Mobile healthcare, telemedicine, telehealth, BYOD

Features

The Impact of BYOD on Healthcare Providers and Hospitals

While BYOD was thought to have begun around the same time that patients started bringing their smartphones into the hospital, its relevance is driven by doctors who have their own preference for devices. Back in the “good old days,” when doctors were in charge and patients … weren’t, the cellphone was about as welcome in the hospital as a flea-infested rat with a short...


More Features

Is There a Difference between Telemedicine and Telehealth?

Today’s healthcare ecosystem is filled with references to and examples of telemedicine and telehealth – in some cases, the two terms are used interchangeably. Whether they mean the same thing is a topic of considerable debate. In...

Finding a Place for Real Time Location Systems in Healthcare

Roughly ten years ago, PeaceHealth installed a real time location system (RTLS) platform to help track nurses and equipment in the three-state Pacific Northwest health system. Since then, officials say, the health system has cut its “doctor...

Physician Perspectives on Benefits of mHealth Adoption, Use

Whereas the bigger networks and health systems may have the resources for mHealth adoption, those in a much smaller environment have to make do with less — or be more creative. To try to understand how independent and small practice doctors...

Can Health IT Platforms Support Success as Artificial Intelligence Looms?

HealthITAnalytics The healthcare industry is frequently labeled as one of the slowest sectors to adopt new technologies, respond to consumer demands, and implement process changes that take advantage of the type of big data analytics that are revolutionizing retail,...

Exploring the Fundamentals of Medical Billing and Coding

RevCycleIntelligence Medical billing and coding translate a patient encounter into the languages used for claims submission and reimbursement. Billing and coding are separate processes, but both are crucial to receiving payment for healthcare services. Medical coding...

Perils of Healthcare Phishing and What You Can Do About It

HealthITSecurity The old stereotype used to be that doctors didn’t work on Wednesday because they were out playing golf or fishing. Today, healthcare phishing is no joke to doctors, many of whom work on Wednesdays and weekends, or for other healthcare professionals....

Addressing Healthcare Network Connectivity Challenges

HITInfrastructure Network connectivity is a critical piece of health IT infrastructure. As organizations continue to add connected medical devices and other IT tools to their digital environments, reliable networks are required to allow providers to interact with...

Setting the Stage for Value-Based Care with Patient Data Access

EHRIntelligence Increasing patient satisfaction is one of the top goals of value-based care, and patient data access can be a key way to reach that goal. However, both patients and providers are often unsure about patients being able to access their own health...

Using Shared Decision-Making to Improve Patient Engagement

PatientEngagementHIT As healthcare professionals face changing consumer demands and calls for increased patient engagement, many organizations are turning to shared decision-making as a key strategy for activating patients in their own treatment. According to the...

What Is the ONC Health IT Certification Program?

EHRIntelligence Health IT companies and innovators offer a number of different types of EHR technology and EHR-integrated health IT solutions to the provider community. These tools include everything from patient portals to voice recognition software, and they...

Artificial Intelligence Promises a New Paradigm for Healthcare

HealthITAnalytics The speed with which artificial intelligence has become an inescapable component of every new technology offering is either highly encouraging or deeply troubling, depending on the observer’s zeal or trepidation around the notion of integrating...

Defending Against Healthcare Ransomware Attacks

HealthITSecurity Healthcare ransomware attacks have become a security nightmare for many organizations over the last couple of years. Ransomware is a type of malware that prevents or limits users from accessing their systems, either by locking the systems’...

Using Health IT to Meet Medicaid Population Health, Socioeconomic Needs

HealthITAnalytics Despite the fact that one out of every five members of the United States population is covered under Medicaid, providers dedicated to serving this segment of the market can often feel as if they are operating in a slightly separate world....

Maximizing Provider Revenue with Payer Contract Management

RevCycleIntelligence Ensuring correct reimbursement in a timely manner is always at the top of a healthcare provider’s mind. But many provider organizations could be leaving money on the table with inefficient and infrequent payer contract management. Payer...

Reconciling the Opioid Crisis with Delivering Quality Patient Experience

PatientEngagementHIT Every day, 115 Americans die after overdosing on an opioid. The rate of opioid-related deaths increased nearly threefold between 2002 and 2015, and heroin-related overdose deaths increased more than six times over during that same time period....

How Hyperconverged Infrastructure Improves Health IT Functionality

HITInfrastructure Hyperconverged infrastructure (HCI) is a future-looking technology that can help organizations overcome the challenges of shoestring budgets, increasing demands for data access, and the need to remain flexible in an era of continuous innovation....

Hospital Utilization Management Can Reduce Denials, Improve Care

RevCycleIntelligence Utilization management in healthcare is commonly thought of as a strategy that payers employ to control resource use within physician offices and hospitals to keep healthcare costs down. However, hospital utilization management programs are also...

EHR Users Want Their Time Back, and Artificial Intelligence Can Help

HealthITAnalytics Healthcare is a world full of adages, aphorisms, and narratives.  From “first, do no harm” and the “triple aim” to “keeping the patient in the center of care” while snatching that “low-hanging fruit,”...

What Healthcare Providers Must Know About the HIPAA Security Rule

HealthITSecurity Healthcare organizations are facing increasingly sophisticated cybersecurity attacks, which is pushing entities to remain vigilant in keeping protected health in formation (PHI) secure. The HIPAA Security Rule is a national standard that can...

X

Join 20,000 of your peers

Sign up for our free newsletter to keep reading our articles:

Get free access to webcasts, white papers and exclusive interviews.

Our privacy policy

no, thanks