|By Kevin Benedict||
|April 22, 2014 10:00 AM EDT||
By Caleb Benedict, Research Analyst, GIS and IoT
GIS technology is being used in the healthcare industry today for patient care and preventative medicine among other things. Hospitals and other organizations, with GIS and big data resources now have the ability to collect geographic information from their patients and study trends in illnesses based on where the patients live now and in the past. By displaying this information on a map it allows healthcare workers to visually see trends in illnesses and predict which communities will most likely to be impacted in the future. In addition, understanding where patients have traveled over time enables healthcare officials to predict where ground zero for viruses might be located and how the diseases may have been spread.
A recent GIS study conducted in China determined that the next likely at-risk region for the H7N9 avian flu virus is located in a north region of Vietnam. They were able to determine this information by mapping previous cases of the flu virus which created a cookie-crumb trail that helped them predict northern Vietnam.
GIS applications like the one in China can be used for a variety of healthcare trends. If hospitals start building databases using patient locations, they would be able to detect trends based on patient geography. This could allow hospitals to stock medical inventory based on predictive analytics, train their staff in advance of the diseases, and forecast the number of patients that will be affected.
Not only can GIS help predict future at-risk areas, but GIS applications can also help hospitals reduce expenses and improve patient care. A recent study in Maryland compared the use of life flight helicopters to ambulances. The study determined that in 31% of cases when a life flight was used, an ambulance would have been a better choice. Knowing when an ambulance is a better choice could save a lot of money.
The use of GIS technology and big data analytics in healthcare is an emerging area worth watching. Here are some of the use cases referenced above:
A study by the University of Cincinnati uses GIS to compare the use of life flight helicopters and ambulances. (http://bit.ly/1noQnoQ)
GIS is used to study how pollution levels in different regions of the U.S. affect residents. (http://bit.ly/1jIHGoz)
A recent study in China uses GIS to predict the next impact area for the H7N9 avian flu virus. (http://bit.ly/1fU8yBI)
Join Kevin Benedict at the M6 Mobility Exchange in San Diego!
Kevin Benedict Senior Analyst, Digital Transformation, EBA, Center for the Future of Work Cognizant View my profile on LinkedIn Learn about mobile strategies at MobileEnterpriseStrategies.com Follow me on Twitter @krbenedict Browse the Mobile Solution Directory Join the Linkedin Group Strategic Enterprise Mobility Join the Google+ Community Mobile Enterprise Strategies Recommended Strategy Book Code Halos Recommended iPad App Code Halos for iPads
***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.
May. 28, 2015 04:00 PM EDT Reads: 3,100
May. 28, 2015 03:30 PM EDT Reads: 1,311
May. 28, 2015 03:00 PM EDT Reads: 4,326
May. 28, 2015 03:00 PM EDT Reads: 1,940
May. 28, 2015 02:56 PM EDT Reads: 142
May. 28, 2015 02:00 PM EDT Reads: 611
May. 28, 2015 02:00 PM EDT Reads: 1,663
May. 28, 2015 02:00 PM EDT Reads: 4,836
May. 28, 2015 01:30 PM EDT Reads: 656
May. 28, 2015 01:04 PM EDT Reads: 388
May. 28, 2015 01:00 PM EDT Reads: 6,201
May. 28, 2015 12:30 PM EDT Reads: 1,486
May. 28, 2015 12:30 PM EDT Reads: 1,179
May. 28, 2015 12:15 PM EDT Reads: 2,075
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
May. 28, 2015 12:00 PM EDT Reads: 4,225