Tuesday, May 5, 2020

Use of IT in Business and Healthcare Industry †Free Samples

Question: Discuss about the Use of IT in Business Healthcare Industry. Answer: Introduction Co.As.It is in the business of providing various different services to people coming from Italy to stay in Australia. This has been on-going for over 40 years. As such, since 1968 people arriving from Italy to Australia had been provided services related to living in Australia, education, health and job opportunities. In particular, Healthcare is an area where theres a special attention given to people with aged care community services to the family as well as mental healthcare services. (Coasit.org.au, 2016) Requirement of IT for Co.As.It Co.As.It manages various different services and and the need for ICT in their operations is something to keep in mind always. For instance, the team of community services includes psychologists, social workers, communicate care workers, service coordinators and volunteers. Keeping track of duties and roles as well as the allocation of work and then tracking their resources and managing the entire team is a complicated task and the company relies on manual processes making it time consuming and prone to human errors. The Aged Care Team provides assistance as well as support on 1 to 1 basis together working at a policy and community developments so as to cater needs by communicating the government as well as mainstream agencies. The Drug and Alcohol team program are working for the people as well. The execution and management of tasks would become easier when IT is brought into the picture. Importance of Information Technology for business survival There are a host of factors that would define the relevance of Information Technology in the development of Co.As.It and related services: Preparation IT would help in the preparation phase in the way of collecting important information from different sources and that too in a quick and timely efficient manner. Planning IT also helps in planning different processes that are involved in business by the help of IT and by documentation and reporting and the use of software so as to monitor and track several activities along with many more. Practice Design checks, ease of installation as wel as deployment of services are some of the key characterizes that comes handy with the application of IT. Progress Checks It is difficult to entirely rely on manual processes for keeping the track of all open progress and also the activities which are involved. IT enables these tasks with complete ease. Phases that are involved in development of IT for Co.As.It: Planning It is the very first phase for the application of Information Technology for any bsiness wherein an overall approach as well as the strategy is discussed. Objectives and execution plans would also be studied in this project. Requirement Analysis In this phase all of the stakeholders would have a meeting and discuss on the requirements of specific goals. The overall aim of this meeting is to collect max information so as to understand specifications and expectations. It is also required to ensure that scope is extremely clear and ech and every individual who was involved with the steps to achieve the result have that in their mind. The exact steps for each and every requirement would be verified and validates and also communicated with the testers so as to give them a clear picture for their duties. Design Next phase in the lifecycle is the designing part. A high-level diagram would be design for all requirement has already been listed down. A DSD or a design specification document would be created that helps keep the architectural design of the project together with its components that is to be developed as well as the communication details and flow charts as well. The design would usually be kept in DSD or the Design Specification Document. Implementation Once the design has been done, the implementation stage would kick in. This is where the desig is practically implemented. The coding would begin once the design has been completed. The database development team would come into action designing the Tables and writing the relation between those tables, the front-end developers would come in action coding the front-end interaction as well as translating the design into a graphical user interface and the back-end team would code the bulk of the logical and arithmetical operations. Unit test cases would also be developed so as to test and then review the code as soon as its being developed. The components that are built and tested to be working fine are produced in the final system and this cycle is repeated until the complete system is coded. Testing This phase has been further sub-divided into following phase (Softwaretestinghelp.com, 2016): Requirement phase This involves finalization of test strategy and approach for creation and execution of test plan. Analysis phase In this phase, roles and responsibilities of test team are defined. Design phase In this phase, test data is estimated along with different scenarios. Execution phase In this phase, test scenarios are run and respective results are logged. Completion phase In this phase, completion is finalized according to the exit criteria and closure report is created. Deployment In this phase, the code is deployed on live server. Once, it is done, maintenance team will take over the charge of resolving after-deployment issues. It monitors and resolve them as and when need occurs. Co.As.It and IT Co.As.It manages its business through electronic management system. Consumer Directed Care (CDC) helps it in remaining competitive. The transition happened in the business with integration with Home Care Manager software (Bolden, 2015). It gives transparency in the business to employees. It also proves to be cost-effective solution. Especially, rostering feature helped Home Care Manager to coordinate with double booking workers. It also provides visibility between employees and business. With the help of this software, it becomes feasible to track location of employees and get data on their arrival time. Risks in implementation of IT The Co.As.IT organization maintains huge chunks of data. Hence, following risks are associated with this data: Private - The data of company may contain personal information of a person or an organization. Hence any tampering with it, may leads to huge losses in companys data. Examples of this data includes employee data. Sensitive This information is very critical for the business and hence require high degree of protection from threats. It includes financial transactions of the business. Confidential This information includes that information which is critical for business and 3rd party stakeholders. For example: information of healthcare department. Public Information which is shared with public comes under this category. Following risks are associated with above-mentioned risks: Malicious threat This includes those threats which are malicious and uses existing system, its resources and data for their execution that is to obtain authorization to access the data (Spychecker.com. 2016). Virus This contains a set of executable instructions which may pose a threat to the information stored in the system. They get transferred from Internet and portable media. Spyware This includes surveillance tools which are used to monitor the tasks performed by the users. Trojan They have self-replicating feature and remain in systems for a very long time. They cause huge damage to the system when they are activated. Rootkits They are set of software instructions which are used by 3rd party to obtain access to the machine so as to alter the files or execute them by 3rd The key user of the machine does not get any feeling of these activities. Man-in-the-middle This risk includes letting attacker to sit between the source and destination. Then captures all activities with wrong intention. DDoS This stands for Distributed Denial of Service and keeps on sending huge requests to the server i.e. useless traffic (Digitalattackmap.com. 2016). Spoofing This involves (Ttu.edu. 2016) pretending an individual with another person or a company with the key intention of gathering personal data or critical business data which can be of private and confidential use. Phishing This attempts at gathering data such as login credentials or bank details by pretending as a trusted person/entity over electronic network. It uses a fake website to mislead users. It also deceives the users (Ttu.edu. 2016).. Conclusion The selected organization i.e. Co.As.It is collaboration venture between Australia and Italy. It conducts good work for people of both the communities. By using IT, the business will definitely help in achieving high efficiency. The implementation phases are divided into following different phases; requirement analysis, designing, implementation, testing, etc. The company has been benefitted by using Home Care Manager. However, with the implementation IT, there are some risks such as virus attacks, malicious threats to various types of data of the organization. These data can be private, confidential, sensitive and public in nature. References Bolden, S. (2015). Co.As.It makes significant mileage cost savings with Home Care Manager software - iCareHealth. [online] Icarehealth.com.au. Available at: https://icarehealth.com.au/blog/co-as-it-makes-significant-mileage-cost-savings-with-home-care-manager-software/ [Accessed 19 May 2016]. Coasit.org.au. (2016). Co.As.It. Sydney Italian Language Community Services. [online] Available at: https://www.coasit.org.au/ [Accessed 19 May 2016]. Ghahrai, A. (2015). SDLC Phases - Software Development Life Cycle. [online] Testing Excellence. Available at: https://www.testingexcellence.com/software-development-life-cycle-sdlc-phases/ [Accessed 19 May 2016]. NueMD. (2013). The importance of proper IT implementation in healthcare. [online] Available at: https://www.nuemd.com/news/2015/07/20/importance-proper-implementation-healthcare [Accessed 19 May 2016]. Spychecker.com. (2016). What is spyware and adware?. [online] Available at: https://www.spychecker.com/spyware.html [Accessed 19 May 2016]. Ttu.edu. (2016). Scams Spam, Phishing, Spoofing and Pharming | Be in Charge of Your Digital Life | CPI: Lubbock | TTU. [online] Available at: https://www.ttu.edu/cybersecurity/lubbock/digital-life/digital-identity/scams-spam-phishing-spoofing-pharming.php [Accessed 19 May 2016]. Digitalattackmap.com. (2016). Digital Attack Map. [online] Available at: https://www.digitalattackmap.com/understanding-ddos/ [Accessed 19 May 2016]. Softwaretestinghelp.com. (2016). What is Software Testing Life Cycle (STLC)?. [online] Available at: https://www.softwaretestinghelp.com/what-is-software-testing-life-cycle-stlc/ [Accessed 19 May 2016].

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.