Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Intel - eHealth2012

826 views

Published on

Published in: Health & Medicine
  • Be the first to comment

  • Be the first to like this

Intel - eHealth2012

  1. 1. Health 2.0 trends and threads Pavel Kubů M.D. Intel World Ahead Program, Healthcare CEE
  2. 2. The Perfect Storm is here Rising Costs of Healthcare Shortage of HealthcareAging Population Professionals New models of care forced to emerge
  3. 3. The Continuum of Care Shift Left Highest Quality of Life Lowest Cost of CareQuality of Life Health and Wellness Home Care Residential Care Acute Care Cost of Care
  4. 4. The wisdom of crowds:The more people who take part in a social network, the greater the Source: Health 2.0 It’s up to you, Council for Public Health and Health Care for the Ministervalue they create. of Health, Welfare and Sport, Hague 2010
  5. 5. Health 2.0 Biomedical Research platforms Consumer/ Healthcare Patientsproffessionals Smart- Workstations/ Phones & Smart TVs Embedded Desktops Laptops Netbooks Tablets Handhelds One Architecture Across Connected Devices for Healthcare Enabling a Secure, High Performance & Consistent User Experience
  6. 6. Care Coordination: What it Takes EMR CDSS Gather & Store Comprehensive Information CPOE PHR vPro HIE TxTEmpower the Patient Share Information Across Organizations AT, AESNI Patient Family MPOC MHealth Mobilize the Data TEAM Collaboration Secure Access to Information Everywhere
  7. 7. Care Coordination Across the Continuum CPOE EMR Health MPOC Emergency CheckupSelf Check& Control Clinic Electronic Health Record Data Repository Home Community Hospital Visiting Remote Care Diagnostic Academic Pharmacy Long term Hospital Care Research
  8. 8. Care Coordination Across the Continuum HIE National Health Networks Emergency Checkup Personal Health RecordSelf Check& Control Data Patient-Centric Care Data Exchange Exchange Clinic Electronic Health Record Data Repository Home Community Hospital Visiting Remote Care Radiology Academic Pharmacy Long term Hospital Care Research
  9. 9. Care Coordination Across the Continuum PHRs Health Emergency Checkup Personal Health RecordSelf Check& Control Data Patient-Centric Care Data Exchange Exchange Clinic Electronic Health Record Data Repository Home Community Hospital Visiting Remote Care Diagnostic Academic Pharmacy Long term Hospital Care Research
  10. 10. Networking and Decision Support Systems are at the heart of delivering coordinated care to Maccabi members Health Checkup CDSS Emergency Personal Health RecordSelf Check& Control Data Patient-Centric Care Data Exchange Exchange Clinic Electronic Health Record Data Repository Home Community Hospital Visiting Remote Care Diagnostic Academic Pharmacy Long term Hospital Care Research
  11. 11. Coordinated Care Realizes Clinical and Economic Benefits• 17 % increase in the • the average hospital stay number of women above for cardiovascular patients age 50 who had a breast declined from 0.7 days in exam with mammography 2000-2001 to 0.5 days in• 17 % increase in the 2006 number of members over • 76,000 avoided hospital 65 who received a days resulted in a total pneumovax vaccination cost saving of $32 million USD
  12. 12. Example: Home based primary care (HBPC) in the VA • Patients with complex, chronic, disabling disease--too sick for the clinic! • Av age 76 years old, 8 chronic conditions INTEL DOING ETHNOGRAPHIC STUDY OF • Care delivered in the home by inter- HBPC TO HELP THEM SCALE disciplinary team QUALITY,COORDINATED CARE TO MORE • 24% reduction in total cost of careVETS BY IMPLEMENTING HEALTH IT TOOLS • 63% reduction in hospital days IN THEIR WORKFLOW. • 87% reduction in nursing home days
  13. 13. Threads of Virtual World Source: 2011 Internet Crime Report, Internet Crime Compliant Center
  14. 14. Romance Scams• Victims believe they are “dating” someonedecent and honest. However, the online contactis often a criminal with a well-rehearsed scriptthat scammers use repeatedly and successfully.Scammers search chat rooms, dating sites, andsocial networking sites looking for victims.Although the principal group of victims is over 40years old, divorced or widowed, disabled andoften elderly, all demographics are at risk.•Scammers use poetry, flowers and other gifts toreel in victims, while declaring “undying love.”These criminals also use stories of severe lifecircumstances, tragedies, familydeaths, personal injuries or other hardships tokeep their victims concerned and involved intheir schemes. They also ask victims to sendmoney to help overcome alleged financialhardships. Source: 2011 Internet Crime Report, Internet Crime Compliant Center
  15. 15. Work from Home Scams• Consumers continue to lose money from work-from-home scams that cyber criminals use to move stolen funds. Regrettably, due to their participation, these individuals may face criminal charges. Organized cyber criminals recruit their victims through newspaper ads, online employment services, unsolicited emails or “spam,” and social networking sites advertising work-from-home “opportunities.”• Participating with a legitimate business, the consumer becomes a “mule” for criminals who use the consumer’s or other victim’s accounts to steal and launder money. In addition, the Source: 2011 Internet Crime Report, Internet Crime Compliant Center scammers may compromise the victim’s
  16. 16. FBI Impersonation Email Scams• The names of various government agencies and high-ranking government officials have been used in spam attacks in an attempt to defraud consumers. Government agencies do not send unsolicited emails.• Complaints related to spam emails purportedly sent from the FBI continued to be reported with high frequency to IC3. In 2011, IC3 received about 39 complaints per day of this type. Source: 2011 Internet Crime Report, Internet Crime Compliant Center
  17. 17. User User Experience Experience USER Software (OS, Apps) Software (OS, Apps)EXPERIENCE Processor H/W Processor/ Hardware
  18. 18. “Don’t be encumbered by history. Go and create something wonderful.” — Robert Noyce
  19. 19. We Know How to Transform Experiences 1995 2003 2012+ Ultrabook™Multi-media Uncompromised Ultra Thin CD ROM Mobility Ultra Responsive Ultra Secure Ultra Connected
  20. 20. PCs are Stolen Frequently with Sensitive DataPeople are storing more and more personal data on their laptops “ 200,000 laptops lost or stolen every year at European airports 12,000 laptops lost or stolen every week at US airports” - Dell-Ponemon study ”
  21. 21. Security and Trust Built In Intel® Identity Protection Technology Intel® Anti-Theft Technology
  22. 22. A path to building a Service for end user… Intel® IDENTITY PROTECTION Intel® INSIDER™Security is top concern ID theft is lead consumer Users spend over 4 Worldwide 30 million for PC users1 and business concern, hours per month apps (not app followed by Malware3 viewing online video updates) are on a PC5 downloaded each 200K laptops lost or 600K Facebook* IDs day7 stolen every year at compromised every Online video marketEuropean airports/12K day4 $6.9B in 2014 (46% 1. Source: Intel market research laptops lost or stolen CAGR)6 “Voice of the Customer” - global customer survey every week at US 2. Source: Dell-Ponemon Study airports2 3. Source: Intel Market Research Voice of the Customer Survey 4. Source: The Guardian, October 2011
  23. 23. Enabling theUltrabook™ Experiencefor Ageing population
  24. 24. pavel.kubu@intel.com

×