Others titles

  • FHIR Risk Assessment Resource
  • Electronic Health Records Exchange Through FHIR


  • FHIR
  • HL7
  • Medical Terminology
  • Processes Data
  • Processes Information
  • Processes Documentation
  • Health Information Exchange
  • Electronic Health Records
  • FHIR Smart
  • Smart on FHIR

Risk Assessment

Risk assessments are a specialized type of observation. A specialized resource is used to provide a simpler mechanism to capture of a series of risks and to associate those risks with time-ranges, probabilities, etc. An assessment of the likely outcome(s) for a patient or other subject as well as the likelihood of each outcome.

Log in to download

Get The Data

  • The data in CSV format DOWNLOAD
  • Metadata in Human Readable format (PDF) DOWNLOAD
  • Metadata in Machine Readable format (JSON) DOWNLOAD
Your Data License
  • Research
    Non-Commercial, Share-Alike, Attribution Free Forever
  • Commercial
    Commercial Use, Remix & Adapt, White Label Buy Subscription


All risk assertions are captured at one time based on a single set of source inputs. Capture of a single risk MAY be done using the Observation class, particularly in circumstances where it’s treated as a generic observation, but for consistency, all risk assessments and prognosis should be captured using Risk Assessment.

This resource captures predicted outcomes for a patient or population on the basis of source information. Examples include:

– A prognosis statement for a particular condition
– Risk of health outcome (heart attack, particular type of cancer) on the basis of lifestyle factors and/or family history
– List of potential health risks based on a patient’s genetic analysis
– A prediction of outbreak infection rates within a geography based on immunization rates
– This resource can be used to represent the results of formal scoring/decision support tools that evaluate risk. It can also be used to capture a practitioner’s subjective assessment of the patient’s risk based on existing knowledge and previous experience.

Risk assessments may be based on a variety of factors, including:

– Basic demographic information from the Patient or Group resources
– Various Observations including vital signs, lab information, assessments, genetic information, etc.
– FamilyMemberHistory
– Current, past and proposed therapies Immunization, Procedure, CarePlan, etc.

Risk Assessments can be determined manually by health-care providers based on their professional expertise, by using an algorithmic scoring system or through a combination. Risk assessments can also be computed by decision support systems. Operation Definitions may be defined by servers to generate risk assessments based on particular combinations of source resources or other inputs.

About this Dataset

Data Info

Date Created


Last Modified




Update Frequency


Temporal Coverage


Spatial Coverage

United States


John Snow Labs; Health Level Seven International;

Source License URL

Source License Requirements


Source Citation



FHIR, HL7, Medical Terminology, Processes Data, Processes Information, Processes Documentation, Health Information Exchange, Electronic Health Records, FHIR Smart, Smart on FHIR

Other Titles

FHIR Risk Assessment Resource, Electronic Health Records Exchange Through FHIR

Data Fields

Name Description Type Constraints
Concept_NameName of the concept in the FHIR structurestringrequired : 1
Computer_Ready_NameA Computer-ready name (e.g. a token) that identifies the structure - suitable for code generation. Note that this name (and other names relevant for code generation, including element & slice names, codes etc) may collide with reserved words in the relevant target language, and code generators will need to handle this.string-
TypeThe type the structure describes.string-
Dollar_RefThe "$ref" string value contains a Uniform Resource Identifier (URI) which identifies the location of the JSON value being referenced.string-
DescriptionA free text natural language description of the structure and its usestring-
ItemsThe value of the keyword should be an object or an array of objects. If the keyword value is an object, then for the data array to be valid each item of the array should be valid according to the schema in this value.string-
RequiredThe value of the keyword should be an array of unique strings. The data object to be valid should contain all properties with names equal to the elements in the keyword value.string-
ConstThe value of this keyword can be anything. The data is valid if it is deeply equal to the value of the keyword.string-

Data Preview

Concept NameComputer Ready NameTypeDollar RefDescriptionItemsRequiredConst
RiskAssessmentresourceTypeThis is a RiskAssessment resourceRiskAssessment
RiskAssessmentid#/definitions/idThe logical id of the resource as used in the URL for the resource. Once assigned this value never changes.
RiskAssessmentmeta#/definitions/MetaThe metadata about the resource. This is content that is maintained by the infrastructure. Changes to the content might not always be associated with version changes to the resource.
RiskAssessmentimplicitRules#/definitions/uriA reference to a set of rules that were followed when the resource was constructed and which must be understood when processing the content. Often this is a reference to an implementation guide that defines the special rules along with other profiles etc.
RiskAssessment_implicitRules#/definitions/ElementExtensions for implicitRules
RiskAssessmentlanguage#/definitions/codeThe base language in which the resource is written.
RiskAssessment_language#/definitions/ElementExtensions for language
RiskAssessmenttext#/definitions/NarrativeA human-readable narrative that contains a summary of the resource and can be used to represent the content of the resource to a human. The narrative need not encode all the structured data but is required to contain sufficient detail to make it "clinically safe" for a human to just read the narrative. Resource definitions may define what content should be represented in the narrative to ensure clinical safety.
RiskAssessmentcontainedarrayThese resources do not have an independent existence apart from the resource that contains them - they cannot be identified independently and nor can they have their own independent transaction scope.{'$ref': '#/definitions/ResourceList'}
RiskAssessmentextensionarrayMay be used to represent additional information that is not part of the basic definition of the resource. To make the use of extensions safe and manageable there is a strict set of governance applied to the definition and use of extensions. Though any implementer can define an extension there is a set of requirements that SHALL be met as part of the definition of the extension.{'$ref': '#/definitions/Extension'}