Do any coders need to be placed on probation

Assignment Help Computer Network Security
Reference no: EM131274189

Assignment

Complete Part I before moving on to Parts II and III.

Scenario: Imagine that you have just been promoted to the position of Coding Manager at Rasmussen Medical Center and you are now responsible for 5 fulltime and 3 part time coders. One of the important tasks that you will need to complete on a quarterly basis is a coding audit on each of your coders and several types of reports that will summarize the audit information.

The former Coding Manager completed the recent audit but she was not able to complete any of the reports prior to her departure. She has left you with the following audit information on a piece of scratch paper:

Coder 1 88.6 %
Coder 2 96 %
Coder 3 98.9%
Coder 4 92 %
Coder 5 89.9 %
Coder 6 94.6 %
Coder 7 81%
Coder 8 91%

You don't know the coding accuracy policy by heart yet so you set out to locate it in the policy and procedure manual and you find the following Coding Quality Policy

Based on this information, what other past information should you collect so that you can be certain that you are complying with the policy?
Please write your response in a Word document.

PART 2

Do not do this assignment until you complete Part I.

Continuing with the Scenario from Part I, enter the audit summary information that was left for you (from Scenario I) into an Excel spreadsheet along with the information below that you found in the files.

CODER

QUARTER 1

QUARTER 2

QUARTER 3

1

82%

86%

94%

2

96.8%

98%

95.2%

3

92%

97%

96.9%

4

92%

94%

94%

5

87%

91%

89%

6

94.9%

95.2%

94.9%

7

NA

NA

NA

8

97.2%

94%

96%

Once you have entered the information into Excel, create a bar chart showing the 4 quarter history of audit results for each of the coders.

PART 3

Do not do this assignment until you completed Parts I and II.

Continuing the Scenario from Parts I and II, you collected information from each of the coders file and prepared a table to remind you of their employment status.

CODER

LENGTH OF EMPLOYMENT

NOTES

1

1 year


2

7 years


3

4 years


4

11 years


5

1 year

2ND Probation

6

2 years


7

42 days

Address weak areas

8

2 years

Sudden drop

Now you must make some decisions based on the data that you have.

1. Which coders are concerns and why? List each one that you are concerned with and be specific on what part of the policy is in question.

2. Which coder(s) do you need to create an education plan for?

3. Do any coders need to be placed on probation?

4. Do any coders need to be considered for termination?

5. Are any coders in their probationary period in jeopardy of not meeting the probationary expectations?

Answer all the questions above in Memo format to your supervisor, Mary Jones, Director of HIM. Be sure to be professional, accurate, and specific about the actions that you are recommending.

Reference no: EM131274189

Questions Cloud

Describe advantages associated with using each given cable : Describe one or two of the advantages and/or disadvantages associated with using each cable type for a business's network infrastructure.
Determining the database life cycle : Per the text, the Database Life Cycle includes the Database Initial Study, Database Design, Implementation and Loading, Testing and Evaluation, Operation, and Maintenance and Evolution phases. However, the actual implementation of each of the phas..
How you would implement such a plan logistically : Describe the characteristics of the culture you are planning a prevention program for. What is their background? Historically do they have a positive or a negative relationship with health care/prevention? Why is it important to implement a preve..
Healthcare facilities in the gainesville florida area : Your organization has been given the assignment of interconnecting 10 healthcare facilities in the Gainesville Florida area. These facilities are owned by individual practices which report to a master practice for Gainesville.
Do any coders need to be placed on probation : Do any coders need to be placed on probation? Do any coders need to be considered for termination? Are any coders in their probationary period in jeopardy of not meeting the probationary expectations?
Give legal advice using statutory interpretation principle : Provide legal advice, using statutory interpretation principles and approaches, to Brigitta, the Commission and Evo Pty Ltd in relation to the operation of the legislation in their circumstances.
Find the linear correlation coefficient : Find the linear correlation coefficient between cumulative GPA and high school percentile for the 200 UWEC undergraduate students in the Focus sample and Find and interpret the regression equation. 1. Find and interpret the coefficient of determina..
Design and implementation of a global information system : Next, identify one obstacle to the design and implementation of a global information system, and explain one way in which an organization can overcome the obstacle in question.
Values of the data before and after the update : When an update to the database takes place, the time of the update, the values of the data before and after the update, and the type of lock used are recorded in the transaction log. true or false?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd