W16 Data Mining Workshop



Similar documents
INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO:

Topics. Database Essential Concepts. What s s a Good Database System? Using Database Software. Using Database Software. Types of Database Programs

Thank you for using AD Bulk Export 4!

Top 10 Oracle SQL Developer Tips and Tricks

Office of the Registrar. Introduction to PeopleSoft Reporting Tools Query

Relational Databases for the Business Analyst

Audit TM. The Security Auditing Component of. Out-of-the-Box

Ad Hoc Reporting: Data Export

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

User Guide. Trade Finance Global. Reports Centre. October nordea.com/cm OR tradefinance Name of document 8/8 2015/V1

Module 9 Ad Hoc Queries

From Database to your Desktop: How to almost completely automate reports in SAS, with the power of Proc SQL

Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples

Using Delphi Data with Excel and Access

2015, André Melancia (Andy.PT) 1

Oracle Database 10g Express

Bulk Downloader. Call Recording: Bulk Downloader

HALOGEN. Technical Design Specification. Version 2.0

McAfee Database Activity Monitoring 5.0.0

INFO Koffka Khan. Tutorial 6

INTRODUCTION TO MICROSOFT ACCESS Tables, Queries, Forms & Reports

Data Sheet: Work Examiner Professional and Standard

GEHC IT Solutions. Centricity Practice Solution. Centricity Analytics 3.0

ElegantJ BI. White Paper. The Enterprise Option Reporting Tools vs. Business Intelligence

User Guide. Analytics Desktop Document Number:

Foundations of Business Intelligence: Databases and Information Management

Quick Introduction System Requirements Main features Getting Started Connecting to Active Directory... 4

Oracle BI Extended Edition (OBIEE) Tips and Techniques: Part 1

ElegantJ BI. White Paper. Considering the Alternatives Business Intelligence Solutions vs. Spreadsheets

NETWRIX EVENT LOG MANAGER

Foundations of Business Intelligence: Databases and Information Management

<Insert Picture Here> Oracle BI Standard Edition One The Right BI Foundation for the Emerging Enterprise

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

Fairsail. Implementer. Fairsail to Active Directory Synchronization. Version 1.0 FS-PS-FSAD-IG R001.00

Human Resources (HR) Query Basics

SPI Backup via Remote Terminal

Toad for Data Analysts, Tips n Tricks

Important Tips when using Ad Hoc

Chapter 24: Creating Reports and Extracting Data

Using ELM Reports in WhatsUp Gold. This guide provides information about configuring ELM reports in WhatsUp Gold v15.0

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, Integration Guide IBM

Standard Visualize and Manage Organizational Information and Structure

Stored Documents and the FileCabinet

ActiveXperts Network Monitor. White Paper

Seamless Web Data Entry for SAS Applications D.J. Penix, Pinnacle Solutions, Indianapolis, IN

Technology Foundations. Conan C. Albrecht, Ph.D.

AD Phonebook 2.2. Installation and configuration. Dovestones Software

Connect to MySQL or Microsoft SQL Server using R

Manual Password Depot Server 8

Port and Container Terminal Analytics

Publishing Reports in Tableau

Enterprise Security CPA for IBM MF

Together we can build something great

Events Forensic Tools for Microsoft Windows

Enforcive / Enterprise Security

Data Archiving - Solutions, Challenges, Considerations & 3rd Party Tools. Putting Customer First

Pro/INTRALINK Curriculum Guide

Active Directory Authentication Integration

Admin Report Kit for Active Directory

FACILITIES INVENTORY MANAGEMENT SYSTEM:

5.5 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall. Figure 5-2

Prognoz Payment System Data Analysis. Description of the solution

Foundations of Business Intelligence: Databases and Information Management

EZManage SQL Pro. Quick guide for installation and implementation

XML Export Interface. IPS Light. 2 April Contact

InfiniteInsight 6.5 sp4

NetWrix File Server Change Reporter. Quick Start Guide

Advanced BIAR Participant Guide

LearnFromGuru Polish your knowledge

Novell Identity Manager

Microsoft Access 2010 Advanced Queries

UNIVERSE DESIGN BEST PRACTICES. Roxanne Pittman, InfoSol May 8, 2014

FileMaker Security Guide The Key to Securing Your Apps

Welcome to EMP Monitor (Employee monitoring system):

EMC Smarts Network Configuration Manager

Jet Data Manager 2012 User Guide

Password Management Guide

CONNX and Microsoft.NET

Reporting User Guide. Version Oct 2011 Page 1 of 65

Exploring Microsoft Office Access Chapter 2: Relational Databases and Multi-Table Queries

How To Load Data Into An Org Database Cloud Service - Multitenant Edition

Using SAS Enterprise Business Intelligence to Automate a Manual Process: A Case Study Erik S. Larsen, Independent Consultant, Charleston, SC

Stellar Phoenix. SQL Database Repair 6.0. Installation Guide

Policy Guide Access Manager 3.1 SP5 January 2013

Netwrix Auditor for SQL Server

MOC Administering Microsoft SQL Server 2014 Databases

1 2DB Introduction

Microsoft SQL Server 2005 Reporting Services Step by Step

FORMS. Electronic management system of document flows and optimization of organizational processes

Foreword. 1 How to Login to Your Account 2 Activate Key. Remote Support Remote Access. Web Conference 4 Hosted Service. How to Write Filters

Creating and Using Databases with Microsoft Access

Transcription:

W16 Data Mining Workshop Brantley Synco, Director, Internal Audit and Compliance, Baptist Health System Jim Donaldson, Director of Compliance/Privacy and Security Officer, Baptist Health Care Corporation Agenda Introduction and Overview Databases Primer Scope and Parameters Seven Steps for Data Extraction Data Analysis and Application Data Sources and Manipulation Tools Question Period 1

Introduction and Overview Session will show how to combine data from multiple sources into one report Presentation is aimed toward compliance professionals, NOT IT SPECIALIST Techniques can be applied to multiple extractions and analyses. At then of this section of the workshop, participants will be equipped to import data, join tables, and create simple reports. Database Primer What is a database? A comprehensive collection of related data organized for convenient access, generally in a computer. Dictionary.com 2

Database Primer related data Database Primer Poor Database Design 3

Database Primer Poor Database Design (Result) EVENT National ID Last Nam e First Name Address City State Zip HIRE SSN1 LN1 FN1 ADD1 CITY1 ST1 ZIP1 MAR SSN1 LN2 FN1 ADD2 CITY2 ST1 ZIP2 CHG SSN1 LN2 FN1 ADD3 CITY3 ST1 ZIP3 DIV SSN1 LN1 FN1 ADD4 CITY4 ST1 ZIP4 MAR SSN1 LN3 FN2 ADD5 CITY5 ST1 ZIP5 Database Primer Data Normalization is the process of dividing datasets to reduce dependency and duplication. 4

Scope and Parameters Deliverable: OIG monitoring reports Employees Physicians Application: MS Access Source Files: OIG exclusion database Employee File (from HR) Doctor Master file (from credentialing) Step 1: Get your head on straight Must have the confidence you can acquire and use the data 5

Step 1: Get your head on straight 1. "It's not held in only one table. 2. "It's a large and complicated database with about 142 million tables. 3. "You will have to get the OK from the database owner before I give you that." Step 1: Get your head on straight 4. "Bill Lumburger asked for this same data last week for his new TPS report. Have you ask him for it? 5. "I don't know if we can pull data out of that database." 6

Step 1: Get your head on straight 6. "No problem! We can write a SQL script to pull the data you need. Then we can set up an ODBC connection to transport the data. We can drop the data into Oracle, SQL Server, or DB2 format and then you can extract it out into XLS, CSV, XML, or HTML. All I need is your DBMS license and the network location of your server. Just call me back when you have those and I'll get right on it." Step 2: Start at the End What do you want to know? "Do we have any employees or doctors who are excluded from participation by the OIG" 7

Step 2: Start at the End What do you want the report show? All parties and OIG status? Employees separate from doctors? Only employees with possible matches? Step 2: Start at the End What data do you want to show? Provider Data Employee Name Employee Address Employee DOB Physician UPIN OIG Data OIG Name OIG Address OIG DOB 8

Step 2: Start at the End How do you want the data grouped, ordered, or sorted? Source OIG Provider Similarity By Name By Address Step 2: Start at the End Ordered by Similar Employee OIG Name Name Employee OIG Address Address Employee DOB OIG DOB Smith Smith 123 Maple 123 Oak 3/3/68 3/3/68 Ordered by Source Employee Employee Employee OIG Name Address DOB Name OIG Address OIG DOB Smith 123 Maple 3/3/68 Smith 123 Oak 3/3/68 9

Step Three: Locate the data "Where is the information I need? We determined: Exclusions are in the OIG exclusion database. http://oig.hhs.gov/exclusions/exclusions_list.asp HR has the employee details Credentialing has a list of all active physicians. Step Four: Reach out to IT Specialist "Who can I call who would know where I can get this information?" What format is the data? "Who is the database administrator or IT employee that supports these databases and applications? 10

Step Four: Reach out to IT Specialist We determine the following: OIG Database is available from the OIG is a.dbf format. HR uses PeopleSoft built on a DB2 database. Credentialing uses a commercially available system that regularly exports data to the EMR. Step Five: Design Extract Determine what elements are needed. Names Addresses UPINs Limit size of extract Date Active/Inactive records Other element 11

Step Six: Turn Data into Information Import Data Modify data Create Joins Export Data Import Data 12

Import Data Other data types: Import Data Import OIG Data Short cut: Access will open.dbf format 13

Import Data Import Data Data in design view 14

Import Data Open Query Wizard Open Query in design view Data Import 15

Data Import Modify Data 16

Datasheet View Modify Data Design View Modify Data 17

Modify Data Modify Table Changes to Employee table: Upper for First Name (v_first_name) Upper for Last Name (v_last_name_ First 5 characters of Zip code (v_postal 18

Create Joins/Relationships Create Joins/Relationships 19

Create Joins/Relationships Create Joins/Relationships 20

Export Data Step Seven: Don't Re Invent The Wheel By using linked tables, you can update the tables and use the same queries. Follow these steps: Open Linked Table Manager Update all tables Execute the make table queries Open the matched queries. 21

Step Seven: Don't Re Invent The Wheel Comments 1. The actions we performed can be used across almost any data. 2. Practice. You can t break anything. 3. Remember you CAN do this. 22

Data Sources to Consider and Monitoring Tools Disclaimer You will see screen shots from specific information systems used at Baptist Health Care Corporation We are making no express or implied recommendation for these systems or the companies that offer them. 23

Some Data Sources to Consider Network Logs Time and Attendance Logs Instant Messaging Internet Logs Clinical System Logs Emails Real Time Archived Door/Access Controllers Video Surveillance Electronic Payment System Logs Enterprise Data Warehouse Before Using a Source, Consider Your Organizations Culture What expectation of privacy do your employees have? What degree of monitoring will your leadership allow? Are you a union shop? Are you a governmental organization? If you find something bad will the C suite act on it? 24

E mail Logs E mail Logs 25

E mail Logs E mail Automatic Compliance Monitoring 26

E mail Automatic Compliance Monitoring E mail Automatic Compliance Monitoring 27

E mail Automatic Compliance Monitoring E mail Automatic Compliance Monitoring 28

E mail Automatic Compliance Monitoring Instant Message Chat Logs 29

Instant Message Chat Logs Internet Logs 30

Internet Logs Internet Logs Exported 31

Internet Logs Exported and Filtered Network Logs LDAP Example 32

Network Logs LDAP Example Consolidated System Monitoring Helps find the needle in the haystack Collects data from various audit sources Normalizes the data Predefined or ad hoc reports Email alerts 33

Direct System Monitoring Placing software on a computer that will record data for analytics on all activity. Agent secretly loaded on target PC Very invasive Records every keystroke and screen shot Allows playback much like a DVR Useful when you have good reason to believe you will find evidence of adverse activities 34

Direct System Monitoring QUESTIONS? Brantley Synco, Director, Internal Audit and Compliance, Baptist Health System 205 715 5475 / brantley.synco@bhsala.com Jim Donaldson, Director of Compliance/Privacy and Security Officer, Baptist Health Care Corporation 850 469 7773 / jdonaldson@bhcpns.org 35