Information Technology Essays (Examples)

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

Optimizing Merged Health information Systems
Although the merger of two comparably sized companies competing in the same industry is a relatively commonplace business strategy, the process is … percentage of merged entities fail outright because of these problems (Murphy, 2019). These types of problems are further compounded when there are sophisticated information systems involved that must also be merged successfully. The purpose of this paper is to explicate the responsibilities involved in implementing a health … systems involved that must also be merged successfully. The purpose of this paper is to explicate the responsibilities involved in implementing a health information system (HIS) that meets current Health information technology for Economic and Clinical Health (HITECH) Act and the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy regulatory requirements. To this … and the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy regulatory requirements. To this end, a……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Studyspark

Study Document Study Document

Challenges In Management Facing Transformational Leaders Service

Pages: 5 (1606 words) Sources: 5 Document Type:Annotated Bibliography Document #:57833590

Annotated bibliography: Management and Accounting Challenges facing Transformational Leaders: Service and technology
Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. Computers in … formulating and empirically testing a model based on transformational leadership elements as well as diffusion of innovation model phases, utilizing PLS technique and information from as many as 154 companies, for studying the implementation of novel technology, namely MCC (mobile cloud computing). Factors like corporate vision, supportive leaders, intellectual stimulation, and personal acknowledgment are important when it comes to implementation … and identifying the personal needs of others (both indications of offering individual support), have been linked strongly to the implementation of a major information systems innovation like MCC. It reveals that understanding the effect of the leadership element individually on innovation dissemination is important, instead of retaining … comprehensive construct. The authors conclude……

References

References

Al Ahmad, S., Easa, N. F., & Mostapha, N. (2019). The Effect of Transformational Leadership on Innovation: Evidence from Lebanese Banks. European Research Studies Journal, 22(4), 215-240.

Aldholay, A. H., Isaac, O., Abdullah, Z., & Ramayah, T. (2018). The role of transformational leadership as a mediating variable in DeLone and McLean information system success model: The context of online learning usage in Yemen. Telematics and Informatics, 35(5), 1421-1437.

Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. Computers in Industry, 107, 104-113.

Zappalà, S., & Toscano, F. (2019). Transformational leadership and innovation adoption: Is there a moderation role of personal initiative and job control?. Psychologica, 119.

Zhang, Y., Zheng, J., & Darko, A. (2018). How does transformational leadership promote innovation in construction? The mediating role of innovation climate and the multilevel moderation role of project requirements. Sustainability, 10(5), 1506.

Studyspark

Study Document Study Document

Ethics And Health Information

Pages: 8 (2462 words) Sources: 6 Document Type:Term Paper Document #:87876213

Managing Medical Records and the Implementation of Tools and Safeguards Required within HIS
Introduction
Few practices are more important in managing health information systems than managing medical records, safeguarding patients’ medical history, and ensuring that all end users of medical information technology are approved and trained. Some of the biggest factors in security breaches are end users themselves (Rhee, Kim & Ryu, 2009). This is … 2017). This paper will discuss the programming language and relational databases that should be used to accommodate security needs for the HIS, the information tools and safeguards required to protect it, the security needed for electronic health records, an applicable code of ethics, and proposals for training … is that they are not type safe languages. In other words, the programmer is responsible for where the type and data go, how information is compiled and arranged, and so on. This makes it far more……

References

References

Campbell, R. J. (2004). Database Design: What HIM Professionals Need to Know.

Perspectives in Health Information Management 2004, 1:6 (August 4, 2004). Retrieved from  http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_024637.hcsp?dDocName=bok1_024637 

Crossler, R. E., & Posey, C. (2017). Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem. Journal of The Association for Information Systems, 18(7), 487-515.

Donovan, F. (2018). Judge Gives Final OK to $115M Anthem Data Breach Settlement. Retrieved from https://healthitsecurity.com/news/judge-gives-final-ok-to-115m-anthem-data-breach-settlement

HealthIT.gov. (2018). Health Information Privacy, Security, and Your EHR. Retrieved from  https://www.healthit.gov/providers-professionals/ehr-privacy-security 

The IMIA Code of Ethics for Health Information Professionals. (n.d.). Retrieved from http://www.imia medinfo.org/new2/pubdocs/Ethics_Eng.pdf

Jackson, R. (2018). Pulling strings. Retrieved from  https://iaonline.theiia.org/2018/Pages/Pulling-Strings.aspx 

Prince, B. (2013). Programming Languages Susceptible to Specific Security Flaws: Report. Eweek, 12.  Retrieved from  https://www.eweek.com/security/programming-languages-susceptible-to-specific-security-flaws-report

Studyspark

Study Document Study Document

Critical Information Literacy

Pages: 1 (280 words) Sources: 2 Document Type:Essay Document #:59120688

… Barbosa & Morais, 2017). A typical social engineering attack would be a phishing scam, but others would include hackers tricking people into providing information, which is then used against them (Kaspersky, 2020).
Protecting personal information online where social engineering attacks are concerned means training people in how social engineering attacks work, what the attackers need you to do, ……

References

References

Breda, F., Barbosa, H., Morais, T. (2017) Social engineering and cyber security. Conference Paper.

Kaspersky (2020) What is social engineering? Kaspersky Labs. Retrieved April 15, 2020 from  https://usa.kaspersky.com/resource-center/definitions/social-engineering 

Studyspark

Study Document Study Document

Starbucks Use Of Wireless Technology

Pages: 2 (686 words) Sources: 5 Document Type:Term Paper Document #:87468045

… world of technological advancement, companies are trying to gain competitive advantage through using unique ways of reaching out to the customers. Since wireless technology is everywhere, many companies have commercialized and expanded their business through it. Starbucks is one such company.
Starbuck uses GPS (Global Positioning System) … (Global Positioning System) in its Application to know the location of the customer on the basis of which it sends notification and music information to help select the customer their taste of music as this system provides accurate position, time and speed information through satellite.[footnoteRef:1] This has increased customer engagement and brand loyalty as the App offers other unique features too but the tracking of location ……

References

References

Brewin, B. (2001, Jan 08). Starbucks takes wireless leap. Computer World .

Greenemeier, L. (2014, June 24). Starbucks to Offer Wireless Caffeine for Smartphones. Scientific American .

How Household Names Use GIS. (2019, October 9). USC Dornsife.

Torrington, M. (2016, April 12). Starbucks: A Case Study in Effective Mobile App Marketing. Digital Turbine.

Wheeler, C. (2014). Going BIG with GIS. Esri User Conference.

Studyspark

Study Document Study Document

Allied Health And Technology Institute Reopening Guidelines COVID 19

Pages: 11 (3201 words) Sources: 3 Document Type:Essay Document #:35262297

… phone number to allow them to call back in case there is no answer (DC Health, 2020). Notification to DC Health will include information on the patient’s state of residence, contact information, detailed symptom history, underlying comorbidities, detailed travel history, and lists of potential contacts to facilitate contact tracing ((DC Health, 2020). The Department will … contact tracing.
Communicating to the school community is equally important. When there is a confirmed Covid-19 case on-campus, the school will communicate the information to the school community via email without disclosing personally identifiable information on patients and their families. The Family Educational Rights and Privacy Act (FERPA) prevents educational institutions from disclosing personally identifiable information about a patient to other students and staff in the school community without prior consent.
In line with the DC Health Directives, the ……

References

References

CDC (2019). Operating Schools during Covid-19: CDC’s Considerations. Center for Diseases Prevention and Control (CDC). Retrieved from  https://www.cdc.gov/coronavirus/2019-ncov/community/schools-childcare/schools.html 

DC Health (2020). Health Notice for district of Columbia Healthcare Providers . DC Health. Retrieved from  https://dchealth.dc.gov/sites/default/files/dc/sites/doh/publication/attachments/COVID-19_HAN_20200305_Final_update.pdf 

WHO (2020). Key Messages and Actions for Covid-19 Prevention and Control in Schools. World Health Organization. Retrieved from  https://www.who.int/docs/default-source/coronaviruse/key-messages-and-actions-for-covid-19-prevention-and-control-in-schools-march-2020.pdf?sfvrsn=baf81d52_4 

Studyspark

Study Document Study Document

Integrated Waveguide Technologies Preparing For A Public Offering

Pages: 7 (1963 words) Sources: 6 Document Type:Essay Document #:71352857

… a financial year referred to as the final dividend. Dividends account as a source of income for the investors but also have an information signaling effect. Therefore, a dividend distribution is informing the management of the earnings to allocate as dividends and contribute to sharing purchase investment … by The Internal Revenue Service (IRS) if the stock repurchases were a tax avoidance strategy. The stockholder's risk being unfairly treated due to information inadequacy.
Question 10 & 11: $50 Priori Distribution value of equity and Per Stock Price
· Intrinsic Value of Equity = (Value of ……

References

References

Al-Malkawi, H.-A. N., Rafferty, M., & Pillai, R. (2010). Dividend Policy?: A Review of Literatures and Empirical Evidence. International Bulletin of Business Administration, 5(9), 38–45.  https://doi.org/10.12816/0037572 

Baker, H. K., & Weigand, R. (2015). Corporate dividend policy revisited. In Managerial Finance (Vol. 41, Issue 2, pp. 126–144).  https://doi.org/10.1108/MF-03-2014-0077 

Black, F., & Scholes, M. (2010). The effects of dividend yield and dividend policy on common stock prices and returns. In Journal of Financial Economics (Vol. 1, Issue 1, pp. 1–22).  https://doi.org/10.1016/0304-405X(74)90006-3 

Farre-Mensa, J., Michaely, R., & Schmalz, M. (2014). Payout Policy. Annual Review of Financial Economics, 6, 75–134.

Mohanasundari, M., & Vidhya, P. (2016). Dividend Policy and Its Impact on Firm Value: A Review of Theories and Empirical Evidence. Journal of Management Sciences and Technology, 3(3), 59–69.

Travlos, Trigeorgis, & Vafeas. (2001). No Title. Multinational Finance Journal, 5(2), 87–112.

Studyspark

Study Document Study Document

Cloud Computing And Cost Effectiveness

Pages: 5 (1591 words) Sources: 5 Document Type:Annotated Bibliography Document #:36737117


Annotated Bibliography
Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of information Systems Evaluation, 17(1), 3.
This article ascertains that the major reason why SMEs in Ireland adopt cloud computing is for cost-effectiveness. The study shows … and software. Also, a key feature of cloud computing is its capacity to diminish the financial burden that is placed on firms in technology adoption. The authors also demonstrate that cost reduction can be achieved through the capability to shift from a CAPEX cost structure to an … cloud computing. Different from desktop computing, where hard disk crashes can result in the destruction and loss of the firm’s valuable data and information, the same does not apply in the cloud where data is stored effectively.
The cost-effectiveness of cloud computing is perceptible. Rather than purchasing … capabilities devoid of incurring the……

References

References

Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International Technology and Information Management, 26(1), 112 – 137.

Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.

Elmonem, M. A. A., Nasr, E. S., & Geith, M. H. (2016). Benefits and challenges of cloud ERP systems–A systematic literature review. Future Computing and Informatics Journal, 1(1-2), 1-9.

Shankar, K. (2016). Effectiveness of Cloud Computing in Global Business. Journal of Applied Management-Jidnyasa, 8(1), 66-73.

Xue, C. T. S., & Xin, F. T. W. (2016). Benefits and challenges of the adoption of cloud computing in business. International Journal on Cloud Computing: Services and Architecture, 6(6), 01-15.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security … in the form of a methodical analysis by an outside specialist on compliance, for identifying any chinks in the armor of the company's information technology system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer … of data, which also creates considerable risks to the data itself, computer systems, and critical infrastructures and operations it supports. Despite developments in information security, numerous information systems continue to display susceptibility to both external and internal breaches (Suduc, Bîzoi & Filip, 2010). Internal information security auditing enhances the likelihood of……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… especially into use by SMEs. To this end, this chapter describes more fully the study’s guiding Unified Theory of Acceptance and Use of technology theoretical/conceptual framework followed by an overview of the Internet of Things (IoT) and an analysis of current trends that are having an impact … Davis (2003) by integrating a number of disparate elements from previous models to create a more accurate approach to understanding how and why technology-related decisions are made by organizations today. The Venkatesh et al. (2003) theoretical model draws on a number of key elements from eight previous … from eight previous theories or models in order to produce a more robust overview concerning the effects of different motivational factors on the technology-related decision-making process to identify how and why end users actually use different technologies.
The rationale in support of this more comprehensive model included … applied to similar situations involving……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Join thousands of other students and

"spark your studies".