Discovering de facto diagnosis specialties

In health care institutions, medical specialty information may be lacking or inaccurate. Diagnosis histories offer information on which medical specialties may exist in practice, regardless of whether they have official codes. We refer to such specialties that are predicted with high certainty by diagnosis histories de facto diagnosis specialties. We aim to discover de facto diagnosis specialties under a general discovery--evaluation framework. Specifically, we employ a semi-supervised learning model and an unsupervised learning method for discovery. We further employ four supervised learning models for evaluation. We use one year of diagnosis histories from a major medical center, which consists of two data sets: one is fine-grained and the other is general. The semi-supervised learning model discovers a specialty for Breast Cancer on the fine-grained data set; while the unsupervised learning method confirms this discovery and suggests another specialty for Obesity on the larger general data set. The evaluation results reinforce that these two specialties can be recognized accurately by supervised learning models in comparison with 12 common diagnosis specialties defined by the Health Care Provider Taxonomy Code Set.

[1]  Aviel D. Rubin,et al.  Enforcing Minimum Necessary Access in Healthcare Through Integrated Audit and Access Control , 2013, BCB.

[2]  Philip S. Yu,et al.  PathSim , 2011, Proc. VLDB Endow..

[3]  Kelly Caine,et al.  Patients want granular privacy control over health information in electronic medical records , 2013, J. Am. Medical Informatics Assoc..

[4]  Carl A. Gunter,et al.  Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems , 2011, IEEE Security & Privacy.

[5]  William M. Tierney,et al.  Point and Counterpoint: Patient Control of Access to Data in Their Electronic Health Records , 2014, Journal of General Internal Medicine.

[6]  Tiberiu R Shulimzon Interventional pulmonology: a new medical specialty. , 2014, The Israel Medical Association journal : IMAJ.

[7]  Xing Xie,et al.  Privacy Risk in Anonymized Heterogeneous Information Networks , 2014, EDBT.

[8]  Carl A. Gunter,et al.  Modeling and detecting anomalous topic access , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[9]  Wen Zhang,et al.  Role Prediction Using Electronic Medical Record System Audits , 2011, HealthSec.

[10]  P. Duncan,et al.  Inaccuracy of the International Classification of Diseases (ICD-9-CM) in identifying the diagnosis of ischemic cerebrovascular disease , 1997, Neurology.

[11]  Christoph U. Lehmann,et al.  Clinical Informatics Board Certification: History, Current Status, and Predicted Impact on the Clinical Informatics Workforce , 2010, Thrombosis and Haemostasis.

[12]  Soumya K. Ghosh,et al.  An access control model for cloud-based EMR federation , 2014, Int. J. Trust. Manag. Comput. Commun..

[13]  P. J. Green,et al.  Probability and Statistical Inference , 1978 .

[14]  Sarah Jane Delany k-Nearest Neighbour Classifiers , 2007 .

[15]  Young Ji Lee,et al.  Visualizing collaborative electronic health record usage for hospitalized patients with heart failure , 2015, J. Am. Medical Informatics Assoc..

[16]  Xun Lu Diagnosis based specialist identification in the hospital , 2014 .

[17]  William M. Tierney,et al.  Provider Responses to Patients Controlling Access to their Electronic Health Records: A Prospective Cohort Study in Primary Care , 2014, Journal of General Internal Medicine.

[18]  Wen Zhang,et al.  Evolving role definitions through permission invocation patterns , 2013, SACMAT '13.

[19]  D. Fabbri,et al.  Explaining accesses to electronic medical records using diagnosis information , 2013, J. Am. Medical Informatics Assoc..

[20]  Kuang-Ming Kuo,et al.  How Do Patients Respond to Violation of Their Information Privacy? , 2014, Health information management : journal of the Health Information Management Association of Australia.

[21]  Philip S. Yu,et al.  PathSelClus: Integrating Meta-Path Selection with User-Guided Object Clustering in Heterogeneous Information Networks , 2013, TKDD.

[22]  M. Kendall Probability and Statistical Inference , 1956, Nature.

[23]  Jihoon Kim,et al.  Detecting inappropriate access to electronic health records using collaborative filtering , 2014, Machine Learning.

[24]  Yizhou Sun,et al.  RankClus: integrating clustering with ranking for heterogeneous information network analysis , 2009, EDBT '09.

[25]  Denise L. Anthony,et al.  The double-edged sword of electronic health records: implications for patient disclosure , 2015, J. Am. Medical Informatics Assoc..

[26]  Ibrahim Khalil,et al.  Impact of Privacy Issues on User Behavioural Acceptance of Personalized mHealth Services , 2015 .

[27]  Y. Bonomo,et al.  EDITORIAL: Addiction medicine: a new medical specialty in a new age of medicine , 2010, Internal medicine journal.

[28]  Daniel Fabbri,et al.  Explanation-Based Auditing , 2011, Proc. VLDB Endow..

[29]  Michael I. Jordan,et al.  Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..

[30]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.