After our first job, it’s time to consider our career. MoM TiSH is confident that we are ready to climb the corporate ladder.
We introduced the Journey Interaction Matrix (JIM) in Chapter 8, Learning How Interaction Works in Technology-Enabled Care Teams, to utilize OODA, which was introduced in Chapter 7, Creating New Platforms with OODA. Together, they provide a way to tell structured stories about the relationships between the activities in health journeys, executed by providers and the enablers. In this chapter, we will learn how to create a common understanding to integrate and transform into the top tread of TiSH, personal directed healthcare with the best-fitting solutions and systems, tread by tread.
The TiSH staircase and DevOps4Care enable users to tell compelling and understandable stories along the presented models. This allows developers to understand the needs to design each tread and build the enabling systems. We will address the integration and interoperability of these systems in the enabling platform, the two critical issues to solve in any complex ecosystem. That requires understanding the technology, as well as the interaction of multi-disciplinary teams that work together from a care perspective. It’s all part of TiSH and DevOps4Care.
In this chapter, we’re going to cover the following main topics:
With the JIM at our disposal, we can define the interactions between teams in terms of OODA activities. In the following figure, we added the JIM to the third tread of TiSH. This enables a care organization to define the care processes in OODA activities and have the required capacity within each team to provide the requested care to patients. Given this capacity, the teams have to be integrated into the activities of other teams when involved in networked care.
Figure 9.1 – Interactions between TEC teams and their (OODA) activities
We are not going to describe the professional medical or social procedures, but rather a strategy for the generic functionality and characteristics of how to integrate the different care teams in the following types of care networks we defined previously:
To visualize the nested OODA loops for integrating the different teams, the following diagram shows the hierarchy of the OODA loops, each related to the type of networked care:
Figure 9.2 – OODA loop hierarchy
In the final chapter of this book, we will do an exercise on nested OODA loops as the main design for networked care.
Now that we have decomposed the TEC team into the components of roles and OODA activities using the JIM, it’s time to compose the TEC teams and the networked care. First, remember what we discussed in Chapter 6, Applying the Panarchy Principle, regarding Tuckman’s views on how the team is built with forming, storming, norming, performing, and adjourning steps, and must be able to express their care processes in terms of OODA activities. These activities must be mirrored in the technology.
Next, this team must be digitally skilled. These teams need to become digital centaurs in the care networks, which will take time. TEC teams operate in networks, using platform services that they can dynamically scale around the patients using technology.
The next section will address this.
It’s time to talk about micro-enterprises and 3EO, the Entrepreneurial Ecosystem Enabling Organization. We already briefly mentioned Rendanheyi as an agile way to unbundle and rebundle organizations to suit the patient’s needs, realized in the Moments of Truth on the health journey’s touchpoints. The question is how?
For each network tread, we will provide an example. The first is case management, which is shown in the following diagram:
Figure 9.3 – Teams in case management
Figure 9.3 shows a playing field with Technology in the inner circle, Enabling entities in the middle circle, and Care providers in the outer circle. Other teams or organizations can be outside these circles.
The patient has its healthquarters – analogous to headquarters – at home. Together with the partner, they are their own case manager (self-management) to arrange the care they need. In this example, we have a patient who is recovering after an intervention replacing a hip. The intervention is done in the orthopedic clinic, but the rehabilitation is done at home.
The patient and their partner have a subscription paid by the insurance company to arrange the care they need. The subscription is issued by an enabling organization, a rehabilitation center. The subscription covers a nursing team and physiotherapists, working together with the General Practitioner (GP).
The binding party here is the healthcare insurance company. They provide the governance for the Integration Platform (IP). Through their purchasing power, they can specify what capabilities and functionalities of communication are required for proper case management. Obviously, all parties must be compliant with the guardrails that have been laid out in governmental regulations.
To make sure that the communication requirements are met, an independent Certifying Agency (CA) certifies all players within their circles of influence.
The rehabilitation center has also made arrangements with the municipality, which has a specific team organizing activities such as cycling, walking, and playing games. Both the rehabilitation center and the municipality have decided to work together on training their personnel but have their own department for Human Resources Management (HRM).
By just looking at the department and team level of organizations, we have already digitally unbundled the organizations. This will help with the organizational unbundling when this is required.
If we go one step further to stepped care, the playing field changes. It’s shown in the following diagram:
Figure 9.4 – Teams in stepped care
Like the Danish Naerkliniken that we already introduced in the first chapters of this book, a formal collaboration is established between the municipality, the clinic, practices in the neighborhood, and the rehabilitation center. The GP is involved and the pharmacy acts as an external supplier.
In the collaboration, it was decided that enabling staff has to be trained jointly. The clinic and rehab center provide the human resources related to the collaboration and the municipality provides all materials for use at home. The assistance for housekeeping from the municipality is also part of the collaboration.
In the collaboration, they use the guiding hand of the insurance company for governance. The use of CAs to certify all entities using the Shared Services Platform (SSP) is retained.
Next, we evolve to integrated care, represented in the following diagram:
Figure 9.5 – Teams in integrated care
If we want to go into integrated care, then more disciplines must be involved to cooperate. This time, a cooperation is founded that will be responsible for all platforms to support the entities. One example of cooperation is that all equipment or things required for use at home can be ordered by any team from the online platform.
The same applies to human resources with a platform to assign tasks to individuals across the teams. The Roamler Care platform that we discussed in Chapter 8, Learning How Interaction Works in Technology-Enabled Care Teams, provides this. The HRM department is absorbed in the teams, like with the Buurtzorg concept.
Last but not least (in fact, delivering the most value for the patient) is directed care, which is shown in the following diagram:
Figure 9.6 – Teams in directed care
In directed care, the healthquarters of anyone can direct the care resources via the SSP. This can be highly autonomous as health trackers predict when some form of care is required.
The IP is now governed by a value board responsible for the population management of the region. All teams are in fact free to independently develop to serve the population as best as possible. The Amazon Care approach has a lot of these characteristics, the population being the workforce of Amazon itself.
Integrating the TEC teams means interaction between the OODA activities, at least the internal activities and especially the OODA activities in networked care. We need nurses, therapists, practitioners, and doctors in the teams to be interoperable. We also need to enable supporting staff to manage the services to create the Health eXperience (HeX) journeys.
Although this integration is on the medical side, it must also be realized on the enabling technical side. To be able to build understanding on both sides, we present an overview of the entities on both sides in the following figure:
Figure 9.7 – Entity relation diagram for journeys, providers, and the enablers
To be able to translate the integration and interoperability into enabling services of the platform, we need to recognize the care provisioning entities in the upper part and the enabling entities in the lower part. The awareness of these entities helps with understanding the stories we tell each other. The transformation task force will have to organize common understanding sessions to build a shared mental model for the DevOps4Care process. We use the Entity Relations Diagram (ERD) for this purpose. The entities are divided into 4Care entities and Ops entities. Together, they will be developed.
On the care provisioning (4Care) business side, we identify the following:
The enabling entities are as follows:
These classes are managed as users of resources to enable the care teams. For this, users must identify themselves with the right attributes to be authenticated. Once authenticated, authorization to access the resources can be granted.
The ERD shown in Figure 9.7 shows the relations of the platform between the entities.
This ERD (from TAFIM, the precursor to TOGAF) is used as the foundation for architecture preferably set up from the start to be able to evolve the patient-centric network into the desired SSP.
We use the OODA loops to organize the teams around the patient; how do we mirror that in the IT resources of the platform? What technological topics are important to be aware of as the transformation task force? Let’s dive into it.
The IT resources need to be one step ahead of the most advanced organization in the network. But here, we have to say that this is rarely the case. Here, the need for a common vision of the future based on a common understanding becomes apparent. We will address this in the next chapter. The consequence is that the topology of the IT infrastructure must be futureproof in terms of the transformation treads ahead. A multi-cloud strategy is therefore a must as the SSP will evolve from micro-enterprises originating from different, more traditional organizations, each having its own choice of cloud. These can be public clouds such as Azure and AWS, but also private stacks hosted in privately owned data centers or hosting providers. The first step to take is to prepare the modular microservices for interoperability between the environments in these clouds, but also all subsequent integration levels have to be prepared for.
Integration levels are defined on the business side by the OODA loops and the accompanying level of Systems of Systems for the technology on the other side. It’s this combination that has to be addressed in the common understanding.
One field of knowledge for this is decision support systems.
Tip
Read the publication on decision support, Decision Support Systems and Management Information System, by Pawan Thakur and Ram Kumar.
Another topic for common understanding is trust. Every organization should build trust in the users by having excellent privacy, security, and UX. All actors in the HeXagon have to communicate with each other in a secure way.
That starts with each organization having its own trust domain. So, how do we unbundle this? By having each entity operating from its own domain with zero trust between the domains. For each person or device, it is possible to get access to the required microservices via the API, including the preferred Operating Systems (OSs) and UI.
With the creation of trusted domains, we’re moving from one domain to confined personal domains. The step toward unbundling becomes easy. The organization becomes just another attribute of an identity. With this, we are already getting close to the next version of the internet, called Web3, using blockchain technology to decentralize the web. It could be used to grant every identity its own personal domain, shielded as a block and providing a greater level of security and privacy. But the benefits are there: patients owning their own domain and granting access to actors in the care network on demand.
We are creating a patient’s health data space domain. In the HeXagon, a practitioner logs into that patient’s domain, where they have permission to look for other data to be used in the therapy or other type of intervention. This is the opposite of a patient logging into all different care providers. Prepare to flip the domain inside out. The consequence of this is that every active entity has to be aware of what they are doing – it's they since we’re talking about both humans and devices – and what data is being stored.
If actors can be anywhere, so can data. We won’t have monolithic data stores anymore, but distributed data. The next challenge is how to find the right data when it’s distributed. You can use an index to find where your data is or search all databases on related data. The index method is quicker and can be recorded with each event between actors. Searching will also include derived or processed data. So, both ways are probably needed for access to complete data.
For example, algorithm micro-AI services will need the required data and will search for it. Technologies such as DDS used in other sectors such as aerospace become relevant for healthcare too.
The way it works is that an actor logs into the required domains, getting access to conditions such as authorization and circumstances such as legal relationship. An actor can publish information and/or subscribe to information required for the task at hand.
From the start, it is best to give this ultimate perspective attention and create the design space for the end goal. Also, unbundle staff organizations in the IT domain to prepare for the coming rebundling around the patient’s needs.
This includes the IT department preparing to support the emerging SSP. The IT department can take the lead on the transformation by first collaborating and then forming a cooperation to ultimately support the individual patient by setting up the support on rigorous Identity and Access Management (IAM) and digital services.
The next main topic is how to get access to the data. Every person or thing that needs data for their activity needs to find and get cleared for access in line with their roles in the activity. The main dilemma is, on the one hand, protecting data, and on the other hand, providing access to those who need it. In our practice, we see care providers struggling to give access to personnel outside their own organization. What we need is identity management across all care providers, across the silos.
Before we dive into the specific roles of professionals and patients, we must define what roles are. In IT, roles are associated with identities. But to make it a bit more complex: identities are not just people. Anything can be an identity. In the previous chapter, we discussed how to disentangle or unbundle healthcare services into microservices, allowing the patient to acquire the right service at the desired time. This way, we can dynamically scale resources to provide care.
A microservice is a resource, but it doesn’t run on itself. It needs infrastructure and software. It may need a device and it will certainly need network connectivity. Lastly, it needs a user to drive the service and a receiver that benefits from the service. All of these are identities, and they fulfill a role.
This concept might be a bit hard to understand if you aren’t an IT expert, so we’ll try to make it more specific.
Both the care provider, for instance, a nurse, and the patient are identities. To use care services, they will need access to these services. They might need access to an app on a tablet or a mobile phone. But we only need to grant access to data that is relevant to this specific nurse and patient. Hence, we need to specify who they are, what their role is, and what this role requires. We might even want to be specific about when they need data or where and on what kind of device they are allowed to view data.
A lot of smartphones already have an app that shows relevant health data. That app might collect data from a smartwatch, but it can also hold the data that is entered by a GP or a pharmacy. The patient has access to that app and that data, but also the GP. However, the GP might not be allowed to view data that originated from the smartwatch.
This is where IAM comes in. In our example, we have several identities: patient, provider, GP, pharmacist, and the smartwatch or the tablet and the app itself that needs access to data. Who and what is allowed to view data, based on what role? When and where is access allowed, based on what conditions? This is only about the access, but we need an extra step: we must authenticate the identities – make sure that the identity is whoever or whatever they or it claim(s) to be.
This must be very fine-grained since we are organizing the healthcare to be dynamically scalable into micro-enterprises, changing networks and ecosystems, and microservices. All of this requires management with those end-to-end managed services. We don’t want the nurse or the patient to be bothered by things such as IAM and authentication; it simply must be arranged. We need services that take care of the entire process: from login up to the presentation of the requested data. We need services that manage the functioning of the app, the security of the databases, and the establishment of network connectivity.
One important aspect of granting access to identities with specific roles is trust. If we grant access to identities, we have to first authenticate the role they have, verify that the identity is whoever they claim to be, and trust that they have the appropriate access. Identities should only have access to data that they are eligible to see and use. This is important for a lot of reasons: compliance with laws and regulations to start with. In IT, we use the zero-trust model and use micro-segmentation to enforce proper access, authorization, and authentication.
The most important principle in zero trust is never trust, always verify. In IT, this is typically translated into an architecture that authorizes and authenticates an identity by default. A zero-trust architecture has a single source of user identities. Users and devices are authenticated against that source, including the context, such as compliance with policies and the state of devices. Policies include rules to access an application and data within that application.
An extra line of defense is micro-segmentation, allowing architects to logically divide segments where applications and data reside. This prevents identities – users and devices – from simply hopping from one segment in a network to another without strong authorization and authentication. The identities and roles provided grant the proper access, after verification. These should be common rules in defining roles and access policies in healthcare.
Nothing will happen in the health journey if there are no operations in the background enabling healthcare with technology. We already introduced our TEC teams. This is a term that is also used by CENELEC, the European standardization body, in the framework for service design and management and the development of management standards and shared values within and between the organizations engaged in the social alarm service chain.
CENELEC uses TECOM derived from eTOM from TM Forum. The entity in Figure 9.7 is a representation of their Open Digital Architecture (ODA), which can be explored in detail online at http://www.casewise.tmforum.org/evolve/statics/tmfmodel/index.html.
It’s a comprehensive operations framework including governance of, for instance, APIs used in the microservices. Again, for a common understanding, it suffices that the key principles are understood. So, what should this service look like? It’s these enabling operations that provide the support services so that care workers can concentrate on the health journey and not have to worry about the technology that is used. Technology is water from a tap; it needs to be there, and it needs to work. However, to make that happen, the operations on all supporting entities and the logistics must be executed in an orchestrated way, allowing care workers to execute sense and response in events during the health journey. In fact, we can apply OODA here too: observe whether services are working for the users, orient on the detected service disturbances and user stories, decide on what measures to take, and act upon them. The users will recognize this approach. As operations become more complex with each tread, we also foresee a development in the operations framework, such as starting with TECOM, evolving to eTOM, using Ops4Care where user stories are readily understood by Ops, and using DevOps4Care when automated DevOps is added where users can no-code their services.
This concludes the dive into the technology. It’s clear that it requires the skills of systems engineering and community building alike. In the next chapter, we will address this further by cross-walking the resulting integration and interoperability.
In Chapter 3, Unfolding the Complexity of Transformation, we first mentioned the terms interoperability and integration. Remember Figure 3.5 – Structuring governance in healthcare systems. Interoperability matters a lot to us. It’s even the foundation for the transformation. Think of it as the HeX being created around touchpoints and interaction in each journey, this implicitly means that interoperability enables these interactions. The interoperability we are talking about is that between the OODA activities. These activities are overarching organizations and teams.
Using the ERD of Figure 9.7, we can describe the enabling entities step by step from components via systems to System of Systems and explore two essential topics: the interoperability and data domains and enabling integration along the ERD relations.
Infrastructure must be interoperable from day one. This is the foundation. Systems need to be able to communicate with each other. Technologically, it means that systems must share protocols and interactive connections. But just interoperability of infrastructure doesn’t mean by default that systems can communicate. They need to understand each other and understand each other’s language. In terms of data, it means that we first have to connect to share data and next, make sure that systems can understand and work with this data when the data is transferred between systems.
In broad terms, we have three different levels of interoperability: the syntax in technology, including the structuring of data, the semantic interoperability, where the data has the same meaning in the different medical protocols, and the pragmatic level of everyday usage of data in practical decision-making.
This is a very simplified explanation of concepts such as Distributed Data System by Object Management Group (OMG DDS). This international standard addresses the real-time publish-subscribe communication for embedded systems by declaring a virtual global data space. In this space, applications can share information through data objects that are defined by an application-defined name called a topic and a key. In other words: DDS allows for real data integration. On top of this global space, DDS supports local object models.
In our case, the DDS domain is the health data space. These data spaces need governance, not only by standards such as OMG DDS but also regulations. One of these regulations is the European Health Data Space (EHDS).
Jeroen Tas, former chief of innovation and strategy at Philips and now a member of the board of directors of European cloud initiative Gaia-X, says about the EHDS: “We have enormous possibilities with data in the healthcare sector. We can eliminate overdue care, increase capacity, analyze patients, and gain more insight into diseases. But that process is difficult because parties are sometimes sitting on their own data. The market is fragmented. Files, processes, and market parties must be brought together in a secure manner, whereby privacy and identity access are guaranteed.”
Each data space has its regulations defining who is allowed to do what with data. It sounds simple but the legal complexity of it tends to create data silos and not data spaces due to privacy and security concerns. This inhibits innovation.
Each data space or subdomain has its own access rules about which authenticated identities have the authority to do something. The integration happens at the user or user class level. Each person should have a personal environment like they have on their smartphone. Each person has a personal set of apps and devices as systems of engagement. To enable this, we need a clear definition of the API and UI.
For our personal space, we can look at a concept that was put forward by internet pioneer Tim Berners-Lee, called SOLID, which stands for social linked data. In essence, SOLID is a development approach that fits the concept of Web 3.0, where users own and/or direct their personal assets such as data. The promise of SOLID is to decouple applications from the data, and it is built completely according to the microservices principles. With this concept, users have complete freedom in where their data is stored and who is allowed to access that data. It’s truly a personal data space.
SOLID makes information accessible through microservices. We can apply these principles for health data, using information standards as in the IHE and CIM, specifically ISO 13972:2022, an international standard meaning there are no restrictions when traveling abroad on the availability of data both in syntax and semantics. For the understanding we seek, it’s enough to know that the information in the ICF model can be defined with these standards. Although that’s difficult, focus should stay on the value and not the standard itself.
With the understanding of the entities, we can now address the relations themselves to understand integration. First, we define four relations between the providing entities:
Together, they form the health enterprise. Then, we have four relations between the providing and enabling entities:
These four relations are critical as a common understanding is required to lead to the contracts and specifications to develop, build, deliver, and maintain the enabling technology. Within, we have six relationships between entities of the enabling system of systems:
The last two are the value relations. Those are the touchpoints on the journeys and OODA loop excursions where the Moments of Truth take place:
These two relations of executing itself and the results from execution, bring everything together and form the touchstone of healthcare performance.
This completes all entities and relations in a structure that we will use later on. By following the relation arrows along the entities, for each actual real-life touchpoint, the following questions can be asked: who does what and why? Where and when? What rules should be followed? How can these questions can be explored with all stakeholders? The users can tell their stories along these structured relations and entities. The operators and developers understand these structured stories to plan the initial functionality and subsequent improved iterations based on the new stories from experience.
Now that we have discussed how to tell stories to each other, we should have a closer look at the governance of the community. That’s what the next section is about.
We have to set up governance, which has to follow the development of networked care from case management to directed care. Here, we will see what has to be set up for each type of networked care:
Note
For more details on the ACG by John Hopkins, we cordially refer you to https://www.hopkinsacg.org.
The following table provides an overview of the governance of the TEC platform:
Table 9.1 – Overview TEC platform governance
Governance is about community building and it is here where the panarchy principles apply. The speed of community building will set the order and pace, not the technology. Given the complexity, it will take time to build a common understanding and navigate the panarchy dynamics. It takes time to learn to tell clear stories to each other.
Note
A way to start governance and community building for a platform is using the Contract for the Web from, yet again, Tim Berners-Lee. A good exercise would be to adapt this yourself for healthcare. More information can be found at https://contractfortheweb.org.
In this chapter, we have learned that a common understanding of interoperability and integration can be achieved by using reference models to identify the relations to be used in stories to the operators and developers. We have addressed integration and interoperability as the two critical issues that we must solve in a complex ecosystem. That requires understanding the technology, as well as the interaction of multi-disciplinary teams that work together from a care perspective. It’s all part of TiSH and DevOps4Care, as we have shown in this chapter.
We also learned how to unbundle and rebundle organizations in TEC and supporting teams using OODA loops to establish networked care with ever more value, ultimately for the patient but clearly addressing the roles that all stakeholders have in networked and integrated care. We learned how to implement these care models in feasible and defined steps.
Lastly, we demonstrated how to arrange and grow the governance model to ensure operability. We explored several technology domains, such as AI, Internet of Things, and data, and for additional learning on these topics, we kindly refer to the titles in the Further reading section. In the next section, we will learn how to perform assessments using TiSH, as a starting point to grow maturity in healthcare transformation.
In this chapter, we mentioned a number of frameworks and initiatives. This section gives links to more information:
Case management |
Stepped care |
Integrated care |
Directed care | |
Value |
Reimbursement |
Health |
Lifestyle |
Participation |
Value board |
Insurance company / Purchasing department |
Collaboration steering group |
Cooperation committee |
Community representation |
Quality management |
Service levels and certification, direct cost |
Maturity assessment, TCO |
BSC, ROI |
Population ACG, economics |
Financing |
Per user |
Per use |
Shared savings |
Population management |
Operations |
TECOM (availability) |
eTOM (usability) |
Ops4Care (utility) |
DevOps4Care (revenue) |