Skip to main content
Applied Clinical Informatics logoLink to Applied Clinical Informatics
. 2017 Dec 21;8(2):381–395. doi: 10.4338/ACI-2016-11-RA-0191

Using telephony data to facilitate discovery of clinical workflows

Donald W Rucker 1,Correspondence address
PMCID: PMC6241743  PMID: 28421225

Summary

Background: Discovery of clinical workflows to target for redesign using methods such as Lean and Six Sigma is difficult. VoIP telephone call pattern analysis may complement direct observation and EMR-based tools in understanding clinical workflows at the enterprise level by allowing visualization of institutional telecommunications activity.

Objective: To build an analytic framework mapping repetitive and high-volume telephone call patterns in a large medical center to their associated clinical units using an enterprise unified communications server log file and to support visualization of specific call patterns using graphical networks.

Methods: Consecutive call detail records from the medical center’s unified communications server were parsed to cross-correlate telephone call patterns and map associated phone numbers to a cost center dictionary. Hashed data structures were built to allow construction of edge and node files representing high volume call patterns for display with an open source graph network tool.

Results: Summary statistics for an analysis of exactly one week’s call detail records at a large academic medical center showed that 912,386 calls were placed with a total duration of 23,186 hours. Approximately half of all calling called number pairs had an average call duration under 60 seconds and of these the average call duration was 27 seconds.

Conclusions: Cross-correlation of phone calls identified by clinical cost center can be used to generate graphical displays of clinical enterprise communications. Many calls are short. The compact data transfers within short calls may serve as automation or re-design targets. The large absolute amount of time medical center employees were engaged in VoIP telecommunications suggests that analysis of telephone call patterns may offer additional insights into core clinical workflows.

Citation: Rucker DW. Using telephony data to facilitate discovery of clinical workflows. Appl Clin Inform 2017; 8: 381–395 https://doi.org/10.4338/ACI-2016-11-RA-0191

Keywords: Telephone, workflow, communication, organizational efficiency, VoIP

1. Background

Many researchers examine clinical workflows using one of two approaches [ 1 ]. One is direct visualization of clinical activities with human observers taking notes as they watch clinicians go about their tasks [ 29 ]. The other is analysis of use patterns of pre-existing enterprise software such as computerized physician order entry or nursing medication administration [ 1015 ]. Both approaches have limitations. Manual observation is expensive, limiting data collection to narrow pre-selected workflows. Analysis of a facility’s electronic medical record environment necessarily reflects workflows from specific software and hardware configurations rather than elective workflow choices made by clinicians.

Likewise, there are limited ways to identify clinical workflows at the scale of a healthcare system with thousands of employees [ 1619 ]. Answering the managerial question of how frontline nursing and patient care staff spend their time is not easy [ 2025 ]. This challenge becomes evident when hospitals embark on “Six Sigma” or “Lean” re-engineering efforts and struggle to discover their current processes by asking their employees to manually identify workflow inefficiencies [ 26 , 27 ]. Instrumented workflow discovery tools such as RFID tagging and saccadic eye-movement tracking have had limited success here [ 2830 ].

2. Objectives

One promising workflow discovery assistance tool is computational analysis of electronic log files recorded as a byproduct of using software for other tasks. Log files have been used to analyze screen navigation, outlier events in laparoscopic surgery and as targets for machine learning approaches to categorize clinical pathways [ 1214 , 3133 ]. This paper focuses on the analysis of log files generated by making telephone calls on a medical center’s communications server network.

Communication is intimately involved with clinical workflows [ 34 , 35 ]. The adoption of “bring your own device” policies (allowing use of personal cell phones and tablets) in many healthcare workplaces has increased awareness of communications [ 3641 ]. Identification of lapses in communication during “handoffs” has also generated widespread interest [ 4249 ]. Telephone calls are interesting to measure because they represent clinical tasks in and of themselves and because these communications may serve as surrogate markers for clinical activities which have no current electronic signature. Telephone calls may also reflect rework when phone calls are placed to address failed processes. Of note if there are frequent very short phone calls, the limited information transfers within these short calls may allow identification of simple tasks which offer opportunities for automation or process redesign, for example by replacing some calls with a workflow engine or other communications technology [ 5052 ].

The transition from public switched telephone circuits to voice over IP (VoIP) servers which route internal enterprise calls over the enterprises’ IP (Internet protocol) networks offers new ways to analyze clinical communications at an enterprise scale [ 53 , 54 ]. VoIP servers direct voice calls internal to the enterprise relying on the publicly-switched telephone network only when calls leave enterprise sites. Multiple vendors offer enterprise VoIP systems, often as part of a unified communications system [ 55 ]. While actual conversations are not routinely recorded for reasons of privacy and storage costs, each call generates a call detail record (CDR) in a log file [ 56 , 57 ].

This paper describes a framework for mapping telephone calls to clinical areas as identified by cost-centers using CDR logs and then graphically displaying the high-volume call patterns. The goal is to build a tool which can help clinical re-engineering teams identify additional workflow inefficiencies beyond those recalled from memory by showing the repetitive telephone calls clinicians use in their work. This software can also be used for future work to measure the impact of resulting workflow redesigns.

3. Methods

3.1 Data Requirements

The two main types of data needed to perform IP telephony-based analysis of clinical workflows are a set of call detail records (CDR) and information to map phone numbers in those CDR’s to one or more identifiers of the specific clinical location or activity.

CDR log files are generated by the VoIP telephony or unified communications server. Each record’s data fields include the phone numbers and IP addresses involved in the calls, start and stop time stamps, call type classification such as a conference call or a bridged call, and potential related information such as video conference data [ 56 ].

Mapping phone numbers to the clinical environment requires local information. Directory information should provide information allowing the phone numbers to be mapped to clinical areas and tasks. The actual workflow analysis is performed on those phone numbers which represent high call volume clinical areas with individual user data computationally discarded. Phone numbers could, for example, represent nursing units, labs, radiology, operating rooms or the emergency department. Enterprise phone numbers may accumulate over the course of decades and hence span multiple technologies. Larger institutions can reserve banks of phone numbers to map their phone to internal exchanges allowing shorter numbers to be dialed (e.g. xxx-xx5–1234 is mapped to 5–1234). Additional identification options to map clinical numbers include use of cost center codes and use of Emergency Location Identification Number data which allows emergency responders to pinpoint 911 over VoIP call locations within buildings. Lightweight Directory Access Protocol (LDAP) files may help in providing site mapping of phone numbers.

3.2 Log file analysis

A convenience sample of one million consecutive call detail records from one academic medical center’s Cisco Unified Communications Manager™ version 7.x instance was obtained as a log file (424 KB in size) [ 56 , 57 ]. The medical center’s information technology group, which administers enterprise telephony, also provided a manually-maintained Excel™ spreadsheet mapping of phone numbers which contained active numbers and a mapping to cost center codes. A separate Excel™ spreadsheet crosswalk of cost center numbers (1004 in total) to the cost center names was also provided. Use of pagers, personal cell phones and text messaging was not measured. All data was transmitted and maintained using encrypted storage and public key cryptography. The research protocol was reviewed by the Ohio State University IRB who determined that the research did not involve human subjects and did not fall under requirements for IRB review or exemption.

Software analyzing the call detail records and the telephone number mappings was programmed using Perl version 5.16. [ 58 ] Modules to support in-memory debugging, persistence and calculations of memory structure size were obtained from Perl’s CPAN.org (Data::Dumper, Storable and Devel::Size). Perl hash functions were used to represent the major data structures as unique key:value pairs. Programming was performed in Windows 7 and Centos Linux environments on a laptop personal computer with an Intel Core i7 2.90 GHz CPU and 16 gigabytes of RAM.

Each phone call generated a 94 field comma separated value CDR. For workflow analysis, each individual phone call’s data needed to be aggregated and indexed to the phone number allowing collection of cumulative data about all calls between each realized pair of internal phone numbers. These aggregated data structures also needed to support the generation of a directed graph where phone numbers are nodes or vertices and phone calls are arcs or edges.

To minimize memory use reading the log files, each CDR was read one at a time and parsed into a hash structure temporarily holding the data fields. Selected fields such as the number calling, the number called, and the duration of the call were then saved into three core representations of the phone call traffic. These three hashes had keys, respectively, of the number calling, the number called and a string combined the number calling and the number called. These hashes stored the total duration of calls, the number of successful and unsuccessful calls as defined by the metadata definitions from the Cisco Unified Communications Manager technical manuals, information about the calling device and, as described below, data about the clinical environment [ 56 ]. The calling number hash also contained a nested hash with subkeys for each called number and that subset’s call characteristics while correspondingly the called number hash contained a nested hash with subkeys for each calling number. Having nested hashes provides significant flexibility in structuring further analysis. Specifically having symmetrically nested hash functions for both calling and called phone numbers allows retracing all call patterns in either direction. The Perl language provides hashes where each key has a unique value.

Functions to sort the calls by call counts were built to allow selection of high-volume call patterns. Additional functions were built to capture aggregate statistics, time stamps, and the volume of short duration phone calls. Major data structures were optimized using Perl references which are pointers to locations in memory. Processing one million calls with debugging code enabled required 6 minutes.

3.3 Building a graph representation

Intuitively, enterprise representations of phone traffic can be represented as network graphs. With the growth of Facebook™ and LinkedIn™, social network analysis of graphical data structures is increasing [ 5967 ]. Network graphs can be transformed into matrices allowing for application of a wide variety of computational descriptions of the information flows implicit in the graph [ 6870 ].

Graphs can be represented as matrices using an adjacency matrix. An adjacency matrix representation of a graph of phone call patterns is a matrix A where calls from phone number i to phone number j can be summed as individual matrix element a ij . The nested hashes described above can be seen as sparse adjacency matrices where only positive matrix elements are represented. Of note, since the direction of the call, i.e. which number is calling and which number is called, is important in this analysis, the graph representation of the data is directed. Correspondingly, the phone call adjacency matrix is not symmetrical as it would be with an undirected graph.

In this visualization of the graph representations of the data, selected phone numbers are represented as nodes while cumulative phone traffic in one direction is represented as an arc (or arrow) pointing in one direction. For many pairs of phone numbers (nodes), there were high volumes of phone calls in both directions so the graph representation included arcs for both call directions. Building a unified graph representation consolidating information from both the calling and called phone number data structures requires making choices about how to combine each data structure’s call duration information.

3.4 Mapping clinical workflows

Mapping of enterprise phone numbers to clinical areas and by implication clinical activities occurring in those areas depends on how an institution documents its organizational structure. For this analysis phone numbers were identified by cost center. The cost center mapping was programmed by cross-matching and merging a cost center file holding the names and descriptions of clinical cost centers with an enterprise list of phone numbers with their cost center identification into a hash where the phone numbers served as keys. On reading each CDR, number lookup from this “phone directory” hash was performed and the phone number’s cost center data incorporated into the calling, called and call-pair number hashes.

Importantly, the granularity of the cost center data used allowed association of the phone numbers with individual nursing units, operating room areas, and numerous other specific departments and area of the medical center. To focus on clinical workflows, only data from internal 5-digit extensions was carried forward eliminating outside calls and internal server re-routed calls. Filtering and data cleansing of the historical phone number assignment file were programmed using regular expressions.

3.5 Graphical display

For this academic medical center there were over 100,000 phone calls a day and approximately 30,000 unique phone numbers necessitating a strategy of examining only high volume workflows. Gephi © was selected as the open-source visualization tool for the graph representation [ 71 ]. Traversing the hash structures described above, each phone number and its associated clinical cost center was mapped into a node for Gephi while the call traffic between the phone numbers and corresponding count data was mapped as a directed edge. Gephi allows customizations to the display of nodes and edges to incorporate color mappings and various weighting functions. Edge and node files written to Gephi were limited to the 500 most frequent edges (sorted call pairs) for ease of visual inspection. Filtering functions to select calls by cost center or call group were built.

Because the goal of this work was to display nodes that are meaningfully labeled and edges which can be directly inspected, indirect graph analysis using tools such as clustering, graph partitioning, community detection or spectral analysis was not performed.

4. Results

Summary statistics for all calls are listed in ► Table 1 . Two findings are of note. First, the large volume of phone calls in this single academic medical center and its affiliated clinics (with approximately 850 inpatient beds at the time of this analysis) reflects a measurable labor investment in telephony. Filtering results of the log file to select call traffic in the first 168 hours to correspond to exactly one calendar week yielded 23,186 hours of call duration as measured by server time for that week. Averaging over that week’s total of 912,386 calls yielded an average call volume per day of 130,341 calls. Second, as noted in ► Table 1 , roughly half of the call pairs were short calls averaging 27 seconds length.

Table 1.

Summary VoIP Call Statistics

Total VoIP calls 1,000,000
Successful calls * 898,316
Average duration of successful calls 101.54 seconds
Unique call pairs ** 533,311
‘Short’ call pairs ** with average call under 60 seconds 267,158
Average duration of ‘short’ call pairs 26.93 seconds
Total duration of call time for 1,000,000 calls 25,337 hours
Total duration of clock time to obtain the 1,000,000 calls 181 hours
Total call count in one week (7 calendar days, 168 consecutive hours) 912,386
Total duration of call time in one week (168 consecutive hours) 23,186 hours

* Successful calls are defined in CDR metadata as calls with duration over 1 second

** Call pair is a unique pair of number x calling number y

This framework capturing CDR data allows network displays aggregated by sets of cost centers and numbers. ► Figure 1 displays the overall high frequency call traffic for the top 500 call pairs. There is one large internal node for voice mail as well as a number of other aggregations most of which represent inpatient nursing units. ► Figure 2 displays a drill-down into one representative inpatient nursing unit showing a high volume of internal to the unit shared phones traffic between the unit clerks, nurses, and patient care associates.

Fig. 1.

Fig. 1

Gephi © graphical network display of overall enterprise top 500 call pairs calls out of the one million calls using the Fruchterman-Reingold force-directed layout algorithm. The left column and margins of the Gephi screen show tools to select the layout algorithm as well as to label the nodes (phone numbers) and edges (calls) with information such as cost center name, call volume or duration. The large node in the right upper quadrant represents voice mail and many of the smaller sub-networks correspond to large inpatient nursing units. Here label display is turned off to show the overall structure of high-frequency telephone traffic.

Fig. 2.

Fig. 2

Close-up of Gephi © screen capture of sorted high frequency calling patterns involving one representative inpatient nursing unit cost center. Phone number nodes are labeled with their cost center label and overall contribution to call volume while edges (calls between specific phone numbers) are labeled with directional call counts. Other call detail record data could be selected for display when writing the node and edge data files for import into Gephi. This figure represents the type of display which would be generated and shown to start manual discovery of clinical workflows in Lean or Six Sigma programs.

5. Discussion

5.1 Discussion

This paper describes design of a software stack to use internal VoIP telephone log files to generate a graphical representation of enterprise medical center telephone traffic labeled with clinical cost center information. The cost center label serves as the proxy for who is making the call and the types of clinical activities which may have been discussed during the telephone call. The actual topic of the conversation is obviously not known since conversations were neither recorded nor analyzed.

The framework is designed to generate visual displays for exploratory data analysis and to facilitate the manual recall of relevant common clinical workflows by medical center staff engaged in workflow redesign. The author hypothesizes that graph display can provide information not otherwise available to teams identifying clinical workflows for redesign, for example as part of a “Six Sigma” or “Lean” process. While this framework provides potentially new information to assist in analyzing clinical activities, the mapping into actual clinical activities is entirely dependent on employee pattern recognition and insight [ 72 ]. Given the re-engineering intent of the framework, only internal VoIP calls were displayed graphically.

Summary statistics of the telephone traffic can help frame the clinical informatics questions and opportunities. The amount of telephony work by employees is likely significantly underestimated when measuring only the 23,186 hours of time per week spent on the server. To the extent that that server time reflects an actual two-way conversation rather than time spent on hold or in voice mail, employee call time totals should be doubled. If one were to make the assumption that most time on the phone is spent talking to another employee rather than leaving voicemail this data would suggest up to approximately twice this time or ∼40,000 employee hours per week were spent on the phone. However, the author was not able to parse time spent in actual conversation from the log files. Importantly, we have no measures of additional time spent searching for phone numbers or the time costs of related workflow interruptions for either party over the average of the 130,341 calls per day [ 48 , 73 ].

Short telephone calls (defined here as phone number pairs averaging calls under 60 seconds here 27 seconds on average) may represent a unique opportunity to redesign workflows since the limited call span suggests that only one substantive fact is being exchanged once one subtracts time required within the call for “overhead” such as greetings, caller identification, and maybe patient identification. The author’s clinical experience suggests many of these short calls are status requests or updates. The class of short calls with limited data payloads may be particularly amenable to separate automation or incorporation into EMR workflows.

The author and clinical colleagues are performing future research to use the framework operationally. Early analysis of the data suggests many of the nursing unit calls are related to patient requests for food or bathroom assistance when handled by patient care associates and for pain relief and issues with intravenous lines when handled by nurses. While this work looks at VoIP logs, EMR generated log files involving communication or coordination tasks such as orders or nursing activities may also be represented as hashed data structures and mapped into graphs. Other communication formats such as RTLS (real time location services) and nurse call systems may be similarly mapped into graphs.

5.2 Limitations

This is a single academic medical center study representing one VoIP server and telephone network installation. This medical center provided mobile VoIP phones to many employees so more data could be obtained from VoIP logs than in environments more reliant on pagers or personal cell phones. Communications using pagers, email or cell phones were not captured [ 7476 ]. Building and analyzing the framework’s data structures requires correct interpretation of the meaning of what is written out in each of the CDR data fields by the telecommunications server [ 56 ]. Only one million sequential calls were analyzed. Analysis of larger call volumes or analysis of call traffic by time of day may reveal different patterns of calling.

This project uses a pre-existing independent mapping of cost-center data to identify clinical units at a high level of precision. Use of this approach at other institutions would require some similar type of site-specific mapping of phone numbers to support inference of clinical activities. Such mappings might be programmed using geo-spatial localization data, LDAP files, other directories, mandated emergency call telephone location files and or manual annotation as well as the cost-center information used here. The granularity or number of clinical locations and implicitly potential clinical activities can impact workflow insights.

The network graphs become too cluttered if low volume calls are represented. Significant workflow insights may be lost when not examining this “long tail” of low volume information [ 77 ].

6. Conclusions

Clinical institutions using VoIP communications can parse log files generated by internal telephone calls to identify high-frequency telephone call patterns. Because the numerals of the phone number alone do not typically carry information, this analysis requires identification of a data source or process to allow electronical mapping of the telephone number to a specific clinical area or activity within the enterprise. Assignment of a phone number to a specific clinical area then facilitates manual inference about common clinical activities occurring in that area and possible explanations for high frequency telephone calls placed or received at that number.

By aggregating this individual call information into enterprise-wide data structures indexed by calling number, called number and calling-called number pairs, cumulative statistics can be generated. These hash-indexed data structures can also be used to compute directed graphs where nodes or vertices represent phone numbers and edges or arcs represent phone call traffic.

Analysis of one medical center’s VoIP log files suggests that medical care at large clinical enterprises involves amounts of telephone time equivalent to hundreds of FTE’s (full-time equivalent employees). A large subset of the phone calls were short, averaging 27 seconds, with the intriguing possibility that these small and possibly definable data payloads may be shifted from manual telephone calls to some form of optimization or automation, for example, by providing new tools for status requests and updates.

Graphical mapping of high-volume call patterns can offer insights into common clinical activities which are labor-intensive, highly interruptive, and have limited or no electronic signature in current clinical software. Visual analysis of telephone traffic may serve as a starting point for “6 Sigma” and “Lean” re-engineering.

Clinical Relevance Statement

Healthcare system telephone calls represented a major time cost to one large academic medical center with 130,341 phone calls per day. Clinical workflow re-engineering targets for Lean and Six Sigma efforts are difficult to identify and providing a graphical display of high-volume telephone traffic can serve as a visualization tool to assist in workflow analysis. A large subset of calling number – called number phone call pairs have an average duration of 27 seconds and the small data transfers implicit in these short calls may serve as a separate automation or process redesign target.

Questions

1). Converting each entry in a telephone call log file into which of the following data structures can best assist in cross-correlating information such as the calling and called phone numbers?

  1. an array

  2. a hash

  3. a union

  4. a linked list

Answer: (B) a hash.

Indexing log file data is needed to allow cross-correlations and insights beyond summary statistics. A hash is the data structure which performs key value pair indexing. The individual entries are naturally already in an array as one reads the file but that is not enough to build cross-correlations such as a graph network. Unions and linked lists are basic data structures which were not needed for this analysis.

2). What type of adjunct data structure should be built or used to perform telephone log file analysis?

  1. a data dictionary

  2. a time-stamping tool

  3. a directory

  4. a communications server

Answer: (C) a directory.

Phone numbers in the log file need to be mapped to some representation of the clinical enterprise via a directory. In this paper the directory maps to cost centers rather than individuals as with a classic “reverse” telephone directory where the phone number is indexed to its human (or corporate) owner. It is important to understand the metadata represented in a log file but this can be done without building a separate data dictionary. The log files provide their own time stamps so a separate time-stamping tool is not required though there will likely be code needed to analyze the temporal implications of the data. A communications server overseeing the Voice over IP communications traffic is what generates the log file and does not need to be built separately to do this analysis.

Acknowledgements

Dawn McDonald, Mark Carey, Ben Sartor, Steve Holtzapfel and Phyllis Teater of Ohio State University Wexner Medical Center’s IT group provided invaluable assistance obtaining and interpreting the CDR files used.

Clay Marsh and Philip Payne of the Ohio State University Wexner Medical Center provided multiple ideas on structuring research into enterprise communications.

Jacalyn Buck provided valuable information about high call volume clinical domains and nursing unit workflows.

Peter Greco and Jeff Forbes, formerly of Siemens Communications, provided numerous insights into VoIP telephony.

Conflict of Interest The author declares that he has no conflict of interest.

Ethical approval

“All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.”

References

  • 1.Unertl KM, Novak LL, Johnson KB, Lorenzi NM. Traversing the many paths of workflow research: developing a conceptual framework of workflow terminology through a systematic literature review. Journal of the American Medical Informatics Association: JAMIA. 2010;17(03):265–273. doi: 10.1136/jamia.2010.004333. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 2.Walsh C, Siegler EL, Cheston E, O’Donnell H, Collins S, Stein D, Vawdrey DK, Stetson PD. Provider-to-provider electronic communication in the era of meaningful use: a review of the evidence. Journal of Hospital Medicine. 2013;8(10):589–597. doi: 10.1002/jhm.2082. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 3.Westbrook JI, Ampt A, Williamson M, Nguyen K, Kearney L.Methods for measuring the impact of health information technologies on clinicians’ patterns of work and communication Studies in Health Technology and Informatics 2007129Pt 21083–1087. [PubMed] [Google Scholar]
  • 4.Hayes GR, Lee CP, Dourish P. Organizational routines, innovation, and flexibility: the application of narrative networks to dynamic workflow. International Journal of Medical Informatics. 2011;80(08):e161–e177.. doi: 10.1016/j.ijmedinf.2011.01.005. [DOI] [PubMed] [Google Scholar]
  • 5.Wu RC, Lo V, Morra D, Wong BM, Sargeant R, Locke K, Cavalcanti R, Quan SD, Rossos P, Tran K, Cheung M. The intended and unintended consequences of communication systems on general internal medicine inpatient care delivery: a prospective observational case study of five teaching hospitals. Journal of the American Medical Informatics Association: JAMIA. 2013;20 04:766–777. doi: 10.1136/amiajnl-2012-001160. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 6.Unertl KM, Weinger MB, Johnson KB, Lorenzi NM. Describing and modeling workflow and information flow in chronic disease care. Journal of the American Medical Informatics Association: JAMIA. 2009;16(06):826–836. doi: 10.1197/jamia.M3000. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 7.Lopetegui M, Yen PY, Lai A, Jeffries J, Embi P, Payne P. Time motion studies in healthcare: what are we talking about? Journal of Biomedical Informatics. 2014;49:292–299. doi: 10.1016/j.jbi.2014.02.017. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 8.Hefter Y, Madahar P, Eisen LA, Gong MN. A Time-Motion Study of ICU Workflow and the Impact of Strain. Critical Care Medicine. 2016;44(08):1482–1489. doi: 10.1097/CCM.0000000000001719. [DOI] [PubMed] [Google Scholar]
  • 9.Leafloor CW, Lochnan HA, Code C, Keely EJ, Rothwell DM, Forster AJ, Huang AR. Time-motion studies of internal medicine residents’ duty hours: a systematic review and meta-analysis. Advances in Medical Education and Practice. 2015;6:621–629. doi: 10.2147/AMEP.S90568. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 10.Zheng K, Haftel HM, Hirschl RB, O’Reilly M, Hanauer DA. Quantifying the impact of health IT implementations on clinical workflow: a new methodological perspective. Journal of the American Medical Informatics Association: JAMIA. 2010;17(04):454–461. doi: 10.1136/jamia.2010.004440. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 11.Westbrook JI, Li L, Georgiou A, Paoloni R, Cullen J. Impact of an electronic medication management system on hospital doctors’ and nurses’ work: a controlled pre-post, time and motion study. Journal of the American Medical Informatics Association: JAMIA. 2013;20(06):1150–1158. doi: 10.1136/amiajnl-2012-001414. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 12.Hripcsak G, Vawdrey DK, Fred MR, Bostwick SB. Use of electronic clinical documentation: time spent and team interactions. Journal of the American Medical Informatics Association: JAMIA. 2011;18(02):112–117. doi: 10.1136/jamia.2010.008441. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 13.Huang Z, Dong W, Ji L, Gan C, Lu X, Duan H. Discovery of clinical pathway patterns from event logs using probabilistic topic models. Journal of Biomedical Informatics. 2014;47:39–57. doi: 10.1016/j.jbi.2013.09.003. [DOI] [PubMed] [Google Scholar]
  • 14.Huang Z, Lu X, Duan H, Fan W. Summarizing clinical pathways from event logs. Journal of Biomedical Informatics. 2013;46(01):111–127. doi: 10.1016/j.jbi.2012.10.001. [DOI] [PubMed] [Google Scholar]
  • 15.Hribar MR, Read-Brown S, Reznick L, Lombardi L, Parikh M, Yackel TR, Chiang MF. Secondary Use of EHR Timestamp data: Validation and Application for Workflow Optimization. AMIA Annual Symposium proceedings/AMIA Symposium AMIA Symposium. 2015;2015:1909–1917. [PMC free article] [PubMed] [Google Scholar]
  • 16.Chassin MR. Improving the quality of health care: what‘s taking so long? Health Affairs (Project Hope) 2013;32(10):1761–1765. doi: 10.1377/hlthaff.2013.0809. [DOI] [PubMed] [Google Scholar]
  • 17.Grando MA, Peleg M, Cuggia M, Glasspool D. Patterns for collaborative work in health care teams. Artificial Intelligence in Medicine. 2011;53(03):139–160. doi: 10.1016/j.artmed.2011.08.005. [DOI] [PubMed] [Google Scholar]
  • 18.Gooch P, Roudsari A. Computerization of workflows, guidelines, and care pathways: a review of implementation challenges for process-oriented health information systems. Journal of the American Medical Informatics Association: JAMIA. 2011;18(06):738–748. doi: 10.1136/amiajnl-2010-000033. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 19.Chen Y, Lorenzi NM, Sandberg WS, Wolgast K, Malin BA.Identifying collaborative care teams through electronic medical record utilization patterns Journal of the American Medical Informatics Association: JAMIA 2016. Aug 28.https://doi.org/10.1093/jamia/ocw124 [DOI] [PMC free article] [PubMed]
  • 20.Valdez RS, Ramly E, Brennan PF.Industrial and Systems Engineering and Health Care: Critical Areas of Research--Final Report Rockville, MD: Agency for Healthcare Research and Quality; 2010. Contract No.: AHRQ Publication No. 10–0079. [Google Scholar]
  • 21.Westbrook JI, Braithwaite J, Georgiou A, Ampt A, Creswick N, Coiera E, Iedema R. Multimethod evaluation of information and communication technologies in health in the context of wicked problems and sociotechnical theory. Journal of the American Medical Informatics Association: JAMIA. 2007;14 06:746–755. doi: 10.1197/jamia.M2462. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 22.Vankipuram M, Kahol K, Cohen T, Patel VL. Visualization and analysis of activities in critical care environments. AMIA Annual Symposium proceedings/AMIA Symposium AMIA Symposium. 2009;2009:662–666. [PMC free article] [PubMed] [Google Scholar]
  • 23.Chen Y, Xie W, Gunter CA, Liebovitz D, Mehrotra S, Zhang H, Malin B. Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization. AMIA Annual Symposium proceedings/AMIA Symposium AMIA Symposium. 2015;2015:416–425. [PMC free article] [PubMed] [Google Scholar]
  • 24.Partington A, Wynn M, Suriadi S, Ouyang C, Karnon J. Process mining for clinical processes: a comparative analysis of four Australian hospitals. ACM Transactions on Management Information Systems (TMIS) 2015;5(04):19. [Google Scholar]
  • 25.Vawdrey DK, Wilcox LG, Collins S, Feiner S, Mamykina O, Stein DM, Bakken S, Fred MR, Stetson PD. Awareness of the Care Team in Electronic Health Records. Applied Clinical Informatics. 2011;2(04):395–405. doi: 10.4338/ACI-2011-05-RA-0034. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 26.Ahmed S, Manaf NH, Islam R. Effects of Lean Six Sigma application in healthcare services: a literature review. Reviews on Environmental Health. 2013;28(04):189–194. doi: 10.1515/reveh-2013-0015. [DOI] [PubMed] [Google Scholar]
  • 27.DelliFraine JL, Langabeer JR, Nembhard IM. Assessing the evidence of Six Sigma and Lean in the health care industry. Quality Management in Health Care. 2010;19(03):211–225. doi: 10.1097/QMH.0b013e3181eb140e. [DOI] [PubMed] [Google Scholar]
  • 28.Pentland A, Choudhury T, Eagle N, Singh P. Human dynamics: computation for organizations. Pattern Recogn Lett. 2005;26(04):503–511. [Google Scholar]
  • 29.Lai HM, Lin IC, Tseng LT. High-level managers’ considerations for RFID adoption in hospitals: an empirical study in Taiwan. Journal of Medical Systems. 2014;38(02):3. doi: 10.1007/s10916-013-0003-z. [DOI] [PubMed] [Google Scholar]
  • 30.Weibel N, Rick S, Emmenegger C, Ashfaq S, Calvitti A, Agha Z. LAB-IN-A-BOX: semi-automatic tracking of activity in the medical office. Pers Ubiquit Comput. 2015;19(02):317–334. [Google Scholar]
  • 31.Chen ES, Cimino JJ. Automated discovery of patient-specific clinician information needs using clinical information system log files. AMIA Annual Symposium proceedings/AMIA Symposium AMIA Symposium. 2003:145–149. [PMC free article] [PubMed] [Google Scholar]
  • 32.Bouarfa L, Dankelman J. Workflow mining and outlier detection from clinical activity logs. Journal of Biomedical Informatics. 2012;45(06):1185–1190. doi: 10.1016/j.jbi.2012.08.003. [DOI] [PubMed] [Google Scholar]
  • 33.Schnell K, Puri C, Mahler P, Dukatz C. Teaching an Old Log New Tricks with Machine Learning. Big Data. 2014;2(01):7–11. doi: 10.1089/big.2014.1518. [DOI] [PubMed] [Google Scholar]
  • 34.Wu RC, Tran K, Lo V, O’Leary KJ, Morra D, Quan SD, Perrier L. Effects of clinical communication interventions in hospitals: a systematic review of information and communication technology adoptions for improved communication between clinicians. International Journal of Medical Informatics. 2012;81(11):723–732. doi: 10.1016/j.ijmedinf.2012.05.014. [DOI] [PubMed] [Google Scholar]
  • 35.Serdarevic M, Fazzino TL, MacLean CD, Rose GL, Helzer JE. Recruiting 9126 Primary Care Patients by Telephone: Characteristics of Participants Reached on Landlines, Basic Cell Phones, and Smartphones. Population Health Management. 2016;19(03):212–215. doi: 10.1089/pop.2015.0047. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 36.Mendonca EA, Chen ES, Stetson PD, McKnight LK, Lei J, Cimino JJ.Approach to mobile information and communication for health care International Journal of Medical Informatics 200473(7–8)631–638. [DOI] [PubMed] [Google Scholar]
  • 37.Williams J. Left to their own devices how healthcare organizations are tackling the BYOD trend. Biomedical Instrumentation & Technology/Association for the Advancement of Medical Instrumentation. 2014;48(05):327–339. doi: 10.2345/0899-8205-48.5.327. [DOI] [PubMed] [Google Scholar]
  • 38.Johnson AC, El Hajj SC, Perret JN, Caffery TS, Jones GN, Musso MW. Smartphones in medicine: emerging practices in an academic medical center. Journal of Medical Systems. 2015;39(01):164. doi: 10.1007/s10916-014-0164-4. [DOI] [PubMed] [Google Scholar]
  • 39.Patel N, Siegler JE, Stromberg N, Ravitz N, Hanson CW. Perfect Storm of Inpatient Communication Needs and an Innovative Solution Utilizing Smartphones and Secured Messaging. Applied Clinical Informatics. 2016;7(03):777–789. doi: 10.4338/ACI-2015-11-RA-0151. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 40.Cronin RM, Davis SE, Shenson JA, Chen Q, Rosenbloom ST, Jackson GP. Growth of Secure Messaging Through a Patient Portal as a Form of Outpatient Interaction across Clinical Specialties. Applied Clinical Informatics. 2015;6(02):288–304. doi: 10.4338/ACI-2014-12-RA-0117. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 41.Whitlow ML, Drake E, Tullmann D, Hoke G, Barth D. Bringing technology to the bedside: using smart-phones to improve interprofessional communication. Computers, Informatics, Nursing: CIN. 2014;32(07):305–311. doi: 10.1097/CIN.0000000000000063. [DOI] [PubMed] [Google Scholar]
  • 42.Scholl J, Groth K. Of organization, device and context: Interruptions from mobile communication in highly specialized care. Interacting with Computers. 2012;24(05):358–373. [Google Scholar]
  • 43.Hopkinson SG, Jennings BM. Interruptions during nurses’ work: A state-of-the-science review. Research in Nursing & Health. 2013;36(01):38–53. doi: 10.1002/nur.21515. [DOI] [PubMed] [Google Scholar]
  • 44.Cornell P, Riordan M, Townsend-Gervis M, Mobley R. Barriers to critical thinking: workflow interruptions and task switching among nurses. The Journal of Nursing Administration. 2011;41(10):407–414. doi: 10.1097/NNA.0b013e31822edd42. [DOI] [PubMed] [Google Scholar]
  • 45.Brixey JJ, Robinson DJ, Turley JP, Zhang J. The roles of MDs and RNs as initiators and recipients of interruptions in workflow. International Journal of Medical Informatics. 2010;79(06):E109–E115.. doi: 10.1016/j.ijmedinf.2008.08.007. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 46.Patterson ES, Wears RL. Patient handoffs: standardized and reliable measurement tools remain elusive. Joint Commission Journal on Quality and Patient safety/Joint Commission Resources. 2010;36(02):52–61. doi: 10.1016/s1553-7250(10)36011-9. [DOI] [PubMed] [Google Scholar]
  • 47.Bowen M, Prater A, Safdar NM, Dehkharghani S, Fountain JA. Utilization of Workflow Process Maps to Analyze Gaps in Critical Event Notification at a Large, Urban Hospital. Journal of Digital Imaging. 2016;29(04):420–424. doi: 10.1007/s10278-015-9838-9. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 48.Weigl M, Muller A, Angerer P, Hoffmann F. Workflow interruptions and mental workload in hospital pediatricians: an observational study. BMC Health Services Research. 2014;14:433. doi: 10.1186/1472-6963-14-433. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 49.Vaisman A, Wu RC. Analysis of Smartphone Interruptions on Academic General Internal Medicine Wards. Frequent Interruptions may cause a 舘Crisis Mode‘ Work Climate. Applied Clinical Informatics. 2017;8(01):1–11. doi: 10.4338/ACI-2016-08-RA-0130. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 50.Poshywak J. Fighting infection with RTLS. Health Management Technology. 2015;36(02):16. [PubMed] [Google Scholar]
  • 51.Samal L, Stavroudis T, Miller R, Lehmann H, Lehmann C. Effect of a laboratory result pager on provider behavior in a neonatal intensive care unit. Applied clinical Informatics. 2011;2(03):384–394. doi: 10.4338/ACI-2010-09-RA-0052. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 52.Steitz BD, Weinberg ST, Danciu I, Unertl KM. Managing and Communicating Operational Workflow: Designing and Implementing an Electronic Outpatient Whiteboard. Applied Clinical Informatics. 2016;7(01):59–68. doi: 10.4338/ACI-2015-07-CR-0082. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 53.Johnson W. Voice over IP: how computing technology is being used in mobile communications. Journal of healthcare information management: JHIM. 2005;19(04):24–31. [PubMed] [Google Scholar]
  • 54.Flanagan WA. Hoboken, NJ: John Wiley and Sons; 2012. VoIP and Unified Communications. [Google Scholar]
  • 55.Werbach K.Using VoIP to compete Harvard Business Review 200583092005; 83(9):140–147., 160. [PubMed] [Google Scholar]
  • 56.Cisco Unified Communications Manager Call Detail Records Administration Guide.Release 8.6(1) ed San Jose, CA: Cisco Systems; 2011 [Google Scholar]
  • 57.Finke J, Hartmann D. Indianapolis, IN: Cisco Press; 2012. Implementing Cisco Unified Communications Manager, Part 1 (CIPT) Foundation Learning Guide. [Google Scholar]
  • 58.Christiansen T, Foy BD, Wall L.Programming Perl4th ed.Sebastopol, CA: O’Reilly; 2012. xli, 1130 p. p. [Google Scholar]
  • 59.De Meo P, Ferrara E, Fuimara G, Provetti A. On Facebook Most Ties Are Weak. Communications of the ACM. 2014;57(11):78–84. [Google Scholar]
  • 60.Jiang ZQ, Xie WJ, Li MX, Podobnik B, Zhou WX, Stanley HE. Calling patterns in human communication dynamics. Proceedings of the National Academy of Sciences of the United States of America. 2013;110(05):1600–1605. doi: 10.1073/pnas.1220433110. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 61.Onnela JP, Saramaki J, Hyvonen J, Szabo G, de Menezes MA, Kaski K, Barabasi AL, Kertesz J. Analysis of a large-scale weighted network of one-to-one human communication. New J Phys. 2007. p. 9.
  • 62.Zhang P, Serban N. Discovery, visualization and performance analysis of enterprise workflow. Computational Statistics & Data Analysis. 2007;51(05):2670–2687. [Google Scholar]
  • 63.Dong W, Lepri B, Pentland A.Modeling the co-evolution of behaviors and social relationships using mobile phone data Proceedings of the 10th International Conference on Mobile and Ubiquitous Multimedia; Beijing, China2107613: ACM2011134–143.
  • 64.Cebrian M, Pentland A, Kirkpatrick S. Disentangling Social Networks Inferred from Call Logs. Proceedings of CoRR. 2010:1–6. [Google Scholar]
  • 65.Candia J, Gonzalez MC, Wang P, Schoenharl T, Madey G, Barabasi AL.Uncovering individual and collective human dynamics from mobile phone records J Phys a-Math Theor 2008. 41(22).iopscience.iop.org/1751–8113/41/22/224015
  • 66.Barzel B, Sharma A, Barabási A-L, Dekker AJMWV.Chapter 9 –Graph Theory Properties of Cellular NetworksIn:Handbook of Systems Biology San Diego: Academic Press; 2013177–177. [Google Scholar]
  • 67.Merrill J, Hripcsak G. Using social network analysis within a department of biomedical informatics to induce a discussion of academic communities of practice. Journal of the American Medical Informatics Association: JAMIA. 2008;15(06):780–782. doi: 10.1197/jamia.M2717. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 68.Fortunato S.Community detection in graphs Physics Reports 2010486(3–5)75–174. [Google Scholar]
  • 69.Newman MEJ. Oxford: 2010. Networks –An Introduction. [Google Scholar]
  • 70.Leskovec J, Rajaraman A, Ullman JD. Palo Alto, CA: Cambridge University Press; 2015. Mining of Massive Datasets. [Google Scholar]
  • 71.Bastian M, Heymann S, Jacomy M. Gephi: An Open Source Software for Exploring and Manipulating Networks. 2009.
  • 72.Safran C, Jones PC, Rind D, Bush B, Cytryn KN, Patel VL. Electronic communication and collaboration in a health care practice. Artificial Intelligence in Medicine. 1998;12(02):137–151. doi: 10.1016/s0933-3657(97)00047-x. [DOI] [PubMed] [Google Scholar]
  • 73.Balint BJ, Steenburg SD, Lin H, Shen C, Steele JL, Gunderman RB. Do telephone call interruptions have an impact on radiology resident diagnostic accuracy? Academic Radiology. 2014;21(12):1623–1628. doi: 10.1016/j.acra.2014.08.001. [DOI] [PubMed] [Google Scholar]
  • 74.Iversen TB, Melby L, Toussaint P. Instant messaging at the hospital: supporting articulation work? International Journal of Medical Informatics. 2013;82(09):753–761. doi: 10.1016/j.ijmedinf.2013.05.004. [DOI] [PubMed] [Google Scholar]
  • 75.Richardson JE, Ash JS. The effects of hands-free communication device systems: communication changes in hospital organizations. Journal of the American Medical Informatics Association: JAMIA. 2010;17(01):91–98. doi: 10.1197/jamia.M3307. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 76.Shah DR, Galante JM, Bold RJ, Canter RJ, Martinez SR. Text messaging among residents and faculty in a university general surgery residency program: prevalence, purpose, and patient care. Journal of Surgical Education. 2013;70(06):826–834. doi: 10.1016/j.jsurg.2012.05.003. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 77.Anderson C. New York: Hyperion Books; 2006. The Long Tail: Why the future of business is selling less of more. [Google Scholar]

Articles from Applied Clinical Informatics are provided here courtesy of Thieme Medical Publishers

RESOURCES