Contemporary Issues and Challenges Facing Consumer Health Informatics
Both consumers and patients are aware of the benefits that can be realized by health IT. The ultimate goals that are expected to be achieved using advanced health informatics methods and tools are an increase in effectiveness and quality of care (while also reducing costs as an added benefit). Even though the introduction of health IT into healthcare is largely envisioned to procure a net positive result, the negatives that also come along with it must also be taken into consideration. One of the main concerns that health IT introduces revolves around what generally occurs with collected patient data. From how it is stored to with whom it is shared, the areas of data privacy, security, integrity, and trust are often cited by studies showing to be key concerns amongst patients. As a now decade old California Health Foundation (CHF) study found, roughly 68 percent of respondents indicated that the security of their data was a concern (California Health Foundation 2010). With the advancement of technology and the wider reach of information and news about security breaches, it is safe to assume that this same figure will only continue to grow. In fact, a 2018 survey concluded that 83 percent of internet users polled in the United States indicated being “increasingly concerned about their online privacy”. The total worldwide percentage of the same category reflected a 74 percent as being concerned (internet users from the nations that were polled) (Statista, 2018). So, it seems that both consumer and patient perspectives regarding health IT (and IT in general) is that they welcome the added benefits and the advancements that will result, however there is an underlying concern about how these will be realized – especially if their data is somehow looped into these endeavors.
The same mindset would translate over to the patient’s families or caregivers. Those that are in some way related or connected to a patient should be concerned with the type of information that is collected about the patient. For example, if a patient is cared for by a caregiver, and that person’s private information is also tied to the patient, then any unauthorized disclosures of the patient’s information could also end up disclosing the lateral information belonging to the caregiver. The same could be said about a family, such as the home and billing addresses of a patient. In combination with other information, some serious cases of fraud could follow with this type of unauthorized information disclosure.
Overall, all consumers and patients, including those adjacent to patient’s (such as families or caregivers) should rightfully be concerned with how their data is collected, stored, and used. Given that they are direct (and sometimes indirect) stakeholders regarding their own data, user requirements solicitation should be conducted from these same data producing individuals. Unfortunately, instances of hacking and unauthorized data disclosures will continue to continue occur. After all, technology for all its greatness, is also flawed. No one single security control, safeguard or method applied to technology is foolproof. There is always a vulnerability that can be exploited. So, given this critical flaw, it is only a matter of time until the next breach occurs. So, this in combination with humans being rather leery of technology already, only heightens the larger problem of trust. The broader and more public these disclosures or breaches are, the less confident and trusting the general public will be in the technology that interacts with their personal data. One effective means of gaining patient trust, is the idea of patient Data Segmentation. As Braunstein describes it, Data Segmentation is the “specification by the owner of the data as to what data can be shared and who can see that data” (2014, p. 84). This technique gives patients concerned about their data some piece of mind due to it granting the data management reigns over to the owner, in this case the patient. This allows them to decide what exactly occurs with their data once they have decided to hand it over to a healthcare system. Of course, there are different forms of Data Segmentation, and these will vary from setting to setting, but the idea of self-management of data is generally the same. So, this technique could be argued to be a form of user requirements solicitation, or at the very least a decently good method of gaining their trust and a form of user involvement to keep them engaged in applicable informatics tools and methods.
Knowledge and decision-making regarding healthcare can be largely improved through the adaption of technology and thorough and widespread use of data. One such instance discussed in a previous blog post is the use of heath information exchanges (HIE) and their increasing adoption and use throughout the United States. This technology has opened the door for clinical knowledge obtained in one part of the country to be shared with another provider located across the country. The data shared through this network has also begun to be leveraged for advancing clinical decisions. For example, data exchanged through HIEs can be used for research purposes which in turn yield advancements in medicine. The same could be said about other consumer and patient facing technologies, data, and information. One area in particular is the area of self-service healthcare technologies and information. Within this area exists easily accessible web resources, such as health web sites, research paper repositories and databases, self-diagnosis tools, etc. As technology and its reach advances and grows, so does this plentiful area of self-service resources – resources that are rich in credible information that are literally at the fingertips of millions of regular users, patients, and their families. These resources can serve to better equip the general public about healthcare and their own health. In essence, drastically increasing their health literacy in topics ranging from general health concerns (such as healthy exercise routines) to specialized matters about their chronic health condition(s). These sources are jam-packed with information that can easily be accessed and leveraged by regular consumers. The benefit of this would be the increased autonomy that these consumers of information and users of informatics tools would gain. That being an increase in their abilities to be better equipped to deal with health concerns, make informed decisions about their health, and ask the right questions the next time they visit their doctor(s).
One contemporary issue that has not been addressed in this post (to some extent) as it relates to health IT and IT Security and Operations topics, is that of ensuring quality and access to both health information and care. Both focus areas of this blog (IT Security and IT Operations), when properly implemented and managed, can help facilitate these two areas of concern. Already previously touched upon in a prior post, both IT areas have the capabilities, knowledge, tools, and methodologies to enable the proper access of both health and healthcare knowledge, whether that is from a security perspective (as in providing the correct parties with proper access to data or the technology/tools needed to do their jobs) or building and maintaining the IT infrastructure necessary for different parties to interact with healthcare systems. One example being patient-facing web portals where they can access their personal health records (PHR). Without the proper access, an administrator of the portal would not be able to add new patient entries into the system. Without the proper IT Operations team supporting said system, if say, the system was suddenly down, then providers would be forced to fallback to paper operations until something was done to bring the system back “online”. This is where we see some overlap with the idea of quality, as well. Both areas, that of quality and access, overlap quite a bit, from an IT perspective. Without proper access and the infrastructure to support it, quality of either the systems, any data or information residing in those systems, or even the product (in this case healthcare) would see a drastic decline. Alternatively, without quality infrastructure, methods, tools, and resources to support said areas, there could be major setbacks in operations that would cut access to systems, information, and even care.
Finally, when practitioners are tasked with recommending web resources and technologies (whether new or current), they need to keep in mind the previously mentioned lack of trust in technology and security related issues that plague technology (vulnerabilities). This is an area where practitioners would benefit from being well-versed in IT Security. Besides methodologies such as Data Segmentation, a well-versed practitioners would be able to assure or even explain to patients how their health-related data is used and secured. This can be achieved by perhaps citing the security controls in place at the healthcare setting and those applied to the systems handling patient data, without getting too technical of course. Providing this type of information and clarity would (hopefully) appear genuine, thorough, and trustworthy to a general consumer or patient. The same line of logic can be and should be applied when recommending web resources and technologies to the patient. Not a particularly big proponent of scarring people about cybersecurity concerns (because this can have negative effects) but highlighting the dangers of not practicing safe online behavior is sometimes necessary. Furthermore, this would include how to properly access and discern which are reputable resources on the web. This is something that is absolutely key. Not only will this keep patients safe online, but it will provide reliable and credible information for the patients to digest. Again, the same can be said about technology. Educating patients about the real dangers of vulnerabilities, and how no single piece of technology is 100 percent adverse to exploits is essential. However, with many things in life, there are risks and benefits. The use of technology produces benefits, but also come at a risk. A risk of potential data disclosures, for example. That is why a practitioner would stand to benefit from knowing how to reassure their patients that they recognize the risks of collecting and using their health data, but that they are keeping up with industry standards and employing the best tools and methodologies available to keep their information as private as they desire.
Current Technologies used by IT Security and IT Operations to Support Health Consumers
There are vast numbers of technologies that both areas of IT Security and IT Operations use to support general healthcare consumers. If all the different kinds of supportive tools or even the type of technologies were to be listed out and explained in this blog, then this final post would quickly turn into a novel. To generalize, these technologies tend to operate behind the scenes and, as is commonplace of IT technologies, they support and advance whatever the line of business or task-at-hand is. To simplify things in this post, two technologies that are commonly used for support activities in both areas of IT Security and IT Operations will be highlighted. These two types of technologies are normally known to be supportive tools for their respective areas (and in turn provide support to patients or their care providers). They are Directory Services and Technical Management Support software. Both of these technologies are used and leveraged by both IT areas. In fact, during my time working in both IT Security and IT Operations in the financial industry, I made heavy use of both types of technologies concurrently while working in both areas. The Directory Services tool I am most familiar with is Active Directory (AD). AD is a directory service created by Microsoft for Windows environments, specifically domain networks. Per Paessler, it is a “distributed, hierarchical database structure that shares infrastructure information for locating, securing, managing, and organizing computer and network resources” (Paessler.com). This includes individual users and user groups, devices connecting to a network, and even files. It allows for the authentication and authorization of all these potential entity groups within a secured network environment. So, without getting any more technical, this is a service that has an interface where members of either IT Security or IT Operations can conduct some daily operations. IT Security could be tasked with defining user groups, such as admins or nurse practitioners. Then, within AD capabilities, they could assign prefabricated permissions, or in other words what they have access to within the network. This could be certain servers, file directories, etc. This same technology is what enables the addition of new users (employees such as nurses or providers) to the environment and allow for seamless access to network resources. On the other end of things, IT Operations could be tasked with building the file directories mentioned previously, and upload the name and details onto AD. From there other IT teams could engineer the finishing touches and start to grant permissions.
The second technology type is Technical Management Support software. One in particular that I am familiar with is named ServiceNow. ServiceNow is a software as a service (SaaS) platform for Technical Management Support solutions. The whole platform can range from one service (or type of module) to a package containing several or all. The best non-technical way of describing ServiceNow is as an all-things IT support and management hub. At its core, it is a rather robust platform that is also compatible with various other applications, plugins, and third-party tool offerings. The core ServiceNow services are IT services management (ITSM), IT operations management (ITOM), and IT business management (ITBM). All three specializations allow users to manage projects, teams, and even external customer communications. As a matter of fact, DePaul University’s IT department (as of the time of publishing this blog) leverages this same platform for general IT use. Once on the platform, common actions such as getting IT assistance, requesting service offerings or technology, and accessing published training or knowledge materials are all possible for students and staff. The same offerings existed at my previous financial services employer. They also leveraged the ServiceNow platform for general IT use. So, this only further illustrates that it is a widely adopted, universal and customizable platform for general IT use. Additionally, personally having a deeper insight into IT Security and IT Operations processes and tasks, more complex and involved endeavors were tackled using the platform. One in particular was proper Asset Inventory Management. Asset inventory management involves the use of tools and processes to keep accurate and updated records of all hardware and software within an organization. This aspect of IT is essential. Without proper inventories of objects such as personal computers or intangibles such as the software installed on said PCs, then an organization can quickly lose sight of what they manage. This in turn can lead to negative outcomes such as monetary losses, back doors for breaches to occur, or duplicate efforts or expenditures of valuable resources (human hours), to name just a few. ServiceNow makes the management of organizational assets much simpler. Acting as a “source of truth”, ServiceNow can be the IT repository of all assets within an organization. The platform has the capabilities to act as a master database that houses the names of hardware or software, their attributes, such as who is the technical owner, and other important and relevant information such as the next scheduled date for installing updates or security patches (i.e., in the case of a PC). It is also a cloud platform with modern communication technologies, such as the use of APIs to gather information from assets or third parties and their respective plugins or software. So, given the wide array of use cases for Technical Management Support platforms such as ServiceNow, the healthcare industry could also stand to benefit from said software. The same use cases highlighted previously can be applied to healthcare settings requiring health IT. Whenever health IT is deployed, proper Asset Inventory Management must accompany it. For example, if all nurses received tablets for daily use, then those same tablets would need to be asset tagged and recorded for proper maintenance and tracking. Additionally, these platforms could also serve as the portal for healthcare employees to communicate with IT personnel. Requesting technical support regarding health IT, searching for “how-to” knowledge articles, or placing a formal request for a new technology to be acquired and implemented could all be accomplished in this one central location. Because a tool such as ServiceNow would ideally make the daily activities of providers interfacing with health IT less cumbersome, any time saved could be allotted towards patients. Putting in a support request would no longer require a provider to take the time to track IT support, for example. Instead, a support ticket could be created, and IT support would facilitate the fix without having to steal any additional time away from the provider. This is time that could be spent providing better and focused patient care.
One particular set of technologies that are not yet widely used by either IT Security or IT Operations is the merging of novel concepts and technologies pertaining to Big Data and Data Modeling and Simulation with current IT solutions in their respective areas. At this moment in time these two newer IT topics are being heavily explored mostly by the “big tech” companies, such as Google, Facebook IBM, etc. The infant nature of these concepts and technologies, has been the primary barrier to adoption, especially in smaller or less technologically advanced settings. This is because of the substantial initial investment for a pilot program to be researched, planned, and implemented for either of these topics. So, it is understandable and somewhat expected that many smaller settings without the latest and greatest IT solutions will not be jumping at the first instance of potentially adopting such technologies or methods. Surely a clinical setting would recognize the benefits from leveraging all their collected data by using novel data mining techniques and even putting said data through developed simulations, but the previously mentioned barriers to entry would still be expected to prevent them from being early adopters, at least at the smaller healthcare settings. This is not to say that smaller clinical settings would be completely left out of any advancements or knowledge gained from the use of Big Data techniques or advanced statistical modeling, because ideally even smaller settings are currently setting up the necessary health network infrastructure (such as HIEs) to be able to receive this shared newfound information from the larger, pioneering healthcare organizations. Because the traditional teams of IT Security and IT Operations reside within an organization’s IT workforce, their abilities to make use of Big Data technologies or Data Modeling and Simulation methods are usually solely dependent on the strategic visions of IT management. Thus, if neither of these areas are on any IT roadmap, then it is very unlikely that any number of resources would be allotted towards them. However, as technology evolves, vendors are finding new ways of implementing the latest technological innovations into their IT solution offerings. A previously mentioned set of tools, one being Splunk and the other Tableau, are findings innovative ways to introduce the topics of Big Data and Data Modeling and Simulation into their packaged IT Solutions.
Legal and Regulatory Considerations for Health Informatics Tech in IT Security and IT Operations
From experience, working in a highly regulated industry meant that almost all technologies, data, and operations were extensively safeguarded and scrutinized. The extra precautions were not taken to create artificial barriers or to just plainly irritate IT personnel (although inevitably always managed to), but to adhere to strict laws and regulations targeted at protecting some of the most precious and coveted personal information – personally identifiable information (PII). In the healthcare industry this information takes on a slightly different name, but the significance is still the same, personal health information (PHI) is highly regulated and protected by federal, state, and even local laws. This information, if inappropriately disclosed, can cost organizations substantial amounts of money in fines, lawsuits, and lost credibility. So, for the most part, IT in general is well-aware that one of their main goals is to protect this information at all costs.
According to HealthIT.gov, the main federal law (and the most often cited) in healthcare that protects health information is the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Health IT, specifically the technology supported by and worked on by IT Security (and IT Operations) personnel is what drives the necessary levels of adherence to privacy and security that is required by HIPAA. Because of laws like HIPAA, PHI can remain private and secure, giving patients, providers, and families peace of mind that their information is safe within the healthcare system(s). This law requires the strict adherence to security policies and safeguards (controls) to accomplish this. Additionally, whenever there is a federal law or regulation in place, audits are taken very seriously. External auditors (at least in the financial industry) make regular visits to audit and ensure adherence to these strict laws and regulations. If organizations are not compliant, then change is sure to ensue, otherwise risk fines if they have not already been dished out.
Vision for the Future of Data, Information, and Technology in IT Security and IT Operations Supporting Health Informatics
With technology and innovation always moving at a rapid pace, it is sometimes hard to envision what the future holds in terms of IT innovation. I do not think that IT professionals before me envisioned this level of innovation to skyrocket a couple of decades ago. However, the main blueprints for the next 5-10 years of advances in IT have been somewhat drawn out already. As mentioned previously, in certain areas of IT Security and IT Operations, surely an emphasis on adoption of novel technologies and methods of Big Data and Data Mining and Simulation will occur, along with merging them with current technology that supports daily operations in both areas. For example, currently not widely used, are data mining techniques that dig through security breach data and help an organization build predictive models detailing how a certain attacker attempts to gain network access – such as their preferred method of infiltration, time of day, and any other patterns or clues that were not easily identified with the less trained human eye.
Additionally, during this past decade there has been a sizable boom in cloud infrastructure, services, and technologies. It is safe to assume that this movement will only continue to mature, and any stragglers who have not made the move to cloud technologies will do so (if it is beneficial for their business model). At some point in time, the benefits will outweigh the costs of cloud technologies, further prompting widespread adoption. With this of course, brings the need for IT Security and IT Operations professionals that are well versed in cloud technologies. These professionals will be consulted as subject matter experts in their respective areas to properly implement the technologies across different settings and industries. Given that this movement has been ongoing for some time now, challenges and roadblocks have been for the most part figured out. This is not to say that implementation cannot be challenging (or even costly), but instead it is much easier to implement cloud technology today than it was a few years ago given the breadth of information and experts in the field nowadays.
The advent of quantum computing and its commercial or widespread adoption is also not too far off. “Big Tech” companies such as Google have already hinted at working quantum computers and are now shifting towards the commercialization of their quantum machines down the road. With these new and exponentially more powerful machines, organizations of all types and sizes will have additional computational power at their fingertips. Granted they can afford the novel and very likely expensive hardware. Although with the advent of cloud technologies, these same quantum machines could be “rented” for use, bringing costs down for organizations substantially. Score another one for cloud technologies! This new quantum computing power will hold the promise of unlocking further micro and macro advancements in the field of technology, that being at the local organizational level and in society as a whole. For example, whereas computationally heavy simulations might not be possible with most of the hardware existing in clinical health settings, quantum computing will allow for simulations to run with ease. Additionally, these same processing power could be leveraged when transacting data and information across HIEs. Perhaps the results and findings from those previously mentioned simulations.
A personal favorite advancement in the world of technology, specifically in IT development, is the formation of the methodology known as DevSecOps. DevSecOps is a method that combines all three IT areas of Development, Security, and Operations during the development of products, applications, or systems. Being a Security and Operations minded individual, both areas have traditionally been left out of the requirements gathering, development, and testing phases of new systems. With this newer methodology, both areas are started to be looped into the development process from the very start. This is accomplished by having Security and Operations minded individuals sit in on developmental committees and efforts, providing their expertise throughout. This ensures that developers and the organization as a whole puts Security and Operations (the eventual maintenance team of the system) at the forefront, listening to any of their concerns and input. This in turn makes both IT Security and IT Operations not an afterthought, but continued contributors and active stakeholders of the product. Ultimately, this also ends up savings substantial amounts of resources in terms of human hours and money. At the time of writing this blog, DevSecOps is already widely used, so it is not necessarily a novel idea. However, with many methodologies, it is also giving way to similar or enhanced methodologies that will surely be the future of development in the next decade.
As with most new IT initiatives, getting user and organizational buy-in tends to be a difficult task. Using Data Mining as an example, it is not a technology that is widely used, yet. Be it because it is expensive to do so, or the benefits do not currently outweigh the costs for a certain organization. Some organizations or users are still not making the jump to adoption, for whatever the reason(s) may be. There will always be reluctancy or hesitation to adopt new technology, for a plethora of reasons. As was the case with HIE adoption in the United States, it was not until the government signed laws that would require providers to implement the new technologies into their practice. Similarly, if the healthcare industry ever wishes to catch up to (or at the very least just slightly lag) the tech industry, there will need to be a further environmental and governmental actions prompting healthcare settings to adopt new technologies and to innovate. Whether that includes new laws or financial incentives like those provided for achieving Meaningful Use of HIEs. It is clear, that if left up to health care providers alone, many would elect to stay with the way things are, and perhaps still rely on outdated methods such as paper record keeping.
Social, Political, and Economic Factors Influencing Change and the Role of Data and Technology in IT Security and IT Operations
Currently there are social, political, and economic changes brewing that have the potential to directly affect both areas of IT Security and IT Operations and how they interact with health informatics. For example, although not a new idea by any means, a push for universal health care has always surfaced in United States political discourse. Although many would argue this system would be a longshot from where the current United States healthcare system stands, there is a growing base and push for increased social safety nets that take some ideas from universal healthcare. As a result, healthcare, and the technologies it relies on would most likely also have to change to meet these new and drastic changes to how patients receive care. For example, as illustrated by Professor Enid Montague during lecture, receiving healthcare overseas was streamlined. From entering the clinic to billing, the process ran like clockwork without much need for patient interaction (and headaches might I add). The same is not the case here in the United States. I personally have had to call insurance companies regarding payments that were not received by health providers and have had to fill out new patient forms at the same doctor in back-to-back visits. To achieve a seamless and universal (or something very close) drastic changes or an overhaul of health informatics systems would also need to occur. Renewed and robust healthcare and governmental portals with appropriate access for patient use is one example that comes to mind. After all, an influx of new patients, providers, and insurers would surely follow when transforming to a more universal healthcare system. Unfortunately, I am of the belief that the hole that the United States healthcare system is currently in might be just a tad too deep to be able to get back out of. However, that may just be my pessimistic side showing itself again regarding the Unites States healthcare system.
Individuals are also becoming more empowered to take ownership of their own health and take matters into their own hands. This societal push from patients would hypothetically drive the need for engaging and quality self-service health applications and systems. A classic example of such is what private companies such as Apple are doing with their wearable health technology. They have commercialized their patented Apple Watches to include a range of health-related applications and tools so that any user can manage their health without having to visit a doctor. These health tools help users get a decent overall picture of their health. The same would need to occur on a grander level, like from different companies to promote competition (and thus further innovation) and perhaps from the federal government. Government sponsored tools would open the doors for those who cannot easily afford an expensive $500 dollar smartwatch to track their health data. So, perhaps the government could set aside funding to help develop open-source applications that can be used for free by the general public. After all, population health is a main concern of the government. It would be wise for the United States government to facilitate such undertakings and prompt their numerous health organizations to become major players in the mobile health space, as this has proven to be a very hot area of self-service regarding patient health. Of course, this would necessitate the need for IT Security and IT Operations methods and knowledge to be deployed. If a free-to-use application were to be developed by the CDC for example, they would need to ensure that proper security controls have been put in place to make the application safe, secure, and private. Keeping in mind that information housed in and being processed by the application is PHI.
Finally, with wealth inequalities ever expanding between the country’s top earners and lower and middle classes, health, and the access to it has started to take a spotlight as another benefit quickly eroding because of said inequality. More people find themselves not being able to afford a simple visit to the hospital. Instead of facing a bill for thousands of dollars, some uninsured individuals would rather not deal with a condition and remain untreated facing any consequences that may follow. Meanwhile, the ultra-wealthy have access to an abundance of health options, that I am sure, include too many for them to even know what to do with. Like the push for universal healthcare this economic challenge would necessitate action from the United States government to pick up some slack. Therefore, this challenge has the same implications of health informatics as the first political challenge, in the sense that once something is done from the government’s end to combat these inequalities, it is likely that more patients will have the resources to finally receive better (assuming they received any beforehand) healthcare. This in turn will drive an influx of patients receiving more care and could potentially start an increased strain on existing healthcare systems. IT Operations team would need to be looped in to help plan for and respond to situations like these, as this could necessitate additional servers being build or spun up in a cloud infrastructure. That is just one particular problem and solution, but many additional things could go wrong after system-wide changes occur, especially to legacy healthcare systems.
Course Concept Map: How it Was Developed, How to Read, and What is Included
Final additions and corrections were made to my Health Informatics and IT Security and IT Operations Challenges Concept Map. Below you will find a copy of said map. The vision for this concept map was to try to encompass as many health informatics topics as possible into the map, but only if they were applicable to either IT Security or IT Operations challenges and/or the common sub-groups that support both IT areas in most organizations. So, the best way to make sense of this map is to work your way from the inside out, starting at the center and observing the first few seafoam green pills. These are the Health Informatics and IT Security and IT Operations challenges grouped into broad sets based on shared characteristics. Some of these issues or challenges are Communications, Heath IT Management, Data, and so forth. Next, these “challenge” pills can then be traced to a few different kinds of pills; either the corresponding IT sub-groups that would provide support for these challenges being either IT Security (light blue), IT Operations (light green), or running directly to either IT Security or IT Operations topics when no one group in either IT Security or IT Operations makes sense. One thing to note is that the color scheme for the pills is meant to translate across all pills, serving as somewhat of a legend. As mentioned previously, light blue colored pills indicate IT Security groups or topics, light green is used for IT Operations groups or topics, orange for Health Informatics topics, and in some instances, a combination of colors signifying an overlapping in areas, such as light blue- and orange-colored pills. Finally, the line types and thickness serve to aid the viewer with the layers presented, again starting from the center. The lines begin thicker in size – connecting the center to the main “challenge” pills. Then, they become dotted between “challenge” pills and supporting IT sub-group pills and finally, finely dotted lines connecting the rest of the topics.
This map mirrors my thought process approaching the various readings, assignments, and discussions accomplished for this course. As Health Informatics topics were being introduced and explained, we were asked to think about our chosen focus area and draw connections back to it. So, to aid in this process, I would recall back to my time on both of IT Security and IT Operations teams at my previous employer and recall instances that matched what was being introduced that week. Often, there were connections to be made, and challenges to equate. After all, Health Informatics and IT tend to go hand-in-hand. For example, when regulatory concerns were discussed, I immediately recalled my time on the Cybersecurity team. There I was tasked with assisting with reporting on the status of security control compliance. This line of work would be directly requested from the regulatory bodies that would oversee us. So, when topics such as HIPAA, laws, and compliance came up, there was an instant connection of how IT Security would be able to provide support in this regard. When I could not draw upon personal work experiences, I was relied on outside research on subareas or topics that would relate to the Health Informatics topic being discussed. For example, I personally did not have much experience within Identity and Access Management, but I was able to discern a few key sub-topics that would be applicable to learned Health Informatics topics and challenges. One being “Encryption” and how the use of it helps with patients concerned with their privacy.
To not over-burden the viewer with too many topics and their relations back to Health Informatics and IT Security and Operations challenges, there were some topics that had to be cut. However, there was some reasoning behind these choices. For example, the topics of Big Data and Data Models and Simulations were not included in the concept map. This was because, in my eyes, these two specific areas do not really relate to either IT Security or IT Operations, but something more along the lines of Data Analytics. As mentioned previously, Health Informatics and IT overlap quite a bit, however, to not overburden or draw connections where no real additional value can be obtained from them i.e., IT Operations just providing additional technical support for Simulation systems, these were left out or lumped into other concepts. In this case, if a connection were to be made between IT Operations and Informatics Simulation technologies, then that connection would most likely reside in the “Health IT Management” pill. The rest of the Health Informatics topics that were not included followed that same logic – that if a unique relationship could not be drawn and would be more or less a generic “Health IT Management” issue then it was left out. Some additional notable omissions include other data analysis concepts such as visualizations, specific topics surrounding population health (population health is included but nothing granular beyond that), and topics surrounding the United States healthcare system (such as federal policies and initiatives). I do recognize that this map is quite a busy, and can be a bit confusing at times i.e., overlapping lines. However, to some degree this depicts that same overlap that was mentioned to exist between the topics of Health Informatics and IT Security and IT Operations. The truth is that all three areas work alongside quite a lot. Additionally, I am of the belief that both IT areas, along with others, constantly work in the background to serve as the IT bedrock for which Health Informatics can properly operate and thrive.
Final Notes: Top 3 Biggest Learning Points Over the Course of the Semester? How Will Informatics Influence My Career Goals upon Completion of Program?
Some of my biggest learning points from this semester were the ones that were eye-opening, for one reason or another. The first of the bunch was the state of the United States healthcare system as it is today. I was quite disappointed to hear of the system’s shortcomings. As touched upon previously, the more I observed the system in action and learned about it, I was also able to witness the same deficiencies. The truth of the matter is that not everyone in this country will have access to the equal, effective, and quality care – and that’s a tough pill to swallow. I had historically dismissed it myself, as just having run into sub-par clinics. But learning about the system and discussing it with friends and family, slowly started to open my eyes to the same problems that were described during Week 1. I agree with Braunstein, that the main (although not the only) culprit is the pay-per-service healthcare model that currently exists. But not everything is bleak. Although a somewhat broken system, the United States healthcare system presents itself as an opportunity. An opportunity to rebuild, but this time with the future in mind.
