Creating a Data Recording, Essay Example
Creating a Data Recording and Data Storage System for an Independent Healthcare Institution
Summary of Coding Process
To start off with the project, a compilation of the files to be recorded should be imposed hence assuming the process of file-structure to be referenced for the entirety of the project. From the information kept in file, it could be analyzed that the starting point of the project would be based from its past operations and not just on the new ones. This would allow them to confirm whether or not some files ought to be kept for reference or should they be disregarded. The assessment of these files is actually is considered to create a better structure for the program being created. Notably, this will create a better valuation on how an effective the program would be in reference to the function that the organization wants to confirm in line with their mission towards providing better healthcare to the society that they serve.
The Pre-Coding Process:
As the files are collected, assessment of the files and differentiating of information shall be handled. It could be understood that with this process, it could be analyzed that the establishment of function division for the program would be better handled efficiently. The alignment of the established functions of program shall make it easier for the handlers to encode and control the data that have been recorded and re still to be recorded later on. The establishment of functional progress of the program to be created shall be dependent on how effective the structure is and how essential its worth is for the function of the organization. During the pre-coding process, the pre-coders are to enter details into the program. This shall include information like that of the name of the patients, data about their health status, and other important and related information about their health status.
The Coding Process:
The coding process consists of two particular divisions, the procedural and the diagnostic coding. In this regard, the CPC’s or the certified coders are to handle the coding process in consideration with the use of ICD-9-CM, LMRP, the CPT assistant and the HCPCS Level II. The diagnosis of the problem shall provide a better pattern for the program to assume its function. During the coding process, the coders shall consider the procedure code to be taken into account. The technicalities of the program shall be refined in consideration with the kind of operation that the organization needs to undergo.
The aspect from which the quality of the program is tested shall be based upon the pre-operational application of the program. Notably, it could be assumed that through this part of the program’s development towards completion, the creators of the program would be able to make a consistent definition of the role and function of the software data recording system to be established.
Through these particular procedures, it could be analyzed that the function of the program shall be further analyzed and refined in accordance with the requirements of the organization. Through the periods of assessment to be undergone during the pre and post coding development, the creators shall be given the chance to evaluate and revise certain points of the software especially in relation to the mission of the organization. Before the actual utilization of the program, the procedures noted herein shall make an indicative impact on how its functions are compatible with the clients’ requirements.
Summary of Technical Design
The program shall be based upon a technical function of information recording and storage. With this in focus, the creation of the program should be able to define the divisions of the program in a proper manner that shall involve a more competent way of imposing the regulative function of the software to be created. To relate, here are the different division of functions that the program shall relevantly be a part of this project. These functions shall be further imposed as part of the focus of the program being created.To note, presented herein is a flowchart of division of the outline of the entire program.
It could be observed that from this point of presentation, the division of the storage system have been defined hence taking a better position in the course of responding to the needs of the clients being served. With the three divisions of information storage, the operations of the program shall be drawn in response to the quality requirements of the client in line with the demanding considerations noted by their stakeholders in the market. When it comes to the allowance of authorized access into the program, there are three particular operators to be given the chance to access the said set of information:
- Primary administrators
The primary administrators ought to have knowledge about the clients being served by the organization and the information pertaining to their medical backgrounds and their medical issues at present. This will allow them to find a more refined indication on the resources they need to pursue their goals in helping the communities they hope to give attention to.
- Staff Operators
The staff operators are required to have access on the information that is referenced inside the program’s system. It could be realized that somehow, this information shall provide them a better indication on their responsibilities as part of the organization. Giving attention to the information of the clients provide the staff members the rightful knowledge on what they should do in accordance with the needs of the people they serve.
- Field Staffs
Serving as the primary connection with the stakeholders of the organization, the field staffs are to be given access especially to allow them to input the needed information within the system as they relatively connect with the clients in the field. Their access to the system would provide a better chance of updating the database in real-time.
Revised Risk Analysis
There are two primary risks that are to be addressed in this program documentation and establishment. The risks include:
- Measures of program malfunction
It is expected that there would be some points when the program could malfunction especially when wrong codes are inserted within the system or at some point, some technical measures might jeopardize the performance of the program especially in points when information overflow occurs.
- Security Breech [especially in relation to client rights to privacy]
There are instances when there are individuals who would like to know more than what is needed. In these cases, it is very important that the secured access of the system should be well protected. The program shall be founded upon dedicated operations of protection that would entail the establishment of a more referenced login system that would require users to input username and admin code that would allow them to read through the information kept in the system.
From this section of the discussion, it is imposed through the plan that the attempt to control such risks shall also be embedded upon the actual system of operation within the program itself. It could be analyzed that with this indicative approach, the level of development of the program shall provide a more reflective manner on how the definition of function of the program shall be better imposed.
Sample User Guideline
Here are some points to consider especially for those who would be given access to operate the program system being created:
- It is important that the users know of their login info given by the administrators.
- After the login info has been encoded in, it is very important that the users know where to go next depending on the type of information they would want to access. This would allow them to reduce time of operating the system to get the information they wanted.
- The access point of the program provides an easy user-interface that the operators would best benefit from. Every division of the system shall be labeled accordingly.
- It is essential for information encoders to consider operating the database properly. Knowing where to put the information is a definite consideration that encoders should give attention to.
- After utilizing the system’s overall program, it is important to sign off from the program accordingly.
Giving attention to these guidelines is an important aspect of making use of the program efficiently. To note, these guidelines are imposed to provide an assumptive way of giving the operators a chance to access the information they need immediately thus allowing them to give efficient service to their clients effectively.
The program to be created herein as seen through this presentation is imposed to be well protected so as to give attention to the responsibility of the organization to give accurate healthcare assistance to their stakeholders while assuring the value of their privacy. On the other end, the entire system shall also be based on the level of protection that is imposed especially on the part of the administrators’ role in protecting the information they keep within the system. It is deemed that through this program, the role of the organization to provide ample healthcare service to the society would be relatively completed in an efficient manner.
The users of the program are expected to follow the guidelines given for the system to efficiently operate according to expectations. With the given guidelines, it is assumed that the operators would find a better way in redefining the course of medical procedures they are to take depending on the clients’ needs. Notably, it could be analyzed that somehow, it is the resulting aspect o the program on the manner by which the organization serve its clients that is being aimed by the creators of the software. Relatively, from the form of information division and the program structure that is created under this course, the capability of the organization to provide the clients with what they need and assist them with what they require especially when it comes to their healthcare status would be further improved thus assuming a better consideration over the course from which the organization is able to complete its tasks and its points of responsibility towards the community or the public.
Kerzner, Harold (2003). Project Management: A Systems Approach to Planning, Scheduling, and Controlling (8th Ed. ed.). Wiley.
Lewis, James P. (2000). The project manager’s desk reference: a comprehensive guide to project planning, scheduling, evaluation, and systems. p.185.
Horch, John W. (2005). “Two Orientations On How To Work With Objects.” In: IEEE Software. vol. 12, no. 2, pp. 117–118, Mar., 1995.
Time is precious
don’t waste it!