In addition the medical informatics healthcare

  • No School
  • AA 1
  • nallamotuanu
  • 114
  • 100% (1) 1 out of 1 people found this document helpful

This preview shows page 103 - 106 out of 114 pages.

In addition, the medical informatics, healthcare services, and claims administration departments were consulted because they used the claims information on a day-to-day basis. Table 13.2: Subset of a RACI Matrix for Healthcare Claims Data Categories of Attributes Responsible Accountable Consulted Informed ICD-9 and CPT codes Network Management Business Intelligence Medical Informatics, Healthcare Services, Claims Administration N/A Summary This chapter reviews the importance of integrating BPM and big data governance for healthcare. The big data governance program would be well- served to map policies against key activities within mission-critical business processes.
Image of page 103
N OTES 1. The 2011 Digital Universe Study: Extracting Value from Chaos (IDC, 2011). 2. . 3. “Mars Climate Orbiter Fact Sheet.” orbiter/ fact.html. 4. Mars Climate Orbiter Mishap Investigation Board Phase I Report (NASA, November 1999). 5. “An Overview of Biometric Recognition.” info.html. 6. “Biometrics in the Workplace.” Data Protection Commissioner of Ireland. . 7. Samuel Warren and Louis Brandeis. “The Right to Privacy.” Harvard Law Review , Vol. IV, No. 5, December 15, 1890. 8. This chapter includes content from the IBM big data platform solution brief (IBM, 2012). 9. “IBM InfoSphere Streams Data Sheet” (IBM, 2011). 10. Jonny Longden. “Essential Guide to Accuracy in Web Analytics.” Actionable Analytics blog, August 4, 2009. 2009/08/essential-guide-to-data-accuracy-in-web-analytics. 11. “Velocity in Call Centers” (IBM Vivisimo, 2010). - management.com/media/pdfs/casestudy-callcenters.pdf. 12. “Velocity in Pharmaceuticals” (IBM Vivisimo, 2010). docs/casepharma.pdf. 13. . 14. The 2011 Digital Universe Study: Extracting Value from Chaos (IDC, 2011). 15. Kai Biermann. “Betrayed by Our Own Data.” Zeit Online , March 26, 2011. . 16. Erik Larkin. “Browser Fingerprinting Can ID You Without Cookies.” PCWorld , January 29, 2010. browser_fingerprinting_can_id_you_without_cookies.html. 17. IBM InfoSphere Guardium: Managing the Entire Database Security and Compliance Cycle (IBM, 2011). See also common/ssi/ecm/en/imd14286caen/IMD14286CAEN.PDF. 18. IBM InfoSphere Streams: Harnessing Data in Motion (IBM, 2010).
Image of page 104
94 •  IBM InfoSphere 19. Roger Rea. “IBM InfoSphere Streams: Redefining Real Time Analytical Processing” (IBM, 2010). 20. 2010 Information Governance Benchmark Report in Global 1000 Companies (The Compliance, Governance and Oversight Council, 2010). 21. IT Metrics: IT Spending and Staff Report (Gartner, 2010).
Image of page 105
Image of page 106

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture