Evaluate protocols to mitigate identified data and security


Homework

Overview

In this homework you will examine IT systems applied to health information management (HIM), potential vulnerabilities of these systems, and protocols to mitigate the risk of data and security breaches that are due to these vulnerabilities. IT systems are used for health information and data management in many areas, including patient electronic medical records (EMR), hospital operations management, and health care policy decisions. The System Development Life Cycle (SDLC) is a project management framework used to assess IT systems and associated organizational needs to identify and implement improvements to the system. You will write a paper to examine how the SDLC framework can be used to assess an IT system applied to HIM and evaluate risk mitigation protocols that reduce system risk and improve patient quality of care.

Task

Write 5 to 6 pages paper in which you:

• Choose a type of IT system applied to Health Information Management (HIM) for improved patient quality of care supported with an explanation for your selection.

o Examples include
o Electronic Health Record Systems.
o e-prescribing Systems.
o Clinical Decision Support Systems.
o Radiology Information Systems.
o Physician Order Entry Systems.

• Outline organizational needs that define the requirements for the selected type of IT system applied to HIM.

• Critique each of the five phases of the SDLC and how each addresses the organizational needs for the selected type of IT system applied to HIM.

• Assess three possible data and security breach vulnerabilities in the selected type of IT system applied to HIM.

• Evaluate three protocols to mitigate identified data and security breach vulnerabilities and improve the selected type of IT system applied to HIM.

• Synthesize how the outcomes from the analysis of a selected IT system using the SDLC can improve patient quality of care.

Format your homework according to the following formatting requirements:

o The answer should be typed, using Times New Roman font (size 12), double spaced, with one-inch margins on all sides.

o The response also includes a cover page containing the title of the homework, the student's name, the course title, and the date. The cover page is not included in the required page length.

o Also include a reference page. The Citations and references must follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Evaluate protocols to mitigate identified data and security
Reference No:- TGS03167473

Now Priced at $80 (50% Discount)

Recommended (91%)

Rated (4.3/5)