Technologies, systems, and applications needed to achieve optimal clinical

Evaluate various technologies, systems, and applications needed to achieve optimal clinical and business performance outcomes.

Scenario
A director within a large integrated health network has expressed interest for a mHealth solution for her community-based patient population. She wants to ensure this solution could integrate with other health systems in the network. Her team wants to collect blood pressure data for newly diagnosed hypertensive patients requiring daily monitoring. A mHealth solution could reduce resource costs for the number of face-to-face visits required by nurses and improve patient outcomes with continuous monitoring. As a new intern at this health network, investigate one mHealth solution that could meet the director’s needs. Use the module readings, lectures and your own research to select the solution and provide support for the analysis. The director requests your results in the form of a SWOT analysis with discussion on how it will achieve improved clinical and business performance outcomes.

Create a SWOT Analysis that includes:
Description of a selected mHealth solution including why it was chosen for this patient population
SWOT Analysis Model that bullets the items to be included in the subsequent analysis and discussions
Discussion of the outcome analysis of the strengths and opportunities for having this type of clinical data collected from a patient in the community
Discussion of the outcomes analysis of the threats/weaknesses on integrating community-based data into large integrated health network systems (e.g., clinical, financial, administrative)
Reference page of resources utilized

The design and implementation of applications, databases, systems, network infrastructure, and information processing

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Systems,” “Managing Information Security Risk,”

 

 

 

Conduct a full risk assessment against the same corporate profile selected earlier. Based on the information obtained from previous assignments, provide a synopsis on how to manage identified risks, and describe the tools and strategies that will ensure network security.

 

 

Prerequisite: Using a vulnerability scanner obtained for the previous assignment, conduct a full scan against all servers in the domain. (This information will be used in Part 3 of the assignment.)
Use the following guidelines to create a four to five-page report.
Part 1: Prepare for Risk Management (“Establish a Framework for Managing Risk”)
1. List the corporate requirements (i.e., standards, laws) associated with the company. Briefly explain the impact of non-compliance.
2. Develop categories and a classification method for company information systems. List at least eight categories for various people, processes, hardware, software, and data applicable to the company. Describe the data/system classification scheme as well as the reasons for selecting it.
Part 2: Identify Risk (“Where is the Risk to My Information Assets”)
1. List a minimum of 20 assets (data, systems, people, processes, etc.) and measure their value to the company (Low, Moderate, High, Critical) in a simple table.
2. In one column, identify assets that can impact company compliance, customer satisfaction, competitive advantage, or business productivity (i.e., Business Impact Analysis).
Part 3: Assess Risk (“How Severe is the Risk to My Information Assets”)
1. Identify, measure (quantitative and qualitative), and mitigate key information technology risks. In addition, describe each of the tasks associated with risk framing, assessment, response and monitoring. Refer to risk models (e.g., “Managing Information Security Risk”).
2. Select the optimal risk assessment methodology based on corporate needs. Compare the advantages/disadvantages of your selected risk assessment methodology to others used in the industry.
3. Provide a diagram of the matrix that was used to assess risk.
4. Define for each asset the potential threats, the likelihood the threat will occur or be successful, and the impact loss the asset will have on the company (Risk Mitigation Economics). Note: This includes disasters, loss of power, employee resignations, system malfunctions, drop-in customers, etc.
5. Using the vulnerability scan, list in a table a minimum of 15 identified threats (open vulnerabilities) to the information systems, the impact of the exploited vulnerability, and remediation steps (countermeasures) to remove or reduce either impact or likelihood from threat.
Part 4: Define Risk Appetite (“How Much Risk is Acceptable to My Organization”)
1. Review the characteristics of a risk appetite within Chapter 6 of the course text.
2. Establish a Risk Appetite Statement for the company.
3. Define the Risk Tolerance of the company.
Part 5: Control Risk

SYSTEMS

 

 

Extreme weather is becoming more common due to climate change.
a.) Climate change is predicted to lead to a warmer and wetter New England. How might these conditions be measured in terms of more extreme weather? In other words, how could these conditions be dangerous for humans and/or ecosystems? (4 points)
b.) If warmer weather leads to earlier melting of snow in the Sierra Mountains in California, what might this mean for water supplies in Los Angeles? Please explain. (3 points)
c.) Phenology refers to the seasonal timing of plant and animal life. While we might not know the exact dates, do you expect the following phenomena to get earlier in the year, later in the year, or about same time of year over the next 20 years: 1) date of leaf out-first sign of leaves on maple trees in New England, 2) peak fall foliage in New England-when maple leaves turn color, 3) spring arrival of the warbler (a small songbird) in New England. (3 points)

SYSTEMS

 

 

 

 

 

You work on the IT team at a local college. You are currently on an Information Systems (IS) project that is enhancing the registration system. You have a student intern who is inexperienced and untrained. The intern has only taken one information systems course. Your team lead has asked you to prepare a report about the project. In a 4–5-page report, complete the following:

Locate information about several computer-aided software engineering (CASE) tools on the Web (note that you will also find helpful readings in Chapter 13 of your text).
What features do the tools offer that could be beneficial to use in the development of your project?
How do you think using them can reduce cycle time and increase quality?
What are some difficulties that you think the intern might have in trying to develop the information system?
What basic controls should be included in that system to ensure that students are enrolled in the classes they request?
What security should be included in the system to prevent inappropriate use of it?
Make sure your paper is written in the APA style, with a cover page and references page, neither of which count towards the page length requirement. Support your opinion and any arguments you make with sources. Although you are expressing your opinion, it is also a critical business communication. You are to write in the third person and use an academic tone, avoiding casual embellishment or emotional appeal.