Dr. Techo Junky

by Omar N.

Taken from WReporter.com

The article titled “Healthcare 2.0” discusses how Web 2.0 has been integrated into our healthcare system. One example is where medical videos are shared by physicians on websites like askdrwiki.com. Blogs are also used by healthcare professionals in education by sharing some real life cases. This sounds like it would be breaking some privacy act, but the article mentions that it is allowed as long as names and medical record numbers of the patients are never revealed. RSS feeds are another thing that is mentioned has increased healthcare productivity. It alerts busy doctors when a new article is published to keep them updated on research in their field. On the development side, AJAX has also been used in training and educating by reducing access times for x-rays and other images that require immediate responses. The article also uses the term “bashups” as a way to describe the combination of business intelligence and mashups in the healthcare field. For instance, insurance companies can track claims. Google maps, among other application sources, has been a useful tool in tracking the patterns in the spread of diseases.

I’m glad that information technology is usage is on the rise in the healthcare field. It makes me hopeful that my skills will be in demand when I graduate, especially since I’m always reading that healthcare cost and services will continue to increase in the near future.

One concern I have with the integration of technology into the healthcare system is security. Nothing is 100% secure and it isn’t any different with healthcare. Confidential patient data will eventually be compromised. I mean, if Sony can’t keep their information hack proof, I don’t think Kaiser Permanente will stand much of a chance either.

Reference:
Subramoniam, S., & Sadi, S. (2010). Healthcare 2.0. IT Professional Magazine, 12(6), 46-46-51. doi:10.1109/MITP.2010.66

3 thoughts on “Dr. Techo Junky”

  1. Funny last line. I agree with you that it’s great that medical companies are trying to integrate technology for their use, but it could lead to other problems in the future. Hopefully we will be the ones to resolve the issues.

  2. The original post mentioned doctors sharing medical information with other doctors via Web 2.0 technology. Doctors sharing medical research information or real case situation with other doctors without revealing the patients’ info. As long as patients’ info is withheld, I don’t see a privacy violation. If it’s just a collection of blog posts or medical related videos and if database is hacked, there are probably only users’ registration info. Not as catastrophic as losing patients’ confidential info as mentioned in the Sony vs. Kaiser comment. I assume Omar is referring to the fact that Kaiser has upgraded to digital medical records from bulky paper records (Kaiser’s total care approach). While it does make patients’ and care givers’ lives easier by transitioning to digital medical records, Kaiser is opening itself to possible cyber attacks.

    I do agree think it’s great that technology is helping make lives easier, and I believe benefits outweigh the risks.

  3. There is definitely a fine line between enhancing our ability to view records and schedule appointments etc… and security. I work for a medical billing company and we process about 1.9 million visits to the ER a year which is a significant amount of personal information. There is an government agency HIPPA which regulates the way we transfer information (patient) to and from locations. That particular agency has been working diligently to get up to speed with this exact situation. It is not only healthcare but businesses that struggle with these matters as well. The web is far too unknown to a lot of people to in positions of power and “rule/law” making for them to adequately regulate it. Also, I agree completely with you in that hacking will never go away and defending against hacking is a serious challenge for any company trying to conduct business over the web. There are some things that are over looked and cannot be secured because they server a vital role in that company’s business.

    great article and write up.

Comments are closed.