164 research outputs found

    Automated de-identification of free-text medical records

    Get PDF
    Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006.Includes bibliographical references (p. 62-64).This paper presents a de-identification study at the Harvard-MIT Division of Health Science and Technology (HST) to automatically de-identify confidential patient information from text medical records used in intensive care units (ICUs). Patient records are a vital resource in medical research. Before such records can be made available for research studies, protected health information (PHI) must be thoroughly scrubbed according to HIPAA specifications to preserve patient confidentiality. Manual de-identification on large databases tends to be prohibitively expensive, time-consuming and prone to error, making a computerized algorithm an urgent need for large-scale de-identification purposes. We have developed an automated pattern-matching deidentification algorithm that uses medical and hospital-specific information. The current version of the algorithm has an overall sensitivity of around 0.87 and an approximate positive predictive value of 0.63. In terms of sensitivity, it performs significantly better than 1 person (0.81) but not quite as well as a consensus of 2 human de-identifiers (0.94). The algorithm will be published as open-source software, and the de-identified medical records will be incorporated into HST's Multi-Parameter Intelligent Monitoring for Intensive Care (MIMIC II) physiologic database.by Ishna Neamatullah.M.Eng

    Identifying Operations Research Systems Analysts\u27 Technical Competencies: A Delphi Approach

    Get PDF
    After the attacks of September 11, 2011, the demands for more agile, adaptive, critical-thinking, and multi-talented U.S. Army Operations Research Systems Analysts (FA49s) have only increased. Tomorrow\u27s joint operating environment demands U.S. Army FA49s to be ingenious, proactive, and multi-talented; proficient in their core competencies as military leaders as well as being proficient in their technical competencies as problem solvers in the operations research field. The purpose of this study was to identify the technical competencies and knowledge, skills, and abilities (KSAs) required for future U.S. Army FA49s to perform their duties within the joint operating environment of the next twenty-five years. To identify these technical competencies and KSAs, this study employed a qualitative research design with a quantitative component using a conventional, web-assisted Delphi methodology. The Delphi study engaged 10 experts through a first round of data gathering through a web-based questionnaire. First round data was synthesized and sent to the experts, seeking consensus, during a subsequent second round. Expert consensus was achieved on the second round, precluding the need for subsequent rounds to reach consensus. The study resulted in the experts\u27 identification and consensus on 5 technical competencies, 21 areas of knowledge, 41 skills, and 22 abilities that are required for future U.S. Army FA49s to perform their duties within the joint operating environment of the next twenty-five years. This research made four significant contributions to the engineering management discipline. First, it has added to the existing body of knowledge in engineering management theory and methodology by presenting and substantiating that a Delphi process is capable of identifying future and/or forecasting requirements. Second, it contributed to the literature by providing a basis for the expansion of the domain of competencies and KSAs for operations research. Third, this research contributed to the identification of competencies and KSAs that are germane to the practical development of military FA49 educational curricula and may be germane to the practical development of engineering management curricula. Fourth, this research has suggested directions for future research to enhance understanding of the competencies, knowledge, skills, and abilities for the operations research field

    The Proceedings of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia

    Get PDF
    Conference Foreword The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fifteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The papers cover topics from vulnerabilities in “Internet of Things” protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses. The conference has drawn interest and papers from within Australia and internationally. All submitted papers were subject to a double blind peer review process. Twenty two papers were submitted from Australia and overseas, of which eighteen were accepted for final presentation and publication. We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event. We would also like to thank the conference committee who have organised yet another successful congress. Events such as this are impossible without the tireless efforts of such people in reviewing and editing the conference papers, and assisting with the planning, organisation and execution of the conference. To our sponsors, also a vote of thanks for both the financial and moral support provided to the conference. Finally, thank you to the administrative and technical staff, and students of the ECU Security Research Institute for their contributions to the running of the conference

    44th Annual Judge Robert H. Staton Indiana Law Update

    Get PDF
    Meeting proceedings of a seminar by the same name, held September 13-14, 2022

    Information Security Governance Simplified

    Get PDF
    Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn’t when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations

    31st Annual Midwest/Midsouth Estate Planning Institute

    Get PDF
    Materials from the 31st Annual Midwest/Midsouth Estate Planning Institute held by UK/CLE in July 2004

    What Inez Knows: A Qualitative, Longitudinal Case Study of One Woman\u27s Journey Through the Maze of Living with Hiv and a Serious Mental Illness

    Get PDF
    WHAT INEZ KNOWS: A QUALITATIVE, LONGITUDINAL CASE STUDY OF ONE WOMAN\u27S JOURNEY THROUGH THE MAZE OF LIVING WITH HIV AND A SERIOUS MENTAL ILLNESS by Linda Austin The University of Wisconsin-Milwaukee, 2014 Under the Supervision of Professor Patricia E. Stevens Although more than thirty years have passed since AIDS was first diagnosed in the U. S., the HIV/AIDS epidemic continues and the prevalence and incidence statistics remain alarming. Twenty-five percent of the people living with HIV in the United States are women, but only half of these women are in care and even fewer women (42%) have viral suppression. Women of color continue to carry a disproportional disease burden with African American women comprising 64% of newly reported HIV cases in women in 2010. HIV prevalence among adults with a serious mental illness range from 3-23% compared to the general population prevalence (.4-.6%). Based on these facts, there is continuing need to explore the dual experience of HIV infection and serious mental illness in women. Research that focuses on the women and seeks to understand the particulars of their lives may offer greater insight into how the health care community can improve their outcomes. Inez (pseudonym) is an African American woman dually diagnosed with HIV infection and a severe and persistent mental illness. She was one of 55 participants in the qualitative study, In-Depth Longitudinal Study of HIV-Infected Women (National Institutes of Health, Grant #R01NR004840, Principal Investigator, Patricia E. Stevens, PhD, RN, FAAN). In this secondary analysis, her narrative data were segregated from the original study, analyzed, and used to develop an in-depth, longitudinal case study. The purpose of this study was to uncover Inez\u27s perceptions of what it means to live with HIV and a serious mental illness. Through this single case study replete with experiential detail from two years of interviews, we are given an extraordinary view into how one individual lives with HIV and a serious mental illness, what she needs from the health care community to successfully manage her illnesses, and how mutually respectful relationships built over time are key to overcoming internalized and enacted stigma. Inez\u27s story confirms the importance of therapeutic, respectful communication, and stability of care provided in an environment of cultural safety where the perspectives of health care consumers are prioritized. In addition to these practice implications, this research-based case study could be used in problem-based classroom learning environments to inspire students to consider ways to improve the experiences of women who are similar to Inez

    Wi-Fi Enabled Healthcare

    Get PDF
    Focusing on its recent proliferation in hospital systems, Wi-Fi Enabled Healthcare explains how Wi-Fi is transforming clinical work flows and infusing new life into the types of mobile devices being implemented in hospitals. Drawing on first-hand experiences from one of the largest healthcare systems in the United States, it covers the key areas associated with wireless network design, security, and support. Reporting on cutting-edge developments and emerging standards in Wi-Fi technologies, the book explores security implications for each device type. It covers real-time location services and emerging trends in cloud-based wireless architecture. It also outlines several options and design consideration for employee wireless coverage, voice over wireless (including smart phones), mobile medical devices, and wireless guest services. This book presents authoritative insight into the challenges that exist in adding Wi-Fi within a healthcare setting. It explores several solutions in each space along with design considerations and pros and cons. It also supplies an in-depth look at voice over wireless, mobile medical devices, and wireless guest services. The authors provide readers with the technical knowhow required to ensure their systems provide the reliable, end-to-end communications necessary to surmount today’s challenges and capitalize on new opportunities. The shared experience and lessons learned provide essential guidance for large and small healthcare organizations in the United States and around the world. This book is an ideal reference for network design engineers and high-level hospital executives that are thinking about adding or improving upon Wi-Fi in their hospitals or hospital systems

    Egg recipient parents\u27 evaluations of parent-to-offspring disclosure scripts

    Get PDF
    This study focuses on parent-to-offspring (PTO) disclosure, the dialogue from parent to child about the child\u27s genetic makeup, with the intention of contributing to the creation of resources for egg recipient parents struggling with PTO disclosure decisions. A comprehensive literature review synthesized the literature on the disclosure decision, identifying key controversial issues. The principal investigator then created nine disclosure scripts based on the qualitative research of Mac Dougall, Becker, Scheib, and Nachtigall (2007) as well as a book written by a psychologist working in the field of third party reproduction. Egg recipient parents were invited to evaluate the scripts and provide additional information about the PTO decision process through an online survey. Fifty-two completed surveys were analyzed, a 4% response rate. Participants were predominantly mothers, married or partnered, American, Caucasian, heterosexual, highly-educated, and with children under five years old. Findings provide evidence for the need of script resources and the benefit of professional consultation to reach a disclosure decision. Further analyses were conducted after classifying participants into three categories: Disclosers (59.1%), Non-disclosers (18.4%), and Undecided (22.5%). The Disclosers rated two scripts significantly higher than the others, suggesting the usefulness of Helper and Come and Talk approaches with very young children. The discussion addresses limitations of the study, recommendations for professionals, and directions for future research. The review of the literature and this study\u27s findings demonstrate the need for increased efforts towards identifying and disseminating helpful PTO resources to gamete recipient parents

    CPA\u27s guide to medical, dental and other healthcare practices;

    Get PDF
    CD-ROM files converted to PDF and included after main texthttps://egrove.olemiss.edu/aicpa_guides/1128/thumbnail.jp
    • …
    corecore