-
Notifications
You must be signed in to change notification settings - Fork 0
/
IT Primer for Health Information Exchange.htm
240 lines (216 loc) · 33 KB
/
IT Primer for Health Information Exchange.htm
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"><meta http-equiv="Content-Style-Type" content="text/css">
<title>IT Primer for Health Information Exchange</title>
<script type="text/javascript" language="JavaScript">
<!--
function MM_swapImgRestore() { //v3.0
var i,x,a=document.MM_sr; for(i=0;a&&i<a.length&&(x=a[i])&&x.oSrc;i++) x.src=x.oSrc;
}
function MM_preloadImages() { //v3.0
var d=document; if(d.images){ if(!d.MM_p) d.MM_p=new Array();
var i,j=d.MM_p.length,a=MM_preloadImages.arguments; for(i=0; i<a.length; i++)
if (a[i].indexOf("#")!=0){ d.MM_p[j]=new Image; d.MM_p[j++].src=a[i];}}
}
function MM_findObj(n, d) { //v4.01
var p,i,x; if(!d) d=document; if((p=n.indexOf("?"))>0&&parent.frames.length) {
d=parent.frames[n.substring(p+1)].document; n=n.substring(0,p);}
if(!(x=d[n])&&d.all) x=d.all[n]; for (i=0;!x&&i<d.forms.length;i++) x=d.forms[i][n];
for(i=0;!x&&d.layers&&i<d.layers.length;i++) x=MM_findObj(n,d.layers[i].document);
if(!x && d.getElementById) x=d.getElementById(n); return x;
}
function MM_swapImage() { //v3.0
var i,j=0,x,a=MM_swapImage.arguments; document.MM_sr=new Array; for(i=0;i<(a.length-2);i+=3)
if ((x=MM_findObj(a[i]))!=null){document.MM_sr[j++]=x; if(!x.oSrc) x.oSrc=x.src; x.src=a[i+2];}
}
//-->
</script>
<!--*********************--> <!--Your <head> code here--> <!--*********************--> </head>
<script type="text/javascript" language="JavaScript">
<!--
document.write("<table cellpadding=\"0\" cellspacing=\"0\" border=\"0\" width=\"750\">\r\n");
document.write("<tr>\r\n");
document.write(" <td colspan=\"12\">\r\n");
document.write(" <img src=\"/xpedio/groups/public/documents/graphic/bok1_003607.gif\" width=\"750\" height=\"62\" useMap=\"#Map\" border=\"0\" name=\"top\" alt=\"imgMap\">\r\n");
document.write(" <map name=\"Map\">\r\n");
document.write(" <area shape=\"RECT\" coords=\"15,34,66,67\" href=\"http://www.ahima.org\" alt=\"AHIMA Map\">\r\n");
document.write(" </map>\r\n");
document.write(" </td>\r\n");
document.write("</tr>\r\n");
document.write("<tr valign=\"top\">\r\n");
document.write(" <td valign=\"top\">\r\n");
document.write(" <img src=\"/xpedio/groups/public/documents/graphic/bok1_003605.gif\" alt=\"\" width=\"200\" height=\"20\" border=\"0\" name=\"stay1\">\r\n");
document.write(" </td>\r\n");
document.write(" <td valign=\"top\">\r\n");
document.write(" \r\n");
document.write(" <img src=\"/xpedio/groups/public/documents/graphic/bok1_044942.gif\" alt=\"\" width=\"135\" height=\"20\"></td>\r\n");
document.write(" <td valign=\"top\">\r\n");
document.write(" <form name=\"authenticate\" action=\"/xpedio/idcplg?cookieLogin=1&portal=gomain\" method=\"post\">\r\n");
document.write(" <input type=\"hidden\" name=\"redirecturl\" value=\"/xpedio/groups/public/documents/web_assets/bok_home.hcsp\">\r\n");
document.write(" <a onMouseOut=\"MM_swapImgRestore()\" onMouseOver=\"MM_swapImage('login','','/xpedio/groups/public/documents/graphic/bok1_003595.gif',1)\" id=\"login\">\r\n");
document.write(" <input type=\"image\" border=\"0\" src=\"/xpedio/groups/public/documents/graphic/bok1_003593.gif\" width=\"55\" height=\"20\" name=\"login\">\r\n");
document.write(" </a>\r\n");
document.write(" </form>\r\n");
document.write(" \r\n");
document.write(" </td>\r\n");
document.write(" <td valign=\"top\"><!--Communities Logon from BOK-->\r\n");
document.write(" <a href=\"http://cop.ahima.org/\" onMouseOut=\"MM_swapImgRestore()\" onMouseOver=\"MM_swapImage('comms','','/xpedio/groups/public/documents/graphic/bok1_003586.gif',1)\">\r\n");
document.write(" <img name=\"comms\" border=\"0\" src=\"/xpedio/groups/public/documents/graphic/bok1_003584.gif\" alt=\"communities\" width=\"82\" height=\"20\">\r\n");
document.write(" </a>\r\n");
document.write(" </td>\r\n");
document.write(" <td valign=\"top\"><!--Home icon-->\r\n");
document.write(" <a href=\"/xpedio/groups/public/documents/web_assets/bok_home.hcsp\" onMouseOut=\"MM_swapImgRestore()\" onMouseOver=\"MM_swapImage('main','','/xpedio/groups/public/documents/graphic/bok1_003598.gif',1)\">\r\n");
document.write(" <img name=\"main\" border=\"0\" src=\"/xpedio/groups/public/documents/graphic/bok1_003596.gif\" alt=\"home\" width=\"43\" height=\"20\">\r\n");
document.write(" </a>\r\n");
document.write(" </td>\r\n");
document.write(" <td valign=\"top\"><!--Advanced Search icon-->\r\n");
document.write(" <a href=\"/xpedio/groups/public/documents/web_assets/advanced_bok2.hcsp\" onMouseOut=\"MM_swapImgRestore()\" onMouseOver=\"MM_swapImage('advsrch','','/xpedio/groups/public/documents/graphic/bok1_003583.gif',1)\">\r\n");
document.write(" <img name=\"advsrch\" border=\"0\" src=\"/xpedio/groups/public/documents/graphic/bok1_003581.gif\" alt=\"adv srch\" width=\"103\" height=\"20\">\r\n");
document.write(" </a>\r\n");
document.write(" </td>\r\n");
document.write(" <td valign=\"top\"><!--Contact icon-->\r\n");
document.write(" <a href=\"https://secure.ahima.org/contact/contact.aspx\" onMouseOut=\"MM_swapImgRestore()\" onMouseOver=\"MM_swapImage('contact','','/xpedio/groups/public/documents/graphic/bok1_003589.gif',1)\">\r\n");
document.write(" <img name=\"contact\" border=\"0\" src=\"/xpedio/groups/public/documents/graphic/bok1_003587.gif\" alt=\"contact\" width=\"70\" height=\"20\">\r\n");
document.write(" </a>\r\n");
document.write(" </td>\r\n");
document.write(" <td valign=\"top\"><!--Help icon-->\r\n");
document.write(" <a href=\"/xpedio/groups/public/documents/web_assets/bok2_help.hcsp\" onMouseOut=\"MM_swapImgRestore()\" onMouseOver=\"MM_swapImage('help','','/xpedio/groups/public/documents/graphic/bok1_003592.gif',1)\">\r\n");
document.write(" <img name=\"help\" border=\"0\" src=\"/xpedio/groups/public/documents/graphic/bok1_003590.gif\" alt=\"help\" width=\"38\" height=\"20\">\r\n");
document.write(" </a>\r\n");
document.write(" </td>\r\n");
document.write(" <td valign=\"top\"><!--Short red bar-->\r\n");
document.write(" <img src=\"/xpedio/groups/public/documents/graphic/bok1_003606.gif\" alt=\"\" width=\"24\" height=\"20\" border=\"0\" name=\"stay2\">\r\n");
document.write(" </td>\r\n");
document.write("</tr>\r\n");
document.write("</table>\r\n");
//-->
</script>
<table border="0" width="750px"><tr><td> <!--*****************--> <h2> An IT Primer for Health Information Exchange</h2> <p><em>by Stacie Durkin, MBA, RNC, RHIA, and Beth Just, MBA, RHIA</em></p> <hr /> <em>When it comes to building data exchanges, an understanding of basic IT terminology helps HIM professionals serve as a bridge between technical and clinical professionals.</em> <hr /> <p>Clinical data exchange is poised to radically transform healthcare delivery. By connecting disparate healthcare providers, patients, payers, and other stakeholders, data exchange networks are expected to streamline and accelerate the flow of patient data from doctor offices to hospitals to outpatient clinics.</p> <p>That exchange is expected to develop through regional health information organizations, or health information exchanges (HIEs). Most of these organizations are still very much in their infancy and are plagued by unresolved issues. They struggle with establishing effective governance and sustainable business models, privacy and security policies, and accurate patient-matching practices.</p> <p>HIM professionals contribute information management expertise to HIEs, not technical input. However, with an understanding of basic IT terminology related to data exchange, HIM professionals can improve communication between technical and clinical professionals. Serving as a bridge between the professions, HIM can help drive the successful adoption and use of exchanged clinical information.</p> <h3>Network Basics</h3> <p>Ten years ago it was prevalent for healthcare providers to house computer networks and equipment in one IT data center utilizing a <strong>local area network</strong> (LAN) that provided communication between the various computers, or nodes, in the network. While centralized data centers and LANs are still common, <strong>wide area networks</strong> (WANs) that span an entire city or state are becoming more common. This ease and openness of sharing data across networks has been facilitated by the development of standardized communication protocols.</p> <p>A computer <strong>network</strong> is made up of multiple connected computers that communicate over a wired or wireless medium, sharing data and other resources. An example is a home network consisting of two computers that share files and a printer. </p> <p>The size and scalability of any computer network is determined both by the physical medium of communication and by the software controlling the communication. A network can refer to any interconnected group or system, including LANs, WANs, or MANs (metropolitan area networks designed for cities or towns).</p> <p><strong>Network topology </strong>is the arrangement of the nodes (typically the computers) in a network. It describes the physical and virtual (or logical) connections between the nodes. Common physical topologies include bus, star, and ring (see the diagram on the following page). The names describe the arrangement of the nodes on the network.</p> <p><strong>Network protocol</strong> defines the common set of signals and rules governing the syntax, semantics, and synchronization that networked computers use to communicate. One of the most popular protocols for LANs is Ethernet. Wi-Fi is the wireless LAN standard present in many home offices and small office networks. It augments many Ethernet-based LANs in larger institutions. Networks can be broadly classified as using one of two network architectures.</p> <p><strong>Peer-to-peer architecture</strong> is a model in which each user shares the same capabilities, such as query, add, and update, and any party can initiate a communication session. In a peer-to-peer network (often written P2P), each node is equal, and each functions simultaneously as a client and a server to other nodes on the network.</p> <p>In an HIE, each peer node must provide the same type of user or computer authentication, but each participating organization must provide individual authentication for each of its users. The peer-to-peer network trusts any user coming from an authenticated source as long as the proper authentication message is sent with the users access request. Peer-to-peer also has come to describe applications in which users can exchange files directly via the Internet or a mediating server.<sup><a href="#1">1</a></sup></p> <p><strong>Client-server architecture</strong> is a versatile, message-based, and modular infrastructure intended to improve usability, flexibility, interoperability, and scalability when compared to centralized, mainframe, time-sharing computing. Client nodes on the network communicate through a centralized server. This is the architecture typically used by larger businesses that employ only two types of nodes, client and server. It is sometimes referred to as two-tier. Devices may share files and resources.</p> <table width="95%" border="1" cellpadding="3" bgcolor="#e3efff"> <tr> <td><h3>Planning for Quality Assurance</h3> <p>Close attention to data quality is critical as HIEs expand the exchange of data from within a single provider organization or enterprise to a regional network. Quality control is a vital prerequisite, and it should be addressed early in the planning stages.<sup><a href="#sidebar_notes">1</a>,<a href="#sidebar_notes">2</a></sup> The need for data quality and data validation is especially important when data are used by individuals or groups other than those who originated the data.</p> <p>The terms <strong>quality control</strong> and <strong>quality assurance</strong> both refer to the structured pursuit of accuracy in natural science measurement programs. The methods are used to reduce errors, loss, redundancy, misidentification, misattribution, contamination, and incompleteness. The processes should be planned and managed during data collection.</p> <p>With expertise in data integrity, HIM professionals are important participants in successful clinical data exchange, regardless of whether the exchange is within the walls of their own facilities or as part of a regional exchange network.</p> <a name="sidebar_notes"></a> <h3>Notes</h3> <p>1. Loshin, David. Issues and Opportunities in Data Quality Management Coordination. DM Review Magazine, April 2004. Available online at <a href="http://www.dmreview.com/article_sub.cfm?articleId=1000836">www.dmreview.com/article_sub.cfm?articleId=1000836</a>.</p> <p>2. AHIMA. Data Quality Management Model. June 1998. Available online in the FORE Library: HIM Body of Knowledge at <a href="http://www.ahima.org">www.ahima.org</a>.</p></td> </tr> </table> <h3>File Transfer Fundamentals</h3> <p>With the Internet, file transfer became simpler, and organizations expanded their data sharing beyond local area networks. The expansion and widespread use of standardized communication protocols in turn fueled the Internets expansion. A <strong>communication protocol</strong> is a set of standard rules for data representation, signaling, authentication, and error detection required to send information over a communications channel.