1 / 23

Lab 2: CMC and the GE “Centricity” Case

Lab 2: CMC and the GE “Centricity” Case. Updated for Spring 2006. Part 1. Friends and enemies CMC overview HIPPA. Friends …. Secure and Reliable Timely and Accessible Reliable and Simple. And Enemies. Accessible vs. Secure Reliable/Accurate/Complete vs. Economical.

carlys
Télécharger la présentation

Lab 2: CMC and the GE “Centricity” Case

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lab 2: CMC and the GE “Centricity” Case Updated for Spring 2006

  2. Part 1 • Friends and enemies • CMC overview • HIPPA

  3. Friends …. • Secure and Reliable • Timely and Accessible • Reliable and Simple

  4. And Enemies • Accessible vs. Secure • Reliable/Accurate/Complete vs. Economical

  5. CMC Computer-Mediated Communication • Voice-mail or E-mail – one way (asynchronous) • IM / chat rooms – two way (synchronous) • Videophone • Interactive internet games

  6. What happens to our communications when we use CMC? • Loss of Cues = cause misunderstandings • Facial expressions • Tone of voice • Hand gestures • Pauses • Laughs • Make up for it by emoticons or careful writing! (sarcasm)

  7. What else happens? • Writing becomes more informal • Lower case, no punctuation, abbreviations: • POS G2G TTFN • Is this due to information overload? • We become more “self-absorbed” • More interested in our own problems than other • Hate speech, rantings or angry • Web logs do this a lot…

  8. Caveats: careful! • Never reply in anger – wait until the next day. • Can send something stupid or personal to many people at once – watch reply to group. • E-mail can be saved easily and used against you. • E-mail is powerful and gives access to powerful people – flattens organization. Use it wisely!

  9. ? Question ? • Do employers have a right to read or control your e-mail? • Court rulings say: yes, mostly: • Company time and resources • Privacy as basic human right. Don’t work there!

  10. Group Decision SupportSystems (GDSS) A DSS that meets the needs for a group decision. Provides support in group decision-making settings. A GDSS allows you to communicate with group members that are in the same building or half-way across the world.

  11. Characteristics of a GDSS • Easy to use • Decision-making Support • Support Brainstorming • Encourage Group Consensus (voting, gap analysis) • Allow Anonymous input • Reduce negative group behavior

  12. HIPPA • Health Insurance Portability and Privacy Act • Students read hippa overview: • Google: hippa overview via http://www.viahealthplan.com/providers/administration/tools_for_your_office/resources/HIPPA_overview.php#2 • Discuss Simplification, Privacy, Security • Relates to info Attributes!

  13. HIPPA: Simplification • “Administrative Simplification is one of the newly published regulations which requires standardization of electronic transmissions and procedure/diagnosis codes.” • See web page for examples…

  14. HIPPA: Privacy and Personal Health Information (PHI) • “Provisions for individual rights to receive a notice from the covered entity regarding how their PHI will be used; rights to access, inspect and copy their PHI; rights to receive an accounting of the release of their PHI for purposes other than for the use of treatment, payment, operations or other uses. “

  15. HIPPA: Security • Administrative Procedures • Improved procedures/policies for records handling • Backups • Physical Safeguards • Computer room access, protect from fire and water • Technical Security Services and Mechanisms • Logins, passwords, audit trail • Data encryption, firewalls, etc.

  16. Part 2: Chat room. 15 minutes • Discuss Major Societal Trends surrounding the case. • Instructor: turn on recording • Students: COMMUNICATIONS | COLLABORATION | JOIN • Select “Major trends” chat session

  17. Part 3: Discussion Forum: 15 minutes • Use meaningful thread names • Instructor: assign students to groups and start recording. • Students: COMMUNICATIONS | DISCUSSION BOARD | • Select discussion forum “Major Goals”

  18. Part 3 continued: ROI10 minutes. • Instructor: open ROI chart file and discuss. • What were the top 4 savings areas? • Intangibles are important • Can be difficult to measure • E.g., staff morale -> less turnover • Payback time of Centricity system itself? • Note connection to GOALS !

  19. Return On InvestmentANSWERS • What were the top 4 savings areas? • Paper storage costs • Personnel • Legal costs • Better utilization – process more patients • Payback time of Centricity system itself? • 1.5 years. Definitely worth doing.

  20. Part 4: I/P/O/F/S Analysis • For Centricity, identify: • Inputs (patient history, tests, etc.) • Processing (calculations, searching, etc.) • Outputs (screens, e-mail, reports, charts, etc) • Feedback (How is system performing?) • Stakeholders • Individuals or organizations that have an interest in the operation or outcome of the system.

  21. IPOFS chart: 20 minutes. • Use work from pre-lab • Instructor: assign students to groups and start recording. • COMMUNICATION | GROUP PAGES • GROUP # | COLLABORATION | VIRTUAL CLASSROOM • Hold CTL key and JOIN

  22. Part 515 minutes • Face to face: Three most important information attributes for this case? • Contrast and compare CMC techniques: • Face to face • Chat • Discussion forum • Virtual whiteboard

  23. Part 6 • Online quiz • Hand in IPOF chart and pre-lab

More Related