[HTML][HTML] Chatbot for health care and oncology applications using artificial intelligence and machine learning: systematic review
L Xu, L Sanders, K Li, JCL Chow - JMIR cancer, 2021 - cancer.jmir.org
Background: Chatbot is a timely topic applied in various fields, including medicine and
health care, for human-like knowledge transfer and communication. Machine learning, a …
health care, for human-like knowledge transfer and communication. Machine learning, a …
[HTML][HTML] Process mining in healthcare–An updated perspective on the state of the art
E De Roock, N Martin - Journal of biomedical informatics, 2022 - Elsevier
Process mining is the research domain focusing on the development of innovative methods
to gather insights from event logs. It has been used for various use cases within the …
to gather insights from event logs. It has been used for various use cases within the …
Using electronic health record audit logs to study clinical activity: a systematic review of aims, measures, and methods
Objective To systematically review published literature and identify consistency and
variation in the aims, measures, and methods of studies using electronic health record …
variation in the aims, measures, and methods of studies using electronic health record …
Characterizing physician EHR use with vendor derived data: a feasibility study and cross-sectional analysis
Objective To derive 7 proposed core electronic health record (EHR) use metrics across 2
healthcare systems with different EHR vendor product installations and examine factors …
healthcare systems with different EHR vendor product installations and examine factors …
Mining tasks and task characteristics from electronic health record audit logs with unsupervised machine learning
Objective The characteristics of clinician activities while interacting with electronic health
record (EHR) systems can influence the time spent in EHRs and workload. This study aims …
record (EHR) systems can influence the time spent in EHRs and workload. This study aims …
Changes in efficiency and quality of nursing electronic health record documentation after implementation of an admission patient history essential data set
EL Karp, R Freeman, KN Simpson… - CIN: Computers …, 2019 - journals.lww.com
The objective of this quality improvement study was to evaluate whether electronic health
record system timers and event logs can measure the efficiency and quality of a clinical …
record system timers and event logs can measure the efficiency and quality of a clinical …
A modification of time-driven activity-based costing for comparing cost of telehealth and in-person visits
MJ Dooley, KN Simpson, AN Simpson… - Telemedicine and e …, 2022 - liebertpub.com
Introduction: Cost studies of telehealth (TH) and virtual visits are few and report mixed
results of the economic impact of virtual care and TH. Largely missing from the literature are …
results of the economic impact of virtual care and TH. Largely missing from the literature are …
Interaction patterns of trauma providers are associated with length of stay
Background Trauma-related hospitalizations drive a high percentage of health care
expenditure and inpatient resource consumption, which is directly related to length of stay …
expenditure and inpatient resource consumption, which is directly related to length of stay …
Defining an essential clinical dataset for admission patient history to reduce nursing documentation burden
DE Sutton, JR Fogel, AS Giard… - Applied Clinical …, 2020 - thieme-connect.com
Background Documentation burden, defined as the need to complete unnecessary
documentation elements in the electronic health record (EHR), is significant for nurses and …
documentation elements in the electronic health record (EHR), is significant for nurses and …
ML-based cyber incident detection for Electronic Medical Record (EMR) systems
D McGlade, S Scott-Hayward - Smart Health, 2019 - Elsevier
An upward trend in cyber incidents across both UK and US hospitals has been observed
since 2015. Attacks range from identity theft to insurance fraud and extortion/blackmail. The …
since 2015. Attacks range from identity theft to insurance fraud and extortion/blackmail. The …