SlideShare a Scribd company logo
1 of 23
Download to read offline
1 
Technology-enabled healthcare transformation: concept paper 
1 Executive summary 
[WHY] We believe that healthcare sector needs a disruptive transformation: 
 healthcare should be more affordable; 
 healthcare should offer the best possible services for each patient; 
 healthcare should become the centre of the health value-stream; 
 healthcare should seamlessly incorporate innovations; 
 healthcare should be secured by design; 
 healthcare should prevent unjustified proliferation of tools. 
[HOW] Such a transformation is achievable by synergy among various proven modern capabilities: 
 achievements in design of software-intensive distributed systems; 
 architectures for pluggable agile solutions; 
 mature enterprise-wide methodologies as Enterprise Architecture, BPM, SOA and ECM; 
 Internet of things; 
 free and open-source software; 
 partnership between public, private, academic, social and voluntary sectors; 
 sectorial, regional and international collaboration and standardisation. 
[WHAT] A platform-enabled reference architecture and several technological solutions implemented with this architecture will prove that: 
 each patient can be served by knowledge and experience available world-wide hassle- free, remotely and anonymously; 
 any treatment can be transparent in value, cost and results, justified, objectively validatable and traceable; 
 the unique business processes of each healthcare establishment can be assembled from a common library of process patterns (fragments) and tasks thus effortlessly spreading best medical practices and proven medical knowledge; 
 routine activities of the healthcare workers can be automated thus providing the opportunity for more added-value and innovation; 
 the information in the healthcare can be secure stored, exchanged, analysed and enriched; 
 new technologies, tools, devices, procedures and knowledge can be easily plugged-in thus creating opportunities for start-ups; 
 business systems in healthcare can be constructed from components of different vendors and from various origins (borrowed, bought, built, outsourced, standardised, innovated, re-engineered) to quickly create best-to-fit configurations. 
2 Architecting the technology-enabled healthcare transformation 
2.1 General 
Architecture of a system has to provide a brief description of the important aspects of the system. Any system (enterprise, eco-system, supply-chain, industry, country, region, etc.) has
2 
many different stakeholders who see the system differently. (Further each participant of such a system is considered as its stakeholder). Thus different aspects of the system have different importance for different participants (also known as participant’s concerns). 
For some of participants it may be the purpose of the system or customer experience. Others may be more interested in easy evolution of the system. It is for architect to give coherent and convincing answers to all participants how their concerns will be addresses by the system and how their current work habits and experience will be changed for the better. Architect must to speak to participants differently! “Success is in the eyes of beholder” is the first rule for many architects. 
This chapter provides several viewpoints (participant’s concerns) and related views (description of the system) for the following participants: 
 Citizens 
 Patients 
 Healthcare professionals 
 Healthcare industry self-regulator 
 Government regulator for healthcare 
 Healthcare service providers 
 Medical research organisations 
 Medical equipment vendors 
 Health insurance companies 
 Architects of technology-intensive applications for healthcare 
 Managers of technology-intensive projects for healthcare 
Some of these views are specific for healthcare; others are healthcare independent. The following matrix shows relative importance of each view for various participants. 
2.2 Big picture 
2.3 Reference functional architecture 
2.4 Enterprise as a system of processes 
2.5 Security enhanced by the use of processes 
2.6 Some participant’s view 
2.7 Platform-based approach 
2.8 Implementation practices 
2.9 Project management practices 
2.10 Multi-layer implementation model 
2.11 Agile solution delivery practices 
2.12 Various technologies around 
2.13 Modernisation of applications to become process-centric 
Citizens 
+++ 
+ 
+++ 
Patients 
++ 
++ 
+++ 
Professionals 
+ 
+++ 
++ 
+ 
+ 
+ 
+ 
Self-regulator 
++ 
++ 
+++ 
+++ 
+ 
+ 
+ 
Governmental regulator 
+ 
+ 
++ 
+++ 
+ 
+ 
Service providers 
+ 
+++ 
++ 
++ 
++ 
+ 
+ 
+ 
++ 
+++ 
+ 
+++ 
Research 
+ 
++ 
++ 
++ 
Vendors 
+ 
+++ 
++ 
+++ 
++ 
++ 
++ 
++ 
+++ 
++ 
++ 
Insurance 
+++ 
++ 
++ 
+ 
++ 
++ 
Architects 
+ 
++ 
+++ 
+++ 
+++ 
++ 
++ 
+++ 
+++ 
+++ 
+++ 
Project managers 
+ 
++ 
+++ 
++ 
+ 
+ 
++ 
+++ 
+ 
+ 
+ 
+
3 
2.2 Big picture of healthcare 
The big picture of the healthcare is shown in figure 1 as a value-stream for curing patients which is continuously improved by accumulated knowledge and more sophisticated processes and services. 
Figure 1 Big picture of healthcare 
The target of the technology-enabled transformation is to deploy gradually this big picture into each participant of the healthcare to be able to share data, services, processes, knowledge, tools and to eliminate barriers for innovations. 
Figure 2 Big picture of healthcare will enable much higher level of cooperation, collaboration and coordination with the healthcare sector
4 
2.3 Reference functional architecture 
2.3.1 Generic 
Figure 3 shows various functional (business and technical) capabilities to be provided as a “Healthcare Platform” to support the big picture. 
Figure 3 Reference functionality of the common healthcare platform 
2.3.2 Healthcare-common capabilities 
• Medical records 
• Inter-participants secure data and information exchange 
2.3.3 Healthcare domains capabilities 
To be provided during the evolution of the platform. 
2.3.4 Best business practices 
• Knowledge management practices: business manual, QMS 
• Security practices 
• Risk management practices 
• Compliance practices 
• Governance practices 
• Project management practices 
• Performance practices: SLAs, KPIs, predictive analytics 
• Constrains optimisation 
• Customer experience practices 
2.3.5 Universal business capabilities 
• BRM as methodology (including The Decision Model) 
• BPM as managing by processes methodology (BPM, 6sigma, lean, etc.) 
• Relationship management: SRM, CRM 
• Business performance reporting and analytics 
• RM and archiving 
• Project management methodology (PMI, Prince 2, Hermes) 
• Operations documentation 
• Business domain data (or biz objects) repository and model 
• Business reference information 
• Capability (business domain) modelling
5 
• Organisation, roles and rights management 
2.3.6 Specialised enterprise capabilities 
• Financial accounting 
• Marketing 
• Legal 
• Procurement 
2.3.7 Basic technical capabilities (or technologies) 
• Data Warehouse (as a place to re-use data) 
• BRM as a technology 
• BPM as a technology (managing processes per ce) 
• CRM as a technology 
• ECM 
• Communication tools (e-mail, skype, IM) 
• Social connectivity 
• ESB 
• Micro-service-server 
• Identity and access management 
• Data encryption and security 
• Interactive portals: Web-based, mobile-apps-based 
• Complex Event Processes (CEP) 
• Technical monitoring and traceability 
2.4 Enterprise as a system of processes 
2.4.1 General 
Enterprise functioning can be considered as business activity flows spanning the IT applications, employees, customers and partners within and beyond the boundaries of the enterprise. (Business activity is a unit of work). Those flows and individual business activities within them are interrelated. The relationships between them are static (expressed as structure) and dynamic (expressed as behaviour). The number of potential relationships between activities is huge – N x (N-1)/2 for N activities. This is the root cause of the complexity of modern enterprise’s. 
Historically, business process is an essential business concept for bringing some order into the structure and the behaviour of interrelated business activities. A business process is explicitly- defined coordination for guiding the purposeful enactment of business activities. In its simplest form, business process is an initially agreed plan to follow an order of activities; the plan may include some variants and the plan allows some changes during its execution. A detailed, formalised and unchangeable plan (e.g. in a form of process template expressed in BPMN) is one of the several coordination techniques (see http://improving-bpm- systems.blogspot.fr/2014/03/coordination-techniques-in-bpm.html ) potentially used in business processes. 
Because coordination between some activities can be strong (e.g. as in the army) or weak (e.g. as in an amateurs football team), it is possible to discover various stable coordination constructs (in addition to business processes. Usually, the coordination between business activities which belong to a particular coordination construct is stronger that the coordination between similar coordination constructs. 
The knowledge about coordination constructs reduces the number of potential relationships between business activities. This is reducing the level of complexity of an enterprise. 
Let us consider 4 nested coordination constructs: 
1. process patterns (coordination between activities within processes)
6 
2. processes (coordination between process fragments and separate activities) 
3. cluster of processes (coordination between processes) 
4. system of processes (coordination between clusters of processes) 
2.4.2 Process patterns It was observed that although all business processes are unique, they are actually composed from similar process fragments or process patterns. For example, let us consider a typical “repair” process in housing management which comprises claim making, evaluation, selection of a service provider, repair, control, invoicing and insurance to pay the activities. This process is actually composed from a few process patterns as shown in figure 4 with an original process diagram (which was developed without patterns) covered by patterns (red rectangulars). 
Figure 4 Example of a process diagram with implicit use of process patterns Patterns used in this illustration are:  Pattern SI – “Submission Interface” see http://www.slideshare.net/samarin/process- practical-patterns-si  Pattern PAR – “Propose, Act and React” see 8.3.12 from www.samarin.biz/book  Pattern IPS – “Initial Process Skeleton” see 8.3.7 from www.samarin.biz/book 
Although any pattern is a highly-cohesive construct, patterns can be adapted for particular needs. For example, the Delegation of Authority Matrix (DAM) pattern (see http://improving- bpm-systems.blogspot.ch/2012/07/practical-process-pattern-dam.html ) is implemented differently in the procurement and in the project management. Some process patterns are available at http://improving-bpm- systems.blogspot.fr/search/label/practical%20process%20patterns 
2.4.3 Cluster of processes Coordination between processes is usually event-based (see figure 5 with lightning symbol for events). In the simplest variant, the finish of a process is the start of another process. Note that it looks like the state-based coordination between processes. 
Figure 5 Simple coordination between processes
7 
In the reality, there are more complex interactions between processes (see figure 6) which are described in detail in http://improving-bpm-systems.blogspot.ch/2014/03/enterprise-as- system-of-processes.html . 
Figure 6 Examples of complex coordination between processes 
Processes, which are strongly related to each other, form a Cluster Of Process (CLOP). CLOPs usually exist around functional processes which are implemented in a particular business function, e.g. “Field Services”. 
In addition to functional processes there is a set of processes (called halo of processes) which helps to execute functional processes. These additional processes are monitoring, operating and governance processes:  Monitoring processes are responsible for analysing the running functional processes – some sort of operational intelligence.  Operating processes are used for implementing operational (via available parameters or controls) changes.  Governance processes are used for detecting, designing and implementation of struc- tural changes, e.g. “customer satisfaction and loyalty development”, “quality”, “strategy and planning” etc. All together (see figure 7) additional processes constitute two control loops – operational and strategic. 
Figure 7 Cluster of processes and its halo
8 
2.4.4 Coordination between CLOPs Each CLOP may relate to the enabling group of clusters, the supporting group of clusters and the customer group of clusters (see figure 8). The enabling group of clusters are typically specific for a particular CLOP while the supporting group of clusters are common for several CLOPs. 
Figure 7 Coordination between CLOPs Value streams and end-to-end enterprise processes are usually formed from a few CLOPs. 
2.5 Enhancing information cecurity by the use of processes 
2.5.1 General 
Ensuring of the information security implies the following characteristics of the enterprise functioning: 
1. Any business activity is performed only as prescribed and any unintended use of information (e.g., access to information resources unrelated to the work performed) would be impossible in principle. 
2. Initial planning of business activities must be validated for the compliance with the formal rules of information security. 
3. Execution and operational planning of business activities must be constantly validated for the compliance with the formal rules of information security. 
4. The explicit coordination of business activities allows synchronising them with security and risk related activities. 
2.5.2 Control of access to an informational resource along its life-cycle 
In simple cases, the control of access to an informational resource can be rigidly connected to the phases of the life cycle of the resource. The latter can be implemented as a business process. Explicit and executable business process is convenient because the whole dynamic of control access is embedded in the process. This allows better control of access rights change (as shown in figure 8). 
Figure 8 Evolution of access right during the life-cycle
9 
2.5.3 Control of access to an informational resource at activity level 
In more complex cases, information resources are linked to specific business activities. An employee, appointed for the carrying out of a particular business activity, gets access to the information resources required for the carrying out this business activity, only for the duration of this business activity (as shown in figure 9). 
Figure 9 Evolution of access right around a business activity 
Objective operational data collected, who has/had access to what information resources will increase the level of information security. Thus, business processes can detect potential cases for the separation of duty by establishing relationships between business activities. 
2.5.4 Separation and imposition of duty among several business processes 
In general, security-related relationships between business activities should be established and formally registered. A non-inclusive list of such relationships is the following: 
 Other activities which validate the results of the given activity. 
 Other activities which define the governance for the given activity. 
 Other activities which do the handling exceptional situations for the given activity (error handling, escalations, send for review and delegate). 
 Other activities which audit the given activity (1st, 2nd and 3rd party audit). 
 Other activities which evaluate the risks before the given activity. 
 Other activities which evaluate the risks after the given activity. 
 Other activities which certify the given activity (1st, 2nd and 3rd party certification). 
 Other activities which do compensation (undo) for the given activity. 
These relationships between activities define some limitations that roles and actors may carry out what activities: the same actor or a different actor from a different role or a different actor from the same role. For example, if the “Activity_B” validates the results of “Activity_A” then no actor should be in “Role_1” and “Role_2” simultaneously (as shown in figure 10). 
Figure 10 Separation of duties among several business processes 
Thus, the separation of duty may be formally validated at the design-time. 
2.5.5 Management of risk along business processes 
Managing any work by processes allows addressing the risk-related issues in proactive manner. The risk is strongly related to how the business processes are carried out. By
10 
understanding processes (i.e. through being able to simulate them) the business may predict how the risk may changing during the execution of that process. The explicit description of processes permits to add a few “check-points” within any process to examine its risk-related “health”. 
Business processes act as a skeleton to which the enterprise adds risk management activities (as shown in figure 11) – each business activity is enriched by risk-related monitoring and evaluation. 
Figure 11 Enhancing processes by risk management 
The risk evaluation may initiate some risk mitigation processes. The risk evaluation may be as complex as necessary, and it may include simulations and the conduct of statistical and scenario analysis. 
2.5.6 The intra-participants secure integration 
Healthcare platform, which acts also an inter-participants coordination tool, ultimately resolved the integration problems within the healthcare. Instead of that participants are connected to each other in ad-hoc way, the healthcare platform offers an integration process which delivers data and documents between all participants in a systematic way as shown in figure 12. It is actually a centralised service (backbone) for the inter-participants secure electronic exchange (like sending / receiving registered letters). 
Figure 12 Reducing complexity in integration between participants 
Generally, the backbone is decoupled from participant internal applications through two adapters: dispatcher (handle messages coming from the backbone) and expediter (handle messages going to the backbone). To be transmitted through the backbone, each message (business data and documents) is protected by three "envelopes" (marked by blue circled number in figure 13): 
 Business (processing) envelope 
 Delivery (addressing) envelope 
 Transportation (routing) envelope
11 
Figure 13 Integration process between participants 
2.6 Some participant’s view 
For some participants, the healthcare platform should look like a social collaborative extranet which may have the following visual design (see figure 14). 
Figure 14 Healthcare platform as a social collaborative extranet for some participants 
This extranet considers that: 
 Each participant has several roles, e.g. YOURSELF (person and his/her legal representatives), MERICARED (person with insurance), PATIENT, SENIOR (persons with age over 60 years), etc. 
 Person may select which roles he/she is carrying out at a particular moment in time. 
 Each communication between a participant and the healthcare services is a case with associated documents, data, audit trails, records, service level agreements and key performance indicators. A case may be completed or on-going. 
2.7 Platform-based approach for working and advancing together 
How is it possible to deliver many similar capabilities for a number of highly diverse participants in a rational way? The current way of provisioning via monolith and proprietary IT applications leads to many duplications. At the result, we, the patients and citizens, are paying several times for the same functionality (which often is implemented not with the highest quality). 
The big picture for healthcare is too big for one project and needs to be implemented in an incremental way as a set of inter-related projects. In such a situation, developing the final requirements is virtually impossible because no one does know exactly what should be built, and, often, new functionalities should be demonstrated before articulating in detail what is wanted. Furthermore, all participants will usually advance at own, often different, speed. If all participants are treated in an identical manner, then the slowest determines the speed of all.
12 
The traditional approach for IT application development does not work in such a case because it requires everything to be defined up front. The pure agile approach for IT application development does not work either because it cannot guarantee that a particular functionality will be developed once only and systematically re-used in all applications. 
Therefore, implementation approach of the big picture must enable gradual, economic and self-accelerating of technical and business transformations for all healthcare service providers together. Figure 15 shows a platform-based architectural approach: all common functionalities should constitute a single platform and individual new solutions are built using the functionalities available from the platform. The provisioning of solutions will be carried out incrementally with the pace of a particular set of participants (or target community). At each moment in time, each healthcare service provider may have a different pace and need a different individual set of functionality. 
Figure 15 Platform-based approach 
The platform-based architectural approach is based on the following considerations: 
 The platform must standardise and simplify core components of the future industry- wide system of systems. For any component outside the platform, new opportunities should be explored using agile principles. These twin approaches should be mutually reinforcing: the platform frees up resource to focus on new opportunities while successful agile innovations are rapidly scaled up when incorporated into the platform. 
 An agile approach requires coordination at an industry level. 
 To minimise duplication of effort in solving the same problems, there needs to be industry-wide transparency of agile initiatives. 
 Existing components of the platform need periodic review. Transparency and the publication openly of feedback and the results of experiments will help to keep the pressure on the platform for continual improvement as well as short-term cost savings. 
An example of the platform-based approach: Android and iOS are platforms with many small applications. 
2.8 Platform implementation practices 
Considering that the platform is intended for all healthcare service providers, but how is it possible to achieve some degree of uniformity among all healthcare service providers if they have different abilities to absorb the benefits of information technologies. Computerisation is a journey, and each healthcare service provider needs to be allowed to adopt a suitable pace for itself, but we also need to maintain coherence in the progression of the whole set. The use of a “ladder” model can be useful since it permits progression of each entity in a stepwise manner but at the same time guides the overall progression in a coherent manner. Design the “ladder” to have a few levels of capability from “not able” to “fully capable”. Entities are permitted to advance at different paces in their ascent to the top of the “ladder”. For example, their progress could be planned as in figure 16.
13 
Figure 16 Example of planned progress 
Intensive use of process-centric implementation with various coordination techniques thus allowing to assemble unique healthcare service provider’s processes from standard process fragments (patterns). 
Micro-services are considered as the latest SOA outcome to deliver small units of functionality to be assembled by executable processes. 
The systematic and aligned use of business processes and micro-services bring the built-in flexibility and adaptability. 
The platform is designed to be tools-independent by standardizing data, information, interfaces and coordination between various capabilities. This will allow to build the platform incrementally by provisioning needed capabilities from COTS, FOSS, platform-community- owned and in-house components. A few components may be offered for one capability as shown in figure 17. 
Figure 17 Platform composition 
2.9 Project management practices 
There are three primary types of projects. 
1. On-going and centralised platform governance: evolution of the architecture, evolution of technologies, evolution of features, evolution of solutions, evolution of practices and evolution of documentation. 
2. Rapid implementation of solutions as mini-projects: light specifications, quick prototyping, consistent configuration, fast procurement, agile development and re-use of existing tools and habits. 
3. Implementation of new platform components. 
The preferable project management method is archibagile which combines decomposition with agile implementation of “understood” components (see http://improving-bpm- systems.blogspot.ch/2014/06/different-coordination-techniques-in.html and figure 18).
14 
Figure 18 Example of planned progress 
2.10 Multi-layered implementation model 
For the IT side, the platform offers a multi-layer implementation model (see figure 19) for process-centric solutions. This model structures different services and other artefacts around processes. Each layer is a level of abstraction of the business and addresses some particular concerns. 
Figure 19 Example of planned progress 
 The business data layer comprises many pieces of information – names, dates, files, etc., which are stored in existing repositories, e.g. databases, document management systems, web portals, directories, e-mail servers, etc. This layer's role is to access data. In this layer the business is considered in a very primitive way. 
 The business objects layer comprises the many objects specific to a particular business, e.g. a business participant, a product, etc. This layer hides the complexity for manipulating the objects, which are actually collections of data together with any dependencies between them. The level of abstraction is increased – the business is represented by the objects, irrespective of their actual storage in the repositories. 
 The business routines (or regulations) layer comprises the actions which must be carried out on the business objects to perform the business activities. For example, to announce the availability of a product one has to find out which customers are interested in the product, to collect their contact e-mails and to distribute an announcement. At this level of abstraction the business comprises some modifications
15 
(including the adding of value) to the objects. Most enterprise employees work in this layer. 
 The business execution layer carries out the business processes. At this level of abstraction the business is a systematic set of coordinated activities. We can say that this is the layer where business line managers and super-users work. 
 The business monitoring layer analyses the execution of the business process. The business events are collected and compared with the expected (baseline) planning. In addition, the behaviour of the business process can be simulated. The level of abstraction is increased – the business is validated to run correctly. The IT buzzword applicable to this layer is Business Activity Monitoring (BAM). 
 The business intelligence layer implements enterprise-wide planning, performance evaluation and control actions applied to the business processes. At this level of abstraction the whole enterprise business system is considered as a single functional unit. 
Each layer has two roles: it exploits the functionalities of the lower layer, and it serves the higher layer. Each layer has a well-defined interface and its implementation is independent of that of the others. Each layer comprises many services that can be used independently – it is not necessary that all layers be fully implemented at the same time or even be provided in a single project. 
Another practical observation is that different layers have lifecycles of different time scales: typical repositories have a 5- to 10-year life-span while the business requires continuous improvement. Because of the implementation independence of the different layers, each layer may evolve at its own pace without being hampered by the others. 
As a general rule, existing applications already implement many of the business objects, routines and processes, but usually in an unstructured way. The objects, routines and processes are intermixed, not reusable and need to be implemented again and again. The multi-layer implementation model is a tool which helps the enterprise to design the enterprise business systems 
 in business terms, but not in terms of IT tools, 
 via the combination of universally accessible and interdependent building blocks, 
 in a structured way, and 
 with a high level of flexibility built-in. 
Here’s a tip for how to remember the layers: Data, Objects, Routines, Execution, Monitoring, Intelligence – DO-RE-MI. 
2.11 Agile solution delivery practices 
A new solution is constructed from existing services and newly developed ones; the latter may be in different layers. Versioning of artefacts brings unprecedented flexibility, and thus removes the existing segregation between software development and maintenance – the IT unit can easily carry out continuous evolution of the system. 
The development team members develop solutions as a set of easy-to-evolve artefacts (of course, within the limits defined by the architects). Below there are a few examples of the evolution of a solution constructed in accordance with the multi-layer implementation model. To demonstrate the reuse of existing services, newly created services are marked using a star in the top right corner. Note that the two top levels (intelligence and monitoring) have been removed to simplify these examples. 
Example 1 (see figure 20) is a process for releasing a product for customers while minimising the amount of human activity. Automated activity a1 collects all necessary information from internal repositories (ERP and int. DMS), and populates it into an external repository (ext. DMS) without opening external access to it. Human activity a2 requires a person to check the product, its metadata and other related resources to ensure that everything is in order for the
16 
product to be released to the customer. Automated activity a3 opens customer access to the product (on ext. DMS). 
Figure 20 Example 1 
Example 2 (see figure 21) is an extension of example 1. Automated activity a4 uses a customer directory and prepares a notification to a customer if the released product matches his/her interests. Automated activity a5 delivers this notification via e-mail. 
Figure 21 Example 2 
Example 3 (see figure 22) is a process for the handling of some external requests. Automated activity a6 analyses the input obtained via e-mail and saves it into an internal repository (int. DMS) for traceability purposes. If necessary, human activity a7 is executed to categorize a request. Automated activity a8 performs any necessary actions. Automated activity a5 informs the requestor (via an e-mail) of the actions taken. 
Figure 22 Example 3
17 
Example 4 (see figure 23) is a process for some typical work. Automated activity a9 fetches information from internal repositories and prepares it for manual activity a10. Automated activity a11 validates the work done. Automated activity a12 saves the results into internal repositories. 
Figure 23 Example 4 
A “snow-ball” effect is observed – as more services and libraries become available, the implementation of each new service is faster. Also, practically all services are actually micro- services which are small in size and functionality. (See about micro-services http://www.tigerteam.dk/2014/micro-services-its-not-only-the-size-that-matters-its-also-how- you-use-them-part-1/ ) 
2.12 Various technologies around the implementation model 
The multi-layer implementation model is the main tool for the solutions architects. It helps them to assemble solutions, which is rather different from implementing traditional applications: 
 the new solution is generally implemented across existing IT applications and repositories; 
 any missing building blocks are initially implemented, by preference, in a dynamic programming language; 
• the new solution generally does not have its “own” database; 
• the new solution is “outside” existing systems; 
• typical concerns for BPM, SOA and IT-governance are considered together. 
Where in this “architectural framework” are databases, application servers, Graphical User Interfaces (GUIs), XML, web services and other IT gadgets? By definition, it doesn't matter. Everything in figure 18 is considered as a service. These services can be executed inside a single program, within many programs on a single computer, on an application server or in a distributed environment. Services may be implemented in-house today and may be outsourced tomorrow, or implemented manually today and automated tomorrow. 
Another popular question concerns the relation of the multi-layer implementation model with some other technologies. Figure 24 shows how various technologies work together within the platform. Normally, some services are accessible from a portal or workplace. They “float” in an Enterprise Service Bus (ESB). The latter is used only for service-to-service connections at the technical level and not for business- or content- based routing logic. Obviously, we want to keep the business logic in one place (and not dispersed in an ESB) and we also want to have explicit coordination of services (but not magic routing by an ESB). Ideally, an ESB should be based on a solid computing basis which can be provided by a grid, modern virtualisation infrastructure or cloud computing.
18 
Figure 24 Various technologies work together 
More details about this is available in the book www.samarin.biz/book 
2.13 Modernisation of applications to become process-centric 
Usually, the services are “cemented” within monolithic applications which bridge GUIs, business logic and databases. To convert them into process-centric, it is necessary to externalise all services as shown in figure 25. 
Figure 25 Technical transformation of applications 
Such a technical modernisation is carried out in three steps: 
 Disassemble an application into services. 
 Improve existing services and/or add new services. 
 Assemble services via processes. 
It is important to intermix the technical transformation with the business evolution and combine various tactics about services: rent/borrow, buy, build, outsource, centralised vs. kept locally, standardised, re-engineered or automated. 
For complex applications (such an in-house developed legacy ERP), many of the services can be already available on the market (see figure 26).
19 
Figure 26 Technical transformation of a legacy ERP 
In practically all cases the transformation must be carried-out using a step-by-step approach via the “eclipse” pattern (see figure 27). At first, we “cover” only a tiny area of the whole process. Usually we start with the intra-application coordination, because this part of IT is considered as boring and not very rewarding. The first fragment of explicit coordination may be quite primitive; it is a duplication of some existing functionality which is just eclipsed by this process. Then we introduce more and more fragments. With time, we cover bigger and bigger areas by explicit coordination of existing fragments. 
Figure 27 Use of the “eclipse” pattern for becoming process-centric 
Step by step, existing applications are transformed into services. It is recommended that such transformations be carried out with great care. For example, at first, services should be implemented to copy as closely as possible the existing functionality; they are optimised and refactored only later. Modifications to applications are minimised – by preference, some functionality is just switched off. To do this, some techniques of externalising events are necessary to link monolith applications and processes as shown in figure 28.
20 
Figure 28 Externalising events which will launch processes 
3 Electronic Health Records implementation (maybe useful for “meaningful use”) 
3.1 General 
www.healthit.gov defines Electronic Health Records (EHRs) as, at their simplest, digital (computerized) versions of patients' paper charts. But EHRs, when fully up and running, are so much more than that. 
EHRs are real-time, patient-centred records. They make information available instantly, "whenever and wherever it is needed". And they bring together in one place everything about a patient's health. EHRs can: 
 Contain information about a patient's medical history, diagnoses, medications, immunization dates, allergies, radiology images, and lab and test results 
 Offer access to evidence-based tools that providers can use in making decisions about a patient's care 
 Automate and streamline providers' workflow 
 Increase organization and accuracy of patient information 
 Support key market changes in payer requirements and consumer expectations 
 One of the key features of an EHR is that it can be created, managed, and consulted by authorized providers and staff across more than one health care organization. A single EHR can bring together information from current and past doctors, emergency facilities, school and workplace clinics, pharmacies, laboratories, and medical imaging facilities. 
3.2 Conceptual view on EHR 
Certainly, EHR is the core of majority of the healthcare IT applications and a perfect implementation of EHR is a must. Within the healthcare platform, EHR is architected in the following way. 
A person (or his/her legal representative) is the only owner of his/her EHR. Others use person’s EHR just temporary. Any other participants in healthcare must explicitly request some EHR from the patient. Such a request must be executed only in the context of a process/workflow/case in which the patient and the requestor are involved (see 2.5.3). 
Conceptually, my personal EHR are kept in my personal digital data and document storage. (It may be home-based as an appliance or cloud-based). This storage is supported by: 
 Inbox – my official postal box in the Internet (like postal box for a person or a household). Note, a person may have several inbox including anonymous ones.
21 
 Deposit box – a short-term protected cloud space for each act as a temporary storage for of data and documents exchange. Imagine that some paper documents were copied and put in an envelope. 
 Safe box – a long-term protected cloud space for a backup copy. Imagine a personal safe box in a Swiss bank. 
 Encryption services. 
3.3 Example of process which uses EHR 
Below is an example of how the exchange between a patient (me) and a medical office should be carried out (keep in mind 2.5.6). The situation: I made an appointment to visit a doctor. The doctor has indicated which my medical documents (i.e. my EHR) are necessary for this visit. I have to send some of my medical documents before the visit. This is done in the following way (see figure 29): 
1) As part of the “visit doctor” process, I got a task to send a list of medical documents. If there is nothing special, I approve the standard execution of the task as steps 2-6. 
2) Creation a dedicated deposit box (with some protection) and copy requested documents (with some protection). 
3) A temporary link to this deposit box is generated. 
4) This link is communicated to the medical office’s reception service (office2others). 
5) Documents from my temporary deposit box are copied to medical office temporary de- posit box. 
6) A notification about arrival of documents appears in the medical office’s inbox. 
7) A medial office employee gets a task to copy the documents from the temporary de- posit box to the medical office internal system. 
Figure 29 Exchange of document in the “visit doctor” process 
Documents to be sent and deposit boxes are encrypted with short-life-time keys and techniques of secured envelope are used as well (see 2.5.6). 
If some of those documents may be offered for medical research purposed then these documents will be anonymized by removing personal information and their encryption will be different (just to guarantee their integrity during the transition). 
3.4 EHR implementation considerations 
Obviously, the mentioned above concept of EHR is an ideal state that should be approached through several transitional states. Imagine a situation when a medial organisation has EHR diluted somewhere in several IT applications. What can be the steps to advance to a better EHR? A possible way forward is below:
22 
1. Create a separate EHR master repository with tight security and strict audit. 
2. Migrate existing EHR from existing IT applications to the EHR repository. 
3. Consider step-by-step modernisation of existing IT applications by starting to externalize some events about updating the EHR (see 2.13). 
4. Link those events with “integration” processes to fetch EHR from existing IT applications and populate the EHR repository. 
5. Use the EHR repository as the master source for processes and, if possible, existing IT applications. 
6. Add more “integration” processes to exchange between your organization’s EHR master repository and other medical organizations. 
7. Add more functional processes which use the EHR master repository. 
8. Discuss with the vendors of your existing IT applications about externalization of EHR. 
In addition, do not forget to engage an architect into this transformation. As well as, systematically inform patients about handling of their EHR. 
4 Participants, their concerns and benefits analysis 
Let us look at the whole healthcare eco-system to list all participants and their concerns as the following. 
 Patients – hassle-free access to the healthcare services, correctness of treatment, maximum as possible treatment at home, cost. 
 Doctors—zero routine work, access to the medical knowledge, access to medications, traceability. 
 Other service providers – minimum overhead, common (with doctors) decision making. 
 Insuring bodies – traceability, cost of overhead, correctness of treatment. 
 Insurance companies – correctness of claims, correctness of treatment. 
 Governments – overall quality, overall cost. 
 Other services – easy to have business the main participants. 
5 Potential innovations and their effect on participants ## Innovation Technology-enabled techniques Impact 1 Medical records are safely managed and properly share among the participants Security is compared with private banks. Well-structured data. World-wide access for patient’s data. Comprehensiveness of personal data. Anonymous by Owner data for analysis and consultations 2 
A patient can visit a doctor remotely 
Video conferencing. 
Avoid hassle for trivial cases. 
Better traceability. 3 A patient can provide some simple “measurements” (pressure, temperature, sugar in blood) remotely Smart devices and connectivity. Systematic caring, faster alerting to prevent complex situations. Better traceability. 4 
Best specialists can provide consultation to an anonymous patient and recommend him/her the best possible treatment 
Video conferencing. 
World-wide access for patient’s data. 
Improving the quality of treatment. 5 Patient is guided for home-based treatment Predefined coordination and Better supervising
23 
alerting (e.g. for taking pills). Systematic monitoring. 6 
All participants of the health-care ecosystem are electronically interlinked: doctors, hospitals, labs, pharmacies, insurances, government agencies 
Secured exchange of data. 
Higher quality of data. 
Less overhead. 7 Other social (from governmental agencies), scientific, professional (3rd party reviewing), and commercial (express delivery) services can be plugged-in Standard interfaces for services in standard processes. Cost management. Opportunities for small and local businesses. 8 
The joint work of all participants is coordinated in a transparent and traceable manner. 
Guaranteed audit trail. Guaranteed goal. 
Early catching of problems. 
Continual improvement. 
End of document (copyright 2014, Alexander SAMARIN, V3, 2014-07-12)

More Related Content

What's hot

Mini-course at VFU - Architecting modern digital systems - 4
Mini-course at VFU - Architecting modern digital systems - 4Mini-course at VFU - Architecting modern digital systems - 4
Mini-course at VFU - Architecting modern digital systems - 4Alexander SAMARIN
 
Building large-scale digital repeatable systems e.g Smart Cities
Building large-scale digital repeatable systems e.g Smart CitiesBuilding large-scale digital repeatable systems e.g Smart Cities
Building large-scale digital repeatable systems e.g Smart CitiesAlexander SAMARIN
 
Smart Cities Reference Architecture
Smart Cities Reference ArchitectureSmart Cities Reference Architecture
Smart Cities Reference ArchitectureAlexander SAMARIN
 
enterprise_architecture_as_a_tool_of_digital_state_transformation_-_m._bukows...
enterprise_architecture_as_a_tool_of_digital_state_transformation_-_m._bukows...enterprise_architecture_as_a_tool_of_digital_state_transformation_-_m._bukows...
enterprise_architecture_as_a_tool_of_digital_state_transformation_-_m._bukows...Michal Bukowski, MBA, P2P
 
Digital transformation: New purpose for enterprise architecture
Digital transformation: New purpose for enterprise architectureDigital transformation: New purpose for enterprise architecture
Digital transformation: New purpose for enterprise architectureJason Bloomberg
 
Togaf online training
Togaf online trainingTogaf online training
Togaf online trainingxoomlakshmi
 
Designing an IT Solution
Designing an IT SolutionDesigning an IT Solution
Designing an IT SolutionPhilippe Julio
 
Foundations of enterprise architecture management and archi mate
Foundations of enterprise architecture management and archi mateFoundations of enterprise architecture management and archi mate
Foundations of enterprise architecture management and archi mateStefan Schindewolf
 
Enterprise Architecture - TOGAF Overview
Enterprise Architecture - TOGAF OverviewEnterprise Architecture - TOGAF Overview
Enterprise Architecture - TOGAF OverviewMohamed Sami El-Tahawy
 
IT Architect Profession
IT Architect ProfessionIT Architect Profession
IT Architect ProfessionNugroho Gito
 
Delivering enterprise architecture
Delivering enterprise architectureDelivering enterprise architecture
Delivering enterprise architectureBas van Gils
 
Open bim and collaboration practice
Open bim and collaboration practiceOpen bim and collaboration practice
Open bim and collaboration practiceOmar Selim
 
Introducing the World's First Information Architecture Tool
Introducing the World's First Information Architecture ToolIntroducing the World's First Information Architecture Tool
Introducing the World's First Information Architecture ToolDATAVERSITY
 
ETDP 2015 D1 Technology Enabled Facility Lifecycle Data Management - Grace Wa...
ETDP 2015 D1 Technology Enabled Facility Lifecycle Data Management - Grace Wa...ETDP 2015 D1 Technology Enabled Facility Lifecycle Data Management - Grace Wa...
ETDP 2015 D1 Technology Enabled Facility Lifecycle Data Management - Grace Wa...Comit Projects Ltd
 
Architecting for the Cloud with TOGAF®
Architecting for the Cloud with TOGAF®Architecting for the Cloud with TOGAF®
Architecting for the Cloud with TOGAF®Sunil Kempegowda
 
Archi mate views_and_viewpoints
Archi mate views_and_viewpointsArchi mate views_and_viewpoints
Archi mate views_and_viewpointsIgor Igoroshka
 
Jennifer Whyte - Digital innovation and the transformation of infrastructure ...
Jennifer Whyte - Digital innovation and the transformation of infrastructure ...Jennifer Whyte - Digital innovation and the transformation of infrastructure ...
Jennifer Whyte - Digital innovation and the transformation of infrastructure ...Association for Project Management
 
Sam El-Jouzi - Inside the digital asset - exploring immersive visualisation t...
Sam El-Jouzi - Inside the digital asset - exploring immersive visualisation t...Sam El-Jouzi - Inside the digital asset - exploring immersive visualisation t...
Sam El-Jouzi - Inside the digital asset - exploring immersive visualisation t...Association for Project Management
 

What's hot (20)

Mini-course at VFU - Architecting modern digital systems - 4
Mini-course at VFU - Architecting modern digital systems - 4Mini-course at VFU - Architecting modern digital systems - 4
Mini-course at VFU - Architecting modern digital systems - 4
 
Building large-scale digital repeatable systems e.g Smart Cities
Building large-scale digital repeatable systems e.g Smart CitiesBuilding large-scale digital repeatable systems e.g Smart Cities
Building large-scale digital repeatable systems e.g Smart Cities
 
Smart Cities Reference Architecture
Smart Cities Reference ArchitectureSmart Cities Reference Architecture
Smart Cities Reference Architecture
 
enterprise_architecture_as_a_tool_of_digital_state_transformation_-_m._bukows...
enterprise_architecture_as_a_tool_of_digital_state_transformation_-_m._bukows...enterprise_architecture_as_a_tool_of_digital_state_transformation_-_m._bukows...
enterprise_architecture_as_a_tool_of_digital_state_transformation_-_m._bukows...
 
Digital transformation: New purpose for enterprise architecture
Digital transformation: New purpose for enterprise architectureDigital transformation: New purpose for enterprise architecture
Digital transformation: New purpose for enterprise architecture
 
Togaf online training
Togaf online trainingTogaf online training
Togaf online training
 
Lightscene 2016: Revolutionising Asset Control Systems
Lightscene 2016: Revolutionising Asset Control SystemsLightscene 2016: Revolutionising Asset Control Systems
Lightscene 2016: Revolutionising Asset Control Systems
 
Ambassadors of innovation on architectures
Ambassadors of innovation on architecturesAmbassadors of innovation on architectures
Ambassadors of innovation on architectures
 
Designing an IT Solution
Designing an IT SolutionDesigning an IT Solution
Designing an IT Solution
 
Foundations of enterprise architecture management and archi mate
Foundations of enterprise architecture management and archi mateFoundations of enterprise architecture management and archi mate
Foundations of enterprise architecture management and archi mate
 
Enterprise Architecture - TOGAF Overview
Enterprise Architecture - TOGAF OverviewEnterprise Architecture - TOGAF Overview
Enterprise Architecture - TOGAF Overview
 
IT Architect Profession
IT Architect ProfessionIT Architect Profession
IT Architect Profession
 
Delivering enterprise architecture
Delivering enterprise architectureDelivering enterprise architecture
Delivering enterprise architecture
 
Open bim and collaboration practice
Open bim and collaboration practiceOpen bim and collaboration practice
Open bim and collaboration practice
 
Introducing the World's First Information Architecture Tool
Introducing the World's First Information Architecture ToolIntroducing the World's First Information Architecture Tool
Introducing the World's First Information Architecture Tool
 
ETDP 2015 D1 Technology Enabled Facility Lifecycle Data Management - Grace Wa...
ETDP 2015 D1 Technology Enabled Facility Lifecycle Data Management - Grace Wa...ETDP 2015 D1 Technology Enabled Facility Lifecycle Data Management - Grace Wa...
ETDP 2015 D1 Technology Enabled Facility Lifecycle Data Management - Grace Wa...
 
Architecting for the Cloud with TOGAF®
Architecting for the Cloud with TOGAF®Architecting for the Cloud with TOGAF®
Architecting for the Cloud with TOGAF®
 
Archi mate views_and_viewpoints
Archi mate views_and_viewpointsArchi mate views_and_viewpoints
Archi mate views_and_viewpoints
 
Jennifer Whyte - Digital innovation and the transformation of infrastructure ...
Jennifer Whyte - Digital innovation and the transformation of infrastructure ...Jennifer Whyte - Digital innovation and the transformation of infrastructure ...
Jennifer Whyte - Digital innovation and the transformation of infrastructure ...
 
Sam El-Jouzi - Inside the digital asset - exploring immersive visualisation t...
Sam El-Jouzi - Inside the digital asset - exploring immersive visualisation t...Sam El-Jouzi - Inside the digital asset - exploring immersive visualisation t...
Sam El-Jouzi - Inside the digital asset - exploring immersive visualisation t...
 

Viewers also liked

E-government reference model
E-government reference modelE-government reference model
E-government reference modelAlexander SAMARIN
 
Better application architecture with #microservices and #BPM (as APaaS)
Better application architecture with #microservices and #BPM (as APaaS)Better application architecture with #microservices and #BPM (as APaaS)
Better application architecture with #microservices and #BPM (as APaaS)Alexander SAMARIN
 
The concept paper
The concept paperThe concept paper
The concept papermunene2012
 
Incremental transformation to #digital (explicit and executable) processes
Incremental transformation to #digital (explicit and executable) processes Incremental transformation to #digital (explicit and executable) processes
Incremental transformation to #digital (explicit and executable) processes Alexander SAMARIN
 
Architecting digital transformation v1
Architecting digital transformation v1Architecting digital transformation v1
Architecting digital transformation v1Alexander SAMARIN
 
Addressing security concerns through BPM
Addressing security concerns through BPMAddressing security concerns through BPM
Addressing security concerns through BPMAlexander SAMARIN
 
Representing Business Processes: Conceptual Model and Design Methodology
Representing Business Processes: Conceptual Model and Design MethodologyRepresenting Business Processes: Conceptual Model and Design Methodology
Representing Business Processes: Conceptual Model and Design MethodologyMichele Chinosi
 
BPM, SOA and EA for e-government
BPM, SOA and EA for e-government BPM, SOA and EA for e-government
BPM, SOA and EA for e-government Alexander SAMARIN
 
Reaction paper
Reaction paperReaction paper
Reaction paperKat Lutao
 
Concept Paper
Concept PaperConcept Paper
Concept Paperplhill14
 

Viewers also liked (12)

E-government reference model
E-government reference modelE-government reference model
E-government reference model
 
Better application architecture with #microservices and #BPM (as APaaS)
Better application architecture with #microservices and #BPM (as APaaS)Better application architecture with #microservices and #BPM (as APaaS)
Better application architecture with #microservices and #BPM (as APaaS)
 
The concept paper
The concept paperThe concept paper
The concept paper
 
Music Video Concept Paper
Music Video Concept PaperMusic Video Concept Paper
Music Video Concept Paper
 
Incremental transformation to #digital (explicit and executable) processes
Incremental transformation to #digital (explicit and executable) processes Incremental transformation to #digital (explicit and executable) processes
Incremental transformation to #digital (explicit and executable) processes
 
Architecting digital transformation v1
Architecting digital transformation v1Architecting digital transformation v1
Architecting digital transformation v1
 
Addressing security concerns through BPM
Addressing security concerns through BPMAddressing security concerns through BPM
Addressing security concerns through BPM
 
Representing Business Processes: Conceptual Model and Design Methodology
Representing Business Processes: Conceptual Model and Design MethodologyRepresenting Business Processes: Conceptual Model and Design Methodology
Representing Business Processes: Conceptual Model and Design Methodology
 
BPM, SOA and EA for e-government
BPM, SOA and EA for e-government BPM, SOA and EA for e-government
BPM, SOA and EA for e-government
 
Reaction paper
Reaction paperReaction paper
Reaction paper
 
Concept Paper
Concept PaperConcept Paper
Concept Paper
 
Project proposal
Project proposalProject proposal
Project proposal
 

Similar to Technology-enabled healthcare transformation: concept paper

An Empirical Evaluation of Capability Modelling using Design Rationale.pdf
An Empirical Evaluation of Capability Modelling using Design Rationale.pdfAn Empirical Evaluation of Capability Modelling using Design Rationale.pdf
An Empirical Evaluation of Capability Modelling using Design Rationale.pdfSarah Pollard
 
Erp application
Erp applicationErp application
Erp applicationAkshara S
 
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...ijbiss
 
A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...
A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...
A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...ijbiss
 
IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...
IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...
IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...IRJET Journal
 
Solution Architecture US healthcare
Solution Architecture US healthcare Solution Architecture US healthcare
Solution Architecture US healthcare sumiteshkr
 
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...ijbiss
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture Hamzazafeer
 
New hospital it strategy 2
New hospital it strategy 2New hospital it strategy 2
New hospital it strategy 2Pankaj Gupta
 
Controlling SOA in Support of Operational Improvement (ISPE PE Vol 31 No 4 - ...
Controlling SOA in Support of Operational Improvement (ISPE PE Vol 31 No 4 - ...Controlling SOA in Support of Operational Improvement (ISPE PE Vol 31 No 4 - ...
Controlling SOA in Support of Operational Improvement (ISPE PE Vol 31 No 4 - ...David Stokes
 
Business Intelligence Module 3
Business Intelligence Module 3Business Intelligence Module 3
Business Intelligence Module 3Home
 
Microsoft Mimarisi
Microsoft MimarisiMicrosoft Mimarisi
Microsoft MimarisiNuri Cankaya
 
Not All Collaboration Solutions are Built the Same
Not All Collaboration Solutions are Built the Same Not All Collaboration Solutions are Built the Same
Not All Collaboration Solutions are Built the Same Phil Auguste
 
Transformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance worldTransformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance worldNIIT Technologies
 
Digital transformation through integration
Digital transformation through integrationDigital transformation through integration
Digital transformation through integrationCetrixSaudi
 

Similar to Technology-enabled healthcare transformation: concept paper (20)

An Empirical Evaluation of Capability Modelling using Design Rationale.pdf
An Empirical Evaluation of Capability Modelling using Design Rationale.pdfAn Empirical Evaluation of Capability Modelling using Design Rationale.pdf
An Empirical Evaluation of Capability Modelling using Design Rationale.pdf
 
Systema analysis
Systema analysisSystema analysis
Systema analysis
 
Erp application
Erp applicationErp application
Erp application
 
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
 
A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...
A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...
A Study on the Sectors of Economy Serviced by Pre-Industry System Developers ...
 
IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...
IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...
IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...
 
Solution Architecture US healthcare
Solution Architecture US healthcare Solution Architecture US healthcare
Solution Architecture US healthcare
 
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
A STUDY ON THE SECTORS OF ECONOMY SERVICED BY PRE-INDUSTRY SYSTEM DEVELOPERS ...
 
Business analyst
Business analystBusiness analyst
Business analyst
 
Mis module ii
Mis module iiMis module ii
Mis module ii
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture
 
New hospital it strategy 2
New hospital it strategy 2New hospital it strategy 2
New hospital it strategy 2
 
Controlling SOA in Support of Operational Improvement (ISPE PE Vol 31 No 4 - ...
Controlling SOA in Support of Operational Improvement (ISPE PE Vol 31 No 4 - ...Controlling SOA in Support of Operational Improvement (ISPE PE Vol 31 No 4 - ...
Controlling SOA in Support of Operational Improvement (ISPE PE Vol 31 No 4 - ...
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
Sdlc1
Sdlc1Sdlc1
Sdlc1
 
Business Intelligence Module 3
Business Intelligence Module 3Business Intelligence Module 3
Business Intelligence Module 3
 
Microsoft Mimarisi
Microsoft MimarisiMicrosoft Mimarisi
Microsoft Mimarisi
 
Not All Collaboration Solutions are Built the Same
Not All Collaboration Solutions are Built the Same Not All Collaboration Solutions are Built the Same
Not All Collaboration Solutions are Built the Same
 
Transformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance worldTransformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance world
 
Digital transformation through integration
Digital transformation through integrationDigital transformation through integration
Digital transformation through integration
 

More from Alexander SAMARIN

Digital Architecture Methodology for Systemic Digital Transformation (Smart C...
Digital Architecture Methodology for Systemic Digital Transformation (Smart C...Digital Architecture Methodology for Systemic Digital Transformation (Smart C...
Digital Architecture Methodology for Systemic Digital Transformation (Smart C...Alexander SAMARIN
 
Mini-course at VFU - Architecting modern digital systems - 0
Mini-course at VFU - Architecting modern digital systems - 0Mini-course at VFU - Architecting modern digital systems - 0
Mini-course at VFU - Architecting modern digital systems - 0Alexander SAMARIN
 
Mini-course at VFU - Architecting modern digital systems - 5
Mini-course at VFU - Architecting modern digital systems - 5Mini-course at VFU - Architecting modern digital systems - 5
Mini-course at VFU - Architecting modern digital systems - 5Alexander SAMARIN
 
Mini-course at VFU - Architecting modern digital systems - 3
Mini-course at VFU - Architecting modern digital systems - 3Mini-course at VFU - Architecting modern digital systems - 3
Mini-course at VFU - Architecting modern digital systems - 3Alexander SAMARIN
 
Mini-course at VFU - Architecting modern digital systems - 2
Mini-course at VFU - Architecting modern digital systems - 2Mini-course at VFU - Architecting modern digital systems - 2
Mini-course at VFU - Architecting modern digital systems - 2Alexander SAMARIN
 
Systems architecting experience
Systems architecting experienceSystems architecting experience
Systems architecting experienceAlexander SAMARIN
 
Enterprise Architecture (#EntArch) as a #systemsapproach applied management d...
Enterprise Architecture (#EntArch) as a #systemsapproach applied management d...Enterprise Architecture (#EntArch) as a #systemsapproach applied management d...
Enterprise Architecture (#EntArch) as a #systemsapproach applied management d...Alexander SAMARIN
 
BPM for SOA+ESB+API and cloud
BPM for SOA+ESB+API and cloud BPM for SOA+ESB+API and cloud
BPM for SOA+ESB+API and cloud Alexander SAMARIN
 
Smart-city implementation reference model
Smart-city implementation reference modelSmart-city implementation reference model
Smart-city implementation reference modelAlexander SAMARIN
 
Эталонная модель электронного правительства
Эталонная модель электронного правительстваЭталонная модель электронного правительства
Эталонная модель электронного правительстваAlexander SAMARIN
 
Ladder of business process practices
Ladder of business process practicesLadder of business process practices
Ladder of business process practicesAlexander SAMARIN
 
Importance of executable processes and BPMN
Importance of executable processes and BPMNImportance of executable processes and BPMN
Importance of executable processes and BPMNAlexander SAMARIN
 
How EA, BPM, SOA and ECM work together
How EA, BPM, SOA and ECM work togetherHow EA, BPM, SOA and ECM work together
How EA, BPM, SOA and ECM work togetherAlexander SAMARIN
 
Business Architecture Patterns (BPM in Practice conference)
Business Architecture Patterns (BPM in Practice conference)Business Architecture Patterns (BPM in Practice conference)
Business Architecture Patterns (BPM in Practice conference)Alexander SAMARIN
 
BPM for business analysts: modelling procedure
BPM for business analysts: modelling procedureBPM for business analysts: modelling procedure
BPM for business analysts: modelling procedureAlexander SAMARIN
 
Integration via #BPM: become friendly to #cloud
Integration via #BPM: become friendly to #cloudIntegration via #BPM: become friendly to #cloud
Integration via #BPM: become friendly to #cloudAlexander SAMARIN
 

More from Alexander SAMARIN (16)

Digital Architecture Methodology for Systemic Digital Transformation (Smart C...
Digital Architecture Methodology for Systemic Digital Transformation (Smart C...Digital Architecture Methodology for Systemic Digital Transformation (Smart C...
Digital Architecture Methodology for Systemic Digital Transformation (Smart C...
 
Mini-course at VFU - Architecting modern digital systems - 0
Mini-course at VFU - Architecting modern digital systems - 0Mini-course at VFU - Architecting modern digital systems - 0
Mini-course at VFU - Architecting modern digital systems - 0
 
Mini-course at VFU - Architecting modern digital systems - 5
Mini-course at VFU - Architecting modern digital systems - 5Mini-course at VFU - Architecting modern digital systems - 5
Mini-course at VFU - Architecting modern digital systems - 5
 
Mini-course at VFU - Architecting modern digital systems - 3
Mini-course at VFU - Architecting modern digital systems - 3Mini-course at VFU - Architecting modern digital systems - 3
Mini-course at VFU - Architecting modern digital systems - 3
 
Mini-course at VFU - Architecting modern digital systems - 2
Mini-course at VFU - Architecting modern digital systems - 2Mini-course at VFU - Architecting modern digital systems - 2
Mini-course at VFU - Architecting modern digital systems - 2
 
Systems architecting experience
Systems architecting experienceSystems architecting experience
Systems architecting experience
 
Enterprise Architecture (#EntArch) as a #systemsapproach applied management d...
Enterprise Architecture (#EntArch) as a #systemsapproach applied management d...Enterprise Architecture (#EntArch) as a #systemsapproach applied management d...
Enterprise Architecture (#EntArch) as a #systemsapproach applied management d...
 
BPM for SOA+ESB+API and cloud
BPM for SOA+ESB+API and cloud BPM for SOA+ESB+API and cloud
BPM for SOA+ESB+API and cloud
 
Smart-city implementation reference model
Smart-city implementation reference modelSmart-city implementation reference model
Smart-city implementation reference model
 
Эталонная модель электронного правительства
Эталонная модель электронного правительстваЭталонная модель электронного правительства
Эталонная модель электронного правительства
 
Ladder of business process practices
Ladder of business process practicesLadder of business process practices
Ladder of business process practices
 
Importance of executable processes and BPMN
Importance of executable processes and BPMNImportance of executable processes and BPMN
Importance of executable processes and BPMN
 
How EA, BPM, SOA and ECM work together
How EA, BPM, SOA and ECM work togetherHow EA, BPM, SOA and ECM work together
How EA, BPM, SOA and ECM work together
 
Business Architecture Patterns (BPM in Practice conference)
Business Architecture Patterns (BPM in Practice conference)Business Architecture Patterns (BPM in Practice conference)
Business Architecture Patterns (BPM in Practice conference)
 
BPM for business analysts: modelling procedure
BPM for business analysts: modelling procedureBPM for business analysts: modelling procedure
BPM for business analysts: modelling procedure
 
Integration via #BPM: become friendly to #cloud
Integration via #BPM: become friendly to #cloudIntegration via #BPM: become friendly to #cloud
Integration via #BPM: become friendly to #cloud
 

Recently uploaded

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesSanjay Willie
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Technology-enabled healthcare transformation: concept paper

  • 1. 1 Technology-enabled healthcare transformation: concept paper 1 Executive summary [WHY] We believe that healthcare sector needs a disruptive transformation:  healthcare should be more affordable;  healthcare should offer the best possible services for each patient;  healthcare should become the centre of the health value-stream;  healthcare should seamlessly incorporate innovations;  healthcare should be secured by design;  healthcare should prevent unjustified proliferation of tools. [HOW] Such a transformation is achievable by synergy among various proven modern capabilities:  achievements in design of software-intensive distributed systems;  architectures for pluggable agile solutions;  mature enterprise-wide methodologies as Enterprise Architecture, BPM, SOA and ECM;  Internet of things;  free and open-source software;  partnership between public, private, academic, social and voluntary sectors;  sectorial, regional and international collaboration and standardisation. [WHAT] A platform-enabled reference architecture and several technological solutions implemented with this architecture will prove that:  each patient can be served by knowledge and experience available world-wide hassle- free, remotely and anonymously;  any treatment can be transparent in value, cost and results, justified, objectively validatable and traceable;  the unique business processes of each healthcare establishment can be assembled from a common library of process patterns (fragments) and tasks thus effortlessly spreading best medical practices and proven medical knowledge;  routine activities of the healthcare workers can be automated thus providing the opportunity for more added-value and innovation;  the information in the healthcare can be secure stored, exchanged, analysed and enriched;  new technologies, tools, devices, procedures and knowledge can be easily plugged-in thus creating opportunities for start-ups;  business systems in healthcare can be constructed from components of different vendors and from various origins (borrowed, bought, built, outsourced, standardised, innovated, re-engineered) to quickly create best-to-fit configurations. 2 Architecting the technology-enabled healthcare transformation 2.1 General Architecture of a system has to provide a brief description of the important aspects of the system. Any system (enterprise, eco-system, supply-chain, industry, country, region, etc.) has
  • 2. 2 many different stakeholders who see the system differently. (Further each participant of such a system is considered as its stakeholder). Thus different aspects of the system have different importance for different participants (also known as participant’s concerns). For some of participants it may be the purpose of the system or customer experience. Others may be more interested in easy evolution of the system. It is for architect to give coherent and convincing answers to all participants how their concerns will be addresses by the system and how their current work habits and experience will be changed for the better. Architect must to speak to participants differently! “Success is in the eyes of beholder” is the first rule for many architects. This chapter provides several viewpoints (participant’s concerns) and related views (description of the system) for the following participants:  Citizens  Patients  Healthcare professionals  Healthcare industry self-regulator  Government regulator for healthcare  Healthcare service providers  Medical research organisations  Medical equipment vendors  Health insurance companies  Architects of technology-intensive applications for healthcare  Managers of technology-intensive projects for healthcare Some of these views are specific for healthcare; others are healthcare independent. The following matrix shows relative importance of each view for various participants. 2.2 Big picture 2.3 Reference functional architecture 2.4 Enterprise as a system of processes 2.5 Security enhanced by the use of processes 2.6 Some participant’s view 2.7 Platform-based approach 2.8 Implementation practices 2.9 Project management practices 2.10 Multi-layer implementation model 2.11 Agile solution delivery practices 2.12 Various technologies around 2.13 Modernisation of applications to become process-centric Citizens +++ + +++ Patients ++ ++ +++ Professionals + +++ ++ + + + + Self-regulator ++ ++ +++ +++ + + + Governmental regulator + + ++ +++ + + Service providers + +++ ++ ++ ++ + + + ++ +++ + +++ Research + ++ ++ ++ Vendors + +++ ++ +++ ++ ++ ++ ++ +++ ++ ++ Insurance +++ ++ ++ + ++ ++ Architects + ++ +++ +++ +++ ++ ++ +++ +++ +++ +++ Project managers + ++ +++ ++ + + ++ +++ + + + +
  • 3. 3 2.2 Big picture of healthcare The big picture of the healthcare is shown in figure 1 as a value-stream for curing patients which is continuously improved by accumulated knowledge and more sophisticated processes and services. Figure 1 Big picture of healthcare The target of the technology-enabled transformation is to deploy gradually this big picture into each participant of the healthcare to be able to share data, services, processes, knowledge, tools and to eliminate barriers for innovations. Figure 2 Big picture of healthcare will enable much higher level of cooperation, collaboration and coordination with the healthcare sector
  • 4. 4 2.3 Reference functional architecture 2.3.1 Generic Figure 3 shows various functional (business and technical) capabilities to be provided as a “Healthcare Platform” to support the big picture. Figure 3 Reference functionality of the common healthcare platform 2.3.2 Healthcare-common capabilities • Medical records • Inter-participants secure data and information exchange 2.3.3 Healthcare domains capabilities To be provided during the evolution of the platform. 2.3.4 Best business practices • Knowledge management practices: business manual, QMS • Security practices • Risk management practices • Compliance practices • Governance practices • Project management practices • Performance practices: SLAs, KPIs, predictive analytics • Constrains optimisation • Customer experience practices 2.3.5 Universal business capabilities • BRM as methodology (including The Decision Model) • BPM as managing by processes methodology (BPM, 6sigma, lean, etc.) • Relationship management: SRM, CRM • Business performance reporting and analytics • RM and archiving • Project management methodology (PMI, Prince 2, Hermes) • Operations documentation • Business domain data (or biz objects) repository and model • Business reference information • Capability (business domain) modelling
  • 5. 5 • Organisation, roles and rights management 2.3.6 Specialised enterprise capabilities • Financial accounting • Marketing • Legal • Procurement 2.3.7 Basic technical capabilities (or technologies) • Data Warehouse (as a place to re-use data) • BRM as a technology • BPM as a technology (managing processes per ce) • CRM as a technology • ECM • Communication tools (e-mail, skype, IM) • Social connectivity • ESB • Micro-service-server • Identity and access management • Data encryption and security • Interactive portals: Web-based, mobile-apps-based • Complex Event Processes (CEP) • Technical monitoring and traceability 2.4 Enterprise as a system of processes 2.4.1 General Enterprise functioning can be considered as business activity flows spanning the IT applications, employees, customers and partners within and beyond the boundaries of the enterprise. (Business activity is a unit of work). Those flows and individual business activities within them are interrelated. The relationships between them are static (expressed as structure) and dynamic (expressed as behaviour). The number of potential relationships between activities is huge – N x (N-1)/2 for N activities. This is the root cause of the complexity of modern enterprise’s. Historically, business process is an essential business concept for bringing some order into the structure and the behaviour of interrelated business activities. A business process is explicitly- defined coordination for guiding the purposeful enactment of business activities. In its simplest form, business process is an initially agreed plan to follow an order of activities; the plan may include some variants and the plan allows some changes during its execution. A detailed, formalised and unchangeable plan (e.g. in a form of process template expressed in BPMN) is one of the several coordination techniques (see http://improving-bpm- systems.blogspot.fr/2014/03/coordination-techniques-in-bpm.html ) potentially used in business processes. Because coordination between some activities can be strong (e.g. as in the army) or weak (e.g. as in an amateurs football team), it is possible to discover various stable coordination constructs (in addition to business processes. Usually, the coordination between business activities which belong to a particular coordination construct is stronger that the coordination between similar coordination constructs. The knowledge about coordination constructs reduces the number of potential relationships between business activities. This is reducing the level of complexity of an enterprise. Let us consider 4 nested coordination constructs: 1. process patterns (coordination between activities within processes)
  • 6. 6 2. processes (coordination between process fragments and separate activities) 3. cluster of processes (coordination between processes) 4. system of processes (coordination between clusters of processes) 2.4.2 Process patterns It was observed that although all business processes are unique, they are actually composed from similar process fragments or process patterns. For example, let us consider a typical “repair” process in housing management which comprises claim making, evaluation, selection of a service provider, repair, control, invoicing and insurance to pay the activities. This process is actually composed from a few process patterns as shown in figure 4 with an original process diagram (which was developed without patterns) covered by patterns (red rectangulars). Figure 4 Example of a process diagram with implicit use of process patterns Patterns used in this illustration are:  Pattern SI – “Submission Interface” see http://www.slideshare.net/samarin/process- practical-patterns-si  Pattern PAR – “Propose, Act and React” see 8.3.12 from www.samarin.biz/book  Pattern IPS – “Initial Process Skeleton” see 8.3.7 from www.samarin.biz/book Although any pattern is a highly-cohesive construct, patterns can be adapted for particular needs. For example, the Delegation of Authority Matrix (DAM) pattern (see http://improving- bpm-systems.blogspot.ch/2012/07/practical-process-pattern-dam.html ) is implemented differently in the procurement and in the project management. Some process patterns are available at http://improving-bpm- systems.blogspot.fr/search/label/practical%20process%20patterns 2.4.3 Cluster of processes Coordination between processes is usually event-based (see figure 5 with lightning symbol for events). In the simplest variant, the finish of a process is the start of another process. Note that it looks like the state-based coordination between processes. Figure 5 Simple coordination between processes
  • 7. 7 In the reality, there are more complex interactions between processes (see figure 6) which are described in detail in http://improving-bpm-systems.blogspot.ch/2014/03/enterprise-as- system-of-processes.html . Figure 6 Examples of complex coordination between processes Processes, which are strongly related to each other, form a Cluster Of Process (CLOP). CLOPs usually exist around functional processes which are implemented in a particular business function, e.g. “Field Services”. In addition to functional processes there is a set of processes (called halo of processes) which helps to execute functional processes. These additional processes are monitoring, operating and governance processes:  Monitoring processes are responsible for analysing the running functional processes – some sort of operational intelligence.  Operating processes are used for implementing operational (via available parameters or controls) changes.  Governance processes are used for detecting, designing and implementation of struc- tural changes, e.g. “customer satisfaction and loyalty development”, “quality”, “strategy and planning” etc. All together (see figure 7) additional processes constitute two control loops – operational and strategic. Figure 7 Cluster of processes and its halo
  • 8. 8 2.4.4 Coordination between CLOPs Each CLOP may relate to the enabling group of clusters, the supporting group of clusters and the customer group of clusters (see figure 8). The enabling group of clusters are typically specific for a particular CLOP while the supporting group of clusters are common for several CLOPs. Figure 7 Coordination between CLOPs Value streams and end-to-end enterprise processes are usually formed from a few CLOPs. 2.5 Enhancing information cecurity by the use of processes 2.5.1 General Ensuring of the information security implies the following characteristics of the enterprise functioning: 1. Any business activity is performed only as prescribed and any unintended use of information (e.g., access to information resources unrelated to the work performed) would be impossible in principle. 2. Initial planning of business activities must be validated for the compliance with the formal rules of information security. 3. Execution and operational planning of business activities must be constantly validated for the compliance with the formal rules of information security. 4. The explicit coordination of business activities allows synchronising them with security and risk related activities. 2.5.2 Control of access to an informational resource along its life-cycle In simple cases, the control of access to an informational resource can be rigidly connected to the phases of the life cycle of the resource. The latter can be implemented as a business process. Explicit and executable business process is convenient because the whole dynamic of control access is embedded in the process. This allows better control of access rights change (as shown in figure 8). Figure 8 Evolution of access right during the life-cycle
  • 9. 9 2.5.3 Control of access to an informational resource at activity level In more complex cases, information resources are linked to specific business activities. An employee, appointed for the carrying out of a particular business activity, gets access to the information resources required for the carrying out this business activity, only for the duration of this business activity (as shown in figure 9). Figure 9 Evolution of access right around a business activity Objective operational data collected, who has/had access to what information resources will increase the level of information security. Thus, business processes can detect potential cases for the separation of duty by establishing relationships between business activities. 2.5.4 Separation and imposition of duty among several business processes In general, security-related relationships between business activities should be established and formally registered. A non-inclusive list of such relationships is the following:  Other activities which validate the results of the given activity.  Other activities which define the governance for the given activity.  Other activities which do the handling exceptional situations for the given activity (error handling, escalations, send for review and delegate).  Other activities which audit the given activity (1st, 2nd and 3rd party audit).  Other activities which evaluate the risks before the given activity.  Other activities which evaluate the risks after the given activity.  Other activities which certify the given activity (1st, 2nd and 3rd party certification).  Other activities which do compensation (undo) for the given activity. These relationships between activities define some limitations that roles and actors may carry out what activities: the same actor or a different actor from a different role or a different actor from the same role. For example, if the “Activity_B” validates the results of “Activity_A” then no actor should be in “Role_1” and “Role_2” simultaneously (as shown in figure 10). Figure 10 Separation of duties among several business processes Thus, the separation of duty may be formally validated at the design-time. 2.5.5 Management of risk along business processes Managing any work by processes allows addressing the risk-related issues in proactive manner. The risk is strongly related to how the business processes are carried out. By
  • 10. 10 understanding processes (i.e. through being able to simulate them) the business may predict how the risk may changing during the execution of that process. The explicit description of processes permits to add a few “check-points” within any process to examine its risk-related “health”. Business processes act as a skeleton to which the enterprise adds risk management activities (as shown in figure 11) – each business activity is enriched by risk-related monitoring and evaluation. Figure 11 Enhancing processes by risk management The risk evaluation may initiate some risk mitigation processes. The risk evaluation may be as complex as necessary, and it may include simulations and the conduct of statistical and scenario analysis. 2.5.6 The intra-participants secure integration Healthcare platform, which acts also an inter-participants coordination tool, ultimately resolved the integration problems within the healthcare. Instead of that participants are connected to each other in ad-hoc way, the healthcare platform offers an integration process which delivers data and documents between all participants in a systematic way as shown in figure 12. It is actually a centralised service (backbone) for the inter-participants secure electronic exchange (like sending / receiving registered letters). Figure 12 Reducing complexity in integration between participants Generally, the backbone is decoupled from participant internal applications through two adapters: dispatcher (handle messages coming from the backbone) and expediter (handle messages going to the backbone). To be transmitted through the backbone, each message (business data and documents) is protected by three "envelopes" (marked by blue circled number in figure 13):  Business (processing) envelope  Delivery (addressing) envelope  Transportation (routing) envelope
  • 11. 11 Figure 13 Integration process between participants 2.6 Some participant’s view For some participants, the healthcare platform should look like a social collaborative extranet which may have the following visual design (see figure 14). Figure 14 Healthcare platform as a social collaborative extranet for some participants This extranet considers that:  Each participant has several roles, e.g. YOURSELF (person and his/her legal representatives), MERICARED (person with insurance), PATIENT, SENIOR (persons with age over 60 years), etc.  Person may select which roles he/she is carrying out at a particular moment in time.  Each communication between a participant and the healthcare services is a case with associated documents, data, audit trails, records, service level agreements and key performance indicators. A case may be completed or on-going. 2.7 Platform-based approach for working and advancing together How is it possible to deliver many similar capabilities for a number of highly diverse participants in a rational way? The current way of provisioning via monolith and proprietary IT applications leads to many duplications. At the result, we, the patients and citizens, are paying several times for the same functionality (which often is implemented not with the highest quality). The big picture for healthcare is too big for one project and needs to be implemented in an incremental way as a set of inter-related projects. In such a situation, developing the final requirements is virtually impossible because no one does know exactly what should be built, and, often, new functionalities should be demonstrated before articulating in detail what is wanted. Furthermore, all participants will usually advance at own, often different, speed. If all participants are treated in an identical manner, then the slowest determines the speed of all.
  • 12. 12 The traditional approach for IT application development does not work in such a case because it requires everything to be defined up front. The pure agile approach for IT application development does not work either because it cannot guarantee that a particular functionality will be developed once only and systematically re-used in all applications. Therefore, implementation approach of the big picture must enable gradual, economic and self-accelerating of technical and business transformations for all healthcare service providers together. Figure 15 shows a platform-based architectural approach: all common functionalities should constitute a single platform and individual new solutions are built using the functionalities available from the platform. The provisioning of solutions will be carried out incrementally with the pace of a particular set of participants (or target community). At each moment in time, each healthcare service provider may have a different pace and need a different individual set of functionality. Figure 15 Platform-based approach The platform-based architectural approach is based on the following considerations:  The platform must standardise and simplify core components of the future industry- wide system of systems. For any component outside the platform, new opportunities should be explored using agile principles. These twin approaches should be mutually reinforcing: the platform frees up resource to focus on new opportunities while successful agile innovations are rapidly scaled up when incorporated into the platform.  An agile approach requires coordination at an industry level.  To minimise duplication of effort in solving the same problems, there needs to be industry-wide transparency of agile initiatives.  Existing components of the platform need periodic review. Transparency and the publication openly of feedback and the results of experiments will help to keep the pressure on the platform for continual improvement as well as short-term cost savings. An example of the platform-based approach: Android and iOS are platforms with many small applications. 2.8 Platform implementation practices Considering that the platform is intended for all healthcare service providers, but how is it possible to achieve some degree of uniformity among all healthcare service providers if they have different abilities to absorb the benefits of information technologies. Computerisation is a journey, and each healthcare service provider needs to be allowed to adopt a suitable pace for itself, but we also need to maintain coherence in the progression of the whole set. The use of a “ladder” model can be useful since it permits progression of each entity in a stepwise manner but at the same time guides the overall progression in a coherent manner. Design the “ladder” to have a few levels of capability from “not able” to “fully capable”. Entities are permitted to advance at different paces in their ascent to the top of the “ladder”. For example, their progress could be planned as in figure 16.
  • 13. 13 Figure 16 Example of planned progress Intensive use of process-centric implementation with various coordination techniques thus allowing to assemble unique healthcare service provider’s processes from standard process fragments (patterns). Micro-services are considered as the latest SOA outcome to deliver small units of functionality to be assembled by executable processes. The systematic and aligned use of business processes and micro-services bring the built-in flexibility and adaptability. The platform is designed to be tools-independent by standardizing data, information, interfaces and coordination between various capabilities. This will allow to build the platform incrementally by provisioning needed capabilities from COTS, FOSS, platform-community- owned and in-house components. A few components may be offered for one capability as shown in figure 17. Figure 17 Platform composition 2.9 Project management practices There are three primary types of projects. 1. On-going and centralised platform governance: evolution of the architecture, evolution of technologies, evolution of features, evolution of solutions, evolution of practices and evolution of documentation. 2. Rapid implementation of solutions as mini-projects: light specifications, quick prototyping, consistent configuration, fast procurement, agile development and re-use of existing tools and habits. 3. Implementation of new platform components. The preferable project management method is archibagile which combines decomposition with agile implementation of “understood” components (see http://improving-bpm- systems.blogspot.ch/2014/06/different-coordination-techniques-in.html and figure 18).
  • 14. 14 Figure 18 Example of planned progress 2.10 Multi-layered implementation model For the IT side, the platform offers a multi-layer implementation model (see figure 19) for process-centric solutions. This model structures different services and other artefacts around processes. Each layer is a level of abstraction of the business and addresses some particular concerns. Figure 19 Example of planned progress  The business data layer comprises many pieces of information – names, dates, files, etc., which are stored in existing repositories, e.g. databases, document management systems, web portals, directories, e-mail servers, etc. This layer's role is to access data. In this layer the business is considered in a very primitive way.  The business objects layer comprises the many objects specific to a particular business, e.g. a business participant, a product, etc. This layer hides the complexity for manipulating the objects, which are actually collections of data together with any dependencies between them. The level of abstraction is increased – the business is represented by the objects, irrespective of their actual storage in the repositories.  The business routines (or regulations) layer comprises the actions which must be carried out on the business objects to perform the business activities. For example, to announce the availability of a product one has to find out which customers are interested in the product, to collect their contact e-mails and to distribute an announcement. At this level of abstraction the business comprises some modifications
  • 15. 15 (including the adding of value) to the objects. Most enterprise employees work in this layer.  The business execution layer carries out the business processes. At this level of abstraction the business is a systematic set of coordinated activities. We can say that this is the layer where business line managers and super-users work.  The business monitoring layer analyses the execution of the business process. The business events are collected and compared with the expected (baseline) planning. In addition, the behaviour of the business process can be simulated. The level of abstraction is increased – the business is validated to run correctly. The IT buzzword applicable to this layer is Business Activity Monitoring (BAM).  The business intelligence layer implements enterprise-wide planning, performance evaluation and control actions applied to the business processes. At this level of abstraction the whole enterprise business system is considered as a single functional unit. Each layer has two roles: it exploits the functionalities of the lower layer, and it serves the higher layer. Each layer has a well-defined interface and its implementation is independent of that of the others. Each layer comprises many services that can be used independently – it is not necessary that all layers be fully implemented at the same time or even be provided in a single project. Another practical observation is that different layers have lifecycles of different time scales: typical repositories have a 5- to 10-year life-span while the business requires continuous improvement. Because of the implementation independence of the different layers, each layer may evolve at its own pace without being hampered by the others. As a general rule, existing applications already implement many of the business objects, routines and processes, but usually in an unstructured way. The objects, routines and processes are intermixed, not reusable and need to be implemented again and again. The multi-layer implementation model is a tool which helps the enterprise to design the enterprise business systems  in business terms, but not in terms of IT tools,  via the combination of universally accessible and interdependent building blocks,  in a structured way, and  with a high level of flexibility built-in. Here’s a tip for how to remember the layers: Data, Objects, Routines, Execution, Monitoring, Intelligence – DO-RE-MI. 2.11 Agile solution delivery practices A new solution is constructed from existing services and newly developed ones; the latter may be in different layers. Versioning of artefacts brings unprecedented flexibility, and thus removes the existing segregation between software development and maintenance – the IT unit can easily carry out continuous evolution of the system. The development team members develop solutions as a set of easy-to-evolve artefacts (of course, within the limits defined by the architects). Below there are a few examples of the evolution of a solution constructed in accordance with the multi-layer implementation model. To demonstrate the reuse of existing services, newly created services are marked using a star in the top right corner. Note that the two top levels (intelligence and monitoring) have been removed to simplify these examples. Example 1 (see figure 20) is a process for releasing a product for customers while minimising the amount of human activity. Automated activity a1 collects all necessary information from internal repositories (ERP and int. DMS), and populates it into an external repository (ext. DMS) without opening external access to it. Human activity a2 requires a person to check the product, its metadata and other related resources to ensure that everything is in order for the
  • 16. 16 product to be released to the customer. Automated activity a3 opens customer access to the product (on ext. DMS). Figure 20 Example 1 Example 2 (see figure 21) is an extension of example 1. Automated activity a4 uses a customer directory and prepares a notification to a customer if the released product matches his/her interests. Automated activity a5 delivers this notification via e-mail. Figure 21 Example 2 Example 3 (see figure 22) is a process for the handling of some external requests. Automated activity a6 analyses the input obtained via e-mail and saves it into an internal repository (int. DMS) for traceability purposes. If necessary, human activity a7 is executed to categorize a request. Automated activity a8 performs any necessary actions. Automated activity a5 informs the requestor (via an e-mail) of the actions taken. Figure 22 Example 3
  • 17. 17 Example 4 (see figure 23) is a process for some typical work. Automated activity a9 fetches information from internal repositories and prepares it for manual activity a10. Automated activity a11 validates the work done. Automated activity a12 saves the results into internal repositories. Figure 23 Example 4 A “snow-ball” effect is observed – as more services and libraries become available, the implementation of each new service is faster. Also, practically all services are actually micro- services which are small in size and functionality. (See about micro-services http://www.tigerteam.dk/2014/micro-services-its-not-only-the-size-that-matters-its-also-how- you-use-them-part-1/ ) 2.12 Various technologies around the implementation model The multi-layer implementation model is the main tool for the solutions architects. It helps them to assemble solutions, which is rather different from implementing traditional applications:  the new solution is generally implemented across existing IT applications and repositories;  any missing building blocks are initially implemented, by preference, in a dynamic programming language; • the new solution generally does not have its “own” database; • the new solution is “outside” existing systems; • typical concerns for BPM, SOA and IT-governance are considered together. Where in this “architectural framework” are databases, application servers, Graphical User Interfaces (GUIs), XML, web services and other IT gadgets? By definition, it doesn't matter. Everything in figure 18 is considered as a service. These services can be executed inside a single program, within many programs on a single computer, on an application server or in a distributed environment. Services may be implemented in-house today and may be outsourced tomorrow, or implemented manually today and automated tomorrow. Another popular question concerns the relation of the multi-layer implementation model with some other technologies. Figure 24 shows how various technologies work together within the platform. Normally, some services are accessible from a portal or workplace. They “float” in an Enterprise Service Bus (ESB). The latter is used only for service-to-service connections at the technical level and not for business- or content- based routing logic. Obviously, we want to keep the business logic in one place (and not dispersed in an ESB) and we also want to have explicit coordination of services (but not magic routing by an ESB). Ideally, an ESB should be based on a solid computing basis which can be provided by a grid, modern virtualisation infrastructure or cloud computing.
  • 18. 18 Figure 24 Various technologies work together More details about this is available in the book www.samarin.biz/book 2.13 Modernisation of applications to become process-centric Usually, the services are “cemented” within monolithic applications which bridge GUIs, business logic and databases. To convert them into process-centric, it is necessary to externalise all services as shown in figure 25. Figure 25 Technical transformation of applications Such a technical modernisation is carried out in three steps:  Disassemble an application into services.  Improve existing services and/or add new services.  Assemble services via processes. It is important to intermix the technical transformation with the business evolution and combine various tactics about services: rent/borrow, buy, build, outsource, centralised vs. kept locally, standardised, re-engineered or automated. For complex applications (such an in-house developed legacy ERP), many of the services can be already available on the market (see figure 26).
  • 19. 19 Figure 26 Technical transformation of a legacy ERP In practically all cases the transformation must be carried-out using a step-by-step approach via the “eclipse” pattern (see figure 27). At first, we “cover” only a tiny area of the whole process. Usually we start with the intra-application coordination, because this part of IT is considered as boring and not very rewarding. The first fragment of explicit coordination may be quite primitive; it is a duplication of some existing functionality which is just eclipsed by this process. Then we introduce more and more fragments. With time, we cover bigger and bigger areas by explicit coordination of existing fragments. Figure 27 Use of the “eclipse” pattern for becoming process-centric Step by step, existing applications are transformed into services. It is recommended that such transformations be carried out with great care. For example, at first, services should be implemented to copy as closely as possible the existing functionality; they are optimised and refactored only later. Modifications to applications are minimised – by preference, some functionality is just switched off. To do this, some techniques of externalising events are necessary to link monolith applications and processes as shown in figure 28.
  • 20. 20 Figure 28 Externalising events which will launch processes 3 Electronic Health Records implementation (maybe useful for “meaningful use”) 3.1 General www.healthit.gov defines Electronic Health Records (EHRs) as, at their simplest, digital (computerized) versions of patients' paper charts. But EHRs, when fully up and running, are so much more than that. EHRs are real-time, patient-centred records. They make information available instantly, "whenever and wherever it is needed". And they bring together in one place everything about a patient's health. EHRs can:  Contain information about a patient's medical history, diagnoses, medications, immunization dates, allergies, radiology images, and lab and test results  Offer access to evidence-based tools that providers can use in making decisions about a patient's care  Automate and streamline providers' workflow  Increase organization and accuracy of patient information  Support key market changes in payer requirements and consumer expectations  One of the key features of an EHR is that it can be created, managed, and consulted by authorized providers and staff across more than one health care organization. A single EHR can bring together information from current and past doctors, emergency facilities, school and workplace clinics, pharmacies, laboratories, and medical imaging facilities. 3.2 Conceptual view on EHR Certainly, EHR is the core of majority of the healthcare IT applications and a perfect implementation of EHR is a must. Within the healthcare platform, EHR is architected in the following way. A person (or his/her legal representative) is the only owner of his/her EHR. Others use person’s EHR just temporary. Any other participants in healthcare must explicitly request some EHR from the patient. Such a request must be executed only in the context of a process/workflow/case in which the patient and the requestor are involved (see 2.5.3). Conceptually, my personal EHR are kept in my personal digital data and document storage. (It may be home-based as an appliance or cloud-based). This storage is supported by:  Inbox – my official postal box in the Internet (like postal box for a person or a household). Note, a person may have several inbox including anonymous ones.
  • 21. 21  Deposit box – a short-term protected cloud space for each act as a temporary storage for of data and documents exchange. Imagine that some paper documents were copied and put in an envelope.  Safe box – a long-term protected cloud space for a backup copy. Imagine a personal safe box in a Swiss bank.  Encryption services. 3.3 Example of process which uses EHR Below is an example of how the exchange between a patient (me) and a medical office should be carried out (keep in mind 2.5.6). The situation: I made an appointment to visit a doctor. The doctor has indicated which my medical documents (i.e. my EHR) are necessary for this visit. I have to send some of my medical documents before the visit. This is done in the following way (see figure 29): 1) As part of the “visit doctor” process, I got a task to send a list of medical documents. If there is nothing special, I approve the standard execution of the task as steps 2-6. 2) Creation a dedicated deposit box (with some protection) and copy requested documents (with some protection). 3) A temporary link to this deposit box is generated. 4) This link is communicated to the medical office’s reception service (office2others). 5) Documents from my temporary deposit box are copied to medical office temporary de- posit box. 6) A notification about arrival of documents appears in the medical office’s inbox. 7) A medial office employee gets a task to copy the documents from the temporary de- posit box to the medical office internal system. Figure 29 Exchange of document in the “visit doctor” process Documents to be sent and deposit boxes are encrypted with short-life-time keys and techniques of secured envelope are used as well (see 2.5.6). If some of those documents may be offered for medical research purposed then these documents will be anonymized by removing personal information and their encryption will be different (just to guarantee their integrity during the transition). 3.4 EHR implementation considerations Obviously, the mentioned above concept of EHR is an ideal state that should be approached through several transitional states. Imagine a situation when a medial organisation has EHR diluted somewhere in several IT applications. What can be the steps to advance to a better EHR? A possible way forward is below:
  • 22. 22 1. Create a separate EHR master repository with tight security and strict audit. 2. Migrate existing EHR from existing IT applications to the EHR repository. 3. Consider step-by-step modernisation of existing IT applications by starting to externalize some events about updating the EHR (see 2.13). 4. Link those events with “integration” processes to fetch EHR from existing IT applications and populate the EHR repository. 5. Use the EHR repository as the master source for processes and, if possible, existing IT applications. 6. Add more “integration” processes to exchange between your organization’s EHR master repository and other medical organizations. 7. Add more functional processes which use the EHR master repository. 8. Discuss with the vendors of your existing IT applications about externalization of EHR. In addition, do not forget to engage an architect into this transformation. As well as, systematically inform patients about handling of their EHR. 4 Participants, their concerns and benefits analysis Let us look at the whole healthcare eco-system to list all participants and their concerns as the following.  Patients – hassle-free access to the healthcare services, correctness of treatment, maximum as possible treatment at home, cost.  Doctors—zero routine work, access to the medical knowledge, access to medications, traceability.  Other service providers – minimum overhead, common (with doctors) decision making.  Insuring bodies – traceability, cost of overhead, correctness of treatment.  Insurance companies – correctness of claims, correctness of treatment.  Governments – overall quality, overall cost.  Other services – easy to have business the main participants. 5 Potential innovations and their effect on participants ## Innovation Technology-enabled techniques Impact 1 Medical records are safely managed and properly share among the participants Security is compared with private banks. Well-structured data. World-wide access for patient’s data. Comprehensiveness of personal data. Anonymous by Owner data for analysis and consultations 2 A patient can visit a doctor remotely Video conferencing. Avoid hassle for trivial cases. Better traceability. 3 A patient can provide some simple “measurements” (pressure, temperature, sugar in blood) remotely Smart devices and connectivity. Systematic caring, faster alerting to prevent complex situations. Better traceability. 4 Best specialists can provide consultation to an anonymous patient and recommend him/her the best possible treatment Video conferencing. World-wide access for patient’s data. Improving the quality of treatment. 5 Patient is guided for home-based treatment Predefined coordination and Better supervising
  • 23. 23 alerting (e.g. for taking pills). Systematic monitoring. 6 All participants of the health-care ecosystem are electronically interlinked: doctors, hospitals, labs, pharmacies, insurances, government agencies Secured exchange of data. Higher quality of data. Less overhead. 7 Other social (from governmental agencies), scientific, professional (3rd party reviewing), and commercial (express delivery) services can be plugged-in Standard interfaces for services in standard processes. Cost management. Opportunities for small and local businesses. 8 The joint work of all participants is coordinated in a transparent and traceable manner. Guaranteed audit trail. Guaranteed goal. Early catching of problems. Continual improvement. End of document (copyright 2014, Alexander SAMARIN, V3, 2014-07-12)