HIMSS NCA IOT_9 17 2015_final

16
For Internal VA Use Only Strategies for Leveraging the IOT with Social Media in Health IT HIMSS National Capital Area (NCA) Chapter Event 17 September 2015

Transcript of HIMSS NCA IOT_9 17 2015_final

For Internal VA Use Only

Strategies for Leveraging the IOT with Social Media in Health ITHIMSS National Capital Area (NCA) Chapter Event17 September 2015

For Internal VA Use Only

For Internal VA Use Only

For Internal VA Use Only

Providers and developers looking for population health management solutions and better strategies for chronic

disease care are turning to wearables (Fitbit, Apple Watch, etc.), smartphones, tablets, and home

monitoring devices to better engage with patients, solve specific problems and answer the call for better care

coordination through enhanced data analytics.

For Internal VA Use Only

Patient-Generated Health Data Fills in the Gaps

• Providers are overwhelmed…• Critical for better care

coordination• Improves patient engagement

and satisfaction• Integrates new objective data

sources• Requires strong data

management and machine automated learningHow can we leverage this data to improve care?

For Internal VA Use Only

Use Case #1: Leveraging Wearable Technology

Cardiac Care Wireless blood pressure

measurement Wearable device to track

activity and continuously monitor heart rate

Internet-connected pill w/ camera and/or pillbox Out of range numbers

initiate SMS text messages (possibly via Connected Health tools like Annie) and automatic appointment

Chronic conditions under control

For Internal VA Use Only

Use Case #2: Leveraging Wearable TechnologyDiabetes Wireless glucometer Wearable device to track

activity and continuously monitor heart rate

Calorie consumption monitor Sleep tracker

Out of range numbers initiate SMS text messages (e.g., Annie) and automatic appointments

Chronic conditions under control

For Internal VA Use Only

Demographic Snapshot*

• 92% of internet users aged 18–29• 73% of internet users aged 30–49• 57% of internet users aged 50–64

• 38% of internet users aged 65+

* 2012 Pew Internet Survey

For Internal VA Use Only

Social Media Improves Predictive Analytics, Launches Suicide Prevention

Patients can provide a great deal of information into their health and wellness through social media and online search.

Social media can provide a range of alerts and supportive services.

For Internal VA Use Only

Internet Sharing Sites: New Data Sources & Support

PatientsLikeMe is an online patient network whose goal is to connect patients, improve outcomes, and enable research.

For Internal VA Use Only

Sept 10: FBI Issues Alert for IOT Device SecurityWhat are the Risks?• An exploitation of the Universal Plug and Play protocol

(UPnP) to gain access to many IOT devices. – Cyber actors can change the configuration, and run

commands on the devices, potentially enabling the devices to harvest sensitive information or conduct attacks against homes and businesses, or engage in digital eavesdropping;

• An exploitation of default passwords to send malicious and spam e-mails, or steal personally identifiable or credit card information;

• Compromising the IOT device to cause physical harm;• Overloading the devices to render the device inoperable;• Interfering with business transactions.

For Internal VA Use Only

Security in the IOT

• The IOT is redrawing the lines of IT responsibilities for the enterprise

• IOT objects possess the ability to change the state of the environment around them, or even their own state; for example, raising or lowering the temperature of a room or adjusting the flow of fluids to a patient in a hospital bed

• Securing the IOT expands the responsibility of the traditional IT security practice with every new identifying, sensing and communicating device added for each new business use case

• Gartner concluded that by 2020, a staggering 26 billion devices will be installed worldwide and connecting with each other

For Internal VA Use Only

Security Considerations• Human interaction is the weakest link in the security

process• VA’s policy for Veteran participation requires “opt in”• Provisioning of secure access methods and procedures

discourages the user community from leveraging alternative, less secure practices and methods

• Determine methodology and practices to secure, integrate, and use data interactions from mobile and stationary medical devices• Develop and enforce strong policies • Presence, footprint, standards, process

For Internal VA Use Only

An Example: Enterprise Messaging Infrastructure (eMI) Serves…

…VeteransVeterans will have the opportunity to access VA information and services at any time because eMI provides an efficient way to coordinate secure and reliable data exchanges.

…VAeMI directly aligns with the VA’s strategic plan of interoperability and reuse.

eMI delivers reliable, secure, high-performance, worldwide scalable service-oriented architecture based

services.

For Internal VA Use Only

Questions?

For Internal VA Use Only

References

• www.pewinternet.org/Commentary/2012/March/Pew-Internet-Social-Networkingfull-detail.aspx

• http://healthitsecurity.com/news/top-tips-on-healthcare-byod-best-practices-mobile-security?__hstc=33802686.98285844d3ef657079a1ce1fe9b2ceaf.1441808593469.1441808593469.1441808593469.1&__hssc=33802686.1.1441808593469&__hsfp=3443386125

• http://www.npr.org/sections/alltechconsidered/2015/03/17/391056271/fighting-stigma-against-privacy-facebook-s-new-suicide-resources

• http://cache.freescale.com/files/corporate/doc/white_paper/IOTREVHEALCARWP.pdf

• http://healthitanalytics.com/news/five-population-health-use-cases-for-the-internet-of-things

• VistA Evolution eMI Tech Sheet