitate the processing of transaction data for reporting, data and information management processes become more effective, produce faster output and no longer use incorrect data input or require duplication of data.


2019 ◽  
Vol 34 (s1) ◽  
pp. s123-s124
Author(s):  
Min Joung Kim ◽  
Joon Min Park

Introduction:Overcrowding in the emergency department (ED) has been a global problem for a long time, but it is still not resolved.Aim:To determine if an ED expansion would be effective in resolving overcrowding.Methods:This was a retrospective study comparing two 10-month periods before (September 2015 to June 2016) and after (September 2017 to June 2018) the ED expansion in an urban tertiary hospital. The existing ED consisted of 45 beds in the adult area and eight beds in the pediatric area. After the construction, the number of beds was not increased, but a fast track area was newly established in the adult area, and a 25-bed ward for emergency hospitalized patients was opened.Results:The number of patients visiting the ED increased from 77,078 to 87,927. The proportion of patients who returned home without treatment significantly decreased from 11.5% to 0.9% (p<0.001). The number of adult patients increased from 40,814 to 60,720, but the number of patients who could be treated on the bed decreased (22,166 (54.3%) vs. 17,776 (29.3%), p<0.001). The number of pediatric patients was similar in both periods. Median ED length of stay (LOS) of total patients increased from 193.0 min to 205.8 min (p<0.001). Of the 18,900 hospitalized patients during post-period, 1,255 (6.64%) were admitted to the emergency ward, and the boarding (from admission decision to hospitalization) time of the admitted patients decreased from 239.2 min in the pre-period to 190.9 min in the post-period by 38.3 min. However, more time was required for admission decision in the post-period (216.8 vs. 253.3, p<0.001).Discussion:The ED expansion allowed more patients to be treated, and the emergency ward reduced boarding times of admitted patients. However, due to the increase in the number of patients, the time required for medical treatment increased.


2018 ◽  
pp. 6-11 ◽  
Author(s):  
Aleksey Babenko ◽  
Svetlana Kozunova

The level of information security of corporate information systems depends on the security of information assets of the enterprise in which the enterprise information systems are implemented. To protect data processed in corporate information systems, it is advisable to ensure the information security of the system, to identify and predict threats to information security violations. Such measures will ensure effective management of information security and high-quality response to threats in corporate information systems in real time. Thus, the research of threats management and information security of corporate information systems allows the authors to develop a model of threat profile. The difference from the previously proposed models is that the present solution defines the actions that need to be taken when threats are detected and to prevent them. Application of the proposed model will allow implementing special procedures of information security management of the enterprise, using private information security policies for corporate information systems. The authors highlight the key aspects of managing threats to information security of corporate information systems. The vulnerabilities typical for corporate information systems have been allocated. The sources of threats have been formed, and the potential violators have been described. A unique model of the profile of threats to information security for corporate information system has been developed.


2011 ◽  
pp. 1920-1929
Author(s):  
Yifeng Shen

Thanks to the rapid development in the field of information technology, healthcare providers rely more and more on information systems to deliver professional and administrative services. There are high demands for those information systems that provide timely and accurate patient medical information. High-quality healthcare services depend on the ability of the healthcare provider to readily access the information such as a patient’s test results and treatment notes. Failure to access this information may delay diagnosis, resulting in improper treatment and rising costs (Rind et al., 1997). Compared to paper-based patient data, computer-based patient data has more complex security requirements as more technologies are involved. One of the key drivers to systematically enhance the protection of private health information within healthcare providers is compliance with the healthcare information system security standard framework and related legislation. Security standards and legislation of the healthcare information system are critical for ensuring the confidentiality and integrity of private health information (Amatayakul, 1999). Privacy determines who should have access, what constitutes the patient’s rights to confidentiality, and what constitutes inappropriate access to health records. Security is embodied in standards and technology that ensure the confidentiality of healthcare information and enable health data integrity policies to be carried out.


2021 ◽  
Vol 50 (Supplement_1) ◽  
pp. i12-i42
Author(s):  
N Saxton ◽  
D Mayne

Abstract Topic Early recognition and multidisciplinary management of frail patients in acute care is a national priority. This is reflected in the NHS 10 year plan, NHS Improvement (NHSI) and Getting It Right First Time (GIRFT) ambitions for acute care. The Sunderland Royal Hospital acute frailty service currently reviews frail patients on the Medical Admissions Unit (MAU) each morning. Analysis of our emergency department (ED) data demonstrates that most frail patients arrive to the ED between 12 pm and 18 pm leading to a cohort of frail patients who are not receiving comprehensive geriatric assessment early in their patient journey. Here, we present our piloted expansion of the frailty service into the ED. Intervention Currently the frailty service is provided on MAU between 9 am and 1 pm. The pilot service expansion ran for five weeks between September and October 2018 and involved the acute frailty team being available to ED and MAU from Monday to Friday 0830 am to 1700 pm. Frail patients were proactively identified using the ED patient tracker as well being referred to the team by ED staff. Improvement During the pilot, the team reviewed 131 additional patients. 85% were seen in ED. 61 patients were discharged directly from ED and 33 patients were admitted directly to a back of house medical ward resulting in reduced MAU occupancy rates in the evenings. Concerns that bringing full MDT assessment into ED might result in increased time spent in ED were proven to be unfounded. Median length of stay for admitted patients was low with 49% discharged within 7 days and 9.9% 30 day readmission rate. Feedback from ED and community teams was positive. Discussion It is recognised that early CGA is beneficial for patients with frailty syndromes who are admitted to hospital. Most commonly, this takes place on medical admissions wards. Through this pilot, we have demonstrated significant added benefits of bringing the acute frailty team and crucially CGA into the emergency department setting. As well as increased discharges directly from ED, we demonstrated a reduction in length of stay and readmissions as well as improved patient flow. Our aim is to permanently implement a seven day frailty service with input on MAU as well as ED.


Sign in / Sign up

Export Citation Format

Share Document