Presentation is loading. Please wait.

Presentation is loading. Please wait.

Health 2.0 trends and threads

Similar presentations


Presentation on theme: "Health 2.0 trends and threads"— Presentation transcript:

1 Health 2.0 trends and threads
Health 2.0 it´s up to you The term '2.0' is currently being applied to many fields of endeavour: Politics 2.0, Science 2.0, Trendwatching 2.0, Education 2.0, Police 2.0, Consultancy 2.0, Civil Service 2.0, etc. Within the health and welfare sector we see the terms Health 2.0, Healthcare 2.0, Care 2.0, Welfare 2.0 and Medicine 2.0, to name but a few. All are derived from the term 'Web 2.0', which was coined by Tim O’Reilly and Dale Dougherty to refer to collaboration within networks which rely on 'collective intelligence'. The more people involved, they contend, the greater the effects will be. Many definitions of the term '2.0' refer to the new generation of websites which are more dynamic and interactive than earlier (Web 1.0) examples. Rather than a 'solitary web experience' such as reading an online newspaper or corporate brochure, Web 2.0 users communicate with each other, and can even determine the type and form of the information which appears on the monitor before them. A significant component of Web 2.0 is therefore 'the wisdom of crowds'. The more people who take part in a social network, the greater the value they create Pavel Kubů M.D. Intel World Ahead Program, Healthcare CEE

2 The Perfect Storm is here
Rising Costs of Healthcare Aging Population Shortage of Healthcare Professionals New models of care forced to emerge

3 Highest Quality of Life
The Continuum of Care Shift Left Highest Quality of Life Lowest Cost of Care Quality of Life Health and Wellness Home Care Residential Care Acute Care Cost of Care

4 The wisdom of crowds: The more people who take part in a social network, the greater the value they create. Source: Health 2.0 It’s up to you, Council for Public Health and Health Care for the Minister of Health, Welfare and Sport, Hague 2010

5 Healthcare proffessionals
Health 2.0 platforms Biomedical Research Consumer/ Patients Healthcare proffessionals Smart- Phones & Handhelds Workstations/ Desktops Smart TVs Embedded Laptops Netbooks Tablets One Architecture Across Connected Devices for Healthcare Enabling a Secure, High Performance & Consistent User Experience

6 Care Coordination: What it Takes
CDSS EMR Gather & Store Comprehensive Information CPOE PHR HIE vPro TxT Empower the Patient Share Information Across Organizations AT, AESNI Now, if you jump to the next slide, it's a representation of the data and the data flow that we're talking about. If we're talking about care coordination and data flow, then where is the data and what venues are we talking about. Well, there are four fundamental areas where you're actually looking at the data. The very first thing you have to be able to do is have is have a repository for this data. So maybe one of the first things you need to think about is gathering and storing data. Sharing the data seems like the next logical thing once it's gathered, making that data mobile so it's available anywhere, in any environment, where any of the actors are that are caring for the patients, where any of these providers are, including taking the data to the home environment. But this is a circle. Once you take the data home, you generate more data which now you want to share with more people, which now may be more mobile healthcare workers. You can start anywhere on this circle to get started. If you want to coordinate data flow, you can start by building a health exchange. You can start by building a data center. You can start by looking at your mobile environment and starting to use things as simple as cell phones and mobile clients.OR you could start with a home care program. You can start anywhere. But to realize the true cost savings, to realize the true benefit, unfortunately you have to do all four of these things. Doing one of them in isolation will get you value, will get you savings, but the message I need to deliver to you, as providers, as caregivers, is you've actually got to do all four things. And again, you can get started anywhere, but the ultimate goal is, you need to do all four. So let's jump on and look at that. Well, saying you start with where the payments are going to be, say in the United States, with meaningful use. Patient Family MPOC MHealth Mobilize the Data TEAM Collaboration Secure Access to Information Everywhere 6 6 6

7 Care Coordination Across the Continuum
CPOE EMR MPOC Health Checkup Emergency Self Check & Control Clinic Electronic Health Record Data Repository To start with You're actually looking at Phase One of meaningful use; where I'm going to gather this information from and put it into my electronic record or my data repository. There are multiple sites that you need to gather the data from and that's what you need to start to comprehend. Who has the data that you're looking for? Critical to include all stakeholder Stakeholder Could be the emergency responders, the emergency room itself. It could be the community care hospital, the patient's doctor, the patient's nurse. It could be a freestanding diagnostic center or a lab and it could be an academic medical center. If you move forward now that I've actually kind of got this data, and I can put it together and I can create an electronic record, well, now that I have gathered the clinical data the patient's going to want to add to it. Home Community Hospital Visiting Care Remote Diagnostic Academic Hospital Research Pharmacy Long term Care Intel Confidential 7 7 7 7

8 Care Coordination Across the Continuum
HIE National Networks Health Checkup Emergency Personal Health Record Self Check & Control Data Exchange Patient-Centric Care Data Exchange Clinic Electronic Health Record Data Repository To meet Meaningful use criteria I need to make this information, available to the patient. So now the patient has a personal view of their own record and I want that to be able to feed into the electronic record and visa versa. And this allows me, actually, to start thinking about sharing data beyond what you might see as the traditional actors here on, the right side of the picture. I want to now start to share data with long term care. We said we want to be able to do electronic prescribing which means sending the data electronically to a pharmacist. And I want to be able to communicate with the visiting nurses because I want that shift left continuum. I want to be able to kick you out of the hospital once I've discharged you and keep you in the community. Home Community Hospital Visiting Care Remote Radiology Academic Hospital Research Pharmacy Long term Care Intel Confidential 8 8 8 8

9 Care Coordination Across the Continuum
PHRs Health Checkup Emergency Personal Health Record Self Check & Control Data Exchange Patient-Centric Care Data Exchange Clinic Electronic Health Record Data Repository I've got to better share this information across these continuums. And finally, I actually want to be able to take care of you at home and empower you to care for yourself at home. So, either that home care data that you're now starting to collect and generate because the patient's are becoming more sophisticated and using home checkers and home tools that are increasingly becoming available, that's going to feed into their personal health record in the data repository, not just institutional data. Home Community Hospital Visiting Care Remote Diagnostic Academic Hospital Research Pharmacy Long term Care Intel Confidential 9 9 9 9

10 Networking and Decision Support Systems are at the heart of delivering coordinated care to Maccabi members CDSS Health Checkup Emergency Personal Health Record Self Check & Control Data Exchange Patient-Centric Care Data Exchange Clinic Electronic Health Record Data Repository And finally, now that you actually see this holistic data, that’s where phase three meaningful use actually comes in and that's where now you apply rules and clinical decision support to this massive data that you've gathered and shared. And that's fundamentally the vision that you're thinking about. Alright, let's actually talking about how this can actually make a difference, what actually this might mean. Home Community Hospital Visiting Care Remote Diagnostic Academic Hospital Research Pharmacy Long term Care Intel Confidential 10 10 10 10

11 Coordinated Care Realizes Clinical and Economic Benefits
17 % increase in the number of women above age 50 who had a breast exam with mammography 17 % increase in the number of members over 65 who received a pneumovax vaccination the average hospital stay for cardiovascular patients declined from 0.7 days in to 0.5 days in 2006 76,000 avoided hospital days resulted in a total cost saving of $32 million USD Over a three year period to 2009, Maccabi achieved the following results:

12 Threads of Virtual World
Source: 2011 Internet Crime Report, Internet Crime Compliant Center

13 Romance Scams Victims believe they are “dating” someone decent and honest. However, the online contact is often a criminal with a well-rehearsed script that scammers use repeatedly and successfully. Scammers search chat rooms, dating sites, and social networking sites looking for victims. Although the principal group of victims is over 40 years old, divorced or widowed, disabled and often elderly, all demographics are at risk. Scammers use poetry, flowers and other gifts to reel in victims, while declaring “undying love.” These criminals also use stories of severe life circumstances, tragedies, family deaths, personal injuries or other hardships to keep their victims concerned and involved in their schemes. They also ask victims to send money to help overcome alleged financial hardships. Source: 2011 Internet Crime Report, Internet Crime Compliant Center

14 Work from Home Scams Consumers continue to lose money from work-from-home scams that cyber criminals use to move stolen funds. Regrettably, due to their participation, these individuals may face criminal charges. Organized cyber criminals recruit their victims through newspaper ads, online employment services, unsolicited s or “spam,” and social networking sites advertising work-from-home “opportunities.” Participating with a legitimate business, the consumer becomes a “mule” for criminals who use the consumer’s or other victim’s accounts to steal and launder money. In addition, the scammers may compromise the victim’s own identity or accounts. Source: 2011 Internet Crime Report, Internet Crime Compliant Center

15 FBI Impersonation Email Scams
The names of various government agencies and high-ranking government officials have been used in spam attacks in an attempt to defraud consumers. Government agencies do not send unsolicited s. Complaints related to spam s purportedly sent from the FBI continued to be reported with high frequency to IC3. In 2011, IC3 received about 39 complaints per day of this type. Source: 2011 Internet Crime Report, Internet Crime Compliant Center

16 We Know How to Transform Experiences
1995 Uncompromised Mobility 2003 2012+ Ultra Thin Ultra Responsive Ultra Secure Ultra Connected Ultrabook™ Multi-media CD ROM Time to do it again -

17 “ ” PCs are Stolen Frequently with Sensitive Data People are storing
Laptop theft is serious worldwide problem and it is getting worse all the time. As you can see from the statistics, every 12 seconds a laptop gets stolen in the U.S. According to a Dell-Ponemon study, 200,000 laptops are lost or stolen every year at European airports, laptops are stolen EVERY WEEK at US Airports. The Laptop users store valuable records, such as bank statements, or private information, such as credit card details, on their laptop. Loss of personal laptop and the data it contains can be an emotional and financial loss. Intel AT delivers peace of mind by helping lockdown lost or missing laptops. How does Intel Anti-Theft Service bring Intel AT Technology to life? What’s the difference between Intel® Anti Theft Technology and Intel Anti Theft Service? Lets take a look. People are storing 200,000 laptops lost or stolen every year at European airports more and more personal data on their laptops 12,000 laptops lost or stolen every week at US airports” - Dell-Ponemon study

18 Security and Trust Built In
Intel® Identity Protection Technology Intel® Anti-Theft Technology 18

19 Enabling the Ultrabook™ Experience for Ageing population

20


Download ppt "Health 2.0 trends and threads"

Similar presentations


Ads by Google