<sup><a href="#2">2</a></sup></p> <p>A variety of open standards exist for communication protocols, including TCP/IP. Transmission Control Protocol implements error detection and correction; Internet Protocol implements addressing for a large set of protocols. One computer can send a file to another computer by just knowing the receiving computers <strong>IP address,</strong> which can be viewed as a computers street address or phone number.</p> <p>TCP/IP was developed in the 1970s, and the structure of the Internet is still closely reflected by the TCP/IP model. Other open standards for communication protocols include OSI (Open Systems Interconnection) and UPnP (Universal Plug and Play). <strong>Open source</strong> software code is available to the general public with limited or no intellectual property restrictions. The term describes a collaboration of content source code using a set of principles and practices that promote access to the design and production of goods and knowledge. </p> <p><strong>File Transfer Protocol</strong> (FTP) is an open standards protocol for exchanging data over any network that supports TCP/IP. An FTP server uses FTP software to listen on the network for connection requests from other computers. The client computer, running FTP client software, initiates a connection to the server. Once connected, the client can perform a number of file operations such as uploading, downloading, renaming, and deleting files on the server.<sup><a href="#3">3</a></sup></p> <p>Nearly every computer platform supports the FTP protocol regardless of the operating system. An <strong>operating system</strong> is a program that allocates and manages the tasks and internal system resources of the computer such as controlling and allocating memory, prioritizing requests, and controlling input and output devices.</p> <p>Nowadays, <strong>distributed environments</strong> typically provide efficient real-time data sharing among computers. Different parts of a software program may run on different computers communicating with each other across a network, and data are stored decentrally and are pulled together by the application when needed.</p> <p>Rather than sending files of data in one message, individual communications are sent with just the data needed to communicate that one message. They are one-way, sometimes requiring a response from the receiving computer. This allows real-time communication, with little chance of the entire message not making it successfully to the receiving computer.</p> <p>A common distributed environment current in healthcare today might be a multifacility organization using an electronic medical record viewer application that pulls data from different clinical and ancillary systems such as nursing documentation, laboratory, or radiology results. Various programs used in the electronic record system could be run on different computers, optimizing the response time of the programs. This would typically occur in a <strong>client-server network architecture</strong> setting. The server is the brains of the system, and the client computers are the workstations.</p> <p>Messages or transactions between computers travel through a port on the computer. There are physical ports, such as a <strong>serial port</strong> or a <strong>USB</strong> (universal serial bus) port, and there are virtual ports that provide a virtual data connection between computer programs. All personal computers have physical ports. All application programs that send or receive data will have a virtual port.</p> <p>An <strong>interface</strong> defines the communication between two entities, such as a piece of software, a hardware device, or a user. A software program that provides an interface between a human and a computer is called a <strong>user interface.</strong> Interfaces between hardware components are physical or <strong>device interfaces.</strong> Interfaces between separate software components are <strong>software interfaces</strong> and allow for data mapping and any special coding or translating. They provide a mechanism by which databases and software applications can communicate.</p> <p>Message communication between one database system and another are handled either via a point-to-point interface or through an interface engine. <strong>Point-to-point interfaces</strong> are programs that define the message content (or fields), format, and translation required to send data directly from one system to another. These are typically more expensive to maintain and manage, as they may have many customized fields and formats. </p> <p>Changes to the sending systems application or the receiving systems application or database will often require an update to the point-to-point interface program. Most medium to large healthcare organizations now use an interface engine to help manage the interfaces between their various administrative, financial, and clinical applications.</p> <p>An <strong>interface engine</strong> is a software application that manages the input, data mapping, data translation, and distribution of transactions from one computer system to another. Most provider organizations and healthcare IT products follow Health Level Seven (HL7), the industry standard for electronic data exchange in healthcare environments.</p> <table width="95%" border="1" cellpadding="2"> <tr> <td><h3>Common Network Topologies</h3> <p><img src="http://library.ahima.org/xpedio/groups/public/documents/graphic/bok1_036236.jpg" alt="Common Network Topologies" width="550" height="368" /></p> <p>Network topology is the arrangement of the nodes in a network (typically the computers). In <strong>bus topology,</strong> the nodes connect to a common backbone or trunk, called the bus. Data sent between the nodes travel along the bus and are received by all nodes at once. <strong>Star topology</strong> links all nodes of the network to a central node. Data transmitted between nodes are first sent to the central node, which then retransmits the data to the other nodes in the network. In <strong>ring topology,</strong> each node connects to another in a closed loop. Data travel from one node to the next, usually flowing through the network in a single direction.</p> </td> </tr> </table> <h3>An HL7 Overview</h3> <p>HL7 became an ANSI-accredited standards developing organization in 1994 for interchange of clinical, financial, and administrative information among healthcare computer systems. ANSI, the American National Standards Institute, is a private, not-for-profit organization that oversees the development of voluntary consensus standards used in the US.</p> <p>HL7s name refers to the top layer (level 7) of the Open Systems Interconnection model of the International Standards Organization in the health environment. The standard ensures a common communication method between applications generally mapped through an interface. The organizations primary goal is to provide data exchange standards that eliminate or substantially reduce custom interface programming and program maintenance.</p> <p>The HL7 message structure provides a delineation of the type of data being transmitted, the actual message description, a specification of each segment of the message and the actual fields and subfields contained in each segment.<sup><a href="#4">4</a></sup> An example of an HL7 message is shown in the sidebar Inside an HL7 Message, above.</p> <p>The HL7 standard has become the foundation for the electronic medical record, allowing the exchange of data between very diverse health services such as pharmacy formularies, radiological imaging, lab values, and transcribed reports.</p> <table width="90%" border="1" cellpadding="2"> <tr> <td><h3>Inside an HL7 Message</h3> <p>At first reading, a message conforming to the HL7 transmission standard is overwhelming. But breaking down the documentation of each messageits segments and fieldsshows how straightforward the message standard really is. The standard establishes the following message elements:</p> <p>1. Message Type: e.g., ADT (admission, discharge, transfer), ORM (order response message), MDM (medical document management), MFN (master file notification).</p> <p>2. Message: e.g., A01 (admit/visit notification), A03 (discharge/end visit), A08 (update patient information), A34 (merge patient information).</p> <p>3. Segments: e.g., MSH (message header), PID (patient ID), PV1 (patient visit), NK1 (next of kin).</p> <p>4. Components (field): e.g., in the PID segment, patient name, internal identifier number, and date of birth. </p> <p>5. Subcomponents: for example, identifier number (the medical record number itself), identifier type (such as MRN), last name, first name, middle name, and other subcomponents in the patient name field. Subcomponents are typically delimited by a caret (^) symbol.</p> <h4>Sample HL7 Message</h4> <p>MSH|^~&|EPIC|EPICADT|SMS|SMSADT|199912271408|CHARRIS|ADT^A04|1817457|<br /> EVN|A04|199912271408|||CHARRIS<br /> PID|||454721^^^St. Marys^MRN||DOE^JOHN^^^^|DOE^JOHN^^^^|19480203|M|<br /> NK1||CONROY^MARI^^^^|SPO||(216)731-4359||EC|||||||||||||||||||||||||||<br /> PV1||O|168 ~219~C~PMA^^^^^^^^^||||277^ALLEN FADZL^BONNIE^^^^||| |||||||</p> <p>Components in each segment of the message are separated with a delimiter. The sample message above uses a pipe symbol (|).</p> <p>Because message naming is standardized and each segment and component appears in a standard position within the message, the receiving computer is able to identify each individual piece of data the message contains and sort and store it automatically.</p> <p>For instance, the above message is an A04—register a patient, typically used for communicating outpatient registrations. In the patient identification (PID) segment, the third position contains the patients medical record number (MRN)—454721, coming from St. Marys.</p></td> </tr> </table> <h3>Scalability and Life Cycle</h3> <p>As healthcare IT environments become larger and more interconnected, <strong>scalability</strong> becomes a major concern. Scalability is used in two different fashions in IT.</p> <p>The first is the hardware or softwares ability to continue to function well when it or its context changes in size or volume of record storage. Rescaling is typically to a larger size or volume; for example, when additional storage is added or a new database program is launched.</p> <p>The second use for the term is an organizations attempt to improve performance and reduce response time. Rescaling often is needed because of an increase in users or high-volume periods, which drive the need for a more sophisticated operating system or database platform.</p> <p>The useful life of an information system is referred to as the <strong>system development life cycle.</strong> The explosion of available clinical information and rapid pace of health information system development has shortened the cycle. Today software development requires teams of architects, analysts, programmers, testers, and users working together to create the millions of lines of custom-written code that drive enterprises. <strong>Object-oriented technology</strong> allows smaller sets of programming code that can be reused in one system multiple times for multiple applications. This reduces an applications development life cycle.</p> <p>There are many life cycle models: waterfall, fountain, spiral, build and fix, rapid prototyping, incremental, and synchronize and stabilize.<sup><a href="#5">5</a></sup> Systems analysts use these models to develop an information system, including requirements, validation training, and user ownership through investigation, analysis, design, implementation, and maintenance.<sup><a href="#6">6</a></sup> (For a description of common models, see the appendix to the online version of this article, available in the FORE Library: HIM Body of Knowledge at <a href="http://www.ahima.org">www.ahima.org</a>.)</p> <h3>Old Challenges, New Media</h3> <p>All that has been previously discussed—from networks to operating systems to communication protocols—makes up what is commonly referred to as the <strong>system architecture</strong>. This describes the set of relations between the systems structural properties. The representation of the system architecture sets forth the relationship between the elements and rules governing those relationships. These designs are critical to leveraging the investment in a way that meets the business needs and strategies of the organization.</p> <p>Although system architectures are as unique as the organizations designing them, they share one constant need in achieving interoperability within healthcare organizations or HIEs. That constant is the need to deliver accurate clinical information to the user in a timely manner that supports patient safety.<sup><a href="#7">7</a></sup> </p> <p>HIM professionals hold the key to delivering that transformation. They understand the patients progression through the continuum of care and how that patients data must be presented to the clinician while preserving the privacy of the patient and confidentiality of his or her data. <br /> HIM professionals have always enabled continuity of care by ensuring a complete and accurate patient record. They have always maintained compliance to federal and state regulations and supported the organizations revenue cycle. Todays challenges are no different than the ones of the past. The only difference is the media by which health information is delivered.</p> <h3>Notes</h3> <p><a name="1" id="1"></a>1. Just, Beth, and Stacie Durkin. Clinical Data Exchange Models. September 2007. Available online in the FORE Library: HIM Body of Knowledge at <a href="http://www.ahima.org">www.ahima.org</a>. Web extra to HIM Principles in Health Information Exchange, <em>Journal of AHIMA</em> 78, no. 8 (Sept. 2007): 69–74.</p> <p><a name="2" id="12"></a>2. Wikipedia. Communications Protocol. November 26, 2007. Available online at <a href="http://en.wikipedia.org/wiki/Communications_protocol">http://en.wikipedia.org/wiki/Communications_protocol</a>.</p> <p><a name="3" id="13"></a>3. Wikipedia. File Transfer Protocol. November 26, 2007. Available online at <a href="http://en.wikipedia.org/wiki/Ftp">http://en.wikipedia.org/wiki/Ftp</a>.</p> <p><a name="4" id="14"></a>4. Huff, Stanley M. Clinical Data Exchange Standards and Vocabularies for Messages. Available online at <a href="http://www.amia.org/pubs/symposia/D005239.PDF">www.amia.org/pubs/symposia/D005239.PDF</a>.</p> <p><a name="5" id="15"></a>5. Lewallen, Raymond. Software Development Life Cycle Models. Codebetter.com. Available online at <a href="http://www.codebetter.com/blogs/raymond.lewallen/archive/2005/07/13/129114.aspx">www.codebetter.com/blogs/raymond.lewallen/archive/2005/07/13/129114.aspx</a>. </p> <p><a name="6" id="16"></a>6. Mousin, Gwen, Elaine Remmlinger, and J. Peter Weil. IT Integration Options for Integrated Delivery Systems—Information Technology. <em>Healthcare Financial Management,</em> February 1999. Available online at <a href="http://findarticles.com/p/articles/mi_m3257/is_2_53/ai_53953606">http://findarticles.com/p/articles/mi_m3257/is_2_53/ai_53953606</a>.</p> <p><a name="7" id="17"></a>7. Connecting for Health. Clinical Data Exchange Efforts in the United States: An Overview. Background paper of the Data Standards Working Group. Available online at <a href="http;//www.connectingforhealth.org/resources/dswg_backgrounder_appendixa.pdf">www.connectingforhealth.org/resources/dswg_backgrounder_appendixa.pdf</a>.</p> <p><em><strong>Stacie Durkin</strong> (<a href="mailto;[email protected]">[email protected]</a>) is CEO and president of Durkin and Associates. <strong>Beth Just</strong> (<a href="mailto:[email protected]">[email protected]</a>) is CEO and president of Just Associates.</em> <hr size="2" align="left" width="87%"><table border="1" cellpadding="5"><tr><td width="630"><font face="Verdana" size="-1"><b>Article citation</b>:<br>Durkin, Stacie; Just, Beth. "An IT Primer for Health Information Exchange." <i>Journal of AHIMA</i> 79, no.1 (January 2008): 38-42.</font></td></tr></table> <!--*****************--></td> </tr></table>
<script type="text/javascript" language="JavaScript">
<!--
document.write("<table cellspacing=\"0\" cellpadding=\"0\" width=\"725\" border=\"0\">\r\n");
document.write("<tr>\r\n");
document.write(" <td valign=\"bottom\" colSpan=\"2\">\r\n");
document.write(" <hr />\r\n");
document.write(" <center><table width=\"100%\">\r\n");
document.write(" <tr>\r\n");
document.write(" <td><div align=\"left\"><font size=\"2\">\r\n");
document.write(" Copyright ©2008 American Health Information Management Association. All rights reserved. All contents,\r\n");
document.write(" including images and graphics, on this Web site are copyrighted by AHIMA unless otherwise noted. You must obtain permission\r\n");
document.write(" to reproduce any information, graphics, or images from this site. You do not need to obtain permission to cite, reference, or\r\n");
document.write(" briefly quote this material as long as proper citation of the source of the information is made. Please\r\n");
document.write(" <a href=\https://secure.ahima.org/publications/reprint/index.aspx\>contact Publications</a>\r\n");
document.write(" to obtain permission. Please include the title and URL of the\r\n");
document.write(" content you wish to reprint in your request.\r\n");
document.write(" </font></div></td>\r\n");
document.write(" </tr>\r\n");
document.write(" </table></center>\r\n");
document.write(" </td>\r\n");
document.write("</tr>\r\n");
document.write("</table>\r\n");
//-->
</script>
</body></html>