Title: The Clinical Results Repository at Southwestern A Study in Partnership
1(No Transcript)
2It will not make the slightest difference to
anything Comments by the French Inspector
General of the Infantry concerning the value of
the machine gun.
3(No Transcript)
4- Never Rely on Technology to Solve Problems
Organizations and people are flexible. Technology
is not. - Dont Ignore History The strategic use of
technology always requires process change. - Know the Real CostsAs a rule of thumb, process
change will cost 2x-4x the price of hardware and
software.
5Information Architecture
Kirk KirkseyVP for Information ResourcesUT
Southwestern Medical Center at Dallas(214) 648
6252kirk.kirksey_at_email.swmed.edu
6A Short Exercise
Youre Loan Shark USA is the fastest growing
small loan company in the United States. The YLS
strategy is to grow by acquiring small finance
companies across the country. Eight acquisitions
are planned for the next 10 months. Each branch
has separate computer systems storing detailed
customer record. Unfortunately these are
different software platforms. Some are in-house
developed. Others have been purchased from
various small and large vendors. The commonality
of information collected is unknown. A major
problem is costing millions and is threatening to
put the company out of business. Newly acquired
offices are unable to identify deadbeat customers
who already have loans with the company. Default
rates are soaring. Consultants from Chicago
wearing wool overcoats and carrying 300 fountain
pens have determined that pre-qualifying loans
with the companys existing information would
save 10m per year. They recommend integrating
customers computer records. Unfortunately, they
went back to Chicago before describing exactly
how to accomplish this goal. Your are the new
CEO charged with correcting this problem (the
last one was fired). You have called a meeting
with the companys Chief Information Officer and
her council of technical gurus. Before the
meeting, you want to set a direction. As
described
7(No Transcript)
8Information Architecture
- Part 1 Architecture Defined
- Part 2 Levels of Architecture
- Part 3 Components of Architecture
- Part 4 Information Architecture Overview
- Part 5. A Case Study The Electronic Medical
Record - Part 6. An Assessment of Risk
- Part 7 Protecting Your Architecture
9Part 1Information Architecture The single most
misused, misunderstood, misinterpreted term in
information technology today. What does it mean
to you????
10Part 1 Architecture What is it?
11Information Architecture
Information Architecture is a high level or
general view of something that conveys an overall
understanding of its various components and how
those components interrelate.
John Hobbs
12Moving Toward anInformation Architecture
Stage 3 Clusters of Databases
Clusters of Processes Required
Communications Structure
Stage 2 Required Processes
Geographic Locations Nature of
Process Interaction Business Rules
for Relationships
Stage 1 Structure of Organization
Goals of the Organization Required
Business Functions Information Needs
13Part 2 Levels of Architecture
14Levels of an Information Architecture
Application ArchitectureProcessing and storage
for a logical function
Network ArchitectureData communications
structure required for application interaction
Exchange ArchitectureTechnologies required for
interchange of information
Foundation Architectures
Integration ArchitectureRelational technologies
required to create new logical structures from
disparate components
The Architecture of Findability
15Exercise
- In keeping with our definition of architecture.
- What high level concepts do the following
representations of architecture convey to you? - What strengths are conveyed?
- What weaknesses do you see?
16Application Architecture
A Tiered Architecture
The Relationship of Function
17A Network Architecture
18Information Exchange Architecture
- Manual
- Batch
- Point to Point
- Screen Scrap
- Transaction Intercept
- Interface Engine
19Level 3 Integration
Level 1 Departmental
Systems
Level 2 Communications
Level 4 Linked Repositories
Local Area/Wide Area Network
UTSW
- Medical Entities Dictionary (proposed)
The Architectureof Integration
Firewall
The Internet
Hospital A
Hospital B
20(No Transcript)
21Part 3Architectural Components orWhy Does
this Stuff Cost So Much?
22Architectural ComponentsA Brief History of Chaos
1992Internet TCP/IP
1983 Desktop Computing
1950sMainframe
1961RS232
1960 Minis
1985Networking
1990Client Server
23Mainframes
- Single Vendor Solutions
- Glass House Organization(my way or the
highway) - Proprietary Technologies
24What is a Mainframe
From Whatis.com
25Minicomputers
- Inexpensive
- Clinical Lab Products
- Polorized IT Organizations
- Specialized Applications
- DEC and MUMPS
26RS232
- Hardware Port Standard
- Facilitated Real Time Data Interface
- Made IT Organizations Hate Each Other Even More
- Made EDI Possible
27Point-to-Point Model
- Two Way Required
- N (N-1)
- Vendor Cost
- Maintenance
- Change Management
- Personnel
- Standards
- Expensive
28Desktop Computing
- Information dispersed
- IS costs impossible to calculate
- Little institutional value
29The Network
- Replaces computer system as single critical
component - Pathway to information
- The network is the system
30Networking for the Masses
- Rise of Connectivity
- Corporate Pathway to Departmental Information
- Computing over Wide Geographies
- The Network Becomes the System
31(No Transcript)
32Electronic Data Interchange (EDI)
- Layer 7 in OSI Model
- Standards Based Data Interface
- Cost of Interface and Data Exchange Falls
- Real Time Predictability
33Client Server Computing
- Lowers (maybe) total cost of computing
- Distributes Computing Functions to Cheap Machines
- Foster distribution of large databases
- Promotes Easy to Use Tools
34The Internet
- Global Commerce
- Information Security Risks
- Really Distributed Computing
- The Communication Appliance
35Part 4 An Brief Overview of Information
Architectures
36Some Assumptions About Architecture
- Network is present
- Multiple applications. Multiple platforms.
- Legacy data interfaces present
- Islands of useful information
- Information integration is good
- Youve got to do Web stuff but nobody knows why
except your consultant
37Lets Not Be Confused
- ConnectivityAbility to obtain functional
connection - InterfaceExchange of data
- IntegrationCo-mingled information creating a
logical structure.
38Department
TheIntegrationFoodChain
39Application Philosophy
- Best of BreedSelect best product for the
jobObtain connectivityIntegrate - Core SystemsMinimize number of vendors (usually
central administration then functional areas) - Single VendorIf you find one of these that
works, call me.
40Separate ApplicationsData InterchangeMultiple
Connections
41VisualIntegration
42Visual Integration
Strengths Weaknesses
- Strategic limitations
- Operational vulnerabilities
43Data Warehouse Model
44Intranet/Extanet
Integration Tools
DataWarehouse
E CommerceSupply Chain MgtEDI
AncillaryWarehouse
Internet
45Data Warehouse
Strengths Weaknesses
- Strategic use of information
- Create new data structure
- Expensive
- May require new middleware or backend processes
46Data Warehouse
- Integrates disparate information
- Require standardization method
- Allows strategic use of information
- Less subject to operational glitches
- Less expensive to support
- expensive
47Building Architectures
Mainframes The Internet EDI
The Network Mini Computers Desktop
Computing RS232
48A Short Exercise
Youre Loan Shark USA is the fastest growing
small loan company in the United States. The YLS
strategy is to grow by acquiring small finance
companies across the country. Eight acquisitions
are planned for the next 10 months. Each branch
has separate computer systems storing detailed
customer record. Unfortunately these are
different software platforms. Some are in-house
developed. Others have been purchased from
various small and large vendors. The commonality
of information collected is unknown. A major
problem is costing millions and is threatening to
put the company out of business. Newly acquired
offices are unable to identify deadbeat customers
who already have loans with the company. Default
rates are soaring. Consultants from Chicago
wearing wool overcoats and carrying 300 fountain
pens have determined that pre-qualifying loans
with the companys existing information would
save 10m per year. They recommend integrating
customers computer records. Unfortunately, they
went back to Chicago before describing exactly
how to accomplish this goal. Your are the new
CEO charged with correcting this problem (the
last one was fired). You have called a meeting
with the companys Chief Information Officer and
her council of technical gurus. Before the
meeting, you want to set a direction. As
described
- What is the fundamental problem (one sentence
two words would be better)? - What do you need to know about the loan
application process? - What do you need to know about the computer
systems at the branch offices? - What do you need to know about industry
technology standards and best practices? - What do you need to know about the companys
technical communication infrastructure? - What do you believe are the four or five major
milestones needed to accomplish the
fullintegration of company information?
49Part 5 Case Study
How to achieve tightly coupled integrated
clinical information systems in a growing patient
population served by multiple departments and
affiliated but separate institutions?
50A Typical Clinical Systems Environment
- Point to Point Environment
- Separate Network Topologies
- Redundancies
- No Enterprise Information Strategy
51(No Transcript)
52The Goal
- Departmental Autonomy
- The Identification and Integration of Strategic
Information - Scorched Earth Not Possible
- Widest Access Possible
- Lowest Cost Possible
53The Goal
Strategic Warehouses
- Clinical Results
- Research Engine
- Financial Decision Support
54Organizational Considerations
- Budgeting Methodology Infrastructure Increased
departmental burden - Support and Training Inter Departmental Inter
Institutional - Information Security Competitive
information Institutional responsibility Patient
confidentiality - Technology Standards
55Level 3 Integration
Level 1 Departmental
Systems
Level 4 Linked Repositories
Level 2 Communications
- Passive Master Entities Index
UTSW
- Medical Entities Dictionary (proposed)
An Architecture for
Patient
Integration
The Internet
Hospital A
Hospital B
Active Master Entities Index
56Level 1 The Applications Architecture
- Build Phase 1 Network
- Establish Connectivity
- Establish EDI Standards
- Establish Connectivity Standards
- Active person index for positive identification
Establish Phase 1 Systems Hospital Information
SystemsLab SystemsRadiology SystemsAppointment
SchedulingInpatient BillingOutpatient Billing
57Level 2 The Enterprise Data Communication
Architecture
- Single Network Topology
- Centrally Funded and Managed
- Defined Physical and Transport Standards
- NO EXCEPTIONS
58Level 3 The Integration Layer
- Interface Engine Technology
- Master Entities Index
- Standard Vocabularies
- Standard EDI
59The Interface Engine
Point-to-Point Model
Interface Engine
- Object Oriented
- One to Many
- Many to One
- Minimize Vendor Involvement
- Can Force Standard EDI
- Two Way Required
- N (N-1)
- Vendor Cost
- Maintenance
- Change Management
- Personnel
- Standards
60Same Person?????
Name Bob SmithSex MaleAddrs 4141
Gilbert Dallas 75219DOB
8/27/52SSN 464-98-7628
Name Robert SmithSex MaleAddrs 4141
Gilbert Dallas 75214DOB
8/27/52SSN 464-98-7628
61Master Entities Index
- Probabilistic Matching
- Weighting
- Suspense Queue for Human Intervention
62Name Bob SmithSex MaleAddrs 4141
Gilbert Dallas 75219DOB
8/27/52SSN 464-98-7628
P80Patient Match
Master PersonIndex
Name Robert SmithSex MaleAddrs 4141
Gilbert Dallas 75214DOB
8/27/52SSN 464-98-7628
P
63Level 4 Warehousing
- Reconciled Data
- Allows Multiple Views
- Data Mining
- Can be linked to other warehouses
64Part 6 An Assessment of Risk
65Sources of Information Loss
Respondents Sources of Financial Losses and
Concerns
- System Downtime or Failure - 72
- Inadvertent Errors - 71
- Viruses - 46
- Malicious Acts by Employees - 29
- Malicious Acts by Outsiders - 19
- Natural Disasters - 17
- Unknown Source - 15
- Industrial Espionage - 8
Source CSI Computer Crime and Security Survey
(1999 Results)
66Impact and Likelihood
Impact
Probability
- High - 500,000
- Medium - 1K-500K
- Low -
- Certain
- Possible
- Unlikely
67UT SouthwesternTop 20 Events4/7/99 - 5/11/99
68- Certainty of LossVSValue of Loss
Unlikely Possible Certain
High500K Med100K 500K Low
69Exercise
Identify 5 high probability risks associated with
both the computerized medical record and the YLS
example.
70CRR A Risk Analysis
Total Risks 77
71High Risk/Certain
- No Std for Adding New Users
- No Procedures for Controlling Physical Access
- No Owner Defined
- Inaccurate Info in the CRR
- Wrong Patient ID
- Hardware/Network Capacity Exhausted
- Lack of Campus-Wide Security Standards
- Unauthorized Browsing
- Political Change in Direction
- Compromise of Security in Dept Systems
- Unprotected Dial-in
- Viruses Spread by Vendor
- No Central Security Adm
72High Risk/Certain (cont)
- Rules for Decision Support Assumed Present
- Incomplete or Improper Matching Info
73Wrong Patient ID
- Master Patient Index
- Probabilistic Matching
- Name (Soundex)
- DOB
- SSN
- Two Year Backload as Test
74Unprotected Dial-in
- No Web Access
- Controlled Citrix Server
- Personal Validation of Password
75Hardware/Network Exhausted
- Standard Management Metrics in Place
- CPU Utilization
- Disk Usage
- Segment Usage
- Central Network Monitor with Remote Disconnect
Capabilities - Fiber Backbones with Giga Switch Connectivity
76No Owner Defined
- UT Southwestern established as Service Bureau
- Dissolution Agreements in Place
- Hardware/Software Agreements in Place in Case of
Institutional Split
77Political Change in Direction
- Service Level Contract
- Dissolution Agreement
- Purchased Hardware in Divisible Chunks
78Viruses Spread By Vendor
- All Servers Checked Daily
- All Workstations Checked Daily (minimum). Shield
Required - Disconnect Infected Users
79Part 7 Protecting Your Architecture
80Recovery Strategies Cost VS Risk
- Hot SiteRemote hardware on standby
- Warm SiteRemote hardware (minimal)
- Cold SiteNo hardware. Site only
- Business ContinuationDown time procedures
81How to Recover from a Disaster
- Do your backups
- Test your backups
- See your backups
- Touch your backups
- Store your backups off site
- If backups take too long, get a new computer
82Disaster Recovery
- Risk Assessment (dont forget the phones and
network) - Communications (who calls who)
- Hot Site (Comdisco, Sunguard, IBM)
- Cold Site and Drop Shop Contracts
- Crises Recovery Team
- Declaring a Disaster
- Business Contingency Planning
83Chicago Hot Site
Grand PrairieWork Site
DR VendorsNational Network
Permanent T1
- Step 1 Declare Disaster
- Step 2 Retrieve backup media from offsite
storage. - Step 3 Fly media and personnel to Chicago
- Step 4 Establish UTSW environment
- Step 5 Evaluate. Begin building local cold site
X
Local Cold Site
84In Closing, Remember. . .
Nothing hard is every easy. My Grandmother