Upload
eleanor-izard
View
215
Download
0
Tags:
Embed Size (px)
Citation preview
Health 2.0 trends and threads
Pavel Kubů M.D.Intel World Ahead Program, Healthcare CEE
The Perfect Storm is here
New modelsof care forced
to emerge
New modelsof care forced
to emerge
Shortage of Healthcare Professionals
Rising Costs of Healthcare
Aging Population
The Continuum of CareQ
ualit
y of
Life
Shift LeftHighest Quality of Life
Lowest Cost of Care
Health and Wellness
Home Care
Residential Care
Acute Care
Cost of Care
The wisdom of crowds:The more people who take part in a social network, the greater the value they create. Source: Health 2.0 It’s up to you, Council for Public Health and Health Care for the Minister
of Health, Welfare and Sport, Hague 2010
Health 2.0 platforms
Workstations/ Desktops LaptopsEmbedded
Smart-Phones & Handhelds
Netbooks TabletsSmart TVs
Enabling a Secure, High Performance & Consistent User Experience
One Architecture Across Connected Devices for Healthcare
Biomedical Research
Healthcare proffessional
s
Consumer/
Patients
Care Coordination: What it Takes
Gather & Store Comprehensive Information
Share Information Across Organizations
Mobilize the Data TEAM Collaboration
Empower the Patient
Patient Family
CPOE
HIE
CDSS
Secure Access to Information Everywhere
EMR
MHealthMPOC
PHR
AT, AESNI
vProTxT
Care Coordination Across the Continuum
Data Repository
Emergency
RemoteDiagnostic
Clinic
PharmacyAcademic Hospital Research
Community Hospital
Long term Care
Electronic Health Record
HealthCheckup
Self Check& Control
Home
Visiting Care
CPOEEMRMPOC
Care Coordination Across the Continuum
Emergency
RemoteRadiology
Clinic
Community Hospital
Academic Hospital Research
Pharmacy Long term Care
HealthCheckup
Self Check& Control
Home
Visiting Care
Personal Health Record
Patient-Centric Care
Electronic Health Record
Data Repository
DataExchange
DataExchange
HIENational Networks
Care Coordination Across the Continuum
HealthCheckup
Self Check& Control
Home
Emergency
RemoteDiagnostic
Clinic
Community Hospital
Academic Hospital Research
Pharmacy Long term Care
Visiting Care
Personal Health Record
Patient-Centric Care
Electronic Health Record
Data Repository
DataExchange
DataExchange
PHRs
Networking and Decision Support Systems are at the heart of delivering coordinated care to Maccabi
members
Personal Health Record
Patient-Centric Care
Electronic Health Record
Data Repository
CDSSHealthCheckup
Self Check& Control
Home
Emergency
RemoteDiagnostic
Clinic
Community Hospital
Academic Hospital Research
Pharmacy Long term Care
Visiting Care
DataExchange
DataExchange
Coordinated Care Realizes Clinicaland Economic Benefits
• 17 % increase in the number of women above age 50 who had a breast exam with mammography
• 17 % increase in the number of members over 65 who received a pneumovax vaccination
• the average hospital stay for cardiovascular patients declined from 0.7 days in 2000-2001 to 0.5 days in 2006
• 76,000 avoided hospital days resulted in a total cost saving of $32 million USD
Threads of Virtual World
Source: 2011 Internet Crime Report, Internet Crime Compliant Center
Romance Scams
Source: 2011 Internet Crime Report, Internet Crime Compliant Center
• Victims believe they are “dating” someone decent and honest. However, the online contact is often a criminal with a well-rehearsed script that scammers use repeatedly and successfully. Scammers search chat rooms, dating sites, and social networking sites looking for victims. Although the principal group of victims is over 40 years old, divorced or widowed, disabled and often elderly, all demographics are at risk.
• Scammers use poetry, flowers and other gifts to reel in victims, while declaring “undying love.” These criminals also use stories of severe life circumstances, tragedies, family deaths, personal injuries or other hardships to keep their victims concerned and involved in their schemes. They also ask victims to send money to help overcome alleged financial hardships.
Work from Home Scams• Consumers continue to lose money
from work-from-home scams that cyber criminals use to move stolen funds. Regrettably, due to their participation, these individuals may face criminal charges. Organized cyber criminals recruit their victims through newspaper ads, online employment services, unsolicited emails or “spam,” and social networking sites advertising work-from-home “opportunities.”
• Participating with a legitimate business, the consumer becomes a “mule” for criminals who use the consumer’s or other victim’s accounts to steal and launder money. In addition, the scammers may compromise the victim’s own identity or accounts.
Source: 2011 Internet Crime Report, Internet Crime Compliant Center
FBI Impersonation Email Scams• The names of various
government agencies and high-ranking government officials have been used in spam attacks in an attempt to defraud consumers. Government agencies do not send unsolicited emails.
• Complaints related to spam emails purportedly sent from the FBI continued to be reported with high frequency to IC3. In 2011, IC3 received about 39 complaints per day of this type.
Source: 2011 Internet Crime Report, Internet Crime Compliant Center
We Know How to Transform Experiences
Multi-mediaCD ROM
1995
UncompromisedMobility
2003 2012+
Ultra ThinUltra Responsive
Ultra SecureUltra Connected
Ultrabook™
PCs are Stolen Frequently with Sensitive Data
- Dell-Ponemon study
People are storingmore and more personal data on their laptops
“”
200,000laptops lost or stolen every year at European airports12,000 laptops lost or stolen every week at US
airports”
Security and Trust Built In
Intel®Identity Protection
Technology
Intel®Anti-Theft
Technology
Enabling the Ultrabook™ Experience for Ageing population