Do any coders need to be placed on probation

Assignment Help Computer Network Security
Reference no: EM131274189

Assignment

Complete Part I before moving on to Parts II and III.

Scenario: Imagine that you have just been promoted to the position of Coding Manager at Rasmussen Medical Center and you are now responsible for 5 fulltime and 3 part time coders. One of the important tasks that you will need to complete on a quarterly basis is a coding audit on each of your coders and several types of reports that will summarize the audit information.

The former Coding Manager completed the recent audit but she was not able to complete any of the reports prior to her departure. She has left you with the following audit information on a piece of scratch paper:

Coder 1 88.6 %
Coder 2 96 %
Coder 3 98.9%
Coder 4 92 %
Coder 5 89.9 %
Coder 6 94.6 %
Coder 7 81%
Coder 8 91%

You don't know the coding accuracy policy by heart yet so you set out to locate it in the policy and procedure manual and you find the following Coding Quality Policy

Based on this information, what other past information should you collect so that you can be certain that you are complying with the policy?
Please write your response in a Word document.

PART 2

Do not do this assignment until you complete Part I.

Continuing with the Scenario from Part I, enter the audit summary information that was left for you (from Scenario I) into an Excel spreadsheet along with the information below that you found in the files.

CODER

QUARTER 1

QUARTER 2

QUARTER 3

1

82%

86%

94%

2

96.8%

98%

95.2%

3

92%

97%

96.9%

4

92%

94%

94%

5

87%

91%

89%

6

94.9%

95.2%

94.9%

7

NA

NA

NA

8

97.2%

94%

96%

Once you have entered the information into Excel, create a bar chart showing the 4 quarter history of audit results for each of the coders.

PART 3

Do not do this assignment until you completed Parts I and II.

Continuing the Scenario from Parts I and II, you collected information from each of the coders file and prepared a table to remind you of their employment status.

CODER

LENGTH OF EMPLOYMENT

NOTES

1

1 year


2

7 years


3

4 years


4

11 years


5

1 year

2ND Probation

6

2 years


7

42 days

Address weak areas

8

2 years

Sudden drop

Now you must make some decisions based on the data that you have.

1. Which coders are concerns and why? List each one that you are concerned with and be specific on what part of the policy is in question.

2. Which coder(s) do you need to create an education plan for?

3. Do any coders need to be placed on probation?

4. Do any coders need to be considered for termination?

5. Are any coders in their probationary period in jeopardy of not meeting the probationary expectations?

Answer all the questions above in Memo format to your supervisor, Mary Jones, Director of HIM. Be sure to be professional, accurate, and specific about the actions that you are recommending.

Reference no: EM131274189

Questions Cloud

Describe advantages associated with using each given cable : Describe one or two of the advantages and/or disadvantages associated with using each cable type for a business's network infrastructure.
Determining the database life cycle : Per the text, the Database Life Cycle includes the Database Initial Study, Database Design, Implementation and Loading, Testing and Evaluation, Operation, and Maintenance and Evolution phases. However, the actual implementation of each of the phas..
How you would implement such a plan logistically : Describe the characteristics of the culture you are planning a prevention program for. What is their background? Historically do they have a positive or a negative relationship with health care/prevention? Why is it important to implement a preve..
Healthcare facilities in the gainesville florida area : Your organization has been given the assignment of interconnecting 10 healthcare facilities in the Gainesville Florida area. These facilities are owned by individual practices which report to a master practice for Gainesville.
Do any coders need to be placed on probation : Do any coders need to be placed on probation? Do any coders need to be considered for termination? Are any coders in their probationary period in jeopardy of not meeting the probationary expectations?
Give legal advice using statutory interpretation principle : Provide legal advice, using statutory interpretation principles and approaches, to Brigitta, the Commission and Evo Pty Ltd in relation to the operation of the legislation in their circumstances.
Find the linear correlation coefficient : Find the linear correlation coefficient between cumulative GPA and high school percentile for the 200 UWEC undergraduate students in the Focus sample and Find and interpret the regression equation. 1. Find and interpret the coefficient of determina..
Design and implementation of a global information system : Next, identify one obstacle to the design and implementation of a global information system, and explain one way in which an organization can overcome the obstacle in question.
Values of the data before and after the update : When an update to the database takes place, the time of the update, the values of the data before and after the update, and the type of lock used are recorded in the transaction log. true or false?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Evaluate the strengths and weaknesses of the organizations

Evaluate the strengths and weaknesses of the organizations cybersecurity policy along attributes - Analyze the range of organizational policies (the policy framework) that are needed to effectively manage cybersecurity risks.

  Define the terms class, object and message

Define the terms class, object and message. How does the concept of message passing help to encapsulate the implementation of an object, including its data?

  Most damaging corporate computer crime

1. In your opinion, what is the most damaging corporate computer crime today? In your reply provide at least two recent examples with references to support your opinion.

  What are some ideas you have about possible research topics

Considering your Program (DM/DCS) your concentration, and your interests, what are some ideas you have about possible research topics? Please add in these yourself

  The broad definition of computer crime can be described

According to the text, the broad definition of computer crime can be described

  Describe the steps that are required if a data recovery

Identify the backup software that will be used and how it will be configured. Describe the steps that are required if a data recovery is necessary.

  Define cybersecurity as an organizational strategy

Prepare a short paper of approximately 8-12 ( double spaced)pages investigating the strategic impact of cybersecurity in the organization with a special focus on its ethical and legal implications.

  Which e-mail security protocols depends upon a web.

Which e-mail security protocol(s) depend(s) upon a "Web of Trust"?

  Information about the cases

Most of the questions are based on actual cases, so information about the cases can be googled if wanted. (Example Search Term: Dodona I, LLC vs. Goldman Sachs & Co.)

  Data standards and data security

Data Standards and Data Security

  Analysis to be presented in a 10- to 15-slide microsoft

analysis to be presented in a 10- to 15-slide microsoft powerpoint presentation and use detailed speaker notes for

  Technical report on a network security topic

You will be required to do a presentation to your class and write a literature review to your tutor as a technical report on a Network Security Topic". You will need to find (at least two) papers on the topic and then confirm them with the lecture..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd