Explain the challenge of matching records among large datasets, with and without common unique iden9fiers Explore some of the available techniques to
|
|
- Berniece Stephens
- 5 years ago
- Views:
Transcription
1
2 None
3 Explain the challenge of matching records among large datasets, with and without common unique iden9fiers Explore some of the available techniques to help link records Provide some examples where we use such these techniques Focus of the talk will be on prac9cal things you can implement in your projects
4 Many circumstances where informa9on needs to be linked between different systems May or may not be a common linking iden9fier that can be used to match records Challenges in medical research related to restric9ons on the use of protected health informa9on (PHI) Lack of a na9onal pa9ent iden9fier that would facilitate studies of popula9on health
5 We have data in Database A We have data in Database B How do we find the records in Database B that correspond to the records in Database A? How do we do this when there is not a common iden9fier between the two databases?
6 Unique iden9fier (UID) for a given pa9ent encounter OR case number for a surgical procedure Hospital account number for an admission Medical Record number for a pa9ent Enterprise Master Pa9ent Index for a system of hospitals with different informa9on systems Records in separate databases have the same UID One- to- one rela9onship between records in the datasets Lookup up record in one database with the UID Find all the corresponding records in the other database having the same UID Simple. But maybe not
7 Unique iden9fiers may not be unique Same pa9ent assigned mul9ple iden9fiers Medical Record Number Pa9ents may use another person s iden9fica9on card to gain access to medical service Emergency Room Pa9ents may be associated with another pa9ent s iden9fier by a clerk Similar names Char9ng may be done on the wrong pa9ent Linking iden9fier may be missing Manual entry of informa9on normally received by an electronic data feed AIMS Cases populated from an OR Scheduling Systems Manual pa9ent entry into an automated drug dispensing system
8 Medical records departments spend a large amount of 9me cleaning up these mistakes Once charted, removing incorrect informa9on from the electronic medical record can be challenging Whether doing research studies or managing the clinical chart, even when UIDs are present, probabilis9c methods will be needed Accuracy is very important when dealing with pa9ent care Small errors in matching typically do not affect the conclusions of research studies (when P very small) Sensi9vity analyses to explore the impact in mismatching
9 Uses descrip9ve informa9on to link records Pa9ent Name DOB SSN Address Not 100% certainty that records in two databases correspond to each other Probabili9es can be assigned for various matching criteria to weight the likelihood of matching From prior knowledge of the data Training the matching algorithms manually
10 Field Database A Match Database B Last Name Smith = Smith First Name John = John Middle Name J. missing DOB 01/03/1950 = 01/03/1950 Address 111 S Main Street 111 South Main St SSN ? MRN
11
12 763,465 allegedly unique pa9ent entries in our anesthesia informa9on management system (AIMS) database (from the hospital ADT feed) Many duplicate names; some are for different individuals 107 Robert Smith s 88 James Williams 62 Michael Jones Only 1 Donna Sczerbowitcz If the person has a common name, more likely to be ambiguity Weights can be adjusted automa9cally for names based on their frequency in the database
13 Duplicate names and DOB 9 pts with the same DOB named Calvin Williams 7 pts with the same DOB named Thomas Kennedy 35,646 records with 1 duplicate name and DOB Many of these are the same pa9ent who have mul9ple MRN s assigned (but not all) Adding addi9onal informa9on to the matching criteria may allow resolu9on E.g., pa9ent s address
14
15 Reduce the number of candidate matches to improve the probability of gehng a good match Don t use the en9re database for matches, but only reasonable candidates For matching AIMS records on a given date of surgery, only consider pa9ents in the hospital on that date For determining if a pa9ent is dead from the Social Security Death Master File, ignore all pa9ents returned as dead who had a lab test done aier the date of death Addi9onal informa9on about the record to be matched may suggest other strategies
16 Transform data to the same format These dates are the same January 1, Jan2013 These states are the same PA Pennsylvania These first names may or may not be the same William Bill Remove punctua9on from names John Q. Public John Q Public James Smith, III James Smith III Convert address components Street and St South and S
17 Name matching can be imprecise Misspellings Use of nicknames or preferred names may differ among databases Name changes (especially maiden vs. married name) Transposi9on of first and last names We have 723 such pa9ents in our AIMs where the names are switched and both records have the same DOB Many likely are transposi9ons of the same person
18 Soundex Most well known phone9c algorithm Originally developed in 1918 For names pronounced in English Goal is to encode homophones so that names with minor spelling varia9ons will s9ll match 4 characters First character is the first leler of the name 3 numbers corresponding to consonants with similar sounds Included as a standard feature in most commercial databases
19 Name 1 Soundex Name 2 Soundex Result Roberts R163 Robertson R163 False match Epstein E123 Eps9en E123 Match Limita9ons Only first 3 consonants are encoded Not designed to work with non- English names Variants exist (e.g., for eastern European names) Can be useful in conjunc9on with other methods
20 Metaphone 1 More accurate phone9c encoding than Soundex for English names Open source Metaphone 2 Accounts for spelling peculiari9es in languages other than English Open source Metaphone 3 More advanced version of Metaphone 2 License fee
