preview

Essay On Electronic Health Record

Decent Essays

The electronic health record (EHR) is a key component of HISs (health information system). While HISs consist of much more, commonly the EHR is the focus of concern. Through the use of HISs, contouring aspects of patient care and proper patient care documentation is required to ensure quality care for every patient as well as providing an evaluation method and quality improvement. While the long-term goal of all medical professionals is standardized HISs, currently organizations are free to customize the system to fit the needs of the organization. Regardless of the system chosen by any organization, the most important facets of an effective HIS are usability, interoperability, scalability, and compatibility. Usability, “the degree of ease …show more content…

The advantages of interoperability include, but are not limited to: enhanced communication between departments and/or providers, improved continuity of care by enabling availability of complete medical records, and to ease the accessibility of patient access. Disadvantages of interoperability include, but are not limited to: privacy and/or confidentiality risks, non-compatible interfaces, implementation difficulties, and lack of standardized designs that prevents sharing the needed medical information (Kruse, Kothman, Anerobi & Abanaka, 2016). Scalability, “the ability for a system to grow with an organization as the organization grows” (Acrobatiq, 2016, p. 15), is essential for successful HIS. Without the ability to grow, an organization is limited to current abilities only, which renders the entire system obsolete quickly. Advantages of scalability include, but are not limited to: management support of new processes and expansions, efficiency of patient care with the ability to record current essential medical care, and encouraged organizational growth with upcoming technology changes. Disadvantages of scalability include, but are not limited to: lack of technical support or knowledge to expand, potential security issues created by system

Get Access