Intelligent Alert Suppression

ABSTRACT

Methods, systems, and computer-readable media are provided for intelligent suppression of alerts. Alerts may be evaluated prior to presentation to determine whether to present the alert or suppress the alert to reduce alert fatigue. The evaluation includes analysis of the alert including specific alert parameters. Alert parameters include, but are not limited to, an age of the patient, one or more diagnoses of the patient, one or more problems of the patient, etc. Additional parameters that may be evaluated include an alert severity score, a threshold value, and an override rate. Alerts that qualify may be suppressed and the suppressed alerts may be provided as non-interruptive alerts (i.e., alerts that may be presented but do not require action in order to continue with a workflow).

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No. 16/453,238, filed Jun. 26, 2019, and entitled “INTELLIGENT ALERT SUPPRESSION,”, which is a continuation of U.S. application Ser. No. 16/019,080, filed Jun. 26, 2018 (issued as U.S. Pat. No. 10,388,413) and entitled “INTELLIGENT ALERT SUPPRESSION,” which is a continuation of U.S. application Ser. No. 15/131,231, filed Apr. 18, 2016 (issued as U.S. Pat. No. 10,037,411) and entitled “INTELLIGENT ALERT SUPPRESSION,” which claims a priority benefit under 35 U.S.C. § 119 to Indian Provisional Application No. 4318/DEL/2015, filed in India on Dec. 30, 2015 and entitled “INTELLIGENT ALERT SUPPRESSION,” the entirety of which is incorporated by reference herein.

BACKGROUND

The adoption of Computerized Physician/Provider Order Entry (CPOE) systems in healthcare environments has offered many benefits to healthcare and effectively presented serious medication errors. However, alert fatigue is an unintended consequence of implementing CPOE systems. Alert fatigue is caused by an excessive number of alerts/warnings about items (e.g., Drug-drug/Drug-Allergy interactions, contraindications, dosages, etc.). As a result, providers may pay less attention to or even ignore vital alerts, thus limiting these systems' effectiveness which impacts patient care and safety. There is no current solution to counter alert fatigue by controlling the frequency of alerts or suppressing the alerts for a given patient and condition without having a negative impact on patient care and safety.

SUMMARY

This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.

In brief and at a high level, this disclosure describes, among other things, methods, systems, and computer storage media for suppressing alerts. Alerts may be identified in a typical fashion (e.g., during use of a CPOE system) but are evaluated prior to presentation to determine whether to present the alert or suppress the alert. The evaluation includes analysis of the alert including specific alert parameters. Alert parameters include, but are not limited to, an age of the patient, a diagnosis of the patient, a problem of the patient, etc. Additional parameters that may be evaluated include an alert severity score, a threshold value, and an override rate. Alerts that qualify may be suppressed and the suppressed alerts may be provided as non-interruptive alerts (i.e., alerts that may be presented but do not require action in order to continue with a workflow).

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments are described in detail below with reference to the attached drawing figures, wherein:

FIG. 1 is a block diagram of an exemplary computing environment suitable to implement embodiments of the present invention;

FIG. 2 is a block diagram of an exemplary system for suppressing alerts suitable to implement embodiments of the present invention;

FIG. 3 is a flow diagram of an exemplary method of suppressing alerts in accordance with an embodiment of the present invention;

FIG. 4 is a flow diagram of an exemplary method of suppressing alerts in accordance with an embodiment of the present invention; and

FIG. 5 is a flow diagram of an exemplary method of suppressing alerts in accordance with an embodiment of the present invention.

DETAILED DESCRIPTION

The subject matter of the present invention is described with specificity herein to meet statutory requirements. However, the description itself is not intended to limit the scope of this patent. Rather, the inventors have contemplated that the claimed subject matter might also be embodied in other ways, to include different steps or combinations of steps similar to the ones described in this document, in conjunction with other present or future technologies. Moreover, although the terms “step” and/or “block” may be used herein to connote different elements of methods employed, the terms should not be interpreted as implying any particular order among or between various steps herein disclosed unless and except when the order of individual steps is explicitly described.

In brief and at a high level, this disclosure describes, among other things, methods, systems, and computer storage media for suppressing alerts. Alerts may be identified in a typical fashion (e.g., during use of a CPOE system) but are evaluated prior to presentation to determine whether to present the alert or suppress the alert. The evaluation includes analysis of the alert including specific alert parameters. Alert parameters include, but are not limited to, an age of the patient, a diagnosis of the patient, a problem of the patient, etc. Additional parameters that may be evaluated include an alert severity score, a threshold value, and an override rate. Alerts that qualify may be suppressed and the suppressed alerts may be provided as non-interruptive alerts (i.e., alerts that may be presented but do not require action in order to continue with a workflow).

The claimed solution is necessarily rooted in computerized healthcare technology in order to overcome a problem specifically arising in the realm of computer healthcare information networks, and the claims address the problem of evaluating alerts to intelligently determine whether to present or suppress the alert. If adhering to the routine, conventional function of providing alerts, providers will continue to be overwhelmed with every alert that is generated and, thus, will continue to ignore a vast majority of alerts. Some surveys indicate that providers ignore 90% of alerts as they dismiss the alerts as obvious, resulting in ignoring high severity alerts and thereby causing patient safety concerns. The claimed invention provides a way to intelligently suppress alerts without compromising patient care and safety. It is not desirable to suppress all alerts so the right balance must be struck to alert adequately to prioritize patient safety. The claimed invention overcomes the limitations of current computer healthcare technology and provides other benefits that will become clear to those skilled in the art from the foregoing description.

An exemplary computing environment suitable for use in implementing embodiments of the present invention is described below. FIG. 1 is an exemplary computing environment (e.g., medical-information computing-system environment) with which embodiments of the present invention may be implemented. The computing environment is illustrated and designated generally as reference numeral 100. The computing environment 100 is merely an example of one suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention. Neither should the computing environment 100 be interpreted as having any dependency or requirement relating to any single component or combination of components illustrated therein.

The present invention is a special computing system that can leverage well-known computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations that might be suitable for use with the present invention include personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above-mentioned systems or devices, and the like.

The present invention might be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Exemplary program modules comprise routines, programs, objects, components, and data structures that perform particular tasks or implement particular abstract data types. The present invention might be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules might be located in association with local and/or remote computer storage media (e.g., memory storage devices).

With continued reference to FIG. 1, the computing environment 100 comprises a computing device in the form of a control server 102. Exemplary components of the control server 102 comprise a processing unit, internal system memory, and a suitable system bus for coupling various system components, including data store 104, with the control server 102. The system bus might be any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, and a local bus, using any of a variety of bus architectures. Exemplary architectures comprise Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronic Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus, also known as Mezzanine bus.

The control server 102 typically includes therein, or has access to, a variety of non-transitory computer-readable media. Computer-readable media can be any available media that might be accessed by control server 102, and includes volatile and nonvolatile media, as well as, removable and nonremovable media. By way of example, and not limitation, computer-readable media may comprise computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by control server 102. Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media.

The control server 102 might operate in a computer network 106 using logical connections to one or more remote computers 108. Remote computers 108 might be located at a variety of locations in a medical or research environment, including clinical laboratories (e.g., molecular diagnostic laboratories), hospitals and other inpatient settings, veterinary environments, ambulatory settings, medical billing and financial offices, hospital administration settings, home healthcare environments, and clinicians' offices. Clinicians may comprise a treating physician or physicians; specialists such as surgeons, radiologists, cardiologists, and oncologists; emergency medical technicians; physicians' assistants; nurse practitioners; nurses; nurses' aides; pharmacists; dieticians; microbiologists; laboratory experts; laboratory technologists; genetic counselors; researchers; veterinarians; students; and the like. The remote computers 108 might also be physically located in nontraditional medical care environments so that the entire healthcare community might be capable of integration on the network. The remote computers 108 might be personal computers, servers, routers, network PCs, peer devices, other common network nodes, or the like and might comprise some or all of the elements described above in relation to the control server 102. The devices can be personal digital assistants or other like devices.

Computer networks 106 comprise local area networks (LANs) and/or wide area networks (WANs). Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and the Internet. When utilized in a WAN networking environment, the control server 102 might comprise a modem or other means for establishing communications over the WAN, such as the Internet. In a networking environment, program modules or portions thereof might be stored in association with the control server 102, the data store 104, or any of the remote computers 108. For example, various application programs may reside on the memory associated with any one or more of the remote computers 108. It will be appreciated by those of ordinary skill in the art that the network connections shown are exemplary and other means of establishing a communications link between the computers (e.g., control server 102 and remote computers 108) might be utilized.

In operation, an organization might enter commands and information into the control server 102 or convey the commands and information to the control server 102 via one or more of the remote computers 108 through input devices, such as a keyboard, a microphone (e.g., voice inputs), a touch screen, a pointing device (commonly referred to as a mouse), a trackball, or a touch pad. Other input devices comprise satellite dishes, scanners, or the like. Commands and information might also be sent directly from a remote healthcare device to the control server 102. In addition to a monitor, the control server 102 and/or remote computers 108 might comprise other peripheral output devices, such as speakers and a printer.

Although many other internal components of the control server 102 and the remote computers 108 are not shown, such components and their interconnection are well known. Accordingly, additional details concerning the internal construction of the control server 102 and the remote computers 108 are not further disclosed herein.

Turning now to FIG. 2, a block diagram 200 is illustrated, in accordance with an embodiment of the present invention, showing an exemplary system for suppressing alerts. It will be understood and appreciated that the computing system shown in FIG. 2 is merely an example of one suitable computing system environment and is not intended to suggest any limitation as to the scope of the user or functionality of embodiments of the present invention. Neither should the computing system be interpreted as having any dependency or requirement related to any single component or combination of components illustrated therein. Further, although the various block of FIG. 2 are shown with lines for the sake of clarity, in reality, delineating various components is not so clear, and metaphorically, the lines would more accurately be grey and fuzzy. In addition, any number of physical machines (such as computing devices or portions of computing devices shown in FIG. 1), virtual machines, data centers, endpoints, or combinations thereof may be employed to achieve the desired functionality within the scope of embodiments of the present invention.

The components of FIG. 2 are capable of communicating with a number of different entities or data sources such as a repository for alert responses (RAR) 203, an organizational preferences database 204, and an alert database 205 for the collection of data. This communication may utilize, without limitation, one or more local area networks (LANs) and/or wide area networks (WANs). Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and the Internet. Accordingly, the network 201 is not further described herein. As used throughout this application, the term “healthcare data” is meant to be broad and encompass any type of healthcare information. The healthcare data may be specific to a single patient or a group of patients. The healthcare data may also be directed to a clinician or group of clinicians. For example, healthcare data as it relates to a clinician may include patients that the clinician treats.

Returning now to FIG. 2, the exemplary system 200 includes a Computerized Provider Order Entry (CPOE) system 202, a repository of alert responses (RAR) 203, an organizational preferences database 204, an alert database 205, and an alert suppression engine (ASE) 206.

The CPOE system/device 202 may be any device configured as CPOE device. The CPOE device 202 is where providers input orders for patients. The CPOE device is where, in embodiments, alerts are originally generated. Alerts may be generated when a conflict is detected upon input of an order. However, utilizing the present invention, alerts are evaluated prior to presentation such that a determination whether to suppress the alert is made. When alerts are generated at the CPOE device 202, the alert is communicated to the ASE 206 along with patient contextual information such as a patient age, a patient diagnosis, and a patient problem. Additional information may also be communicated to the ASE 206 as discussed below. It is worth noting that while the CPOE device 202 and the ASE 206 are illustrated as separate components in FIG. 2, no such limitation is present in the invention as the ASE 206 may be, for instance, integrated into the CPOE device 202.

The RAR 203 is a knowledge base or collection of all past (historical) alert responses in the system 200. The RAR 203 may include previous alerts generated (presented and suppressed), frequency of particular alerts, how often the alert is overridden (i.e., override rate) by users, etc. Provided below is a sample of an exemplary RAR:

TABLE 1 Exemplary RAR records Alert Alert Override Patient Patient Patient Category Level Rate (%) Age Diagnosis Problems Contrain- High 75 A A12.345Z 449890002 dication Contrain- Medium 87 B A34.567P 272060000 dication Contrain- Low 96 C A56.789P 224960004 dication Drug-drug High 73 A A12.345Z 422627003 interaction Drug-drug Medium 82 C A34.567P 70944005 interaction Drug-drug Low 90 A A56.789E 282965002 interaction Dosage High 65 B A12.345Z 449890002 checking Dosage Medium 70 D A34.567P 224960004 checking Dosage Low 81 E A56.789E 70944005 checking

As shown in Table 1, each alert is associated with a category (e.g., contraindication, drug-drug interaction, etc.) and an alert level (e.g., high, medium, low, etc.). The alerts are also provided with patient contextual information such as age, diagnosis, and problems. The information may be extracted from a patient's electronic health record (EHR). The diagnosis and the problem may be stored as free text (e.g., a textual description of the diagnosis such as diabetes, superficial injury of the scalp, dislocation of the jaw, etc.) or it may be stored as a code (e.g., International Statistical Classification of Diseases and Related Health Problems (ICD) codes).

The organizational preferences database 204 may contain various preferences defined by an organization. Exemplary preferences include a threshold value/level for each category and level of alert. The system 200 may factor in a threshold value while suppressing the alerts. An exemplary organizational threshold level record is provided below in Table 2.

TABLE 2 Alert Category Alert Level Threshold Value (%) Contraindication High 100 Contraindication Medium 95 Contraindication Low 85 Drug-drug interaction High 90 Drug-drug interaction Medium 85 Drug-drug interaction Low 75 Dosage checking High 97 Dosage checking Medium 85 Dosage checking Low 80

The alert database 205 may be configured for, among other things, storing alert information. All alerts may be associated with an alert category. The organization of alerts and their associated categories may be stored in the alert database 205. Additionally, severity levels may be stored in the alert database 205 for corresponding alerts and alert categories. For example, a dosage check alert can have a severity level of high, medium, or low depending on the dosage that has been ordered.

The alert suppression engine (ASE) 206 may be configured for, among other things, determining when to suppress alerts. The ASE 206 may receive information from each of the above described data sources (i.e., the CPOE device 202, the RAR 203, the organizational preferences database 204, and the alert database 205). The ASE 206 may use any of the available information from the other components to arrive at patient-specific logic to suppress alerts for a given patient and condition. The main parameters utilized by the ASE 206 in the suppression determination include, but are not limited to, patient age, patient diagnoses, patient problems, alert severity scores, threshold values, and alert override rates. Each parameter may be assigned a weight, based on its impact on alerts. A sample worksheet is provided below in Table 3.

TABLE 3 Weights 10% 20% 15% 15% 15% 25% Patient Patient Patient Alert Threshold Override Age Diagnoses Problems Alert Alert Severity Value Rate Match Match Match Weighted Category Level Score (%) (%) (%) (%) (%) Average Contrain- High -3 3 100 75 0 25 50 0.49 dication Contrain- Med - 2 2 95 87 100 50 70 0.70 dication Contrain- Low - 1 1 85 96 100 30 60 0.65 dication Drug-drug High -3 3 90 73 0 40 50 0.50 interaction Drug-drug Med - 2 2 85 82 100 35 45 0.60 interaction Drug-drug Low - 1 1 75 90 0 56 75 0.60 interaction Dosage High -3 3 97 65 100 65 80 0.70 checking Dosage Med80 - 2 2 85 70 100 25 40 0.54 checking Dosage Low - 1 1 80 81 0 50 30 0.48 checking

In application, the ASE 206 is invoked whenever there is a conflict in clinical checking while inputting an order (e.g., a test, a medication, etc.) through the CPOE 202 system. An exemplary embodiment is illustrated in FIG. 3 providing an exemplary method 300 for suppressing alerts. Initially, a determination that a conflict exists must be determined at block 301. If no conflict exists at step 302, the method stops at block 303. If a conflict is determined to exist at step 304, the information is communicated to the ASE 206 at block 305. The information communicated may include patient context information such as patient age, patient diagnoses, patient problems, and the like.

