Do any coders need to be placed on probation

Assignment Help Computer Network Security
Reference no: EM131274189

Assignment

Complete Part I before moving on to Parts II and III.

Scenario: Imagine that you have just been promoted to the position of Coding Manager at Rasmussen Medical Center and you are now responsible for 5 fulltime and 3 part time coders. One of the important tasks that you will need to complete on a quarterly basis is a coding audit on each of your coders and several types of reports that will summarize the audit information.

The former Coding Manager completed the recent audit but she was not able to complete any of the reports prior to her departure. She has left you with the following audit information on a piece of scratch paper:

Coder 1 88.6 %
Coder 2 96 %
Coder 3 98.9%
Coder 4 92 %
Coder 5 89.9 %
Coder 6 94.6 %
Coder 7 81%
Coder 8 91%

You don't know the coding accuracy policy by heart yet so you set out to locate it in the policy and procedure manual and you find the following Coding Quality Policy

Based on this information, what other past information should you collect so that you can be certain that you are complying with the policy?
Please write your response in a Word document.

PART 2

Do not do this assignment until you complete Part I.

Continuing with the Scenario from Part I, enter the audit summary information that was left for you (from Scenario I) into an Excel spreadsheet along with the information below that you found in the files.

CODER

QUARTER 1

QUARTER 2

QUARTER 3

1

82%

86%

94%

2

96.8%

98%

95.2%

3

92%

97%

96.9%

4

92%

94%

94%

5

87%

91%

89%

6

94.9%

95.2%

94.9%

7

NA

NA

NA

8

97.2%

94%

96%

Once you have entered the information into Excel, create a bar chart showing the 4 quarter history of audit results for each of the coders.

PART 3

Do not do this assignment until you completed Parts I and II.

Continuing the Scenario from Parts I and II, you collected information from each of the coders file and prepared a table to remind you of their employment status.

CODER

LENGTH OF EMPLOYMENT

NOTES

1

1 year


2

7 years


3

4 years


4

11 years


5

1 year

2ND Probation

6

2 years


7

42 days

Address weak areas

8

2 years

Sudden drop

Now you must make some decisions based on the data that you have.

1. Which coders are concerns and why? List each one that you are concerned with and be specific on what part of the policy is in question.

2. Which coder(s) do you need to create an education plan for?

3. Do any coders need to be placed on probation?

4. Do any coders need to be considered for termination?

5. Are any coders in their probationary period in jeopardy of not meeting the probationary expectations?

Answer all the questions above in Memo format to your supervisor, Mary Jones, Director of HIM. Be sure to be professional, accurate, and specific about the actions that you are recommending.

Reference no: EM131274189

Questions Cloud

Describe advantages associated with using each given cable : Describe one or two of the advantages and/or disadvantages associated with using each cable type for a business's network infrastructure.
Determining the database life cycle : Per the text, the Database Life Cycle includes the Database Initial Study, Database Design, Implementation and Loading, Testing and Evaluation, Operation, and Maintenance and Evolution phases. However, the actual implementation of each of the phas..
How you would implement such a plan logistically : Describe the characteristics of the culture you are planning a prevention program for. What is their background? Historically do they have a positive or a negative relationship with health care/prevention? Why is it important to implement a preve..
Healthcare facilities in the gainesville florida area : Your organization has been given the assignment of interconnecting 10 healthcare facilities in the Gainesville Florida area. These facilities are owned by individual practices which report to a master practice for Gainesville.
Do any coders need to be placed on probation : Do any coders need to be placed on probation? Do any coders need to be considered for termination? Are any coders in their probationary period in jeopardy of not meeting the probationary expectations?
Give legal advice using statutory interpretation principle : Provide legal advice, using statutory interpretation principles and approaches, to Brigitta, the Commission and Evo Pty Ltd in relation to the operation of the legislation in their circumstances.
Find the linear correlation coefficient : Find the linear correlation coefficient between cumulative GPA and high school percentile for the 200 UWEC undergraduate students in the Focus sample and Find and interpret the regression equation. 1. Find and interpret the coefficient of determina..
Design and implementation of a global information system : Next, identify one obstacle to the design and implementation of a global information system, and explain one way in which an organization can overcome the obstacle in question.
Values of the data before and after the update : When an update to the database takes place, the time of the update, the values of the data before and after the update, and the type of lock used are recorded in the transaction log. true or false?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Why do modern encryption algorithms use keys?

Why do modern encryption algorithms use keys?

  How will ids and passwords be properly maintained?

How will IDs and passwords be properly maintained?

  Major information security threats

Assignment: Write a 3-to 4-page paper on at least three major information security threats that a specific organization you choose faces today

  What would be a successful cybersecurity policy

Write an essay on the topic, "Building and implementing a successful cybersecurity policy". The following questions should be covered in the essay: What would be a successful cybersecurity policy

  Desktop publishing system used to produce documents

Consider a desktop publishing system used to produce documents for various organizations. Give an example in which system availability is the most impotent requirement. Please be very brief.

  What are few security compromises that were faced in past

What are the few security compromises that were faced in the recent past due to lack of internet and e-Commerce security competencies?

  Analyze specific potential malicious attacks

Analyze specific potential malicious attacks and / or threats that could be carried out against the network and organization and explain in detail the potential impact of the three selected malicious attacks

  What are risks behind implementing cloud computing programs

What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world?

  How to encrypt a message using a stream cipher

How to encrypt a message using block cipher algorithms we covered in class? What are the similarities and differences between those algorithms and How to encrypt a message using a stream cipher?

  Describe the different types of computer attacks

Describe the different types of computer attacks

  Classification of different types of network attacks

Describe and discuss how it works, which computer security principles the attack is against, and what are the possible countermeasures that could be put in place.

  Analyze ing solution for providing security

Read the case study titled "ING Life". Analyze ING's solution for providing security to determine if the solution is adequate or inadequate

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd