Question

CASE 2.2 Business Case: Data Chaos Creates Risk Data chaos often runs rampant in service organizations,...

CASE 2.2 Business Case: Data Chaos Creates Risk Data chaos often runs rampant in service organizations, such as health care and the government. For example, in many hospitals, each line of business, division, and department has implemented its own IT applications, often without a thorough analysis of its relationship with other departmental or divisional systems. This arrangement leads to the hospital having IT groups that specifi cally manage a particular type of application suite or data silo for a particular department or division. Data Management When apps are not well managed, they can generate terabytes of irrelevant data, causing hospitals to drown in such data. This data chaos could lead to medical errors. In the effort to manage excessive and massive amounts of data, there is increased risk of relevant information being lost (missing) or inaccurate— that is, faulty or dirty data. Another risk is data breaches. • Faulty data: By 2016 an estimated 80 percent of healthcare organizations will adopt electronic health records, or EHRs (IDC MarketScape, 2012). It is well known that an unintended consequence of EHR is faulty data. According to research done at Columbia University, data in EHR systems may not be as accurate and complete as expected (Hripscak & Albers, 2012). Incorrect lab values, imaging results, or physician documentation lead to medical errors, harm patients, and damage the organization’s accreditation and reputation. • Data breaches: More than 25 million people have been affected by health-care system data breaches since the Offi ce for Civil Rights, a division of the U.S. Department of Health and Human Services, began reporting breaches in 2009. Most breaches involved lost or stolen data on laptops, removable drives, or other portable media. Breaches are extremely expensive and destroy trust. Accountability in health care demands compliance with strong data governance efforts. Data governance programs verify that data input into EHR, clinical, fi nancial, and operational systems are accurate and complete—and that only authorized edits can be made and logged.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

As per the problem stated, there is a need of following practices to avoid the problems.
1.TQM(Total quality management) should be implemented.
2.Zero tolerance policy should be implemented according to the requirement.
3.High Security should be implemented
4.Internal and External Audit should be performed
5.Proper database management

6.Proper HR(Human resource Policies)
7.Educate employees about the code of ethics and code of conduct
8.training of employees

9. Policy to edit the records.

1. TQM means no errors at every level, even typing mistakes should not be ignored.
2. In some cases zero tolerance policy should be implemented, for example all the reports of blood test
and other medical test must be accurate.
3.both type of security should be implemented, logical and physical security.
a)there should be proper arrangements for network security(use proxy server/firewall), device security, and employee security.
b)educate employees about social engineering ,security tips and ethics.
for example: use strong passwords,change their passwords frequently, don't reveal their passwords to others(friend/Colleagues)
c)MAC(Mandatory access control) should be implemented.according to MAC,access rights are provided according to the level of authority, for example an accountant should not be able to access the patient's medical history/reports .
d)Don't allow employees/patients to use their personal internet connection(for example mobile phone hot spot) with in the hospital.

4.Internal and External Audit should be performed:
time to time internal audit should be performed and this audit should be crossed checked by the external auditors

5.Proper database management system: to avoid the data redundancy, data base should be normalized.
a)access rights should be granted to the users of the database according to the security policies.
b)all the activities should be monitored by the database administrator(s).
c)Proper backup and recovery plan to recover the data in case of any mishappening.
6.Proper HR(Human resource Policies):- there should be proper HR policies to deal with employees.

7.Educate employees about the code of ethics and code of conduct:
every professional should follow the code of conduct, code of ethics

8.training of employees: lots of developments are taking place day by day in the field of technology.
all the employees should be aware of new security threats and how to protect the data/information and valuable assets.training gives the practical exposure.

9. Editing of records should not be allowed.

if editing is required, then this editing should be monitored and noticed by the concerned authorities.

Add a comment
Know the answer?
Add Answer to:
CASE 2.2 Business Case: Data Chaos Creates Risk Data chaos often runs rampant in service organizations,...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Examining the Importance of Data Governance in Healthcare By Shannon Fuller, MBA HEALTHCARE HAS ALWAYS focused...

    Examining the Importance of Data Governance in Healthcare By Shannon Fuller, MBA HEALTHCARE HAS ALWAYS focused on managing information from application to application, instead of looking at information holistically and defining it holistically. The industry's shift of focus onto analytics—whether it's for predictive analytics or modeling for improved readmission rates—puts the focus back on foundational data. Ihat's what is needed for things like population health, which is increasingly important in healthcare. Patient data isn't held or uséd solely in electronic...

  • The activity An EHR was implemented at the General Hospital one year ago, before you were...

    The activity An EHR was implemented at the General Hospital one year ago, before you were hired. The implementation process did not go smoothly and now there are strong EHR advocates and strong EHR-dissenters on the team. The CEO wants to move forward with an implementation of the bar-coded medication administration feature of the EHR, but the director of nursing does not. You have been asked to manage the implementation and see that it is successful. You will first need...

  • I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter T...

    I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...

  • CASE 17: WATSON’S AMBULATORY EHR TRANSITION Major theme: System acquisition Primary care physicians play a key...

    CASE 17: WATSON’S AMBULATORY EHR TRANSITION Major theme: System acquisition Primary care physicians play a key role in the U.S. health care delivery system. These providers integrate internal and external information with their clinical knowledge to determine the patient’s treatment options. An effective ambulatory electronic health record (EHR) is critical to supply physicians with the information they need to provide quality care and maximize their efficiency. This case involves the decision-making process to replace an inadequate EHR system in a...

  • CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of...

    CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of Personnel Management (OPM) is conducted, may have been extracted. Government offi responsible for recruiting and retaining a world-class cials say that the exposure of security clearance irn workforce to serve the American people and is also mation could pose a problem for years responsible for background investigations on pro- spective employees and security clearances. In June the OPM system, and its records were protected...

  • Week One Assignment Case Study Attached Fil 2015 National University Research Paper Template.docx (25.596 KB) Case...

    Week One Assignment Case Study Attached Fil 2015 National University Research Paper Template.docx (25.596 KB) Case Study: Selection of a Patient Safety Strategy Major Themes: Strategic Planning and IT Alignment Background Information Langley Mason Health (LMH) is located in North Reno County, the largest public health care district in the state of Nevada, serving an 850 square mile area encompassing seven distinctly different communities. The health district was founded in 1937 by a registered nurse and dietician who opened a...

  • Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to...

    Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to government sources, U.S. expenditures on health care in 2009 reached nearly $2.4 trillion dollars ($2.7 trillion by the end of 2010).[1] Despite this vaunting national level of expenditure on medical treatment, death rates due to preventable errors in the delivery of health services rose to approximately 98,000 deaths in 2009.[2] To address the dual challenges of cost control and quality improvement, some have argued...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • please Identify the key points and main thesis of the article 2. Describe the skills you...

    please Identify the key points and main thesis of the article 2. Describe the skills you will need to develop to manage the hospital of the future. use critical analysis doing these questions Suggestion for writing assignmemnt make believe the reader has never read the article -what are the key points you would want the reader to know in order to understand the hospital of the future. In addition, managers, executives do not have time to read--so again what key...

  • I have this case study to solve. i want to ask which type of case study...

    I have this case study to solve. i want to ask which type of case study in this like problem, evaluation or decision? if its decision then what are the criterias and all? Stardust Petroleum Sendirian Berhad: how to inculcate the pro-active safety culture? Farzana Quoquab, Nomahaza Mahadi, Taram Satiraksa Wan Abdullah and Jihad Mohammad Coming together is a beginning; keeping together is progress; working together is success. - Henry Ford The beginning Stardust was established in 2013 as a...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT