This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Part 1: Elements included in designing

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Part 1: Elements included in designing

Introduction

Health facility is one of the fundamental factors that need protection. It served a large community using specialize tools to reduce mortality factor in the city. The health docket needs further reforms to meet the current standards. Improvement on its operations, policies, and procedure of the institution has to be with various capacity. It requires an action plan to allow the start of the implementations (Susan McBride, 2016).

The institution needs a proper setup policy. Health policies refer to principles of actions proposed by an individual to the facility. Plans aim to provide clear guidelines to the health department in the smooth delivery of services (Holland, 2018). Data of the institution needs to be protected. It contains confidential matters of the patients and records of the facility. This data security protects the interest of the health facility. Some of the policies that cover data security are as follows;

Access control policy

This type of security gives guidelines on the access that are available to staffs in the facility. It provides various access privilege of different levels of teams when accessing information system or data.

Acceptance use policy

This kind of policy stipulates the practices that staff using the IT assets of the facility has to agree to access the system network.

Incident response policy

Incident response policy outlines an organized, systematic approach to the health facility in managing an incident when it occurs. It describes the remedy factor and some proposal in trying to salvage the situation in case of an attack to the system.

Business continuity plan

This plan coordinates all the activity within the facility using the disaster recovery plan to restore applications, system, and data that are crucial to the health facility (Oregon, 2008).

The above are some of the policies that are deemed essential to data security. They offer guidelines that will see them fully kept against distortion.

Enhancing ways of potential audit trail will influence the effectiveness of service. An audit trail is crucial to the information security to allow access to traceability. It is useful for the health information system quality since it gives underlining of how they are misused and used. Possible recommendation to the improvement to elements included in the design of audit trail and data quality monitoring programs are as follows;

The health facility should ensure that it maintains the trails in an available and retrievable form which allows it to log some access to the information.

The health facility should ensure data confidentiality. An unauthorized person should not access the data. Login credentials will enhance its integrity and privacy.

The health facility should be capable of implementing the medic’s capability to conduct audits that provide possible access to own records of health.

The facility should demand from vendors to facilitate an information system that supports both the data quality monitoring programs and the audit trails

Part 2: System capability

The system meets the regulatory requirements of the technology. It is because of the measures put in places that protect the system from illegal access. The system provides a transparent platform for data monitoring and the auditing process. The logins and password set in the order offer a clear guideline to use. Only medics with the correct credentials can access the system resources and network (Malley, 2013).

The system has a limited command to all the staffs. The privilege set by the admins has to vary from junior teams t the senior. Only the senior has nearly three-quarters of the opportunities that junior staffs. The director in charge of health information has an overall administrator command. He commands final approval of any document fed in the system. This protection improves data center security from an interference.

Part 3: Recommendation of device selection

Efficient delivery of service is a critical factor in health docket. It offers total utilization of resources without wastage or redundancy improving the working conditions. What excites people is using a facility that is user-friendly and performs the intended purpose. Recommendation for efficient system works best for the intuition.

Installation of a data monitoring program that performs an activity at a faster rate is the best. A health organization executes daily transactions in keeping records and prescription of the patients. This accumulates lords of duty that requires the quickest machine. Employing a faster system will perform work in a brief period.

Assurance of system security is essential. This assurance helps to protect the sensitive data from being exposed outside. Health facility ensures data protection is free from attack. Ensuring its security will prevent intruders from interfering with the system (Vacca, 2014).

Part 4: Evaluation of system

Database design refers to the organization of data following its database model (Watt, 2014). The database of the health information system should be performing activities effectively. The database should have the capability to add, delete, update, and retrieve data. Since a lot of documentation happens in the health facility, it should have functionality. The database should have a unique primary key that will be used basically for the identification. It should also be free from anomalies.

The loopholes in the database will result in the vulnerability of the data. These openings will open an avenue for the intruders to access. Amendment of vulnerabilities has to be in place before use. It will provide the best environment for auditing and data mining. The data needs protection from any external attack (Harrington, 2016).

The data needs to be in a systematic order. This order will help to store files in a well-arranged order. They need to store information in an encrypted file. This encryption will prevent intruders from interfering with the content. The warehouse to have multi-factor authentication. This data center will lead to secure data away from intruders.

Part 5: Development of an information management plan

Health-related issues are one of the critical factor affecting many people. This plan has led to an increasing number of patients daily to the facilities. This increased number of patients needs a comprehensive record. The idea of information management needs to state the capacity of records it can withstand for incoming future storage (Association, 2009). With this escalating number of patients, it has to preserve these records without getting to its capacity. So the future expectation of the plan needs to be evaluated. When compared to strategic planning, it also indicates the hope of the transaction in the future.

With current trends, most attackers target health facility. The attackers ride in it because of the sensitive information stored and sometimes for ransom. A mechanism for data recovery and disaster management needs to be applied. The plan for the health facility has to be in a way that it can accommodate emergencies whenever it happens. The sensitive document stored for patients has to be kept in a secure place.

The methods of operation need to utilize the operational improvement plan. This plan is sufficient for an organization since it keeps the pace of the institution facility with the current emerging trends. This change is valuable to the system since it enhances the effective delivery of services. The information management plan has to accommodate these changes whenever they occur. It has to be elastic of these technological changes (States, 2006).

 

Part 6: Challenges in the system development life cycle

The system development life cycle has got five different phases. These five phases are useful in the development of a system. They have inhibited different challenges discussed below (Carol Britton, 2011).

Analysis phase

Poorly plan techniques is a challenge to the SDLC. It will bring the impossibility of researching since the analysis of the item is missing or distorted. The personnel will have difficulty in choosing the right tool for data collection when the study of the project is left out.

Resources are also another major factor. The project manager has to ensure there are enough resources to facilitate the due process of analysis. This resources will use to give enumeration to the staffs conducting the study.

Skilled personnel will give a correct analysis of a project. But if the project has employed the unskilled staff, it becomes a challenge. The untrained personnel will not adequately accommodate all the requirements of the project. This inadequacy will result in poor delivery of service.

Planning phase

Predicting the future is one of the challenges in planning. It is impossible to tell what befalls the coming days. The uncertainty of the future will make the team come up with some reasonable expectation with no idea of whether a catastrophe may occur.

The limited resource is another factor. This limited resources will push the planning to abscond other scenarios to fit the budget in places. Some of the activities will be deemed off and only perform those that are believed to help to leave other crucial documents.

High expectations may also affect planning. It creates a scenario of coming up with the unachievable things. Since the outcome may be beneficial, the team may be over-ambitious in adding more weight for higher expectation of the future.

Implementation phase

The implementation phase is the final and most critical phase of the SDLC. When the project has an inappropriate strategy, the expectation of the outcome will decline. It will not yield the expected results because of employing an approach that is not applicable at all.

Leadership is also important. The challenge of poor leadership will affect the whole system. The administration in places ha to support the idea and go in line for full implementation. But is the direction is full of wrangles and chaotic, the application may not be achieved (Galin, 2008).

Change is essential in an organization. Having resistance from various quotas on the implementation is a challenge. It will make a hard environment for the application since the resistance team will be an unwilling partner in adapting the changes in places. This change will result in poor delivery of the proposed system.

 

 

References

Association, A. H. (2009). Perspectives in health information management. Chicago: American Health Information Management Association.

Carol Britton, J. D. (2011). Software system development: a gentle introduction. London: McGraw-Hill.

Galin, D., (2008). Software quality assurance. New York: Pearson Education Limited.

Harrington, J. L. (2016). Relational database design and implementation. Amsterdam: Morgan Kaufmann/Elsevier.

Holland, W. W., (2018). Public health policies in the European Union. London: Routledge.

Malley, G., (2013). The System. London: Hodder & Stoughton.

Oregon. (2008). Business continuity plan. Portland: Oregon Dept. of Environmental Quality.

States, U. (2006). Information management. Washington: U.S. Marine Corps.

Susan McBride, M. T. (2016). Nursing informatics. New York: Springer Publishing Company.

Vacca, J. R., (2014). Network and system security. Amsterdam: Boston: Syngress.

Watt, A., (2014). Database design. Victoria: BCcampus, BC Open Textbook Project.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask