The Computer-Based Patient Record

The Computer-Based Patient Record PDF

Author: Committee on Improving the Patient Record

Publisher: National Academies Press

Published: 1997-10-28

Total Pages: 257

ISBN-13: 030957885X

DOWNLOAD EBOOK →

Most industries have plunged into data automation, but health care organizations have lagged in moving patients' medical records from paper to computers. In its first edition, this book presented a blueprint for introducing the computer-based patient record (CPR). The revised edition adds new information to the original book. One section describes recent developments, including the creation of a computer-based patient record institute. An international chapter highlights what is new in this still-emerging technology. An expert committee explores the potential of machine-readable CPRs to improve diagnostic and care decisions, provide a database for policymaking, and much more, addressing these key questions: Who uses patient records? What technology is available and what further research is necessary to meet users' needs? What should government, medical organizations, and others do to make the transition to CPRs? The volume also explores such issues as privacy and confidentiality, costs, the need for training, legal barriers to CPRs, and other key topics.

Information Systems for Business and Beyond

Information Systems for Business and Beyond PDF

Author: David T. Bourgeois

Publisher:

Published: 2014

Total Pages: 167

ISBN-13:

DOWNLOAD EBOOK →

"Information Systems for Business and Beyond introduces the concept of information systems, their use in business, and the larger impact they are having on our world."--BC Campus website.

Computers at Risk

Computers at Risk PDF

Author: National Research Council

Publisher: National Academies Press

Published: 1990-02-01

Total Pages: 320

ISBN-13: 0309043883

DOWNLOAD EBOOK →

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.