66,952 research outputs found

    Information Discovery on Electronic Health Records Using Authority Flow Techniques

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>As the use of electronic health records (EHRs) becomes more widespread, so does the need to search and provide effective information discovery within them. Querying by keyword has emerged as one of the most effective paradigms for searching. Most work in this area is based on traditional Information Retrieval (IR) techniques, where each document is compared individually against the query. We compare the effectiveness of two fundamentally different techniques for keyword search of EHRs.</p> <p>Methods</p> <p>We built two ranking systems. The traditional BM25 system exploits the EHRs' content without regard to association among entities within. The Clinical ObjectRank (CO) system exploits the entities' associations in EHRs using an authority-flow algorithm to discover the most relevant entities. BM25 and CO were deployed on an EHR dataset of the cardiovascular division of Miami Children's Hospital. Using sequences of keywords as queries, sensitivity and specificity were measured by two physicians for a set of 11 queries related to congenital cardiac disease.</p> <p>Results</p> <p>Our pilot evaluation showed that CO outperforms BM25 in terms of sensitivity (65% vs. 38%) by 71% on average, while maintaining the specificity (64% vs. 61%). The evaluation was done by two physicians.</p> <p>Conclusions</p> <p>Authority-flow techniques can greatly improve the detection of relevant information in EHRs and hence deserve further study.</p

    Security and confidentiality approach for the Clinical E-Science Framework (CLEF)

    Get PDF
    CLEF is an MRC sponsored project in the E-Science programme that aims to establish policies and infrastructure for the next generation of integrated clinical and bioscience research. One of the major goals of the project is to provide a pseudonymised repository of histories of cancer patients that can be accessed by researchers. Robust mechanisms and policies are needed to ensure that patient privacy and confidentiality are preserved while delivering a repository of such medically rich information for the purposes of scientific research. This paper summarises the overall approach adopted by CLEF to meet data protection requirements, including the data flows and pseudonymisation mechanisms that are currently being developed. Intended constraints and monitoring policies that will apply to research interrogation of the repository are also outlined. Once evaluated, it is hoped that the CLEF approach can serve as a model for other distributed electronic health record repositories to be accessed for research

    The promotion of data sharing in pharmacoepidemiology

    Get PDF
    This article addresses the role of pharmacoepidemiology in patient safety and the crucial role of data sharing in ensuring that such activities occur. Against the backdrop of proposed reforms of European data protection legislation, it considers whether the current legislative landscape adequately facilitates this essential data sharing. It is argued that rather than maximising and promoting the benefits of such activities by facilitating data sharing, current and proposed legislative landscapes hamper these vital activities. The article posits that current and proposed data protection approaches to pharmacoepidemiology — and more broadly, re-uses of data — should be reoriented towards enabling these important safety enhancing activities. Two potential solutions are offered: 1) a dedicated working party on data reuse for health research and 2) the introduction of new, dedicated legislation

    Behind Enemy Phone Lines: Insider Trading, Parallel Enforcement, and Sharing the Fruits of Wiretaps

    Get PDF
    Two key trends were present in the successful prosecution of Raj Rajaratnam and his coconspirators in one of the largest insider-trading conspiracies in history: the use of wiretaps to investigate and prosecute insider trading and a joint effort between the Department of Justice (DOJ) and the Securities & Exchange Commission (SEC) to conduct the investigation. Despite the close working relationship between the DOJ and the SEC, the DOJ never disclosed the fruits of the wiretaps to the SEC, presumably due to its belief that Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (as amended, the “Wiretap Act”)—the comprehensive framework that authorizes the government to conduct wiretaps in certain circumstances—prohibited it from doing so. Though the Second Circuit in SEC v. Rajaratnam ultimately held that the SEC could obtain wiretap materials from the criminal defendants as part of civil discovery, the question of whether direct disclosure of the wiretap materials from the DOJ to the SEC is prohibited has been raised but not yet addressed. This Note analyzes previous cases addressing the construction of the Wiretap Act’s disclosure provisions and concludes that direct disclosure from the DOJ to the SEC is not prohibited by the Act. It further proposes a process by which civil enforcement agencies, such as the SEC, can request disclosure of wiretap materials through the DOJ in such a way that balances the benefits of disclosure against the privacy interests of the parties whose conversations were intercepted

    Guidelines and Standard Operating Procedures for IDDE and Pollution Prevention/Good Housekeeping

    Get PDF
    In April 2003, the United States Environmental Protection Agency (USEPA) issued a National Pollutant Discharge Elimination System (NPDES) General Permit for Stormwater Discharges from Small Municipal Separate Storm Sewer Systems (MS4s). A total of 45 New Hampshire communities (six fully regulated and 39 partially regulated) became subject to Stormwater Phase II regulations based on their designation as Urbanized Areas according to the 2000 US Census
    • …
    corecore