Additional learning points that were of particular interest were all the robust and well-thought-out informatics tools and solutions used today, and those that are being formulated for future use. A few that come to mind are HIEs, the Direct messaging technology, and new and highly promising ones such as data mining techniques and data models and simulations. These last two in particular are especially interesting given that they are now regularly being used for the advancement of innovative approaches to combat illnesses that even to this day would be considered terminal for so many patients. Braunstein, highlights how advanced statistical methods and predictive modeling are being leveraged in combating cancer. He describes how these two techniques give way to personalized medicine and how “cancer is arguably the best target disease for personalizing medicine”. That in of itself is extremely hopeful for all of medicine. We are truly in a period of time where the power of data can be harnessed and so much good can come about from its effective use.
The last learning point is how much work there is still left to be done. As previously mentioned, the United States healthcare system needs some serious patch work. Of course, that is easier said than done. Additionally, all the sub-areas of Health Informatics require further support. For example, the area of Population Health is in need of some serious assistance after this once in a century pandemic. Population trust in healthcare has drastically decreased, and there needs to work done to regain patient trust. Although some would argue it to be a pipe dream, building out the ultimate and widely adopted HIE has yet to be accomplished. So is the widespread adoption of electronic health records (EHR) and attaining Meaningful Use across the nation. Also, more efficient healthcare delivery systems need to be developed. Said systems need to keep in mind Human Factors, and clinician workflows so that the most optimal care can be delivered to patients. There is always more technically involved work towards modeling, such as creating decision-support tools. The field of Health Informatics is still growing and evolving, and there is still a lot to be accomplished to advance healthcare systems and increase the effectiveness, quality, and equality of care for all.
The topics that I have learned in this Informatics course has opened my eyes to the endless possibilities that exist post the completion of my degree. The knowledge that I am sure to gain will position me to well-informed about the many sub-areas that together comprise Health Informatics. I personally plan on leveraging my higher education thus far, along with prior work experiences in the tech industry to be able to be a contributing factor towards the advancement of health informatics. As I progress though my degree program, I definitely foresee learning a lot more about where else contributions can be made and where my specific set of skills can best be utilized.
Works Cited
Feldman, S., & Richter, F. (2018, December 12). Infographic: Where are people concerned about online privacy? Statista Infographics. Retrieved November 15, 2021, from https://www.statista.com/chart/16400/internet-online-privacy/.
California Health Foundation. 2010. New National Survey Finds Personal Health Records Motivate Consumers to Improve Their Health. http://www.chcf.org/media/press-releases/2010/new-national-survey-finds-personal-health-records-motivate-consumers-to-improve-their-health.
Braunstein, M. L. (2014). Chapter 4 Privacy, Security, and Trust. In Contemporary Health Informatics (pp. 84–87). essay, AHIMA Press.
Braunstein, M. L. (2014). Chapter 10 Big Data Meets Healthcare. In Contemporary Health Informatics (pp. 228–232). essay, AHIMA Press.
Fitzgibbons, L. (2020, April 22). What is ServiceNow and what does it do? SearchITOperations. Retrieved November 16, 2021, from https://searchitoperations.techtarget.com/definition/ServiceNow#:~:text=ServiceNowisacloud-basedcompanythatprovidessoftware,interactionsviaavarietyofappsandplugins.
Paessler. (n.d.). Active directory. IT Explained: Active Directory. Retrieved November 16, 2021, from https://www.paessler.com/it-explained/active-directory.
HealthIT.gov. (2019, September 19). Privacy, security, and HIPAA. Privacy, Security, and HIPAA. Retrieved November 16, 2021, from https://www.healthit.gov/topic/privacy-security-and-hipaa.
Web Resources
https://www.statista.com/chart/16400/internet-online-privacy/
https://www.healthit.gov/topic/privacy-security-and-hipaa
https://www.paessler.com/it-explained/active-directory