Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Hacking Healthcare SPECIAL OFFER: Upgrade this ebook with O’Reilly Preface
Audience Organization Conventions Used in This Book Using Code Examples Safari® Books Online How to Contact Us Acknowledgments
1. Introduction
Health IT and Medical Science Meaningful Use and What It Means to Be an EHR Why So Late? Health IT in Health Reform Evolution of Meaningful Use Accountable Care Organizations EHR Functionality in Context
2. An Anatomy of Medical Practice
How Patients Reach Healthcare Organizations Lab Sample Collection Before a Visit or Admission Date HIPAA and Patient Identification Intake, Demographics, Visits, and Admissions Precertification and Prior Authorization Emergency Admissions Prioritization and Triage Outpatient Care Inpatient Care Labs Imaging Administration and Billing
3. Medical Billing
Who Pays, and How Claims Eligibility Treatment Billing
The Billing Process Complexities in Billing
Adjudication The Patient’s Burden
4. The Bandwidth of Paper
Workflow Tokens Why Leave Paper? Step 0: Health IT Humility Normalized Data Good Boundaries Mean Good Data Data at Peace with Itself: Linked Data Flexible Data Assume Health Data Changes Free Text Data
5. Herding Cats: Healthcare Management and Business Office Operations
Major Business Office Activities
Insurance Records Demographics Revenue Collection Auditing Accounting Reporting Licensing, Credentials, and Enrollments Nonhealthcare Interactions
The Evolution of the Business Office
6. Patient-Facing Software
The PHR as Platform Sharing Data in Patient-Facing Software Patients Using Normal Social Media E-patients The Quantified Self Patient-Focused Social Media Patient Privacy in PHR Systems Specific PHR and Patient-Directed Meaningful Use Requirements
7. Human Error
The Extent of Error Dangerous Dosing Discontents of Computerization Process Errors and Organizational Change Deep Medical Errors and EHR Solutions Errors Caused by Human-Computer Mismatch Best Practices
8. Meaningful Use Overview
Outpatient Guidelines and Requirements Inpatient Guidelines and Requirements
9. A Selective History of EHR Technology
MUMPS: The Programming Language for Healthcare Where Can We Buy Some Light Bulbs? Fragmentation In an Environment with Gag Clauses and No Consumer Reports VistA History
10. Ontologies
A Throw-Away Ontology Learning from Our Example CPT Codes, Sermo, and CMS International Classification of Diseases (ICD) E-patient-Dave-gate Crosswalks and ICD Versions Other Claims Codes Drug Databases SNOMED to the Rescue
SNOMED Example SNOMED and the Semantic Web
UMLS: The Universal Mapping Metaontology Extending Ontologies Other Ontologies Sneaky Ontologies Ontologies Using APIs Exercising Ontologies
11. Interoperability
Some Lessons from Earlier Exchanges The New HIE Rules Strong Standards Winning Protocols The Billing Protocols HL7 Version 2 First-Generation and Second-Generation HIEs Continuity of Care Record HL7 v3, RIM, CDA, CDD, and HITSP C32 The IHE Protocol HIE with IHE
Managing Patient Identifiers with IHE IHE Data Exchange, the Library Model IHE in the NWHIN
The Direct Project/Protocol The PCAST Report The SMART Platform Technology and Policy Were Sitting in the Tree
12. HIPAA: The Far-Reaching Healthcare Regulation
Does HIPAA Cover Me? Responsibilities of Covered Entities HIPAA: A Reasonable Regulation Duct-Tape HIPAA Strategies Breach Notification Rules In Summary
13. Open Source Systems
Why Open Source? Major Open Source Healthcare Projects
ClearHealth Mirth Connect
VistA Variants and Other Certified Open Source EHR Systems OpenMRS
A. Meaningful Use Implementation Assessment About the Authors SPECIAL OFFER: Upgrade this ebook with O’Reilly Copyright
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion