Publications by authors named "D Chern"

Show the generalizability of an ingredient-based method to automatically create an up-to-date, error-free, complete list of medication codes (e.g., opioid medications with at least one opioid ingredient) from an ingredient list (e.

View Article and Find Full Text PDF

Background:  Standardizing and formalizing consent processes and forms can prevent ambiguities, convey a more precise meaning, and support machine interpretation of consent terms.

Objectives:  Our goal was to introduce a systematic approach to standardizing and digitizing pediatric consent forms, which are complex due to legal requirements for child and legal guardian involvement.

Methods:  First, we reviewed the consent requirements from the Arizona regulation, and we used 21 pediatric treatment consents from five Arizona health care organizations to propose and evaluate an implementation-agnostic Consent for Treatment Framework.

View Article and Find Full Text PDF
Article Synopsis
  • - The HL7 organization created a set of 45 sensitive data categories to help implement electronic consent technology, enabling patients to control the sharing of their sensitive medical records.
  • - A study involving twelve physicians led to revisions of 21 of these categories, including the addition of new categories and the modification of existing definitions to promote clearer communication and inclusivity.
  • - Future updates to the HL7 categories should integrate physicians' insights, validate them with patient data, and prioritize patient perspectives for a more patient-centered approach.
View Article and Find Full Text PDF

Physician categorizations of electronic health record (EHR) data (e.g., depression) into sensitive data categories (e.

View Article and Find Full Text PDF

Patients desire greater control over sharing their digital health data. Consent2Share (C2S) is an open-source consent tool offered by SAMHA and the VA to support granular data sharing (GDS) options that align with patient preferences and data privacy regulations. The need to validate this tool exists.

View Article and Find Full Text PDF