Verified Document

Technologies The Recent Changes To Case Study

This will allow sufficient time to integrate the different it support functions together. At the same time, the staff members can be highly trained in using this protocol. Next, administrators need to monitor these changes and the impact they are having on addressing these issues. This will allow for any kind of adjustments to be made in the strategy. Once the process has been streamlined is when this protocol could be introduced to the entire facility. (Michael, 2006) (Noimanee, 2007, pp. 80 -- 92) The biggest risks associated with using this kind of technology is that the security and storage of personal information could be compromised. If this were to happen, it could give hackers unprecedented access to the location of staff members and employees inside the hospital. At the same time, they could use this as a way to look up personal information about patients or employees. (Michael, 2006) (Noimanee, 2007, pp. 80 -- 92)

To deal with these challenges a new approach must be taken that will limit the kinds of files and data that are stored...

Parts of this document are hidden

View Full Document
svg-one

Furthermore, none of the technology (i.e. wireless devices) should be allowed to leave the facility. This will prevent any kind of internal security threats from within. (Michael, 2006) (Noimanee, 2007, pp. 80 -- 92)
To address external risks, a series of firewalls will be created that are interconnected to another. In the event of a security breach, is when the system can automatically isolate a user from accessing critical data. This will allow it personnel time to identify the nature of the threat. To keep with the changes in the security risks, outside consultants will be brought in to test the procedures that are in place. They will report their findings to the board of directors with specific recommendations for dealing with any issues. If this kind of a focus is taken, it will ensure that the hospital is able to adjust with the different challenges they are facing. This is when the facility can continue to deliver the best care and protect the safety of the organization. (Michael, 2006) (Noimanee, 2007, pp. 80…

Sources used in this document:
References

Michael, K. (2006). The Emerging Ethics. Facility of Informatics.

Noimanee, S. (2007). The Vital Signs Data Monitoring. WSEAS Transaction on Biology, 6 (4), 80 -- 92.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now