Discuss about the IT Implementation in Healthcare.
Silver Chain Group provides community health services to the people and operates in four different regions of Australia as Queensland, New South Wales, Western and Southern Australia. Being in the country for over 100 years, it is a non-profit organization that has a marked reputation and quality services all over (Silverchain.org.au, 2016). The range of services that are provided by this group is huge and some of the examples are Wellness services, health care and maintenance services, counseling and advisory services, support and care, assessment services and personal alarms.
On a per year basis, the group covers more than 87,000 people for providing of the services and care and the same is executed with the help of over 3000 staff members and approximately 400 volunteers. Paper-based records were used to maintain the client information which made it difficult to access and also resulted in frequent loss and misplacements. The management and storage of the same also emerged as the big concern for the organization. It was getting troublesome for the staff members to gather data around their respective clients and resulted in decrease of productivity and efficiency as well.
It was extremely required to improve the customer satisfaction and also enable the various entities to provide a medium to easily communicate with each other (LeMay, 2014).
Importance of IT for business survival
Following are the factors and reasons which mark the importance of IT for the group.
It is the task which includes data collection for various sources and is made easy by the help of IT.
Creation of project plans, project schedule, budget plan and various other planning diagrams is a simple task through IT tools and software.
It is necessary to adhere to the defined protocols and norms. IT makes it possible to follow the best practices and guidelines that have been suggested.
It is next to impossible to monitor each and every staff member and the activity going around through manual means. IT helps in the frequent performance and progress checks.
Silver Chain Group took the aid of an enterprise level solution and also launched a mobile application for reaching out to a larger number of people and also to provide quality services to them. Android was the operating system that was selected for the development of the app and the same was customized for many different mobile devices such as Samsung Galaxy S2, S3, S4, Note and Note II smartphones, and Samsung Galaxy Note 8, 10.1 and Tab 10.1 tablet devices to direct care staff and clients (delimiter, 2016).
1. Planning
This is the initial phase which includes the necessary planning to be done around the scope of the project, goals and objectives, assumptions, entry and exit criteria and likewise.
2. Requirement Analysis
There are a number of different Stakeholders that are involved with the Silver Chain Group such as investors, customers, partners, owners and many more. This phase discusses the project with all the essential stakeholders and prepares a set of requirements and specifications accordingly.
3. Design
The next phase in the list is the design phase which revolves around the design diagrams and documents such as design specification document, data flow diagrams, use case diagrams, functional hierarchies and decision trees to understand the design of the project.
4. Implementation
This is the phase where the practical application of the earlier three phases begins. For the health solution and mobile application, the design is brought in real-world implementation and the same is used for the further process. Database team also works to create a strong back-end.
5. Testing
It is an activity which is used to find out the errors that are present in the system. It is done in a phased approach and comprises of the phases such as requirement analysis, design phase, development phase, execution phase and completion phase. It makes use of test conditions, test cases and test scenarios and reports the bugs in the defect report. The closure report is created once the exit criteria are met (Softwaretestinghelp.com, 2016).
6. Deployment and Maintenance
This is the stage where the final product is deployed for the end-users and the issues that arise after that are reported and tackled (Ghahrai, 2015).
Use of IT in Silver Chain Group
The IT solution for Silver Chain Group would be implemented in a mobile application as well. The information associated would be of high degree of protection and the loss to the same could emerge as a serious risk for the group. There is varied information that is associated with the group and has potential risks. It has been categorized as follows:
There are several risks to the confidentiality, integrity, privacy and authenticity of the data and some of them are as described below:
It is a project or an arrangement of guidelines that is vindictive in nature which implies that it has been intended for giving harm or damage to the framework. It gets presented in the framework through capacity media or system.
These are the projects that catch the action of the client on the frameworks and can be utilized to give a considerable measure of harm (Spychecker.com. 2016)
Backdoors are utilized to hamper the credibility and approved access to the framework by softening up to the framework security. These are utilized to sidestep the security component and may demonstrate to a great degree unsafe for the instructive foundations by entering in the zone of private and secret data.
It is another arrangement of code that is malignant in nature and gets activated by a specific movement or an activity. It requires certain conditions to be met with a specific end goal to get enacted and once it does, it can possibly split away the security of the framework.
The service is made unreachable for a specific duration of time since it is overloaded and flooded with unnecessary traffic from unreliable sources (Digitalattackmap.com. 2016).
It is the utilization of electronic informing administration and frameworks to send spontaneous messages in mass. There might be email spam or texting spam. If there should be an occurrence of an instructive establishment, these may bring about spam in online journals, web gathering spam, long range informal communication spam, or record sharing system spam. (Ttu.edu. 2016)
A fake site or email message is utilized to mimic another person’s personality so as to increase delicate data (Ttu.edu. 2016).
It is possible to maintain and monitor IT for the Silver Chain Group with the help of a few countermeasures to the risk and structured methodology as:
Conclusion
Silver Chain Group is an organization that works for the betterment of people of Australia and works through four different locations. There are a huge number of employees and clients that are associated with the group. The management of all of these along with the track of each and every single activity is just impossible through the manual processes. It has thus been suggested to make use of IT in the business and the group has come up with an enterprise health solution and an Android based mobile application as well. These would not only help in the management of services but would also improve the customer experience and accessibility to the organization. There are a set of risks that come up due to the involvement of IT and these have the potential to hamper the confidentiality and security of the information. Countermeasures such as use of anti-virus, internet security, network monitors, encryption techniques and access controls are very effective to control such risks and attacks.
References
delimiter, (2016). [online] Available at: https://delimiter.com.au/wp-content/uploads/2014/04/NBX-Case-Study_Silver-Chain_Mobility.pdf [Accessed 31 May 2016].
LeMay, R. (2014). Android in the enterprise: Three Aussie examples from Samsung | Delimiter. [online] Delimiter. Available at: https://delimiter.com.au/2014/04/14/android-enterprise-three-aussie-examples-samsung/ [Accessed 31 May 2016].
Silverchain.org.au. (2016). Silver Chain Group. [online] Available at: https://www.silverchain.org.au/wa [Accessed 31 May 2016].
Ghahrai, A. (2015). SDLC Phases – Software Development Life Cycle. [online] Testing Excellence. Available at: https://www.testingexcellence.com/software-development-life-cycle-sdlc-phases/ [Accessed 31 May 2016].
NueMD. (2013). The importance of proper IT implementation in healthcare. [online] Available at: https://www.nuemd.com/news/2015/07/20/importance-proper-implementation-healthcare [Accessed 31 May 2016].
Spychecker.com. (2016). What is spyware and adware?. [online] Available at: https://www.spychecker.com/spyware.html [Accessed 31 May 2016].
Ttu.edu. (2016). Scams – Spam, Phishing, Spoofing and Pharming | Be in Charge of Your Digital Life | CPI: Lubbock | TTU. [online] Available at: https://www.ttu.edu/cybersecurity/lubbock/digital-life/digital-identity/scams-spam-phishing-spoofing-pharming.php [Accessed 31 May 2016].
Digitalattackmap.com. (2016). Digital Attack Map. [online] Available at: https://www.digitalattackmap.com/understanding-ddos/ [Accessed 31 May 2016].
Softwaretestinghelp.com. (2016). What is Software Testing Life Cycle (STLC)?. [online] Available at: https://www.softwaretestinghelp.com/what-is-software-testing-life-cycle-stlc/ [Accessed 31 May 2016].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download