1
|
|
2
|
- Introduction of HCO to SKM
- Clinical Knowledge characteristics
- Issues for SKM in the Dental School
- Implementation in the Dental School
- Issues for Future Research
|
3
|
- Previous focus on data creation, acquisition, storage, and transmis=
sion
(Alavi & Leidner, 1999)
- Protection of knowledge has received little attention in research
(Bloodgood & Sali=
sbury,
2001)
- 2073 KM practitioners - Security issues ranked 10th amon=
g KM
practitioners (King, 2002)
- 307 KM - Little or no focus on security by knowledge managers (Asll=
ani
& Luthans, 2003)
|
4
|
- Limited foray into KMS
- Biggest challenges
- sharing data across multiple systems and platforms
- setting standards
- Improving accessibility (Bailey, 2003)
- Along comes HIPAA (1996)
- New focus on Privacy (2003) and Security (2005)
|
5
|
- Knowledge is different; KBV and Competitive Advantage (Grant, 1996;
Salisbury, 2003)
- Competitiveness hinges on management of intellectual resources (Gro=
ver
& Davenport, 2001)
- Effective knowledge management requires a knowledge infrastructure =
and
architecture – including security (Gold, et al., 2001)
- Clinical knowledge is neither unidirectional or linear
- Various users with the demand for more access, more summaries, more
audits, more analytical tools (data mining)
- Current focus is still on database and data security (Damm &
Schindler, 2002)
|
6
|
|
7
|
- Clinical Information Management System (CIMS)
- 2005 Security Deadline
- Patient record is primary vehicle – broad compilation of data=
and
information
- Goal:
- Quality/Effective Dental Care
- Balancing access with security & privacy
- Teaching School
|
8
|
|
9
|
- More on Clinical Information Management System (CIMS)
- Central repository
- Internal development, Client-server (since 1998)
- Security: electronic, physical, human
- KMS functions
- Tracking student progress
- Evaluating outcomes
- Summary financial reports
- QA Analysis
- EMR/EHR (future)
- Digital radiographs (future)
|
10
|
|
11
|
|
12
|
- Continuous Training
- Continuous Risk assessment
- Contingency planning
|
13
|
- Continuous Training
- HIPAA 101 + Refreshers
- High risk Areas
- Weakest link (Smith, 2003) – Example!
- Compliance through:
- Random audits
- Education
- Bulletins/Monthly Clinic Newsletter
- Online quizzes
- Changing the CULTURE!
|
14
|
- Continuous Risk assessment
- Four areas
- Physical assets
- Networking
- Software
- Business/clinical processes
- Gap analysis
- Random audits (time consuming)
|
15
|
- Contingency planning
- Initial assessment
- Linked to training
- UB guidelines vs. state guidelines
- On a case-by-case basis
|
16
|
- Culture change – “culture of security”
- External influences
- New technology (part of the solution)
- Single-Sign-On (SSO): security vs ease of use
- OASIS/HL7/ASTM/???
|
17
|
|
18
|
|
19
|
|