24
Health 2.0 trends and threads Pavel Kubů M.D. Intel World Ahead Program, Healthcare CEE

Intel - eHealth2012

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Intel - eHealth2012

Health 2.0 trends and threads 

Pavel Kubů M.D.Intel World Ahead Program, Healthcare CEE

Page 2: Intel - eHealth2012

The Perfect Storm is here

New modelsof care forced

to emerge

New modelsof care forced

to emerge

Shortage of Healthcare Professionals

Rising Costs of Healthcare

Aging Population

Page 3: Intel - eHealth2012

The Continuum of CareQ

ualit

y of

Life

Shift LeftHighest Quality of Life

Lowest Cost of Care

Health and Wellness

Home Care

Residential Care

Acute Care

Cost of Care

Page 4: Intel - eHealth2012

The wisdom of crowds:The more people who take part in a social network, the greater the value they create.Source: Health 2.0 It’s up to you, Council for Public Health and Health Care for the Minister

of Health, Welfare and Sport, Hague 2010

Page 5: Intel - eHealth2012

Health 2.0 platforms

Workstations/ Desktops LaptopsEmbedded

Smart-Phones & Handhelds

Netbooks TabletsSmart TVs

Enabling a Secure, High Performance & Consistent User Experience

One Architecture Across Connected Devices for Healthcare

Biomedical Research

Healthcare proffessional

s

Consumer/

Patients

Page 6: Intel - eHealth2012

Care Coordination: What it Takes

Gather & Store Comprehensive Information

Share Information Across Organizations

Mobilize the Data TEAM Collaboration

Empower the Patient

Patient Family

CPOE

HIE

CDSS

Secure Access to Information Everywhere

EMR

MHealthMPOC

PHR

AT, AESNI

vProTxT

Page 7: Intel - eHealth2012

Care Coordination Across the Continuum

Data Repository

Emergency

RemoteDiagnostic

Clinic

PharmacyAcademic Hospital Research

Community Hospital

Long term Care

Electronic Health Record

HealthCheckup

Self Check& Control

Home

Visiting Care

CPOEEMRMPOC

Page 8: Intel - eHealth2012

Care Coordination Across the Continuum

Emergency

RemoteRadiology

Clinic

Community Hospital

Academic Hospital Research

Pharmacy Long term Care

HealthCheckup

Self Check& Control

Home

Visiting Care

Personal Health Record

Patient-Centric Care

Electronic Health Record

Data Repository

DataExchange

DataExchange

HIENational Networks

Page 9: Intel - eHealth2012

Care Coordination Across the Continuum

HealthCheckup

Self Check& Control

Home

Emergency

RemoteDiagnostic

Clinic

Community Hospital

Academic Hospital Research

Pharmacy Long term Care

Visiting Care

Personal Health Record

Patient-Centric Care

Electronic Health Record

Data Repository

DataExchange

DataExchange

PHRs

Page 10: Intel - eHealth2012

Networking and Decision Support Systems are at the heart of delivering coordinated care to Maccabi

members

Personal Health Record

Patient-Centric Care

Electronic Health Record

Data Repository

CDSSHealthCheckup

Self Check& Control

Home

Emergency

RemoteDiagnostic

Clinic

Community Hospital

Academic Hospital Research

Pharmacy Long term Care

Visiting Care

DataExchange

DataExchange

Page 11: Intel - eHealth2012

Coordinated Care Realizes Clinicaland Economic Benefits

• 17 % increase in the number of women above age 50 who had a breast exam with mammography

• 17 % increase in the number of members over 65 who received a pneumovax vaccination

• the average hospital stay for cardiovascular patients declined from 0.7 days in 2000-2001 to 0.5 days in 2006

• 76,000 avoided hospital days resulted in a total cost saving of $32 million USD

Page 12: Intel - eHealth2012

Example: Home based primary care (HBPC) in the VA

INTEL DOING ETHNOGRAPHIC STUDY OF HBPC TO HELP THEM SCALE

QUALITY,COORDINATED CARE TO MORE VETS BY IMPLEMENTING HEALTH IT TOOLS

IN THEIR WORKFLOW.

• Patients with complex, chronic,disabling disease--too sick for the clinic!

• Av age 76 years old, 8 chronic conditions • Care delivered in the home by inter-

disciplinary team• 24% reduction in total cost of care• 63% reduction in hospital days• 87% reduction in nursing home days

Page 13: Intel - eHealth2012

Threads of Virtual World

Source: 2011 Internet Crime Report, Internet Crime Compliant Center

Page 14: Intel - eHealth2012

Romance Scams

Source: 2011 Internet Crime Report, Internet Crime Compliant Center

• Victims believe they are “dating” someone decent and honest. However, the online contact is often a criminal with a well-rehearsed script that scammers use repeatedly and successfully. Scammers search chat rooms, dating sites, and social networking sites looking for victims. Although the principal group of victims is over 40 years old, divorced or widowed, disabled and often elderly, all demographics are at risk.

• Scammers use poetry, flowers and other gifts to reel in victims, while declaring “undying love.” These criminals also use stories of severe life circumstances, tragedies, family deaths, personal injuries or other hardships to keep their victims concerned and involved in their schemes. They also ask victims to send money to help overcome alleged financial hardships.

Page 15: Intel - eHealth2012

Work from Home Scams• Consumers continue to lose money

from work-from-home scams that cyber criminals use to move stolen funds. Regrettably, due to their participation, these individuals may face criminal charges. Organized cyber criminals recruit their victims through newspaper ads, online employment services, unsolicited emails or “spam,” and social networking sites advertising work-from-home “opportunities.”

• Participating with a legitimate business, the consumer becomes a “mule” for criminals who use the consumer’s or other victim’s accounts to steal and launder money. In addition, the scammers may compromise the victim’s own identity or accounts.

Source: 2011 Internet Crime Report, Internet Crime Compliant Center

Page 16: Intel - eHealth2012

FBI Impersonation Email Scams• The names of various

government agencies and high-ranking government officials have been used in spam attacks in an attempt to defraud consumers. Government agencies do not send unsolicited emails.

• Complaints related to spam emails purportedly sent from the FBI continued to be reported with high frequency to IC3. In 2011, IC3 received about 39 complaints per day of this type. Source: 2011 Internet Crime Report, Internet Crime Compliant Center

Page 17: Intel - eHealth2012

Processor/Hardware

UserExperience

Software (OS,

Apps)

UserExperience

Software (OS, Apps)

ProcessorH/W

USER EXPERIENCE

Page 18: Intel - eHealth2012

“Don’t be encumbered by history. Go and

create something wonderful.”

— Robert Noyce

Page 19: Intel - eHealth2012

We Know How to Transform Experiences

Multi-mediaCD ROM

1995

UncompromisedMobility

2003 2012+

Ultra ThinUltra Responsive

Ultra SecureUltra Connected

Ultrabook™

Page 20: Intel - eHealth2012

PCs are Stolen Frequently with Sensitive Data

- Dell-Ponemon study

People are storingmore and more personal data on their laptops “

200,000laptops lost or stolen every year at European airports12,000 laptops lost or stolen every week at US

airports”

Page 21: Intel - eHealth2012

Security and Trust Built In

Intel®Identity Protection

Technology

Intel®Anti-Theft

Technology

Page 22: Intel - eHealth2012

200K laptops lost or stolen every year at

European airports/12K laptops lost or stolen

every week at US airports2

A path to building a Service for end user…

Security is top concern for PC users1

ID theft is lead consumer and

business concern, followed by Malware3

Users spend over 4 hours per month

viewing online video on a PC5

Online video market $6.9B in 2014 (46% CAGR)6

600K Facebook* IDs compromised

every day4

Intel® IDENTITY PROTECTION Intel® INSIDER™

Worldwide 30 million apps (not app updates) are downloaded each

day7

1. Source: Intel market research “Voice of the Customer” - global customer survey2. Source: Dell-Ponemon Study3. Source: Intel Market Research Voice of the Customer Survey4. Source: The Guardian, October 20116. Source: Screen Digest

Page 23: Intel - eHealth2012

Enabling the Ultrabook™ Experience for Ageing population