The ASE 206 then identifies the type of conflict at block 306. Types of conflicts include a category of alert/conflict, a severity associated with the category, and the like. Historical information is also accessed at block 307 from the RAR. The historical information accessed may be limited to information relevant to the patient context. For instance, if the alert is for a contraindication, only that category may be identified in the RAR. There is no need to evaluate all historical information in the RAR. Rather, patient context/parameters may be used to filter the records in the RAR. Once the information is accessed, records that are either a partial match or an exact match are identified at block 308. An exact match, as used herein, refers generally to a record that includes at least one item that exactly matches a patient parameter (e.g., a record for an alert of a patient that is 38 years old with a contraindication for Drug X matches an alert generated for a 38 year old for a contraindication for Drug X). Records that match exactly may be assigned values as shown below:

-   -   Patient Age—100% (for exact matches found)     -   Patient Diagnoses—100% (for exact matches found)     -   Patient Problems—100% (for exact matches found)

A partial match, as used herein, refers generally to a record that includes information that partially matches that of the patient context information. Exemplary values are shown below:

-   -   Patient Age—0%     -   Patient Diagnoses—50% (based on number of matching diagnoses in         patient context)     -   Patient Problems—25% (based on number of matching problems in         patient context)

The above described values are assigned to patient parameters at block 309 along with a severity level score. Each alert is associated with a severity level score (e.g., High—3, Medium—2, Low—1, etc.). That score is assigned at block 309. The ASE 206 may retrieve an override rate and a threshold value at block 310. The override rate indicates a history of overrides for a particular alert and the threshold value indicates an organizations preference for a threshold with which to measure when to suppress alerts and when to present alerts. The ASE 206 then calculates weight values at block 311. The weight values may be based on the percentages assigned to each parameter. The ASE 206 may use the calculated weight values and the threshold value to determine whether to suppress the alert. A decision block 312 indicates a decision of whether the weight value is greater than a threshold value is made. For instance, an organization preference (threshold value) may indicates that alerts are to be suppressed when a weight value is greater than 0.85. If the weight value is not greater than the threshold value at decision step 313, the alert is provided at block 314 as an un-suppressed alert (interruptive alert). Interruptive alerts are provided to users and block current actions until a response is received. A user needs to respond to an interruptive alert in order to continue with workflow. Users can either accept or reject the alert based on the context of treatment. The user responses may be communicated to the RAR for future analysis.

If it is determined at step 315 that the weight value is greater than the threshold value then the alert is suppressed at block 316. Suppressed alerts are non-interruptive alerts meaning that they do not block a user's actions or require a response in order to proceed with a workflow. The suppressed alert may be communicated to the RAR for future analysis at block 317. The suppressed alert is also available to the system 200 as a non-interruptive alert with no action required from the user for informational or regulatory purposes.

As is evidenced herein, the system 200 suppresses alerts based on patient context rather than suppressing based on generic manner override logic which does not take care of alerts specific to a patient. In other words, the system 200 intelligently suppresses alerts on a per-patient basis based on patient parameters. The intelligent suppression will reduce alert fatigue among providers and unnecessary workflow interruptions caused due to non-priority alerts.

Turning now to FIG. 4, a flow diagram illustrating an exemplary method 400 is provided. Initially, at block 410, two or more alert parameters associated with an alert are received. The alert parameters may include a patient age, patient diagnoses, or a patient problem. At block 420, each of the two or more alert parameters is associated with a weight value. At block 430, the alert is suppressed when the weight value is greater than a threshold value for the alert.

Turning now to FIG. 5, a flow diagram illustrating an exemplary method 500 is provided. Initially, at block 502, two or more alert parameters for an alert are received. The alert parameters may include a patient age, one or more patient diagnoses, or one or more patient problems. At block 504, an alert category for the alert is identified. At block 506, an override rate for the alert category is identified. At block 508, a severity level for the alert is identified. At block 510, a severity score associated with the severity level is identified. At block 512, a determination is made whether the alert matches at least one historical alert record. At block 514, matching values are assigned to each of the two or more parameters based on the determination whether the alert matches at least one historical alert record. At block 516, a weight value is calculated. At block 518, the alert is suppressed when the weight value is greater than a threshold value such that the alert is provided as a suppressed alert.

Many different arrangements of the various components depicted, as well as components not shown, are possible without departing from the spirit and scope of the present invention. Embodiments of the present invention have been described with the intent to be illustrative rather than restrictive. Alternative embodiments will become apparent to those skilled in the art that do not depart from its scope. A skilled artisan may develop alternative means of implementing the aforementioned improvements without departing from the scope of the present invention.

It will be understood that certain features and subcombinations are of utility and may be employed without reference to other features and subcombinations and are contemplated within the scope of the claims. Not all steps listed in the various figures need be carried out in the specific order described. Accordingly, the scope of the invention is intended to be limited only by the following claims. 

What is claimed is:
 1. A system for suppressing alerts, the system comprising: one or more processors of an alert suppression engine; and one or more computer storage media storing computer-executable instructions that, when executed by the one or more processors of the alert suppression engine, implement a method comprising: upon a conflict being identified while inputting an order, receiving two or more alert parameters associated with an alert, wherein alert parameters include a patient age and one or more of a patient diagnoses or a patient problem; associating each of the two or more alert parameters with a weight value; identifying an alert category for the alert; identifying a severity level for the alert; and suppressing the alert when the weight value is greater than a threshold value for the alert.
 2. The system of claim 1, wherein the order is input into a computerized physician order entry (CPOE) system.
 3. The system of claim 1, wherein the method further comprises not suppressing the alert when the weight value is less than the threshold value for the alert.
 4. The system of claim 1, wherein the method further comprises identifying an override rate for the alert.
 5. The system of claim 1, wherein the method further comprises communicating the alert and details regarding the suppression to a database.
 6. The system of claim 1, wherein the method further comprises providing the alert as a non-interruptive alert.
 9. A computerized method carried out by an alert suppression engine having at least one processor for suppressing alerts, the method comprising: upon a conflict being identified while inputting an order, receiving two or more alert parameters associated with an alert, wherein the two or more alert parameters include one or more of a patient age, a patient diagnoses, or a patient problem; associating each of the two or more alert parameters with a weight value; identifying an alert category for the alert; and suppressing the alert when the weight value is greater than a threshold value for the alert.
 10. The method of claim 9, wherein the order is input into a computerized physician order entry (CPOE) system.
 11. The method of claim 10, wherein the conflict is identified at the CPOE system.
 12. The method of claim 9, further comprising not suppressing the alert when the weight value is less than the threshold value for the alert.
 13. The method of claim 9, further comprising identifying an override rate for the alert.
 14. The method of claim 9, further comprising providing the alert as a non-interruptive alert.
 15. A system for suppressing alerts, the system comprising: a computerized physician order entry system for: receiving input of one or more clinical orders; and based on the input of the one or more clinical orders, identifying a conflict; one or more processors of an alert suppression engine; and one or more computer storage media storing computer-executable instructions that, when executed by the one or more processors of the alert suppression engine, implement a method comprising: upon the conflict being identified, receiving two or more alert parameters associated with an alert, wherein alert parameters include a patient age and one or more of a patient diagnoses or a patient problem; associating each of the two or more alert parameters with a weight value; identifying an alert category for the alert; identifying a severity level for the alert; and suppressing the alert when the weight value is greater than a threshold value for the alert.
 16. The system of claim 15, wherein the method further comprises not suppressing the alert when the weight value is less than the threshold value for the alert.
 17. The system of claim 16, wherein the method further comprises providing the alert as an interruptive alert.
 18. The system of claim 15, wherein the method further comprises providing the alert that was suppressed to a database for analysis.
 19. The system of claim 15, wherein the method further comprises providing the alert that was suppressed as a non-interruptive alert. 