Literature DB >> 21277996

Learning relational policies from electronic health record access logs.

Bradley Malin1, Steve Nyemba, John Paulett.   

Abstract

Modern healthcare organizations (HCOs) are composed of complex dynamic teams to ensure clinical operations are executed in a quick and competent manner. At the same time, the fluid nature of such environments hinders administrators' efforts to define access control policies that appropriately balance patient privacy and healthcare functions. Manual efforts to define these policies are labor-intensive and error-prone, often resulting in systems that endow certain care providers with overly broad access to patients' medical records while restricting other providers from legitimate and timely use. In this work, we propose an alternative method to generate these policies by automatically mining usage patterns from electronic health record (EHR) systems. EHR systems are increasingly being integrated into clinical environments and our approach is designed to be generalizable across HCOs, thus assisting in the design and evaluation of local access control policies. Our technique, which is grounded in data mining and social network analysis theory, extracts a statistical model of the organization from the access logs of its EHRs. In doing so, our approach enables the review of predefined policies, as well as the discovery of unknown behaviors. We evaluate our approach with 5 months of access logs from the Vanderbilt University Medical Center and confirm the existence of stable social structures and intuitive business operations. Additionally, we demonstrate that there is significant turnover in the interactions between users in the HCO and that policies learned at the department-level afford greater stability over time.
Copyright © 2011 Elsevier Inc. All rights reserved.

Entities:  

Mesh:

Year:  2011        PMID: 21277996      PMCID: PMC3063332          DOI: 10.1016/j.jbi.2011.01.007

Source DB:  PubMed          Journal:  J Biomed Inform        ISSN: 1532-0464            Impact factor:   6.317


  26 in total

1.  Computational organization science: a new frontier.

Authors:  Kathleen M Carley
Journal:  Proc Natl Acad Sci U S A       Date:  2002-05-14       Impact factor: 11.205

2.  Correlating web usage of health information with patient medical data.

Authors:  Bradley A Malin
Journal:  Proc AMIA Symp       Date:  2002

3.  A social network analysis of healthcare professional relationships in a French hospital.

Authors:  Laurent Boyer; Raoul Belzeaux; Olivier Maurel; Karine Baumstarck-Barrau; Jean-Claude Samuelian
Journal:  Int J Health Care Qual Assur       Date:  2010

4.  Health care information technology: progress and barriers.

Authors:  William Hersh
Journal:  JAMA       Date:  2004-11-10       Impact factor: 56.272

5.  Modelling privilege management and access control.

Authors:  Bernd Blobel; Ragnar Nordberg; John Mike Davis; Peter Pharow
Journal:  Int J Med Inform       Date:  2005-09-30       Impact factor: 4.046

6.  A longitudinal social network analysis of the editorial boards of medical informatics and bioinformatics journals.

Authors:  Bradley Malin; Kathleen Carley
Journal:  J Am Med Inform Assoc       Date:  2007-02-28       Impact factor: 4.497

7.  Using social network analysis within a department of biomedical informatics to induce a discussion of academic communities of practice.

Authors:  Jacqueline Merrill; George Hripcsak
Journal:  J Am Med Inform Assoc       Date:  2008-08-28       Impact factor: 4.497

8.  Social networks and physician adoption of electronic health records: insights from an empirical study.

Authors:  Kai Zheng; Rema Padman; David Krackhardt; Michael P Johnson; Herbert S Diamond
Journal:  J Am Med Inform Assoc       Date:  2010 May-Jun       Impact factor: 4.497

9.  Sharing medical data for health research: the early personal health record experience.

Authors:  Elissa R Weitzman; Liljana Kaci; Kenneth D Mandl
Journal:  J Med Internet Res       Date:  2010-05-25       Impact factor: 5.428

10.  Supporting communication in an integrated patient record system.

Authors:  Dario A Giuse
Journal:  AMIA Annu Symp Proc       Date:  2003
View more
  18 in total

1.  Role prediction using Electronic Medical Record system audits.

Authors:  Wen Zhang; Carl A Gunter; David Liebovitz; Jian Tian; Bradley Malin
Journal:  AMIA Annu Symp Proc       Date:  2011-10-22

2.  Using Visual Analytics to Determine the Utilization of Preoperative Anesthesia Assessments.

Authors:  J P Wanderer; C L Gruss; J M Ehrenfeld
Journal:  Appl Clin Inform       Date:  2015-10-21       Impact factor: 2.342

3.  Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering.

Authors:  Aditya Krishna Menon; Xiaoqian Jiang; Jihoon Kim; Jaideep Vaidya; Lucila Ohno-Machado
Journal:  Mach Learn       Date:  2014-04-01       Impact factor: 2.940

4.  Evaluating the Effectiveness of Auditing Rules for Electronic Health Record Systems.

Authors:  Monica Hedda; Bradley A Malin; Chao Yan; Daniel Fabbri
Journal:  AMIA Annu Symp Proc       Date:  2018-04-16

5.  Auditing medical records accesses via healthcare interaction networks.

Authors:  You Chen; Steve Nyemba; Bradley Malin
Journal:  AMIA Annu Symp Proc       Date:  2012-11-03

6.  We work with them? Healthcare workers interpretation of organizational relations mined from electronic health records.

Authors:  You Chen; Nancy Lorenzi; Steve Nyemba; Jonathan S Schildcrout; Bradley Malin
Journal:  Int J Med Inform       Date:  2014-04-28       Impact factor: 4.046

7.  Primary Care Providers' Opening of Time-Sensitive Alerts Sent to Commercial Electronic Health Record InBaskets.

Authors:  Sarah L Cutrona; Hassan Fouayzi; Laura Burns; Rajani S Sadasivam; Kathleen M Mazor; Jerry H Gurwitz; Lawrence Garber; Devi Sundaresan; Thomas K Houston; Terry S Field
Journal:  J Gen Intern Med       Date:  2017-08-14       Impact factor: 5.128

Review 8.  "Big data" and the electronic health record.

Authors:  M K Ross; W Wei; L Ohno-Machado
Journal:  Yearb Med Inform       Date:  2014-08-15

9.  Leveraging Social Networks to Detect Anomalous Insider Actions in Collaborative Environments.

Authors:  You Chen; Steve Nyemba; Wen Zhang; Bradley Malin
Journal:  ISI       Date:  2011-07

10.  Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems.

Authors:  Carl A Gunter; David Liebovitz; Bradley Malin
Journal:  IEEE Secur Priv       Date:  2011       Impact factor: 3.573

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.