Abstract
A review of the current challenges, trends and initiatives around the various regulations as related to Health Informatics in the United States is presented.
A summary of the functions in a workflow-based approach organized into the process and compliance for HIPAA, secure email and fax communications interfaces, e-prescriptions and patient safety and the health information technology savings claims versus costs follows:
HIPAA compliance is complex; data interoperability and integration remains difficult.
Email and faxing is possible with current over-the-shelf technologies within the purview of the HIPAA Security and Privacy rule.
Integration of e-prescribing and NPI data is an area where health informatics can make a real difference.
Medical errors remain high.
There are no real savings yet from the usage of health information technologies; the costs for implementation remain high, and the business model has not evolved to meet the needs.
Health Information Technology (Health IT) projects continue to have a significant failure rate; Open Source technologies are a viable alternative both for cost reduction and scalability.
A discussion on the macro view of health informatics is also presented within the context of healthcare models and a comparison of the U.S. system against other countries.
Keywords: HIPAA, health care informatics, risk, security, ROI, savings, email, fax, e-prescribing, NPI, errors, adverse events, open source
Introduction
One editorial observer noted that the Health Insurance Portability and Accountability Act (HIPAA)1 was “Health Care’s Giant Hairball” 2 after Gordon MacKenzie’s observation of the layering and addition to bureaucracy in his book ‘Orbiting the Giant Hairball’, where he notes that “every new policy (or regulation, system, procedure or form) is another hair for the hairball. Hairs are never taken away, only added.” The corporate and bureaucratic ecosystem around the hairball is “a Gordian Knot of corporate normalcy.”
This paper is a review of the current challenges, trends and initiatives around the various processes and regulations, as related to Health Informatics, and is organized into the process and compliance for HIPAA, secure email and fax communications interfaces, e-prescriptions, the national provider identifier, patient safety, the health information technology savings claims versus costs and a summary discussion.
The secure portability and accountability of patient and insurance information requires the increased use of information technologies. However, the U.S. healthcare system has several disparate components: Medicare, Medicaid, private insurance, VA and government insurance, out-of-pocket and uncompensated care. A macro-informatics view with the healthcare informatics workflow as the centralized component, and related components either using the workflow or affecting it, is shown in Figure 1 below:
Figure 1.
Critical components in health informatics from a ‘use-case’4 perspective.
HIPAA as Workflow
The Administrative Simplification (AS) section of HIPAA, passed in 1996 by the U.S. Congress, primarily mandates the use of standardized electronic data interchange for healthcare transactions between providers, insurers and employers. The Security and Privacy Rule of the HIPAA protects patient, and in some instances, the physician information. A representative workflow is the Healthcare Provider—Payer workflow as shown in Figure 2 below:
Figure 2.
Provider-Payer Workflow, derived from.3
Radiology informatics has remained distinct from textual informatics owing to its image content. Another example workflow for secure data transactions for a Radiology workflow is shown in Figure 3 below utilizing the “Use Case” technique as described in the Unified Modeling Language.4
Figure 3.
Radiology Workflow for secure HIPAA data.5
HIPAA compliance is complex from a data perspective: the interoperability and data mapping standards identified by the Healthcare Information Technology Standards Panel (HITSP), which is sponsored by the American National Standards Institute (ANSI)6 are as follows:
ICD-9-CM
CPT
HCPCS
ASTM E1239-04—Standard Practice for Description of Reservation/Registration-Admission, Discharge, Transfer
ICD-10-CM
ICD-10-PCS
HL7 V2. X (for messaging)
HL7 V3 Clinical Document Architecture (CDA) for text reports
LOINC®
SNOMED CT®
National Council for Prescription Drug Programs (NCPDP) for pharmacy
National Drug File Reference Terminology (NDFRT)/RxNorm for formulary
HIPAA Compliance and Case Studies
General guidelines for HIPAA compliance in the “Seven Habits” format7 are as follows:
Document the policy and control environment.
Assign appropriate oversight of compliance management.
Require personnel screening and access control.
Ensure compliance through training and communication.
Implement regular control monitoring and auditing.
Consistently enforce control environment.
Prevent and respond to incidents and gaps in controls.
A HIPAA compliance case study8 of Sharp Healthcare—with 2,600 physician offices and 400 IT applications serving nearly 3 million San Diego county residents found that 40% to 70% of the users of its various IT systems were not employees which directly affected the access control process of the systems involved as per the HIPAA privacy and security rules. The HIPAA Security Rule guidelines used during this study were:
Information System activity review
Termination procedures for user accounts
Information access management
Access establishment, modifications
Access controls
Audit controls, initiated by management
A well publicized security breach of the Kaiser Permenante internet patient portal exposed the shortcomings within organizations with direct consequence for the HIPAA Security and Privacy Rule.11 Lessons learned from this case study:
Complex, tightly-coupled computer systems aggravate security issues.
Security training is necessary but not sufficient to prevent breaches, due to individual errors.
Security issues may signify broader organizational weaknesses.
Good information management and standard operating procedures are as important as the regulatory forcing of security issues.
Even homogenized healthcare systems like the British National Health Service (NHS) are not spared from the challenges in implementing new information technology systems: The £13 billion overhaul of the NHS has run into several problems in emergency, primary, outpatient, cancer and child-abuse care departments. The number of complaints regarding medical errors and delays has more than doubled from 5,500 in 2006 to over 14,000 in 2007.53 Recent NHS problems with smartcards and integration into the Cerner Corporation (Kansas City, KS) Millennium Release 1 Care Records Service have also been reported.54
From the case studies noted above, it can be inferred that Healthcare Compliance is cumbersome and complex, especially for integrating diverse monolithic systems, where data interoperability and data scrubbing is an ongoing quality issue. A little investment in domain expertise can go a long way. A good example of HIPAA risk workbooks and compliance checklist templates is the HIPAA outreach effort of the University of Wisconsin.10
Communications Systems Compliance
The two critical communications components in any health informatics system that need to pass muster with the HIPAA Privacy are email and facsimile (fax) systems. A HIPAA security perspective of these components is presented below:
Secure email
Secure email messaging is a critical component of HIPAA, specifically the electronic Protected Health Information (ePHI). Messaging protocols like the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) and the Portable Document Format (PDF), which is now an ISO standard, are components that are readily available for integration into email and other electronic messaging applications.12
Secure faxes
The drawbacks of traditional paper-based faxing technologies as a HIPAA compliance risk are summarized13 with the following advantages of electronic or internet-based faxing:
Elimination of paper faxes, reducing the risk of data being seen or copied by unauthorized personnel to almost zero;
Elimination of the risk of a paper fax being delivered to the wrong person or being thrown away inadvertently;
The ability to store every fax electronically; either on the user’s PC or a password-protected network server, assuring there is always a copy of important information;
Availability of 128-bit encryption and SSL when transmitting and receiving documents through the secure server method;
Greater accessibility to the information when the fax owner is off-site;
Easy integration with document management applications, eliminating the need to scan paper documents while making information more accessible to auditors and other authorized personnel.
Since TLS, SSL and PDF technologies are readily available and easily integrated with existing infrastructures, secure email and faxing is possible with current ‘over-the-shelf’ technologies within the purview of the HIPAA Security and Privacy rule.
e-Prescribing and the National Provider ID
The e-Prescribing initiative, a section of the Medicare Improvements for Patients and Providers Act of 200814 and the National Provider Identifier (NPI) database15 are critical pieces of the electronic healthcare workflow.
Electronic prescribing (e-prescribing) is the use of an automated data entry system to generate a prescription for pharmaceutical drugs, rather than the current paper-based system.16 The per-seat cost for e-prescription systems in 2006 was approximately $1,500 to $3,000 with a monthly service fee of about $50.16
Since HIPAA mandated the adoption of standard unique identifiers for health care providers and health plans, the U.S. Government Department of Health and Human Services (HHS), through the Centers for Medicare and Medicaid Services (CMS) developed the National Plan and Provider Enumeration System (NPPES). All healthcare organizations should have complied as per this mandate by May 23, 2008. The NPI is a critical component17 of NPPES which:
Stipulates a 10-digit numeric identifier with a check digit,
Establishes the National Provider System (NPS) will be the system to assign unique numbers to health care providers, and
Defines implementation specifications for Health Care Providers which must obtain an NPI and use it on standard transactions; Health Plans and Health Care Clearinghouses which must use the NPI to identify health care providers on standard transactions where the health care provider’s identifier is required.
This is another area where health informatics can make a real difference toward the speed and quality of the transactions.
Medical Errors and Adverse Events
One issue within the health informatics that has yet to gain critical mass is the reporting and auditing of clinical, medical and billing errors in health care systems within the context of patient and insurance information. From the 2008 report of the American Hospital Association (AHA), there are more than 5,700 registered hospitals in the U.S.26
The HealthGrades Patient Survey18 studied over 40 million Medicare hospitalization records at approximately 5,000 hospitals between 2003 and 2005. The results, specifically for Medicare data, were disturbing: 1.16 million patient safety incidents (2.86% incidence rate) and approximately 250,000 preventable deaths and excess costs of $8.6 billion. Extrapolating it to the overall U.S. healthcare numbers (Medicaid, private insurance and VA), this is troubling, to say the least.
Two error reporting studies conducted by the American Academy of Family Physicians (AAFP) National Research Network (NRN), where 1265 medical errors were voluntarily reported by more than 440 primary care clinicians and staff from 52 physician offices. The analysis suggests that patients with complex health issues are vulnerable to more severe outcomes.19 Of the total error reports related to medications, 194 were analyzed: 70% of the medication errors were prescribing errors, while each constituted about 10% of the total medication administration and documentation errors.20
After recent, high-profile drug reactions and interactions,21 the Food and Drug Administration (FDA) is publicizing three ‘road-map’ initiatives:
MedWatch, the FDA safety information and Adverse Event Reporting (AER) program, with a quarterly safety report,22
Sentinel, “a national, integrated, electronic system for monitoring medical product safety”23, and
Be smart about Prescription Drug Advertising, a consumer awareness website with examples of different “direct to consumer” (DTC) advertising examples.24
ROI and the Savings Argument
Electronic healthcare records are the cornerstone argument for better HIPAA compliance. The Return on Investment (ROI) and savings arguments have been touted for implementing health information technologies using best practices. Most of the recommendations—client/server, standard operating procedures, anti-virus systems, accounts and role management, wireless LAN, backups, audit and logging, audits and quality practices—are standard IT infrastructure improvements that are providing marginal improvement outside the HIPAA context.27
The glass half full
The eHealth Initiative, a U.S. non-profit organization that promotes health informatics policy advocacy and informal lobbying for health informatics initiatives, released the results of its fifth annual survey on 11th September, 2008.28
The survey included 130 community-based initiatives in 48 states. The survey created seven stages of a Health Information Exchange (HIE) “initiative”: Stage 1 was recognition of health informatics as a concept and Stage 7 was a “fully” operational organizational HIE. Stages 1–4 are defined as pilot-stage projects, whereas Stages 5–7 are post-pilot “operational” projects.
The number of operational sites (stages 5–7) in the survey increased by 31% from the number in 2007, with stronger participation by providers, payers, patients and public health partners.
The glass half empty
Even the eHealth Initiative acknowledges that 82% of all respondents and 72% of operational initiatives responded that a sustainable business model was “very” or “moderately” difficult to accomplish.
In a statement to Congress, Peter Orszag, Director of the Congressional Budget Office (CBO) presented the analysis “Evidence on the Costs and Benefits of Health Information Technology” on July 24, 2008.29 This study directly contradicted the widely quoted RAND Corporation30 2005 report, which projected an annual savings estimate of $77 billion using health information technologies.
The argument of the CBO study was that technology on its own would not affect the savings equation, primarily due to the hard numbers: as of late 2006, only 11% of physicians and 12% of all hospitals in the United States have adopted health information technology systems (defined as electronic documentation of providers’ notes, electronic viewing of laboratory and radiological results, electronic prescribing, computerized physician order entry, clinical decision support, and interoperability).
Large medical practices adopt health information systems at a faster rate: Only 16% smaller physical practices have “some sort of” health information system versus about 38% of larger practices and organizations.29
Therefore, the commercial Personal Health Record (PHR, used interchangeably with electronic Health Record, eHR and Electronic Medical Record, EMR) initiatives and their features by Microsoft31 and Google32 are called into question, at least for the near future, for their integration to the various existing health information systems and promise of data security, in accordance with the HIPAA regulation. Neither system includes a HIPAA Security and Privacy compliance statement.31,32
Risks, Costs and “Open-Source”
Most health information systems do not meet their goals as originally envisioned.33 The definition of success and failure needs to be better defined and quantified using Risk Analysis and software Validation and Verification.34
A common theme of failures in Health IT projects is the “Design-Reality gap.”33 The issues that create these gaps between design and reality are: Information, Technology, Process, Objectives and values, Staffing and skills, Management and Other resources. Another important context for each of the issues for the Design-Reality gaps is the Hard-Soft gap—the hard rational design perspective that are standards and metrics based versus the soft political reality. Modularity in the planning process—that considers the risks and plans for the gaps, both Design-Reality and Hard-Soft—is a key success metric.33
One of the largest risk factors for a PHR system is data sharing. Santa Barbara County, CA, faced most of the issues discussed here: cost, ROI, integration, back-up, maintenance, training and lost productivity during overlap and operation. The Santa Barbara County Care Data Exchange had to be shut down. However, the success of the data exchange platform of the Regenstrief Institute in Indiana is because 70% of the state uses it.35 The U.S. Census Bureau shows the Santa Barbara county, CA, population in 2006 to be about 400,000; as compared to the population of San Diego county, CA, about 3 million—the same as the state of Iowa.
A PHR system for small group and single practice physicians costs $44,000 per physician, and has an estimated annual average ongoing cost of $8,500, the American College of Physicians President Lynne Kirk, MD, told the house Subcommittee on Regulations, Healthcare and Trade of the House Committee on Small Business in October 2007 and added that the business case does not exist to make this kind of capital investment.
This current Microsoft and Google PHR systems, in post-Beta stage, are negotiating with hospitals and insurance companies, but have not disclosed a revenue model. This raises the question of the most plausible revenue model: pharmaceutical drug and device advertising.
Since planning, implementation and maintenance costs remain the largest hurdle for funding and sustaining health informatics systems, the Open Source movement is a valid alternative to contain costs for health informatics implementation.36
There is a vast amount of free-text information with confidential patient and physician information in nursing notes, discharge summaries and radiology reports. This confidential patient and physician information needs to be “de-identified” (obfuscated) and a method for correlating the specific file back to the de-identified information, the reverse process. Larger healthcare institutions average several terra-bytes (1012 bytes, TB) of annual data. This results in an average free-text data processing rate of about 20 MB per day. The HIPAA Privacy rule defines two methods to “deidentify” health information, both require electronic processing:
Remove 18 specific identifiers for an individual: Names, Geographic identifiers, dates, telephone numbers, Fax numbers, email addresses, SSN, medical record numbers, health plan beneficiary numbers, account numbers, certificate or license numbers, VIN and license plate numbers, device IDs or serial numbers, web URLs, IP addresses, biometric IDs, full face photographs and any unique ID.1
Use a qualified professional to determine the risk involved in the deidenftification process and document the methods and justification for this opinion.1
A good example of an open-source software program is the free-text deidentifier37 Perl38 program called “deid”39. The ‘deid’ program processes about 10 MB per hour of free-text data with an average recall performance of 0.967. This software is released under the GNU Public License Version 2.40
Another open-source protocol and application available for secure communications is the public-private key infrastructure called GNU Privacy Guard (GPG)41 that can be easily integrated into messaging infrastructures. “Single Log-on” technologies like the Mayo Clinic case study42 could be implemented using OpenLDAP43 architecture within existing infrastructures. A comprehensive (non-moderated) list of open source health care software is available through Wikipedia.44 Open-Source currently faces a perception and user-facing-interface problem, which could be easily overcome since most applications nowadays are web-centric. The Health informatics community should be wary of the recent web-centric phrase d’jour: “Cloud Computing” and avoid its allure over the next few years. Risk and business requirements needs to drive the solution, not the technology.45 Caveat emptor.
Healthcare Economic Models
An illuminating contrast of the healthcare expenses versus outcomes is the U.S. versus OECD (Organisation for Economic Co-operation and Development) country averages, 2004 data (updated 2007):56
U.S. Healthcare expenses and metrics
Healthcare spending per capita: $6,102 (2.5 × OECD country average)
Outpatient care spending per capita: $2,668 (3.5 × average)
Healthcare outcomes
Acute care beds per 1000: 25th out of 28 OECD countries
Death rate from medical errors: 3rd highest of OECD countries
Infant mortality rate: 3rd highest of OECD countries
It is evident from the macro-economic health models above that the U.S. healthcare model is a piece-meal patchwork of all the models used around the world. What is surprising and contrary to the increasing uninsured46 and under-insured population47, is that the combined-income of 50 largest “non-profit” hospitals in the U.S. (as defined by the American Hospital Directory) has grown from about $544 million in 2001 to about $4.27 billion, primarily due to a more than 160% mark-up of costs in 2005 (a 60% increase since 2000)48. Uncompensated care was 2% of the total number of patients covered by this total income. U.S. Senators, led by Iowa Senator Charles Grassley (R) are mounting pressure on the tax-exempt status of the non-profit hospital industry after several investigative newspaper reports.49,50
A consensus from the discussion with the thought-leaders in the field from various countries on the path forward for the U.S. healthcare system:55
Universal coverage—Medicare for everyone (long-term coverage not included)
Remove for-profit competition among insurers and hospitals
Adjust risk for coverage from a pool of funds weighted toward ability to pay
Firm price controls (for doctors, drugs and paperwork)
If there are critical snags, get the doctors, nurses, hospital administrators and pharmaceutical industry at one table and provide deadline to resolve the issue—otherwise government decides
The Healthy Americans Act51 proposed by the U. S. Congress and Senate for 2009 is a self-funded step in the right direction toward stitching together the disparate healthcare models.
A common standards platform for healthcare data recorded and exchanged during clinical trials is another area of amalgamation of the Clinical Data Interchange Standards Consortium (CDISC)52 with HIPAA.
Conclusion
From the above sections, the “take-home” message follows:
HIPAA Compliance is complex, especially for integrating diverse monolithic systems, where data interoperability and data scrubbing is an ongoing quality issue. A little investment in domain expertise can go a long way.
Email and faxing is possible with current over-the-shelf technologies within the purview of the HIPAA Security and Privacy rule.
Integration of e-prescribing and NPI data is an area where health informatics can make a real difference.
The reporting of medical errors and adverse events need continued input from the public, watchdog groups and whistle-blowers.
There are no real savings yet from the usage of health information technologies, the costs for implementation remain high and the business model has not evolved to meet the needs.
Health Information Technology (Health IT) projects have a significant failure rate like traditional IT projects and a disciplined risk mitigation along with standardized software validation and verification would reduce the failure rate. Open Source technologies are a viable alternative both for cost reduction and scalability.
It should be noted that Health informatics technologies are powerful tools toward a solution, but not the solution itself. These tools are chipping away slowly at a fundamentally and systemically flawed health care system. No large hoorays yet, but there is definite hope.
Figure 4.
The healthcare macro-models as related to the US healthcare system, derived from.55
Footnotes
Disclosure
The author reports no conflicts of interest. The author has no disclosures or affiliations to any companies mentioned in this article.
References
- 1.HIPAA http://www.hhs.gov/ocr/hipaa/ last visited Sep 2008.
- 2.Valancy J. Health Care’s Giant Hairball. Family Practice Management. 2007 Apr;14(4):58. [PubMed] [Google Scholar]
- 3.Beach J, et al. Operational Impacts of Administration Simplification; proceedings from HIPAAWest Summit; June 2001; http://www.ehcca.com/presentations/HIPAAWest2/1_06.pdf. last visited Sep 2008. [Google Scholar]
- 4.Grady Booch, Ivar Jacobson, Jim Rumbaugh. OMG Unified Modeling Language Specification, Version 1.3. First Edition Mar, 2000. [Google Scholar]
- 5.Synder AM, Weaver AC. The e-Logistics of Securing Distributed Medical Data. University of Virginia publication; Jan, 2006. http://www.cs.virginia.edu/∼acw/security/doc/Publications/e-Logistics%20of%20Securing%20Medical%20Data.pdf last visited, Sep 2008. [Google Scholar]
- 6.Health Information Technology Standards Panel . Healthcare Information Technology Standards Panel Technical Committees: Selected Standards. Jun 29, 2006. pp. 1–24. Version 2.0. [Google Scholar]
- 7.Rasmussen Michael, et al. Seven habits of highly effective compliance programs. Forrester Research publication; 2005. Jul 12, [Google Scholar]
- 8.Linda Hill. How automated access verification can help organizations demonstrate HIPAA compliance: a case study. Journal of Healthcare Information Management. 2(2):116–22. [PubMed] [Google Scholar]
- 9.Code of Federal Regulations 45 CFR Part5b.
- 10.University of Wisconsin HIPAA page http://www.wisc.edu/hipaa/last visited Sep 2008.
- 11.Collmann J, Cooper T. Breaching the Security of the Kaiser Permanente Internet Patient Portal: the Organizational Foundations of Information Security. Journal of the American Medical Informatics Association. 2007 Mar-Apr;14(2):239–243. doi: 10.1197/jamia.M2195. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 12.Janacek B. Secure messaging in healthcare. Tech solutions for HIPAA-compliant messaging. Journal of American Health Information Management Association. 2008 Jun;79(6):50–51. [PubMed] [Google Scholar]
- 13.Adams S. FAXING: The HIPAA Risk That Hides in Plain Sight. Immediate Care Business. Apr 24, 2008. http://www.immediatec-arebusiness.com/cms/CMScomments.asp?articleid=186730 last visited Sep 2008.
- 14. http://waysandmeans.house.gov/media/pdf/110/pdfcp.pdf.
- 15.NPI https://nppes.cms.hhs.gov/ last visited Sep 2008.
- 16.Saransohn K, Holt M. The Prescription Infrastructure: Are We Ready for ePrescribing? prepared for the California Healthcare Foundation by First Consulting Group; Jan, 2006. http://www.chcf.org/documents/healthit/ThePrescriptionInfrastruc-tureReadyForERx.pdf. [Google Scholar]
- 17.HIPAA Administrative Simplification: Standard Unique Health Identifier for Health Care Providers. Final Rule. Jan 23, 2004. 45 CFR Part 162. [PubMed] [Google Scholar]
- 18.Health Grades Fourth Annual Patient Safety in American Hospitals Study. Apr, 2007. http://www.healthgrades.com/media/DMS/pdf/PatientSafetyInAmericanHospitalsStudy2007.pdf last visited Sep 2008.
- 19.Philips RL, et al. Learning From Different Lenses: Reports of Medical Errors in Primary Care by Clinicians, Staff, and Patients: A Project of the American Academy of Family Physicians National Research Network. Journal of Patient Safety. 2006 Sep;2(3):140–6. [Google Scholar]
- 20.Kuo GM, et al. Medication errors reported by US family physicians and their office staff. Quality and Safety in Health Care. 2008;17:286–290. doi: 10.1136/qshc.2007.024869. [DOI] [PubMed] [Google Scholar]
- 21.Johnson A, Winslow R. Drug Makers Say FDA Safety Focus Is Slowing New-Medicine Pipeline. Wall Street Journal. 2008 Jun 30; [Google Scholar]
- 22.MedWatch http://www.fda.gov/medwatch/ last visited Sep 2008.
- 23.Sentinel http://www.fda.gov/oc/initiatives/advance/sentinel/ last visited Sep 2008.
- 24.Drug Advertising http://www.fda.gov/cder/ethicad/index.htm last visited Sep 2008.
- 25. http://www.cspinet.org/integrity/ last visited Sep 2008.
- 26.Fast Facts, American Hospital Association 2008. http://www.aha.org/aha/content/2007/pdf/fastfacts2007.pdf last visited Sep 2008.
- 27.Younger C. Maximizing the Return on Investments in Information Technology by Incorporating Best Practices. Journal of Healthcare Information Management. 18(2):50–58. [PubMed] [Google Scholar]
- 28.eHealth Initiative Fifth Annual Survey of Health Information Exchange at the State and Local Levels. Sep, 2008. http://www.ehealthinitiative.org/2007HIESurvey/2008StateOfTheField.mspx last visited Sep 2008.
- 29.Congressional Budget Office . Evidence on the Costs and Benefits of Health Information Technology. Jul 24, 2008. Testimony and Statement of Peter R. Orzag before the Subcommittee on Health, Committee on Ways and Means, U.S House of Representatives. [Google Scholar]
- 30.Federico G, Meili R, Scoville R. Extrapolating Evidence of Health Information Technology Savings and Costs. Santa Monica, Calif: RAND Corporation; 2005. [Google Scholar]
- 31.Microsoft HealthVault. Sep, 2008. http://www.healthvault.com/ last visited.
- 32.Google Health. Sep, 2008. https://www.google.com/health last visited.
- 33.Heeks R. Health information systems: Failure, success and improvisation. International Journal of Medical Informatics. 2006 Feb;75(2):125–137. doi: 10.1016/j.ijmedinf.2005.07.024. [DOI] [PubMed] [Google Scholar]
- 34.IEEE IEEE Standard for Software Verification and Validation. IEEE Std. 2005 Jun 8;:1012–2004. [Google Scholar]
- 35.Kolbasuk McGee M. Why Progress Toward Electronic Health Records Is Worse Than You Think. Information Week. May 28, 2007. http://www.informationweek.com/news/infrastructure/showArticle.jhtml?articleID=199702199.
- 36.The Open Source Movement. Sep, 2008. http://www.opensource.org/ last visited.
- 37.Neamatullah I, et al. Automated de-identification of free-text medical records. BMC Medical Informatics and Decision Making. 2008;8:32. doi: 10.1186/1472-6947-8-32. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 38.Perl programming language. Sep, 2008. http://www.perl.org/about.html last visited.
- 39.Deid. Sep, 2008. http://www.physionet.org/physiotools/deid/ last visited.
- 40.GPL2 License. Sep, 2008. http://www.gnu.org/licenses/gpl-2.0.html last visited.
- 41.GPG Key Infrastructure. Sep, 2008. http://www.gnupg.org/ last visited.
- 42.Sapp MJ, Behrens TL. Single Logon: Balancing Security and Healthcare Productivity. Journal of Healthcare Information Management. 18(2):21–26. [PubMed] [Google Scholar]
- 43.OpenLDAP. Sep, 2008. http://www.openldap.org/ last visited.
- 44.Wikipedia collection of Open Source Healthcare Software. Sep, 2008. http://en.wikipedia.org/wiki/List_of_open_source_healthcare_software last visited.
- 45.Buyya R, et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities; The 10th IEEE International Conference on High Performance Computing and Communications, HPCC-08; Sep 25, 2008; Keynote paper: http://www.gridbus.org/∼raj/papers/hpcc2008_keynote_cloudcom-puting.pdf. [Google Scholar]
- 46.United States Census Bureau Statistical Abstract 2008. Health and Nutrition Section. Sep, 2008. Table 148. http://www.census.gov/prod/2007pubs/08abstract/health.pdf last visited.
- 47.Cunningham PJ, Felland LE. Falling Behind: Americans Access to Medical Care Deteriorates, 2003–2007. Health System Change. Jun, 2008. Sep, 2008. (Tracking Report No. 19). http://www.hschange.com/CONTENT/993/ last visited. [PubMed]
- 48.Carreyrou J, Martinez B. Nonprofit Hospitals, Once For the Poor, Strike It Rich: With Tax Breaks, They Outperform For-Profit Rivals. Wall Street Journal. 2008 Apr 4; [Google Scholar]
- 49.Martinez B. Cash Before Chemo: Hospitals Get Tough. Wall Street Journal. Apr 28, 2008. Sep 28, 2008. http://online.wsj.com/article/SB120934207044648511.html last visited.
- 50.Japsen B. U. of C. medical practices drawing critical eye. Chicago Tribune. Sep 8, 2008. Sep 8, 2008. http://www.chicagotribune.com/business/chi-mon-uofc-hospital-obama-sep08,0,4276333.story last visited.
- 51.Healthy Americans Act. Sep, 2008. http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=110_cong_bills&docid=f:h3163ih.txt.pdf last visited.
- 52.The CDISC standard. Sep, 2008. http://www.cdisc.org/ last visited.
- 53.Doward J. Chaos as £13bn NHS computer system falters. The Guardian. Aug 10, 2008. Sep 10, 2008. http://www.guardian.co.uk/society/2008/aug/10/nhs.computersystem, last visited.
- 54.Oates J. Running out of patience. The Register. Oct 6, 2008. Oct 6, 2008. http://www.theregister.co.uk/2008/10/06/npfit_care_records/ last visited.
- 55.Reid TR. We’re Number 37!” to be published by Penguin Press in 2009, adapted from “Sick Around the World”, a PBS documentary produced by WGBH. Boston: Oct, 2008. http://www.pbs.org/wgbh/pages/frontline/sickaroundtheworld/countries/models.html last visited. [Google Scholar]
- 56.Peterson CL, Burton R. “U.S. Health Care Spending: Comparison with Other OECD Countries” Congressional Research Service report to Congress. Sep 17, 2007. Oct 17, 2008. http://assets.opencrs.com/rpts/RL34175_20070917.pdf last visited.