21 Name 1 DMP- 2 Name 2 DMP- 2 Result Roberts RPRTS Robertson RPRTS False match Epstein APSTN Eps9en APSTN Match Limita9ons Any vowel star9ng the name is encoded as A 5 characters are returned, 1 more than Soundex Like Soundex, doesn t work that well for words that are not names (e.g., drugs)
22 Levenshtein Calculates the minimum number of steps needed to change one name into the other # steps = edit distance Example Johnstone to Johnsons Edit distance = 3 Delete t and e and add an s Johnstones Johnsons Smaller the edit distance, the closer the names match Good for picking up transposi9ons, dele9ons, inser9ons Not restricted to matching names
23 Jaro- Winkler Similar to Levenshtein in that it looks at transforma9ons, but much more complicated Results in a frac9on from 0 to 1, with higher numbers represen9ng closer matches 1 = two strings are iden9cal 0 = there is no similarity
24 Source Name Target Name Jaro- Winkler HOWEJessicaS HOWIEJESSICAS HOWIEJessica HOWIEMARKE HOWIESTEPHEN HOWIESTEVENJ HOWIEMARK HOWIEKevinJ Names were normalized by concatena9ng the first, last, and middle names Punctua9on was removed Implementa9on of algorithm was case insensi9ve, so no need to convert Jessica S Howe best matches Jessica S Howie An i was dropped from the entered name
25 DOB is commonly available in datasets, and usually accurate But DOB can be entered incorrectly MM/DD/YYYY vs. DD/MM/YYYY Dates entered in universal 9me can present problems DOB of 4/30/1953 is represented as :00:00 In 2007, start and end of US daylight savings 9me changed Dates entered prior to 2007 in the overlap weeks will be off by 1 hour if UTC is converted to local 9me using the current parameters Simpler to just extract the mm/dd/yyyy from the DOB
26 Use as an iden9fier is generally frowned upon Issues related to iden9ty thei Some jurisdic9ons restrict its use (e.g., CA) Individuals may be assigned more than one SSN (e.g., if the original number is being used fraudulently) Rarely, the same SSN can be assigned to more than one person However, SSN is frequently available in hospital databases Needed for mortality studies querying the Death Master File from the Social Security Administra9on This has become increasingly difficult Discon9nua9on of sites previously providing free access Removal of access to deaths within 3 years of the request Discon9nua9on of public access to death data contributed by states
27 May be useful to dis9nguish individuals with the same name E.g., Father and Son May be used to limit targets for alempted matches (e.g., using zip code) Lots of issues related to non- standard formahng People change addresses
28 PHI will not be exposed in outside databases containing medical informa9on HIPAA May or may not be available in internal data sources Need to take great care to protect this informa9on Don t put it on your notebook or USB drive If moved to your desktop, be sure to use a highly encrypted par99on TrueCrypt is a good, free program that can be used Best not to remove this informa9on from the source database in clear text De- iden9fied data repositories as research sources Pa9ent iden9fies are encrypted or otherwise de- iden9fied Can match between data sources using the encrypted values
29 No na9onal person iden9fier to facilitate record linkage for studies of popula9on health Large amount of pushback from organiza9ons concerned about privacy Administra9on of a na9onal system to provide unique iden9fiers to all ci9zens would be extremely complicated and expensive Rochester Epidemiology Project is a singular excep9on Covers medical records of all pa9ents living in Olmsted County, MN since January 1, 1966 who have given permission to use their data for research Collabora9on between Olmsted Medical Center, the Mayo Clinic, and the Rochester Family Medicine Clinic >500,00 unique individuals as of 2010 Rich source of epidemiologic and longitudinal studies of health
30 One- way hash based on common pa9ent iden9fiers will create a non- colliding (unique) iden9fier However same issues related to errors in the iden9fiers as previously discussed Such hashes cannot be reversed to recover the original informa9on if an appropriate encryp9on method is used MD5 has been broken, so don t use it hsp:// Some commercial AIMS are swll using MD5 to encrypt passwords Clear text passwords are not stored, just the hash However, if a hacker gets access to the PW hash table, many can be reversed SHA- 1 and SHA- 2 have been shown to have collisions (different messages with the same digest), so are theore9cally subject to alack SHA- 1 is not recommended, as it has been broken in limited circumstances SHA- 2 has not been broken, but compromise of SHA- 1 would likely lead to breaking SHA- 2, as the same cryptographic method is used SHA- 3 is a new hashing algorithm, expected to become a FIPS standard in 2014
31 If two organiza9ons wish to share informa9on, they can use the same method of hashing so that the resul9ng records can be matched while s9ll maintaining privacy This is the same basis used to store passwords Within an organiza9on, database of de- iden9fied informa9on can also be created using the hashed value as the unique iden9fier However, even if a highly secure cryptographic hashing method is used, re- iden9fica9on is s9ll possible using other informa9on Unusual procedure Public repor9ng of circumstances surrounding an event
32 CREATE FUNCTION [dbo].[hashiden9fier] sql_variant ) RETURNS varchar(22) AS BEGIN varchar(20) varchar(20) END = ' D89dskd7dlsjdj41%%' = as varchar(20)) RETURN + cast(@iden9fier as varchar)) as bigint))
33 Consider a pa9ent with the following iden9fiers: Name: John Q. Public DOB: 01/01/1950 MRN: Create a composite iden9fier consis9ng of the string LastName- FirstName- MI- DOB- = Public- John- Q HashIden9fier(@UID) = [ ] If the same hashing process is applied to the data from another database, the records can then be matched using the this value Hashing techniques are also useful to hide the iden9fy of care providers while preserving the ability to analyze data by provider Anesthesiologist #7 from the 1985 Slogoff and Keats study of myocardial ischemia (Anesthesiology 1985; 62:107-14)
34 Automated reconcilia9on of controlled substances dispensed from Pyxis drug carts and our AIMS and no9fica9on of providers whose records are out of balance Pyxis records cover the en9re hospitaliza9on Link based on 9ming of transac9ons and the when cases are done and the MRN in Pyxis and our AIMS Use pa9ent name to link when the MRN is missing or incorrect 1. Scope limited 1 st to pa9ents the provider took care of in the AIMS 2. Try exact match of LastName+FirstName+MiddleName 3. Try match using Jaro- Winkler and distance >0.90 and first ini9al of Last and First name agree 4. Unsuccessful links then matched using all pa9ents who had cases in the AIMS on the DOS, repea9ng steps 2 and 3
35 Matching billing records to AIMS records For research, oien need the billed CPT4, anesthesia CPT, and ICD9 codes for cases Import labor epidurals into our ACGME repor9ng system, not documented using our AIMS Coders add the unique AIMS case_id to the billing system Historical data before 2012 did not have this informa9on They make transcrip9on errors What we do: First link using the MRN and the DOS If cannot match, then use the pa9ent name and the DOS Limit matches to cases where the anesthesia alending on the billing voucher was involved in the care of the pa9ent Same process using Jaro- Winkler as described on the previous slide
36 Contribu9ons of data to MPOG and AQI Not implemented yet, but planned Will one- way hash provider iden9fiers to prevent iden9fica9on Collabora9ve research studies Where provider heterogeneity must be considered in the analysis Hash provider iden99es when sharing data outside our ins9tu9on Hash pa9ent iden99es when there is a need to iden9fy mul9ple cases on the same pa9ent re-
37 Even where unique iden9fiers between databases are supposed to exist, the process may fail Linking methods are needed for both tradi9onal and big data projects Mul9ple techniques oien need to be applied sequen9ally in descending order of accuracy One- way hashing of iden9fiers can be used to link informa9on from different databases sharing common elements of PHI without compromising the PHI, provided that secure methods are used
38
Overview of Record Linkage Techniques
Overview of Record Linkage Techniques Record linkage or data matching refers to the process used to identify records which relate to the same entity (e.g. patient, customer, household) in one or more data
More informationRobust Identification of Fuzzy Duplicates
Robust Identification of Fuzzy Duplicates ì Authors: Surajit Chaudhuri (Microso3 Research) Venkatesh Gan; (Microso3 Research) Rajeev Motwani (Stanford University) Publica;on: 21 st Interna;onal Conference
More informationArkansas WebIZ Basic Training
Arkansas WebIZ Basic Training Presented by: Andrew Luker Arkansas Department of Health (WebIZ) Dec. 12, 2018 Introduc)on Welcome to Arkansas WebIZ, a state-of-the-art immuniza9on registry built from the
More informationIntroduction to blocking techniques and traditional record linkage
Introduction to blocking techniques and traditional record linkage Brenda Betancourt Duke University Department of Statistical Science bb222@stat.duke.edu May 2, 2018 1 / 32 Blocking: Motivation Naively
More informationLinking Patients in PDMP Data
Linking Patients in PDMP Data Kentucky All Schedule Prescription Electronic Reporting (KASPER) PDMP Training & Technical Assistance Center Webinar October 15, 2014 Jean Hall Lindsey Pierson Office of Administrative
More informationPhishing: What is it?
Objec&ves Define phishing and iden&fy various types of phishing scams Recognize common bai&ng tac&cs used in phishing scams Examine real phishing messages Understand how to protect yourself from being
More informationIntroduction Entity Match Service. Step-by-Step Description
Introduction Entity Match Service In order to incorporate as much institutional data into our central alumni and donor database (hereafter referred to as CADS ), we ve developed a comprehensive suite of
More informationREDCap Best Prac/ces. ITHS Biomedical Informa2cs Core Bas de Veer MS Research Consultant
REDCap Best Prac/ces ITHS Biomedical Informa2cs Core iths_redcap_admin@uw.edu Bas de Veer MS Research Consultant REDCap version: 6.4.0 Last updated February 10, 2015 1 Goals & Agenda Goals Understanding
More informationThis PowerPoint is proprietary and confiden3al and not intended for distribu3on.
This PowerPoint is proprietary and confiden3al and not intended for distribu3on. September 10, 2014 Aspire s Pallia,ve Care Approach Pallia2ve Care: A Medical Specialty Life-Prolonging Care Medicare Hospice
More informationIntegrating BigMatch into Automated Registry Record Linkage Operations
Integrating BigMatch into Automated Registry Record Linkage Operations 2014 NAACCR Annual Conference June 25, 2014 Jason Jacob, MS, Isaac Hands, MPH, David Rust, MS Kentucky Cancer Registry Overview Record
More informationModular arithme.c and cryptography
Modular arithme.c and cryptography CSC 1300 Discrete Structures Villanova University Public Key Cryptography (Slides 11-32) by Dr. Lillian Cassel, Villanova University Villanova CSC 1300 - Dr Papalaskari
More informationInver&ble Bloom Lookup Tables and Applica&ons. Michael Mitzenmacher Joint work with Michael Goodrich, Rasmus Pagh, George Varghese
Inver&ble Bloom Lookup Tables and Applica&ons Michael Mitzenmacher Joint work with Michael Goodrich, Rasmus Pagh, George Varghese Stragglers Problem Consider data streams that insert and delete many items,
More information6 Finding Patient Information
6 Finding Patient Information 6.1 Patient Lookup Overview Patient Lookup is the first screen displayed when you log in. IntelliSpace PACS allows you to uniquely identify a person and track their care as
More informationStep 1: A few setup items are needed to properly start using SeamLESS EHR with MedicFusion.
Step 1: A few setup items are needed to properly start using SeamLESS EHR with MedicFusion. Prerequisites: SeamLESS version 1.3.0.0 R1 or greater esuite version 3.7.4.0 on the worksta;on (3.7.5.0) and
More informationUNIT II A. ENTITY RELATIONSHIP MODEL
UNIT II A. ENTITY RELATIONSHIP MODEL Agenda En0ty & En0ty Sets A6ributes Rela0onship & Rela0onship Sets Constraints Mapping Cardinali0es, Par0cipa0on Constraints, Keys E-R Diagrams & Design of Database
More informationManage Duplicate Records in Salesforce PREVIEW
Manage Duplicate Records in Salesforce Salesforce, Winter 18 PREVIEW Note: This release is in preview. Features described in this document don t become generally available until the latest general availability
More informationProceedings of the Eighth International Conference on Information Quality (ICIQ-03)
Record for a Large Master Client Index at the New York City Health Department Andrew Borthwick ChoiceMaker Technologies andrew.borthwick@choicemaker.com Executive Summary/Abstract: The New York City Department
More informationisystoc User Guide
isystoc 4.3.1 User Guide Table of Contents isystoc 4.3.1 User Guide...4 About isystoc...5 Logging into isystoc...6 Automatic Logout / Refresh...7 isystoc Icons...8 Using isystoc...9 Search Options...10
More informationLocating People Using Advanced Person Search
Locating People Using Advanced Person Search Advanced Person Search allows you to include additional information about your subject, such as a relative name or previous state of residence, or even use
More informationFinding people is part art, part science. We provide the science through data and tools to help in your searches.
Locating People Finding people is part art, part science. We provide the science through data and tools to help in your searches. Our proprietary database engines combine data from hundreds of sources
More information2 Corporation Way Suite 150 Peabody, MA
2 Corporation Way Suite 150 Peabody, MA 01960 888-746-3463 www.locateplus.com Table of Contents Page 3 18 Free Searches and Reports VIP Customer Service & Site Walk-Through s Selecting a GLB Use for Searches
More informationOverview of Datavant's De-Identification and Linking Technology for Structured Data
Overview of Datavant's De-Identification and Linking Technology for Structured Data Introduction Datavant is firmly committed to advancing healthcare through data analytics while protecting patients privacy.
More informationHIE Clinical Portal Non-Provider Manual 1 Last update: 2016/08/30 Alaska ehealth Network
HIE Clinical Portal Non-Provider Manual 1 Last update: 2016/08/30 Alaska ehealth Network Table of Contents Overview... 2 Patient Privacy Policy & Access... 3 User Levels... 5 User Homepage... 7 Common...
More informationCSc 120. Introduc/on to Computer Programming II. 15: Hashing
CSc 120 Introduc/on to Computer Programming II 15: Hashing Hashing 2 Searching We have seen two search algorithms: linear (sequen;al) search O(n) o the items are not sorted binary search O(log n) o the
More informationNet.info. A proposal for making network service informa6on easily available. Steven Bauer Slides from 2010 MIT
Net.info A proposal for making network service informa6on easily available Steven Bauer Slides from 2010 MIT Problem No easy way to iden6fy network service informa6on Ini6al mo6va6on is to make very basic
More informationData Linkage Methods: Overview of Computer Science Research
Data Linkage Methods: Overview of Computer Science Research Peter Christen Research School of Computer Science, ANU College of Engineering and Computer Science, The Australian National University, Canberra,
More informationA Security Punctua.on Framework for Enforcing Access Control on Streaming Data. Rimma V. Nehme, Elke A. Rundensteinerr, Elisa Ber.
A Security Punctua.on Framework for Enforcing Access Control on Streaming Data Rimma V. Nehme, Elke A. Rundensteinerr, Elisa Ber.no Presented by Thao Pham Mo.va.on Mobile devices make available personal
More informationInteroperability and Clinical Repositories: UC- REX - - Federated Querying of Mul>- Site Clinical Data. Michael Hogarth, MD
25 min Interoperability and Clinical Repositories: UC- REX - - Federated Querying of Mul>- Site Clinical Data Michael Hogarth, MD Professor of Medicine, UC Davis hfp://www.hogarth.org What I am talking
More informationICD- 10 Presenta/on #1 for Revolu/onEHR Users June 3, 2015
ICD- 10 Presenta/on #1 for Revolu/onEHR Users June 3, 2015 ScoA Jens, OD, FAAO CEO, Revolu/onEHR Discussion Points Overview of ICD Anatomy of ICD- 10 Choosing ICD- 10 Codes Summarizing Steps You Will Experience
More informationMAHR Webstore Tutorial POWERED BY
MAHR Webstore Tutorial POWERED BY Sign In! Open a new browser window and go to the following link:! h3ps://marcomcentral.app.p;.com/lavigne/mahr/login.aspx?company_id=21708 If you have not registered,
More informationSecure hashing, authen/ca/on
Secure hashing, authen/ca/on root@topi:/etc# more shadow root:$6$1z2.cqoj$bib7hoc7byvsvclmpc1c5f/h.gaddflg1xa2fqknmaoabwzi1ysldik2gikuebeo ugj33w8h4qdiwyvamlfij2eu.:15138:0:99999:7::: daemon:*:15040:0:99999:7:::
More informationHealth Analytic Group. Research Data Management
Health Analytic Group Research Data Management Objectives Specify several different appropriate data sources Describe and appreciate limitations of data sources Timing Workflow process Completeness Accuracy
More informationGrouping methods for ongoing record linkage
Grouping methods for ongoing record linkage Sean M. Randall sean.randall@curtin.edu.au James H. Boyd j.boyd@curtin.edu.au Anna M. Ferrante a.ferrante@curtin.edu.au Adrian P. Brown adrian.brown@curtin.edu.au
More informationTraining Demo: Cox Vendor Clients
Training Demo: Cox Vendor Clients WebASAP Login WebASAP Address https://www.infomart-usa.com/webasap/ You will be prompted to provide your user ID, password & account number each time you log in. Please
More informationData Quality Assessment Recommendations
Data Quality Assessment Recommendations Steering Commi,ee Mee.ng, August 19-20, 2014 Bethesda, MD Meredith Nahm Zozus, PhD Assoc. Director, Clinical Research Informa6cs Duke Transla6onal Medicine Ins6tute
More informationdtalink Faster probabilistic record linking and deduplication methods in Stata for large data files Keith Kranker
dtalink Faster probabilistic record linking and deduplication methods in Stata for large data files Presentation at the 2018 Stata Conference Columbus, Ohio July 20, 2018 Keith Kranker Abstract Stata users
More informationWelcome to the SIHO itransact portal.
Provider and Vendor Access Portal One stop access for your guide to utilizing SIHO s new itransact platform. Welcome to the SIHO itransact portal. Primary access codes will be given to key contacts at
More informationProgramming Environments
Programming Environments There are several ways of crea/ng a computer program Using an Integrated Development Environment (IDE) Using a text editor You should use the method you are most comfortable with.
More informationHow to live with IP forever
How to live with IP forever (or at least for quite some 5me) IPv6 to the rescue! Solves all problems with IPv4 Standardized during the 1990 s Final RFC in 1999 IPv4 vs IPv6 32- bit addresses IPSec op5onal
More informationPharmacy Touch User Guide SOFTWARE REVISION 1.0
Pharmacy Touch User Guide SOFTWARE REVISION 1.0 Contents About this Guide... 3 Introducing Pharmacy Touch... 3 User Inventory... 3 Login and Setup... 4 Fingerprint Reader... 4 Configuring Pharmacy Touch...
More informationTitle of Manual: Specimen Collection Document Number: GPA.SPC.52.0
Page 1 of 17 I._PURPOSE This document is a guideline of procedures for Outreach 2.0 ordering and results application. It is intended to outline the features and functions of Outreach 2.0. All major functionality
More informationIntroduc)on to Bitcoin
Introduc)on to Bitcoin CONTENTS What is Bitcoin Who created it? Who prints it? How does Bitcoin work? The characteris5cs of Bitcoin WHAT IS BITCOIN Bitcoin is a form of digital currency, created and held
More information(10/17) PATIENT GUIDE
(10/17) PATIENT GUIDE Welcome to Parkview MyChart! mychart.parkview.com Welcome to your one story of care. As a patient of Parkview, you now have access to your health information from the convenience
More informationPoint of Care User Manual ver. 5.6 Winter 2018
Point of Care User Manual ver. 5.6 Winter 2018 Table of Contents Point of Care Module (POC) Login to POC Changing Password Start a Case Creating a Case from the Schedule Create a Case New Case Demographics
More informationIden%ty, Risk and Privacy in the broader enterprise
Iden%ty, Risk and Privacy in the broader enterprise Or Why the hell are you calling ME in Florida in the middle of the night because there is a tornado in Indiana?? Mark Bruhn Associate Vice President
More informationGarlik are the online personal iden2ty experts Set up to give individuals and their families real power over the use of their informa2on in the
1 2 Garlik are the online personal iden2ty experts Set up to give individuals and their families real power over the use of their informa2on in the digital world Garlik have assembled a world class Leadership
More informationVIPR Single Sign On User Guide. v March Great Lakes Health Connect. 695 Kenmoor Ave SE, Suite B Grand Rapids, MI 49546
VIPR Single Sign On User Guide v 7.5.2 March 2017 Great Lakes Health Connect 695 Kenmoor Ave SE, Suite B Grand Rapids, MI 49546 (844) 454-2443 www.gl-hc.org info@gl-hc.org Table of Contents GLHC SSO VIPR
More informationSearch Engines. Informa1on Retrieval in Prac1ce. Annota1ons by Michael L. Nelson
Search Engines Informa1on Retrieval in Prac1ce Annota1ons by Michael L. Nelson All slides Addison Wesley, 2008 Evalua1on Evalua1on is key to building effec$ve and efficient search engines measurement usually
More informationMaximizing Statistical Interactions Part II: Database Issues Provided by: The Biostatistics Collaboration Center (BCC) at Northwestern University
Maximizing Statistical Interactions Part II: Database Issues Provided by: The Biostatistics Collaboration Center (BCC) at Northwestern University While your data tables or spreadsheets may look good to
More informationWeb-Based Electronic Death Registration (EDR) Texas Department of Health
Web-Based Electronic Death Registration (EDR) TX EDR THIN CLIENT Trainers Guide DEMOGRAPHIC SECTION Prepared for: Texas Department of Health December 03, 2005 Version 1.0 Prepared by: The Industry Standard
More informationFamily Medicine Residents HIPAA Highlights May 2016 Heather Schmiegelow, JD
Family Medicine Residents HIPAA Highlights May 2016 Heather Schmiegelow, JD The UAMS HIPAA Office Heather Schmiegelow, UAMS HIPAA Privacy Officer Stephen Cochran, UAMS Security Officer Sara Thompson, HIPAA
More information2017 Compliance Educa3on
2017 Compliance Educa3on and Integrity at Work Informa(on Security and Privacy Welcome to the 2017 Compliance Educa(on This training is for BIDMC, HMFP and its Affiliates, and APG* employees, physicians,
More informationBCS Professional Certification
BCS Professional Certification Name Change BCS Professional Policy Certification January Name 2016 and Gender Change Policy August 2017 Copyright BCS 2017 Page 1 of 5 CONTENTS 1. Policy... 3 2. Scope...
More informationSide-channel-leaks in Web Applica2ons: A Reality today, A Challenge Tomorrow. Shuo Chen,Rui Wang, XiaoFeng Wang and Kehuan Zhang
Side-channel-leaks in Web Applica2ons: A Reality today, A Challenge Tomorrow Shuo Chen,Rui Wang, XiaoFeng Wang and Kehuan Zhang Tradi&onal PC applica&on Web applica&on (1) split between client and server
More informationTrust Eleva,on Architecture v03
Trust Eleva,on Architecture v03 DISCUSSION DRAFT 2015-01- 27 Andrew Hughes 1 Purpose of this presenta,on To alempt to explain the Trust Eleva,on mechanism as a form of ALribute Based Access Control To
More informationehealth in the implementa,on of the cross border direc,ve: role of the ehealth Network 26th February 2012
ehealth in the implementa,on of the cross border direc,ve: role of the ehealth Network 26th February 2012 Agenda EU in health Ehealth in the EU ehealth Network ehealth High- Level Governance Ini,a,ve Goals
More informationBy the end of this module you should be able to: Once you re logged into FamLink, search can be accessed from 2 locations
FamLink Search Search provides workers with the ability to locate and search for information in a variety of ways. As with most areas of FamLink, access is available from more than place. Course Icons
More informationDocument Databases: MongoDB
NDBI040: Big Data Management and NoSQL Databases hp://www.ksi.mff.cuni.cz/~svoboda/courses/171-ndbi040/ Lecture 9 Document Databases: MongoDB Marn Svoboda svoboda@ksi.mff.cuni.cz 28. 11. 2017 Charles University
More informationHygieia The Health Management System User Guide and Test Plan
Hygieia The Health Management System User Guide and Test Plan Presented by: Yuji Shimojo, Cara Howie, and Thomas Vera For: Dr. Clarence Huff CMSC 495 Created On: January 26, 2017 Table of Contents Contents
More informationIntroduc)on to Data Management. Chris'e Wiley Sarah C. Williams Heidi Imker
Introduc)on to Data Management Chris'e Wiley Sarah C. Williams Heidi Imker Data Management Workshop Series Introduc)on to Data Management Feb 10 th 4PM 5PM Apr 6 th 1PM 2PM Documenta)on and Organiza)on
More informationARELLO.COM Licensee Verification Web Service v2.0 (LVWS v2) Documentation. Revision: 8/22/2018
ARELLO.COM Licensee Verification Web Service v2.0 (LVWS v2) Documentation Revision: 8/22/2018 Table of Contents Revision: 8/22/2018... 1 Introduction... 3 Subscription... 3 Interface... 3 Formatting the
More informationRecord Linkage. with SAS and Link King. Dinu Corbu. Queensland Health Health Statistics Centre Integration and Linkage Unit
Record Linkage with SAS and Link King Dinu Corbu Queensland Health Health Statistics Centre Integration and Linkage Unit Presented at Queensland Users Exploring SAS Technology QUEST 4 June 2009 Basics
More informationPatient Registration
Patient Registration Adding a Patient Adding a new patient through SequelMed can be accomplished through just a few steps: Defining the Patient Attaching a Plan (optional) Attaching Documents (optional)
More informationDuke Medicine OneView Patient Portal
Duke Medicine OneView Patient Portal Release 1.0... 2 Feature List Overview...2 Portal Account Self Registration Service... 4 Consolidated Account Balance and Pay This Bill... 6 Pay A Bill... 19 Detailed
More informationProtecting Health Information
Agenda Protecting Health Information BRONSON HEALTHCARE GROUP INFORMATION TECHNOLOGY SECURITY ENGINEERING MICHAEL SMITH Personal device usage with sensitive data Mobile devices and BYOD Secure messaging
More informationVersion Control Review. Objec&ves. JSPs and Organiza&on Review DISCUSSION OF QUALITY ATTRIBUTES. Comparison of Applica&ons
Objec&ves Review: Version Control, JSPs Quality A?ributes of Web SoBware Introduc&on to Rela&onal Databases, SQL JDBC Version Control Review Why do we need version control? What can we do with version
More informationMayo Clinic CareLink Quick Start Guide. May 5, 2018
Mayo Clinic CareLink Quick Start Guide May 5, 2018 1 Mayo Clinic CareLink Quick Start Guide Getting Started... 3 Help and contact information... 4 Browser, system, and connection requirements... 4 How
More informationThe Oregon Maternal Data Center (OMDC): Preparing for Registration and Data Submissions. Anne Castles, MPH, MA MDC Project Manager
The Oregon Maternal Data Center (OMDC): Preparing for Registration and Data Submissions Anne Castles, MPH, MA MDC Project Manager Housekeeping Notes Phone lines are open. Please place your line on mute
More informationComputer Security: Crypto & Web Security
CSE 484 / CSE M 584 Computer Security: Crypto & Web Security TA: Thomas Crosley tcrosley@cs Many slides by Franziska Roesner and Adrian Sham HTTP://XKCD.COM/1323/ Lab 1 Deadline Reminders Lab 1 Final due
More informationShare Care. Consumer Search 11/24/2015 1
Share Care Consumer Search 1 Searching for Consumers in Share Care When searching for consumers it is best to use either their date of birth or social security number. The consumer name may not be spelled
More informationpathx pathx Laboratory Information System
A LETTER FROM THE PRESIDENT. At PathX, we fully understand that your lab is focused on more than just patient reports and information processing. For most pathology labs, primary concerns include responsible
More informationVersion 1/Revision 4 Page 1 of 23. epaces PA/DVS Request REFERENCE GUIDE. Table of Contents
Version 1/Revision 4 Page 1 of 23 Table of Contents PA/DVS Request... 2 Provider Service Address... 3 Contact Information... 4 Referring Provider... 4 Ordering Provider... 5 Event Information... 6 Pattern
More informationWhat is MyPalomarHealth and how will it benefit my health care? How do I access my health information on MyPalomarHealth?
MyPalomarHealth FAQs Enrollment Questions What is MyPalomarHealth and how will it benefit my health care? MyPalomarHealth offers patients personalized and secure on-line access to portions of their medical
More informationQUILLEN ETSU PHYSICIANS
QUILLEN ETSU PHYSICIANS Module 5: Notes Provider Training Module Allscripts Touchworks EHR Quillen EHR Team Phone: (423) 282-6122, Option 1 Email: EHRmail@qetsu.org June 2014 MODULE INSTRUCTIONS There
More informationDO NOT SEND DUPLICATE COPIES OF YOUR LOG AND DO NOT SEND A PRINTED COPY.
AMERICAN BOARD OF UROLOGY 2018 LIFE LONG LEARNING (LLL) LEVEL 2 PEDIATRIC UROLOGY SUBSPECIALTY CERTIFICATION EXAMINATION PROCESS INSTRUCTIONS FOR SUBMISSION OF ELECTRONIC LOGS Please read all instructions
More informationTraining Guide for Alabama Practitioners and Pharmacists. Alabama Department of Public Health Prescription Drug Monitoring Program
Training Guide for Alabama Practitioners and Pharmacists Alabama Department of Public Health Prescription Drug Monitoring Program August 2015 Contents Contents 1 Document Overview... 3 Purpose and Contents...
More informationHot Fuzz: using SAS fuzzy data matching techniques to identify duplicate and related customer records. Stuart Edwards, Collection House Group
Hot Fuzz: using SAS fuzzy data matching techniques to identify duplicate and related customer records. Stuart Edwards, Collection House Group Collection House Group; what do we do? Debt Collection; purchased
More informationThe Vitro Integrated Ontology Editor and Seman5c Web Applica5on
The Vitro Integrated Ontology Editor and Seman5c Web Applica5on Brian Lowe, Brian Caruso, Nick Cappadona, Miles Worthington, Stella Mitchell, Jon Corson- Rikert, and the VIVO Collabora5on Interna5onal
More informationMCCM Best Practices. Maximizing Crystal Reporting with Business Objects Distribution
Sarasota Memorial Health Care System MCCM Best Practices Maximizing Crystal Reporting with Business Objects Distribution Presented by: Greg Borden, RN, BS/EB, Senior Clinical Systems Analyst Terry Mills
More information2014 Morrisey Technology and Educational Conference 1
Sarasota Memorial Health Care System MCCM Best Practices Maximizing Crystal Reporting with Business Objects Distribution Presented by: Greg Borden, RN, BS/EB, Senior Clinical Systems Analyst Terry Mills
More informationCOP 5725 Fall Hospital System Database and Data Interface. Term Project
COP 5725 Fall 2016 Hospital System Database and Data Interface Term Project Due date: Nov. 3, 2016 (THU) Database The database contains most of the information used by the web application. A database is
More informationMulG-Vendor Key Management with KMIP
MulG-Vendor Key Management with KMIP Tim Hudson CTO Cryptso2 tjh@cryptso2.com GS13A 19-May-2016 1:35pm Key Management 1000011010100100101100101010000010101000101001101001111010001100 Key Management Standards
More information2017 MOC PEDIATRIC PRACTICE LOG TEMPLATE:
AMERICAN BOARD OF UROLOGY 2017 MAINTENANCE OF CERTIFICATION (MOC) Level 4 PEDIATRIC UROLOGY SUBSPECIALTY CERTIFICATION EXAMINATION PROCESS INSTRUCTIONS FOR SUBMISSION OF ELECTRONIC LOGS Please read all
More informationRecord Linkage 11:35 12:04 (Sharp!)
