Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Technology-enabled healthcare transformation: concept paper

3,062 views

Published on

e-health tehcnology entarch

Published in: Technology
  • How to Love Yourself: 15 Tips for Developing Self Love ♥♥♥ https://tinyurl.com/y6pnne55
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Protect your brain from memory loss with brain pill. find out more... ●●● https://bit.ly/2GEWG9T
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Technology-enabled healthcare transformation: concept paper

  1. 1. 1 Technology-enabled healthcare transformation: concept paper 1 Executive summary [WHY] We believe that healthcare sector needs a disruptive transformation:  healthcare should be more affordable;  healthcare should offer the best possible services for each patient;  healthcare should become the centre of the health value-stream;  healthcare should seamlessly incorporate innovations;  healthcare should be secured by design;  healthcare should prevent unjustified proliferation of tools. [HOW] Such a transformation is achievable by synergy among various proven modern capabilities:  achievements in design of software-intensive distributed systems;  architectures for pluggable agile solutions;  mature enterprise-wide methodologies as Enterprise Architecture, BPM, SOA and ECM;  Internet of things;  free and open-source software;  partnership between public, private, academic, social and voluntary sectors;  sectorial, regional and international collaboration and standardisation. [WHAT] A platform-enabled reference architecture and several technological solutions implemented with this architecture will prove that:  each patient can be served by knowledge and experience available world-wide hassle- free, remotely and anonymously;  any treatment can be transparent in value, cost and results, justified, objectively validatable and traceable;  the unique business processes of each healthcare establishment can be assembled from a common library of process patterns (fragments) and tasks thus effortlessly spreading best medical practices and proven medical knowledge;  routine activities of the healthcare workers can be automated thus providing the opportunity for more added-value and innovation;  the information in the healthcare can be secure stored, exchanged, analysed and enriched;  new technologies, tools, devices, procedures and knowledge can be easily plugged-in thus creating opportunities for start-ups;  business systems in healthcare can be constructed from components of different vendors and from various origins (borrowed, bought, built, outsourced, standardised, innovated, re-engineered) to quickly create best-to-fit configurations. 2 Architecting the technology-enabled healthcare transformation 2.1 General Architecture of a system has to provide a brief description of the important aspects of the system. Any system (enterprise, eco-system, supply-chain, industry, country, region, etc.) has
  2. 2. 2 many different stakeholders who see the system differently. (Further each participant of such a system is considered as its stakeholder). Thus different aspects of the system have different importance for different participants (also known as participant’s concerns). For some of participants it may be the purpose of the system or customer experience. Others may be more interested in easy evolution of the system. It is for architect to give coherent and convincing answers to all participants how their concerns will be addresses by the system and how their current work habits and experience will be changed for the better. Architect must to speak to participants differently! “Success is in the eyes of beholder” is the first rule for many architects. This chapter provides several viewpoints (participant’s concerns) and related views (description of the system) for the following participants:  Citizens  Patients  Healthcare professionals  Healthcare industry self-regulator  Government regulator for healthcare  Healthcare service providers  Medical research organisations  Medical equipment vendors  Health insurance companies  Architects of technology-intensive applications for healthcare  Managers of technology-intensive projects for healthcare Some of these views are specific for healthcare; others are healthcare independent. The following matrix shows relative importance of each view for various participants. 2.2 Big picture 2.3 Reference functional architecture 2.4 Enterprise as a system of processes 2.5 Security enhanced by the use of processes 2.6 Some participant’s view 2.7 Platform-based approach 2.8 Implementation practices 2.9 Project management practices 2.10 Multi-layer implementation model 2.11 Agile solution delivery practices 2.12 Various technologies around 2.13 Modernisation of applications to become process-centric Citizens +++ + +++ Patients ++ ++ +++ Professionals + +++ ++ + + + + Self-regulator ++ ++ +++ +++ + + + Governmental regulator + + ++ +++ + + Service providers + +++ ++ ++ ++ + + + ++ +++ + +++ Research + ++ ++ ++ Vendors + +++ ++ +++ ++ ++ ++ ++ +++ ++ ++ Insurance +++ ++ ++ + ++ ++ Architects + ++ +++ +++ +++ ++ ++ +++ +++ +++ +++ Project managers + ++ +++ ++ + + ++ +++ + + + +
  3. 3. 3 2.2 Big picture of healthcare The big picture of the healthcare is shown in figure 1 as a value-stream for curing patients which is continuously improved by accumulated knowledge and more sophisticated processes and services. Figure 1 Big picture of healthcare The target of the technology-enabled transformation is to deploy gradually this big picture into each participant of the healthcare to be able to share data, services, processes, knowledge, tools and to eliminate barriers for innovations. Figure 2 Big picture of healthcare will enable much higher level of cooperation, collaboration and coordination with the healthcare sector
  4. 4. 4 2.3 Reference functional architecture 2.3.1 Generic Figure 3 shows various functional (business and technical) capabilities to be provided as a “Healthcare Platform” to support the big picture. Figure 3 Reference functionality of the common healthcare platform 2.3.2 Healthcare-common capabilities • Medical records • Inter-participants secure data and information exchange 2.3.3 Healthcare domains capabilities To be provided during the evolution of the platform. 2.3.4 Best business practices • Knowledge management practices: business manual, QMS • Security practices • Risk management practices • Compliance practices • Governance practices • Project management practices • Performance practices: SLAs, KPIs, predictive analytics • Constrains optimisation • Customer experience practices 2.3.5 Universal business capabilities • BRM as methodology (including The Decision Model) • BPM as managing by processes methodology (BPM, 6sigma, lean, etc.) • Relationship management: SRM, CRM • Business performance reporting and analytics • RM and archiving • Project management methodology (PMI, Prince 2, Hermes) • Operations documentation • Business domain data (or biz objects) repository and model • Business reference information • Capability (business domain) modelling
  5. 5. 5 • Organisation, roles and rights management 2.3.6 Specialised enterprise capabilities • Financial accounting • Marketing • Legal • Procurement 2.3.7 Basic technical capabilities (or technologies) • Data Warehouse (as a place to re-use data) • BRM as a technology • BPM as a technology (managing processes per ce) • CRM as a technology • ECM • Communication tools (e-mail, skype, IM) • Social connectivity • ESB • Micro-service-server • Identity and access management • Data encryption and security • Interactive portals: Web-based, mobile-apps-based • Complex Event Processes (CEP) • Technical monitoring and traceability 2.4 Enterprise as a system of processes 2.4.1 General Enterprise functioning can be considered as business activity flows spanning the IT applications, employees, customers and partners within and beyond the boundaries of the enterprise. (Business activity is a unit of work). Those flows and individual business activities within them are interrelated. The relationships between them are static (expressed as structure) and dynamic (expressed as behaviour). The number of potential relationships between activities is huge – N x (N-1)/2 for N activities. This is the root cause of the complexity of modern enterprise’s. Historically, business process is an essential business concept for bringing some order into the structure and the behaviour of interrelated business activities. A business process is explicitly- defined coordination for guiding the purposeful enactment of business activities. In its simplest form, business process is an initially agreed plan to follow an order of activities; the plan may include some variants and the plan allows some changes during its execution. A detailed, formalised and unchangeable plan (e.g. in a form of process template expressed in BPMN) is one of the several coordination techniques (see http://improving-bpm- systems.blogspot.fr/2014/03/coordination-techniques-in-bpm.html ) potentially used in business processes. Because coordination between some activities can be strong (e.g. as in the army) or weak (e.g. as in an amateurs football team), it is possible to discover various stable coordination constructs (in addition to business processes. Usually, the coordination between business activities which belong to a particular coordination construct is stronger that the coordination between similar coordination constructs. The knowledge about coordination constructs reduces the number of potential relationships between business activities. This is reducing the level of complexity of an enterprise. Let us consider 4 nested coordination constructs: 1. process patterns (coordination between activities within processes)
  6. 6. 6 2. processes (coordination between process fragments and separate activities) 3. cluster of processes (coordination between processes) 4. system of processes (coordination between clusters of processes) 2.4.2 Process patterns It was observed that although all business processes are unique, they are actually composed from similar process fragments or process patterns. For example, let us consider a typical “repair” process in housing management which comprises claim making, evaluation, selection of a service provider, repair, control, invoicing and insurance to pay the activities. This process is actually composed from a few process patterns as shown in figure 4 with an original process diagram (which was developed without patterns) covered by patterns (red rectangulars). Figure 4 Example of a process diagram with implicit use of process patterns Patterns used in this illustration are:  Pattern SI – “Submission Interface” see http://www.slideshare.net/samarin/process- practical-patterns-si  Pattern PAR – “Propose, Act and React” see 8.3.12 from www.samarin.biz/book  Pattern IPS – “Initial Process Skeleton” see 8.3.7 from www.samarin.biz/book Although any pattern is a highly-cohesive construct, patterns can be adapted for particular needs. For example, the Delegation of Authority Matrix (DAM) pattern (see http://improving- bpm-systems.blogspot.ch/2012/07/practical-process-pattern-dam.html ) is implemented differently in the procurement and in the project management. Some process patterns are available at http://improving-bpm- systems.blogspot.fr/search/label/practical%20process%20patterns 2.4.3 Cluster of processes Coordination between processes is usually event-based (see figure 5 with lightning symbol for events). In the simplest variant, the finish of a process is the start of another process. Note that it looks like the state-based coordination between processes. Figure 5 Simple coordination between processes
  7. 7. 7 In the reality, there are more complex interactions between processes (see figure 6) which are described in detail in http://improving-bpm-systems.blogspot.ch/2014/03/enterprise-as- system-of-processes.html . Figure 6 Examples of complex coordination between processes Processes, which are strongly related to each other, form a Cluster Of Process (CLOP). CLOPs usually exist around functional processes which are implemented in a particular business function, e.g. “Field Services”. In addition to functional processes there is a set of processes (called halo of processes) which helps to execute functional processes. These additional processes are monitoring, operating and governance processes:  Monitoring processes are responsible for analysing the running functional processes – some sort of operational intelligence.  Operating processes are used for implementing operational (via available parameters or controls) changes.  Governance processes are used for detecting, designing and implementation of struc- tural changes, e.g. “customer satisfaction and loyalty development”, “quality”, “strategy and planning” etc. All together (see figure 7) additional processes constitute two control loops – operational and strategic. Figure 7 Cluster of processes and its halo
  8. 8. 8 2.4.4 Coordination between CLOPs Each CLOP may relate to the enabling group of clusters, the supporting group of clusters and the customer group of clusters (see figure 8). The enabling group of clusters are typically specific for a particular CLOP while the supporting group of clusters are common for several CLOPs. Figure 7 Coordination between CLOPs Value streams and end-to-end enterprise processes are usually formed from a few CLOPs. 2.5 Enhancing information cecurity by the use of processes 2.5.1 General Ensuring of the information security implies the following characteristics of the enterprise functioning: 1. Any business activity is performed only as prescribed and any unintended use of information (e.g., access to information resources unrelated to the work performed) would be impossible in principle. 2. Initial planning of business activities must be validated for the compliance with the formal rules of information security. 3. Execution and operational planning of business activities must be constantly validated for the compliance with the formal rules of information security. 4. The explicit coordination of business activities allows synchronising them with security and risk related activities. 2.5.2 Control of access to an informational resource along its life-cycle In simple cases, the control of access to an informational resource can be rigidly connected to the phases of the life cycle of the resource. The latter can be implemented as a business process. Explicit and executable business process is convenient because the whole dynamic of control access is embedded in the process. This allows better control of access rights change (as shown in figure 8). Figure 8 Evolution of access right during the life-cycle
  9. 9. 9 2.5.3 Control of access to an informational resource at activity level In more complex cases, information resources are linked to specific business activities. An employee, appointed for the carrying out of a particular business activity, gets access to the information resources required for the carrying out this business activity, only for the duration of this business activity (as shown in figure 9). Figure 9 Evolution of access right around a business activity Objective operational data collected, who has/had access to what information resources will increase the level of information security. Thus, business processes can detect potential cases for the separation of duty by establishing relationships between business activities. 2.5.4 Separation and imposition of duty among several business processes In general, security-related relationships between business activities should be established and formally registered. A non-inclusive list of such relationships is the following:  Other activities which validate the results of the given activity.  Other activities which define the governance for the given activity.  Other activities which do the handling exceptional situations for the given activity (error handling, escalations, send for review and delegate).  Other activities which audit the given activity (1st, 2nd and 3rd party audit).  Other activities which evaluate the risks before the given activity.  Other activities which evaluate the risks after the given activity.  Other activities which certify the given activity (1st, 2nd and 3rd party certification).  Other activities which do compensation (undo) for the given activity. These relationships between activities define some limitations that roles and actors may carry out what activities: the same actor or a different actor from a different role or a different actor from the same role. For example, if the “Activity_B” validates the results of “Activity_A” then no actor should be in “Role_1” and “Role_2” simultaneously (as shown in figure 10). Figure 10 Separation of duties among several business processes Thus, the separation of duty may be formally validated at the design-time. 2.5.5 Management of risk along business processes Managing any work by processes allows addressing the risk-related issues in proactive manner. The risk is strongly related to how the business processes are carried out. By
  10. 10. 10 understanding processes (i.e. through being able to simulate them) the business may predict how the risk may changing during the execution of that process. The explicit description of processes permits to add a few “check-points” within any process to examine its risk-related “health”. Business processes act as a skeleton to which the enterprise adds risk management activities (as shown in figure 11) – each business activity is enriched by risk-related monitoring and evaluation. Figure 11 Enhancing processes by risk management The risk evaluation may initiate some risk mitigation processes. The risk evaluation may be as complex as necessary, and it may include simulations and the conduct of statistical and scenario analysis. 2.5.6 The intra-participants secure integration Healthcare platform, which acts also an inter-participants coordination tool, ultimately resolved the integration problems within the healthcare. Instead of that participants are connected to each other in ad-hoc way, the healthcare platform offers an integration process which delivers data and documents between all participants in a systematic way as shown in figure 12. It is actually a centralised service (backbone) for the inter-participants secure electronic exchange (like sending / receiving registered letters). Figure 12 Reducing complexity in integration between participants Generally, the backbone is decoupled from participant internal applications through two adapters: dispatcher (handle messages coming from the backbone) and expediter (handle messages going to the backbone). To be transmitted through the backbone, each message (business data and documents) is protected by three "envelopes" (marked by blue circled number in figure 13):  Business (processing) envelope  Delivery (addressing) envelope  Transportation (routing) envelope
  11. 11. 11 Figure 13 Integration process between participants 2.6 Some participant’s view For some participants, the healthcare platform should look like a social collaborative extranet which may have the following visual design (see figure 14). Figure 14 Healthcare platform as a social collaborative extranet for some participants This extranet considers that:  Each participant has several roles, e.g. YOURSELF (person and his/her legal representatives), MERICARED (person with insurance), PATIENT, SENIOR (persons with age over 60 years), etc.  Person may select which roles he/she is carrying out at a particular moment in time.  Each communication between a participant and the healthcare services is a case with associated documents, data, audit trails, records, service level agreements and key performance indicators. A case may be completed or on-going. 2.7 Platform-based approach for working and advancing together How is it possible to deliver many similar capabilities for a number of highly diverse participants in a rational way? The current way of provisioning via monolith and proprietary IT applications leads to many duplications. At the result, we, the patients and citizens, are paying several times for the same functionality (which often is implemented not with the highest quality). The big picture for healthcare is too big for one project and needs to be implemented in an incremental way as a set of inter-related projects. In such a situation, developing the final requirements is virtually impossible because no one does know exactly what should be built, and, often, new functionalities should be demonstrated before articulating in detail what is wanted. Furthermore, all participants will usually advance at own, often different, speed. If all participants are treated in an identical manner, then the slowest determines the speed of all.
  12. 12. 12 The traditional approach for IT application development does not work in such a case because it requires everything to be defined up front. The pure agile approach for IT application development does not work either because it cannot guarantee that a particular functionality will be developed once only and systematically re-used in all applications. Therefore, implementation approach of the big picture must enable gradual, economic and self-accelerating of technical and business transformations for all healthcare service providers together. Figure 15 shows a platform-based architectural approach: all common functionalities should constitute a single platform and individual new solutions are built using the functionalities available from the platform. The provisioning of solutions will be carried out incrementally with the pace of a particular set of participants (or target community). At each moment in time, each healthcare service provider may have a different pace and need a different individual set of functionality. Figure 15 Platform-based approach The platform-based architectural approach is based on the following considerations:  The platform must standardise and simplify core components of the future industry- wide system of systems. For any component outside the platform, new opportunities should be explored using agile principles. These twin approaches should be mutually reinforcing: the platform frees up resource to focus on new opportunities while successful agile innovations are rapidly scaled up when incorporated into the platform.  An agile approach requires coordination at an industry level.  To minimise duplication of effort in solving the same problems, there needs to be industry-wide transparency of agile initiatives.  Existing components of the platform need periodic review. Transparency and the publication openly of feedback and the results of experiments will help to keep the pressure on the platform for continual improvement as well as short-term cost savings. An example of the platform-based approach: Android and iOS are platforms with many small applications. 2.8 Platform implementation practices Considering that the platform is intended for all healthcare service providers, but how is it possible to achieve some degree of uniformity among all healthcare service providers if they have different abilities to absorb the benefits of information technologies. Computerisation is a journey, and each healthcare service provider needs to be allowed to adopt a suitable pace for itself, but we also need to maintain coherence in the progression of the whole set. The use of a “ladder” model can be useful since it permits progression of each entity in a stepwise manner but at the same time guides the overall progression in a coherent manner. Design the “ladder” to have a few levels of capability from “not able” to “fully capable”. Entities are permitted to advance at different paces in their ascent to the top of the “ladder”. For example, their progress could be planned as in figure 16.
  13. 13. 13 Figure 16 Example of planned progress Intensive use of process-centric implementation with various coordination techniques thus allowing to assemble unique healthcare service provider’s processes from standard process fragments (patterns). Micro-services are considered as the latest SOA outcome to deliver small units of functionality to be assembled by executable processes. The systematic and aligned use of business processes and micro-services bring the built-in flexibility and adaptability. The platform is designed to be tools-independent by standardizing data, information, interfaces and coordination between various capabilities. This will allow to build the platform incrementally by provisioning needed capabilities from COTS, FOSS, platform-community- owned and in-house components. A few components may be offered for one capability as shown in figure 17. Figure 17 Platform composition 2.9 Project management practices There are three primary types of projects. 1. On-going and centralised platform governance: evolution of the architecture, evolution of technologies, evolution of features, evolution of solutions, evolution of practices and evolution of documentation. 2. Rapid implementation of solutions as mini-projects: light specifications, quick prototyping, consistent configuration, fast procurement, agile development and re-use of existing tools and habits. 3. Implementation of new platform components. The preferable project management method is archibagile which combines decomposition with agile implementation of “understood” components (see http://improving-bpm- systems.blogspot.ch/2014/06/different-coordination-techniques-in.html and figure 18).
  14. 14. 14 Figure 18 Example of planned progress 2.10 Multi-layered implementation model For the IT side, the platform offers a multi-layer implementation model (see figure 19) for process-centric solutions. This model structures different services and other artefacts around processes. Each layer is a level of abstraction of the business and addresses some particular concerns. Figure 19 Example of planned progress  The business data layer comprises many pieces of information – names, dates, files, etc., which are stored in existing repositories, e.g. databases, document management systems, web portals, directories, e-mail servers, etc. This layer's role is to access data. In this layer the business is considered in a very primitive way.  The business objects layer comprises the many objects specific to a particular business, e.g. a business participant, a product, etc. This layer hides the complexity for manipulating the objects, which are actually collections of data together with any dependencies between them. The level of abstraction is increased – the business is represented by the objects, irrespective of their actual storage in the repositories.  The business routines (or regulations) layer comprises the actions which must be carried out on the business objects to perform the business activities. For example, to announce the availability of a product one has to find out which customers are interested in the product, to collect their contact e-mails and to distribute an announcement. At this level of abstraction the business comprises some modifications
  15. 15. 15 (including the adding of value) to the objects. Most enterprise employees work in this layer.  The business execution layer carries out the business processes. At this level of abstraction the business is a systematic set of coordinated activities. We can say that this is the layer where business line managers and super-users work.  The business monitoring layer analyses the execution of the business process. The business events are collected and compared with the expected (baseline) planning. In addition, the behaviour of the business process can be simulated. The level of abstraction is increased – the business is validated to run correctly. The IT buzzword applicable to this layer is Business Activity Monitoring (BAM).  The business intelligence layer implements enterprise-wide planning, performance evaluation and control actions applied to the business processes. At this level of abstraction the whole enterprise business system is considered as a single functional unit. Each layer has two roles: it exploits the functionalities of the lower layer, and it serves the higher layer. Each layer has a well-defined interface and its implementation is independent of that of the others. Each layer comprises many services that can be used independently – it is not necessary that all layers be fully implemented at the same time or even be provided in a single project. Another practical observation is that different layers have lifecycles of different time scales: typical repositories have a 5- to 10-year life-span while the business requires continuous improvement. Because of the implementation independence of the different layers, each layer may evolve at its own pace without being hampered by the others. As a general rule, existing applications already implement many of the business objects, routines and processes, but usually in an unstructured way. The objects, routines and processes are intermixed, not reusable and need to be implemented again and again. The multi-layer implementation model is a tool which helps the enterprise to design the enterprise business systems  in business terms, but not in terms of IT tools,  via the combination of universally accessible and interdependent building blocks,  in a structured way, and  with a high level of flexibility built-in. Here’s a tip for how to remember the layers: Data, Objects, Routines, Execution, Monitoring, Intelligence – DO-RE-MI. 2.11 Agile solution delivery practices A new solution is constructed from existing services and newly developed ones; the latter may be in different layers. Versioning of artefacts brings unprecedented flexibility, and thus removes the existing segregation between software development and maintenance – the IT unit can easily carry out continuous evolution of the system. The development team members develop solutions as a set of easy-to-evolve artefacts (of course, within the limits defined by the architects). Below there are a few examples of the evolution of a solution constructed in accordance with the multi-layer implementation model. To demonstrate the reuse of existing services, newly created services are marked using a star in the top right corner. Note that the two top levels (intelligence and monitoring) have been removed to simplify these examples. Example 1 (see figure 20) is a process for releasing a product for customers while minimising the amount of human activity. Automated activity a1 collects all necessary information from internal repositories (ERP and int. DMS), and populates it into an external repository (ext. DMS) without opening external access to it. Human activity a2 requires a person to check the product, its metadata and other related resources to ensure that everything is in order for the
  16. 16. 16 product to be released to the customer. Automated activity a3 opens customer access to the product (on ext. DMS). Figure 20 Example 1 Example 2 (see figure 21) is an extension of example 1. Automated activity a4 uses a customer directory and prepares a notification to a customer if the released product matches his/her interests. Automated activity a5 delivers this notification via e-mail. Figure 21 Example 2 Example 3 (see figure 22) is a process for the handling of some external requests. Automated activity a6 analyses the input obtained via e-mail and saves it into an internal repository (int. DMS) for traceability purposes. If necessary, human activity a7 is executed to categorize a request. Automated activity a8 performs any necessary actions. Automated activity a5 informs the requestor (via an e-mail) of the actions taken. Figure 22 Example 3
  17. 17. 17 Example 4 (see figure 23) is a process for some typical work. Automated activity a9 fetches information from internal repositories and prepares it for manual activity a10. Automated activity a11 validates the work done. Automated activity a12 saves the results into internal repositories. Figure 23 Example 4 A “snow-ball” effect is observed – as more services and libraries become available, the implementation of each new service is faster. Also, practically all services are actually micro- services which are small in size and functionality. (See about micro-services http://www.tigerteam.dk/2014/micro-services-its-not-only-the-size-that-matters-its-also-how- you-use-them-part-1/ ) 2.12 Various technologies around the implementation model The multi-layer implementation model is the main tool for the solutions architects. It helps them to assemble solutions, which is rather different from implementing traditional applications:  the new solution is generally implemented across existing IT applications and repositories;  any missing building blocks are initially implemented, by preference, in a dynamic programming language; • the new solution generally does not have its “own” database; • the new solution is “outside” existing systems; • typical concerns for BPM, SOA and IT-governance are considered together. Where in this “architectural framework” are databases, application servers, Graphical User Interfaces (GUIs), XML, web services and other IT gadgets? By definition, it doesn't matter. Everything in figure 18 is considered as a service. These services can be executed inside a single program, within many programs on a single computer, on an application server or in a distributed environment. Services may be implemented in-house today and may be outsourced tomorrow, or implemented manually today and automated tomorrow. Another popular question concerns the relation of the multi-layer implementation model with some other technologies. Figure 24 shows how various technologies work together within the platform. Normally, some services are accessible from a portal or workplace. They “float” in an Enterprise Service Bus (ESB). The latter is used only for service-to-service connections at the technical level and not for business- or content- based routing logic. Obviously, we want to keep the business logic in one place (and not dispersed in an ESB) and we also want to have explicit coordination of services (but not magic routing by an ESB). Ideally, an ESB should be based on a solid computing basis which can be provided by a grid, modern virtualisation infrastructure or cloud computing.
  18. 18. 18 Figure 24 Various technologies work together More details about this is available in the book www.samarin.biz/book 2.13 Modernisation of applications to become process-centric Usually, the services are “cemented” within monolithic applications which bridge GUIs, business logic and databases. To convert them into process-centric, it is necessary to externalise all services as shown in figure 25. Figure 25 Technical transformation of applications Such a technical modernisation is carried out in three steps:  Disassemble an application into services.  Improve existing services and/or add new services.  Assemble services via processes. It is important to intermix the technical transformation with the business evolution and combine various tactics about services: rent/borrow, buy, build, outsource, centralised vs. kept locally, standardised, re-engineered or automated. For complex applications (such an in-house developed legacy ERP), many of the services can be already available on the market (see figure 26).
  19. 19. 19 Figure 26 Technical transformation of a legacy ERP In practically all cases the transformation must be carried-out using a step-by-step approach via the “eclipse” pattern (see figure 27). At first, we “cover” only a tiny area of the whole process. Usually we start with the intra-application coordination, because this part of IT is considered as boring and not very rewarding. The first fragment of explicit coordination may be quite primitive; it is a duplication of some existing functionality which is just eclipsed by this process. Then we introduce more and more fragments. With time, we cover bigger and bigger areas by explicit coordination of existing fragments. Figure 27 Use of the “eclipse” pattern for becoming process-centric Step by step, existing applications are transformed into services. It is recommended that such transformations be carried out with great care. For example, at first, services should be implemented to copy as closely as possible the existing functionality; they are optimised and refactored only later. Modifications to applications are minimised – by preference, some functionality is just switched off. To do this, some techniques of externalising events are necessary to link monolith applications and processes as shown in figure 28.
  20. 20. 20 Figure 28 Externalising events which will launch processes 3 Electronic Health Records implementation (maybe useful for “meaningful use”) 3.1 General www.healthit.gov defines Electronic Health Records (EHRs) as, at their simplest, digital (computerized) versions of patients' paper charts. But EHRs, when fully up and running, are so much more than that. EHRs are real-time, patient-centred records. They make information available instantly, "whenever and wherever it is needed". And they bring together in one place everything about a patient's health. EHRs can:  Contain information about a patient's medical history, diagnoses, medications, immunization dates, allergies, radiology images, and lab and test results  Offer access to evidence-based tools that providers can use in making decisions about a patient's care  Automate and streamline providers' workflow  Increase organization and accuracy of patient information  Support key market changes in payer requirements and consumer expectations  One of the key features of an EHR is that it can be created, managed, and consulted by authorized providers and staff across more than one health care organization. A single EHR can bring together information from current and past doctors, emergency facilities, school and workplace clinics, pharmacies, laboratories, and medical imaging facilities. 3.2 Conceptual view on EHR Certainly, EHR is the core of majority of the healthcare IT applications and a perfect implementation of EHR is a must. Within the healthcare platform, EHR is architected in the following way. A person (or his/her legal representative) is the only owner of his/her EHR. Others use person’s EHR just temporary. Any other participants in healthcare must explicitly request some EHR from the patient. Such a request must be executed only in the context of a process/workflow/case in which the patient and the requestor are involved (see 2.5.3). Conceptually, my personal EHR are kept in my personal digital data and document storage. (It may be home-based as an appliance or cloud-based). This storage is supported by:  Inbox – my official postal box in the Internet (like postal box for a person or a household). Note, a person may have several inbox including anonymous ones.
  21. 21. 21  Deposit box – a short-term protected cloud space for each act as a temporary storage for of data and documents exchange. Imagine that some paper documents were copied and put in an envelope.  Safe box – a long-term protected cloud space for a backup copy. Imagine a personal safe box in a Swiss bank.  Encryption services. 3.3 Example of process which uses EHR Below is an example of how the exchange between a patient (me) and a medical office should be carried out (keep in mind 2.5.6). The situation: I made an appointment to visit a doctor. The doctor has indicated which my medical documents (i.e. my EHR) are necessary for this visit. I have to send some of my medical documents before the visit. This is done in the following way (see figure 29): 1) As part of the “visit doctor” process, I got a task to send a list of medical documents. If there is nothing special, I approve the standard execution of the task as steps 2-6. 2) Creation a dedicated deposit box (with some protection) and copy requested documents (with some protection). 3) A temporary link to this deposit box is generated. 4) This link is communicated to the medical office’s reception service (office2others). 5) Documents from my temporary deposit box are copied to medical office temporary de- posit box. 6) A notification about arrival of documents appears in the medical office’s inbox. 7) A medial office employee gets a task to copy the documents from the temporary de- posit box to the medical office internal system. Figure 29 Exchange of document in the “visit doctor” process Documents to be sent and deposit boxes are encrypted with short-life-time keys and techniques of secured envelope are used as well (see 2.5.6). If some of those documents may be offered for medical research purposed then these documents will be anonymized by removing personal information and their encryption will be different (just to guarantee their integrity during the transition). 3.4 EHR implementation considerations Obviously, the mentioned above concept of EHR is an ideal state that should be approached through several transitional states. Imagine a situation when a medial organisation has EHR diluted somewhere in several IT applications. What can be the steps to advance to a better EHR? A possible way forward is below:
  22. 22. 22 1. Create a separate EHR master repository with tight security and strict audit. 2. Migrate existing EHR from existing IT applications to the EHR repository. 3. Consider step-by-step modernisation of existing IT applications by starting to externalize some events about updating the EHR (see 2.13). 4. Link those events with “integration” processes to fetch EHR from existing IT applications and populate the EHR repository. 5. Use the EHR repository as the master source for processes and, if possible, existing IT applications. 6. Add more “integration” processes to exchange between your organization’s EHR master repository and other medical organizations. 7. Add more functional processes which use the EHR master repository. 8. Discuss with the vendors of your existing IT applications about externalization of EHR. In addition, do not forget to engage an architect into this transformation. As well as, systematically inform patients about handling of their EHR. 4 Participants, their concerns and benefits analysis Let us look at the whole healthcare eco-system to list all participants and their concerns as the following.  Patients – hassle-free access to the healthcare services, correctness of treatment, maximum as possible treatment at home, cost.  Doctors—zero routine work, access to the medical knowledge, access to medications, traceability.  Other service providers – minimum overhead, common (with doctors) decision making.  Insuring bodies – traceability, cost of overhead, correctness of treatment.  Insurance companies – correctness of claims, correctness of treatment.  Governments – overall quality, overall cost.  Other services – easy to have business the main participants. 5 Potential innovations and their effect on participants ## Innovation Technology-enabled techniques Impact 1 Medical records are safely managed and properly share among the participants Security is compared with private banks. Well-structured data. World-wide access for patient’s data. Comprehensiveness of personal data. Anonymous by Owner data for analysis and consultations 2 A patient can visit a doctor remotely Video conferencing. Avoid hassle for trivial cases. Better traceability. 3 A patient can provide some simple “measurements” (pressure, temperature, sugar in blood) remotely Smart devices and connectivity. Systematic caring, faster alerting to prevent complex situations. Better traceability. 4 Best specialists can provide consultation to an anonymous patient and recommend him/her the best possible treatment Video conferencing. World-wide access for patient’s data. Improving the quality of treatment. 5 Patient is guided for home-based treatment Predefined coordination and Better supervising
  23. 23. 23 alerting (e.g. for taking pills). Systematic monitoring. 6 All participants of the health-care ecosystem are electronically interlinked: doctors, hospitals, labs, pharmacies, insurances, government agencies Secured exchange of data. Higher quality of data. Less overhead. 7 Other social (from governmental agencies), scientific, professional (3rd party reviewing), and commercial (express delivery) services can be plugged-in Standard interfaces for services in standard processes. Cost management. Opportunities for small and local businesses. 8 The joint work of all participants is coordinated in a transparent and traceable manner. Guaranteed audit trail. Guaranteed goal. Early catching of problems. Continual improvement. End of document (copyright 2014, Alexander SAMARIN, V3, 2014-07-12)

×