skip to main content
10.1145/2808719.2808720acmconferencesArticle/Chapter ViewAbstractPublication PagesbcbConference Proceedingsconference-collections
research-article

Discovering de facto diagnosis specialties

Published: 09 September 2015 Publication History

Abstract

In health care institutions, medical specialty information may be lacking or inaccurate. Diagnosis histories offer information on which medical specialties may exist in practice, regardless of whether they have official codes. We refer to such specialties that are predicted with high certainty by diagnosis histories de facto diagnosis specialties. We aim to discover de facto diagnosis specialties under a general discovery--evaluation framework. Specifically, we employ a semi-supervised learning model and an unsupervised learning method for discovery. We further employ four supervised learning models for evaluation. We use one year of diagnosis histories from a major medical center, which consists of two data sets: one is fine-grained and the other is general. The semi-supervised learning model discovers a specialty for Breast Cancer on the fine-grained data set; while the unsupervised learning method confirms this discovery and suggests another specialty for Obesity on the larger general data set. The evaluation results reinforce that these two specialties can be recognized accurately by supervised learning models in comparison with 12 common diagnosis specialties defined by the Health Care Provider Taxonomy Code Set.

References

[1]
National provider identifier. http://nppes.cms.hhs.gov/NPPES/Welcome.do.
[2]
The npi taxonomy codes for psychology: Apa practice organization offers guidance, advocates for change. http://www.apapracticecentral.org/reimbursement/npi/select-code.aspx.
[3]
C. Benesch, D. Witter, A. Wilder, P. Duncan, G. Samsa, and D. Matchar. Inaccuracy of the international classification of diseases (icd-9-cm) in identifying the diagnosis of ischemic cerebrovascular disease. Neurology, 49, 1997.
[4]
D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation. the Journal of machine Learning research, 3:993--1022, 2003.
[5]
Y. Bonomo. Addiction medicine: a new medical specialty in a new age of medicine. Internal Medicine Journal, 40(8):543--544, 2010.
[6]
K. Caine and R. Hanania. Patients want granular privacy control over health information in electronic medical records. Journal of the American Medical Informatics Association, 20(1):7--15, 2013.
[7]
K. Caine and W. M. Tierney. Point and counterpoint: Patient control of access to data in their electronic health records. Journal of general internal medicine, 30(1):38--41, 2015.
[8]
C. Campos-Castillo and D. L. Anthony. The double-edged sword of electronic health records: implications for patient disclosure. Journal of the American Medical Informatics Association, 22(e1):e130--e140, 2015.
[9]
P. Cunningham and S. J. Delany. k-nearest neighbour classifiers. Multi Classifier System, pages 1--17, 2007.
[10]
D. E. Detmer, B. S. Munger, and C. U. Lehmann. Clinical informatics board certification: history, current status, and predicted impact on the clinical informatics workforce. Applied Clinical Informatics, 1(1):11, 2010.
[11]
A. Elixhauser and E. McCarthy. Clinical classifications for health policy research, version 2: hospital inpatient statistics. Number 96. US Department of Health and Human Services, Public Health Service, Agency for Health Care Policy and Research, 1996.
[12]
D. Fabbri and K. LeFevre. Explanation-based auditing. Proceedings of the VLDB Endowment, 5(1):1--12, 2011.
[13]
D. Fabbri and K. LeFevre. Explaining accesses to electronic medical records using diagnosis information. Journal of the American Medical Informatics Association, 20(1):52--60, 2013.
[14]
Centers. for Medicare & Medicaid Services. Taxonomy code. http://www.cms.gov/Medicare/Provider-Enrollment-and-Certification/MedicareProviderSupEnroll/Taxonomy.html.
[15]
C. A. Gunter, D. Liebovitz, and B. Malin. Experience-based access management: A life-cycle framework for identity and access management systems. IEEE security & privacy, 9(5):48, 2011.
[16]
S. Gupta, C. Hanson, C. Gunter, M. Frank, D. Liebovitz, B. Malin, et al. Modeling and detecting anomalous topic access. In IEEE International Conference on Intelligence and Security Informatics (ISI), pages 100--105. IEEE, 2013.
[17]
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten. The weka data mining software: an update. ACM SIGKDD explorations newsletter, 11, 2009.
[18]
R. Hogg and E. Tanis. Probability and Statistical Inference. Pearson Prentice Hall, 2006.
[19]
K.-M. Kuo, C.-C. Ma, J. W. Alexander, et al. How do patients respond to violation of their information privacy? Health Information Management Journal, 43(2):23, 2014.
[20]
X. Lu. Diagnosis based specialist identification in the hospital. Thesis, University of Illinois at Urbana-Champaign, 2014.
[21]
P. Martin, A. D. Rubin, and R. Bhatti. Enforcing minimum necessary access in healthcare through integrated audit and access control. In Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics, page 946. ACM, 2013.
[22]
A. K. Menon, X. Jiang, J. Kim, J. Vaidya, and L. Ohno-Machado. Detecting inappropriate access to electronic health records using collaborative filtering. Machine learning, 95(1):87--101, 2014.
[23]
A. V. Nimkar and S. K. Ghosh. An access control model for cloud-based emr federation. International Journal of Trust Management in Computing and Communications, 2(4):330--352, 2014.
[24]
U. Premarathne, F. Han, H. Liu, and I. Khalil. Impact of privacy issues on user behavioural acceptance of personalized mhealth services. In Mobile Health, pages 1089--1109. Springer, 2015.
[25]
T. R. Shulimzon. Interventional pulmonology: a new medical specialty. The Israel Medical Association journal, 16(6):379--384, 2014.
[26]
N. D. Soulakis, M. B. Carson, Y. J. Lee, D. H. Schneider, C. T. Skeehan, and D. M. Scholtens. Visualizing collaborative electronic health record usage for hospitalized patients with heart failure. Journal of the American Medical Informatics Association, 22(2):299--311, 2015.
[27]
Y. Sun, J. Han, X. Yan, P. S. Yu, and T. Wu. Pathsim: Meta path-based top-k similarity search in heterogeneous information networks. Proceedings of the VLDB Endowment, 2011.
[28]
Y. Sun, J. Han, P. Zhao, Z. Yin, H. Cheng, and T. Wu. Rankclus: integrating clustering with ranking for heterogeneous information network analysis. In Proceedings of the International Conference on Extending Database Technology, pages 565--576. ACM, 2009.
[29]
Y. Sun, B. Norick, J. Han, X. Yan, P. S. Yu, and X. Yu. Pathselclus: Integrating meta-path selection with user-guided object clustering in heterogeneous information networks. ACM Trans. Knowl. Discov. Data, 7(3):11:1--11:23, Sept. 2013.
[30]
W. M. Tierney, S. A. Alpert, A. Byrket, K. Caine, J. C. Leventhal, E. M. Meslin, and P. H. Schwartz. Provider responses to patients controlling access to their electronic health records: a prospective cohort study in primary care. Journal of general internal medicine, 30(1):31--37, 2015.
[31]
A. Zhang, X. Xie, K. C.-C. Chang, C. A. Gunter, J. Han, and X. Wang. Privacy risk in anonymized heterogeneous information networks. In Proceedings of the International Conference on Extending Database Technologies, pages 595--606, 2014.
[32]
W. Zhang, Y. Chen, C. Gunter, D. Liebovitz, and B. Malin. Evolving role definitions through permission invocation patterns. In Proceedings of the 18th ACM symposium on Access control models and technologies, pages 37--48. ACM, 2013.
[33]
W. Zhang, C. A. Gunter, D. Liebovitz, J. Tian, and B. Malin. Role prediction using electronic medical record system audits. In AMIA Annual Symposium Proceedings, volume 2011, page 858. American Medical Informatics Association, 2011.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
BCB '15: Proceedings of the 6th ACM Conference on Bioinformatics, Computational Biology and Health Informatics
September 2015
683 pages
ISBN:9781450338530
DOI:10.1145/2808719
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 September 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. data mining
  2. electronic health record
  3. medical informatics

Qualifiers

  • Research-article

Funding Sources

Conference

BCB '15
Sponsor:

Acceptance Rates

BCB '15 Paper Acceptance Rate 48 of 141 submissions, 34%;
Overall Acceptance Rate 254 of 885 submissions, 29%

Upcoming Conference

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)1
Reflects downloads up to 14 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media