Record Linkage 11:35 12:04 (Sharp!) Rich Pinder Los Angeles Cancer Surveillance Program rpinder@usc.edu NAACCR Short Course Central Cancer Registries: Design, Management and Use Presented at the NAACCR
More informationU4 L6 5.1 Direct Variation & 5.2 Partial Variation (Spring 2017) (completed).notebook April 11, 2017
Apr 11-10:24 AM 1 ACTIVITY: Crazy Taxi Watch the following video. What is the queson being asked? Apr 6-8:03 AM 2 EXTENSION QUESTIONS: a) How much would the trip cost if you traveled 25 km? b) How far
More informationPMDA Valida+on Rules. Preparing for your next submission to Japanese Pharmaceu6cals and Medical Devices Agency. Max Kanevsky December 10, 2015
PMDA Valida+on Rules Preparing for your next submission to Japanese Pharmaceu6cals and Medical Devices Agency Max Kanevsky December 10, 2015 Presenter Max Kanevsky Founder of OpenCDISC CEO of Pinnacle
More informationCS 61C: Great Ideas in Computer Architecture Direct- Mapped Caches. Increasing distance from processor, decreasing speed.
CS 6C: Great Ideas in Computer Architecture Direct- Mapped s 9/27/2 Instructors: Krste Asanovic, Randy H Katz hdp://insteecsberkeleyedu/~cs6c/fa2 Fall 2 - - Lecture #4 New- School Machine Structures (It
More informationLecture 13: Abstract Data Types / Stacks
....... \ \ \ / / / / \ \ \ \ / \ / \ \ \ V /,----' / ^ \ \.--..--. / ^ \ `--- ----` / ^ \. ` > < / /_\ \. ` / /_\ \ / /_\ \ `--' \ /. \ `----. / \ \ '--' '--' / \ / \ \ / \ / / \ \ (_ ) \ (_ ) / / \ \
More informationTitle NPI enumeration/subpart standardized reporting Issue ID 1
Title NPI enumeration/subpart standardized reporting Issue ID 1 5010 837 transactions enforce the intent of the NPI final rule. Providers must use the same enumeration strategy regardless of the health
More informationGoing Further with matchit. Version 5.2
Going Further with matchit Version 5.2 Copyright matchit is copyright helpit systems ltd 1994-2008, all rights reserved. FoxPro is copyright Microsoft Corporation 1988-2008, all rights reserved. Trademarks
More informationBest Practices. Contents. Meridian Technologies 5210 Belfort Rd, Suite 400 Jacksonville, FL Meridiantechnologies.net
Meridian Technologies 5210 Belfort Rd, Suite 400 Jacksonville, FL 32257 Meridiantechnologies.net Contents Overview... 2 A Word on Data Profiling... 2 Extract... 2 De- Identification... 3 PHI... 3 Subsets...
More informationThinking Induc,vely. COS 326 David Walker Princeton University
Thinking Induc,vely COS 326 David Walker Princeton University slides copyright 2017 David Walker permission granted to reuse these slides for non-commercial educa,onal purposes Administra,on 2 Assignment
More informationSecuring Hadoop. Keys Botzum, MapR Technologies Jan MapR Technologies - Confiden6al
Securing Hadoop Keys Botzum, MapR Technologies kbotzum@maprtech.com Jan 2014 MapR Technologies - Confiden6al 1 Why Secure Hadoop Historically security wasn t a high priority Reflec6on of the type of data
More informationRecord Linkage using Probabilistic Methods and Data Mining Techniques
Doi:10.5901/mjss.2017.v8n3p203 Abstract Record Linkage using Probabilistic Methods and Data Mining Techniques Ogerta Elezaj Faculty of Economy, University of Tirana Gloria Tuxhari Faculty of Economy, University
More informationQUILLEN ETSU PHYSICIANS
QUILLEN ETSU PHYSICIANS Module 5: Notes Provider Training Module Allscripts Touchworks EHR Quillen EHR Team Phone: (423) 282-6122, Option 1 June 2018 MODULE INSTRUCTIONS There are a total of 5 modules
More informationSemantics, Metadata and Identifying Master Data
Semantics, Metadata and Identifying Master Data A DataFlux White Paper Prepared by: David Loshin, President, Knowledge Integrity, Inc. Once you have determined that your organization can achieve the benefits
More informationOnline Batch Services
Online Batch Services LexisNexis has enhanced its batch services to allow more user-friendly functionality for uploading batches and mapping layouts. Users sign in to the main product to access the online
More informationUC Davis Health System
UC Davis Health System Application Programming & Project Management I NSTRUCTION M ANUAL Incident Reporting 2.0 Reporter Guide August 2, 2004 Developed by Michael I. Jacobs Programmer Scott P. Silva Project
More informationIntroduc)on to Data Management. Elizabeth Wickes Chris1e Wiley
Introduc)on to Data Management Elizabeth Wickes Chris1e Wiley Data Management Workshop Series Introduc)on to Data Management February 16 th 10AM 11AM Documenta)on and Organiza)on for Data and Processes
More informationAn Ensemble Approach for Record Matching in Data Linkage
Digital Health Innovation for Consumers, Clinicians, Connectivity and Community A. Georgiou et al. (Eds.) 2016 The authors and IOS Press. This article is published online with Open Access by IOS Press
More information