Abstract
This paper aims to analyse the impact of the national electronic health records. It focuses on private health insurance market, business process re-engineering, and other considerations. It uses principles of microeconomic, business process, and dynamic management with examples to predict possible situations during system implementation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
President’s Council of Advisors on Science and Technology (PCAST): Executive Office of the President, Report to the President Realizing the Full Potential of the Health Information Technology to Improve Healthcare for Americans: The Path Forward (2010)
Kabir, E., et al.: A computer aided analysis scheme for detecting epileptic seizure from EEG data. Int. J. Comput. Intell. Syst. 11, 663–671 (2018)
Vimalachandran, P., et al.: The Australian PCEHR system: ensuring privacy and security through an improved access control mechanism. EAI Endorsed Trans. Scalable Inf. Syst. 3(8), e4 (2016)
Australian Health Survey: Health service usage and health related actions, 2011–12. http://www.abs.gov.au/ausstats/abs@.nsf/lookup/E334D0A98272E4DCCA257B39000F2DCF?opendocument. Accessed 5 July 2018
Supriya, S., et al.: Weighted visibility graph with complex network features in the detection of epilepsy. IEEE Access 4, 6554–6566 (2016)
Rosen, H., Wen, J., Snoddon, T.: Public finance in Canada, 4th edn, pp. 161–172. McGraw-Hill Ryerson Limited, USA (2012)
Harmon, P.: The scope and evolution of business process management. In: vom Brocke, J., Rosemann, M. (eds.) Handbook on Business Process Management 1, pp. 50–52. Springer, Berlin (2010). https://doi.org/10.1007/978-3-642-00416-2_3
Cutler, M., Sarah, R.: Paying for health insurance: the trade-off between competition and adverse selection. Q. J. Econ. 113(2), 433–466 (1998)
Smith, W.: Why Processes Matter II: Efficiency (2018)
Siuly, S., et al.: Exploring sampling in the detection of multicategory EEG signals. Comput. Math. Methods Med. 10–22 (2015)
Li, M., et al.: Privacy-aware access control with trust management in web service. World Wide Web 14(4), 407–430 (2011)
Thongkam, J., et al.: AdaBoost algorithm with random forests for predicting breast cancer survivability. In: IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), pp. 3062–3069 (2008)
Vimalachandran, P., et al.: Cryptographic access control in electronic health record systems: a security implication. In: Bouguettaya, A., et al. (eds.) WISE 2017. LNCS, vol. 10570, pp. 540–549. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68786-5_43
Nohria, N., Beer, M.: Cracking the Code of Change. Harvard Business Review (2000). https://hbr.org/2000/05/cracking-the-code-of-change. Accessed 5 July 2018
LaPointe, L., Rivard, S.: A multilevel model of resistance to information technology implementation. MIS Q. 29(3), 461–491 (2005)
Mendoza, A: Change Management (2018)
Australian Institute of Health and Welfare: Australia’s Health. Australia’s health series no. 15. Cat. no. AUS 199. Australia Government, Canberra, p. 3 (2016)
Sun, L., et al.: Semantic access control for cloud computing based on e-Healthcare. In: 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD) (2012)
Wang, H., et al.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425–436 (2005)
Sun, X., et al.: Satisfying privacy requirements before data anonymization. Comput. J. 55(4), 422–437 (2012)
Wang, H., et al.: Special issue on security and privacy of IoT. World Wide Web 21(1), 1–6 (2018)
Sun, X., et al.: Publishing anonymous survey rating data. Data Min. Knowl. Discov. 23(3), 379–406 (2011)
Zhang, J., et al.: Outlier detection from large distributed databases. World Wide Web 17(4), 539–568 (2014)
Zhang, J., et al.: On efficient and robust anonymization for privacy protection on massive streaming categorical information. IEEE Trans. Dependable Secure Comput. 14(5), 507–520 (2017)
Cohen, A., Siegelman, P.: Testing for adverse selection in insurance markets. J. Risk Insur. 77(1), 39–84 (2010)
Sun, L., et al.: Purpose based access control for privacy protection in e-healthcare services. J. Softw. 7(11), 2443–2449 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, Z. (2018). Analysing the Impact of Electronic Health Records. In: Siuly, S., Lee, I., Huang, Z., Zhou, R., Wang, H., Xiang, W. (eds) Health Information Science. HIS 2018. Lecture Notes in Computer Science(), vol 11148. Springer, Cham. https://doi.org/10.1007/978-3-030-01078-2_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-01078-2_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01077-5
Online ISBN: 978-3-030-01078-2
eBook Packages: Computer ScienceComputer Science (R0)