A Systematic Review of Healthcare Information Technology Anomaly Classification

Laura Pullum, Olufemi Omitaomu, Mohammed Olama, Addi Malviya Thakur, Ozgur Ozmer, Hilda Klasky, Teja Kuruganti, Merry Ward, Jeanie Scott, Angela Laurio, Brian Sauer, Frank Drews, Jonathan Nebeker

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Health information technology (HIT) was introduced to streamline administrative medical processes and alleviate errors that may negatively affect patient health. It has helped to some extent in this manner; however, studies have shown that the use of HIT has introduced unexpected new errors in the collection, transmission, use, and processing of electronic health records, as well as potential programming or configuration errors in these HIT systems. This study was initiated to identify HIT anomalies and, from this, potential hazards that may threaten patient safety. The results can be used to identify and prioritize hazard classes, and to assist in the design and implementation of HIT hazard controls and detectors.

Original languageEnglish
Title of host publicationProceedings - 2022 IEEE 10th International Conference on Healthcare Informatics, ICHI 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages393-400
Number of pages8
ISBN (Electronic)9781665468459
DOIs
StatePublished - 2022
Event10th IEEE International Conference on Healthcare Informatics, ICHI 2022 - Rochester, United States
Duration: Jun 11 2022Jun 14 2022

Publication series

NameProceedings - 2022 IEEE 10th International Conference on Healthcare Informatics, ICHI 2022

Conference

Conference10th IEEE International Conference on Healthcare Informatics, ICHI 2022
Country/TerritoryUnited States
CityRochester
Period06/11/2206/14/22

Keywords

  • HIT anomaly classification
  • electronic health records
  • health information technology
  • patient safety

Fingerprint

Dive into the research topics of 'A Systematic Review of Healthcare Information Technology Anomaly Classification'. Together they form a unique fingerprint.

Cite this