IT Infrastructure Management TASK A3
VerifiedAdded on 2021/01/01
|26
|5544
|327
AI Summary
Why was ‘’Work-brain’’ not utilized properly?10 Risk management strategies associated with information technology11 associated with information technology 11 General information threats in hospital industry: 11 Risk management strategies for managing IT structures | |Risks associated with information technology 11 General information threats in hospital industry: 11 Risk management strategies for managing IT structures | |Risks associated with information technology 11 General information threats in hospital industry: 11 Risk management strategies for managing IT structures | |Risks associated with information technology
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
IT infrastructure management
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................3
TASK A...........................................................................................................................................3
1. key reasons for Information technology implementation failure............................................3
2. Who is responsible for the failure and why?..........................................................................4
3. Do some research on the use of IT by hospitals/health departments – give examples of
success stories of IT implementations and outline reasons for the success................................6
What would you recommend the Health Department to do to fix the current problems?..........8
4. Why was ‘’Work-brain’’ not utilized properly?...................................................................10
Risk management strategies associated with information technology..........................................11
Risks associated with information technology..........................................................................11
General information threats in hospital industry:......................................................................11
Risk management strategies for managing IT structures:.........................................................11
CONCLUSION..............................................................................................................................11
There are different type of risk mitigation handling options includes:..........................................11
REFERENCES..............................................................................................................................11
INTRODUCTION...........................................................................................................................3
TASK A...........................................................................................................................................3
1. key reasons for Information technology implementation failure............................................3
2. Who is responsible for the failure and why?..........................................................................4
3. Do some research on the use of IT by hospitals/health departments – give examples of
success stories of IT implementations and outline reasons for the success................................6
What would you recommend the Health Department to do to fix the current problems?..........8
4. Why was ‘’Work-brain’’ not utilized properly?...................................................................10
Risk management strategies associated with information technology..........................................11
Risks associated with information technology..........................................................................11
General information threats in hospital industry:......................................................................11
Risk management strategies for managing IT structures:.........................................................11
CONCLUSION..............................................................................................................................11
There are different type of risk mitigation handling options includes:..........................................11
REFERENCES..............................................................................................................................11
INTRODUCTION
Information technology is a process which
help for managing the business process effectively
and efficiently. It can protect hardware system,
Networking and other devices are used for
exchanging information from one place to another.
IT infrastructure is used in different business
operations and functions that establish connection
between them. This report will discuss about the
Queensland health project that is failed and has
affected the entire business operations and their
functions.
This assignment will discuss about the importance
and significance of project and how they affect the
entire organization. Further, this report will discuss
reason for failure in implementation of information
technology. This assignment will discuss about the
Risk management strategies associated with
information technology. How this platform impact
on the business operations and their functions It
also describes the different strategies of risk
mitigation which helps in managing the business
process effectively and efficiently.
TASK A
1. key reasons for Information technology
implementation failure
There is multiple reason for failure the Queensland
project because of poor management system and
planning.
Complexity of industry- This is the most common
reason that failure the Queensland project. They don't
have effective management so it is difficult for them
to reduce the complexity in the entire system. It is
important for making an effective strategy that help
in increasing the health and medical services which
are provided to customers (Borena & Negash, 2016).
Government plans each and every aspects of
information technology but somewhere, it is not
applicable for development process. For growth and
development, it is necessary to focus on particular
task for achieving goals and objectives.
Complexity associated with the client consultant
relationship- This is also reason for project failure.
Queensland and IBM are not maintaining the good
relationship with each other. It is required for
organization to create healthy relationship with
consultant.
Payroll system Fiasco- Queensland project is selected
by IBM Australia to launch new setup and there
80,000 employees working on this system. This
project provides the health services. This payroll
system will help of Queensland project. There are
many faults generated in system and their
functionality (Boyes, Ellul & Irwin, 2017).
Information technology is a process which
help for managing the business process effectively
and efficiently. It can protect hardware system,
Networking and other devices are used for
exchanging information from one place to another.
IT infrastructure is used in different business
operations and functions that establish connection
between them. This report will discuss about the
Queensland health project that is failed and has
affected the entire business operations and their
functions.
This assignment will discuss about the importance
and significance of project and how they affect the
entire organization. Further, this report will discuss
reason for failure in implementation of information
technology. This assignment will discuss about the
Risk management strategies associated with
information technology. How this platform impact
on the business operations and their functions It
also describes the different strategies of risk
mitigation which helps in managing the business
process effectively and efficiently.
TASK A
1. key reasons for Information technology
implementation failure
There is multiple reason for failure the Queensland
project because of poor management system and
planning.
Complexity of industry- This is the most common
reason that failure the Queensland project. They don't
have effective management so it is difficult for them
to reduce the complexity in the entire system. It is
important for making an effective strategy that help
in increasing the health and medical services which
are provided to customers (Borena & Negash, 2016).
Government plans each and every aspects of
information technology but somewhere, it is not
applicable for development process. For growth and
development, it is necessary to focus on particular
task for achieving goals and objectives.
Complexity associated with the client consultant
relationship- This is also reason for project failure.
Queensland and IBM are not maintaining the good
relationship with each other. It is required for
organization to create healthy relationship with
consultant.
Payroll system Fiasco- Queensland project is selected
by IBM Australia to launch new setup and there
80,000 employees working on this system. This
project provides the health services. This payroll
system will help of Queensland project. There are
many faults generated in system and their
functionality (Boyes, Ellul & Irwin, 2017).
Strategic plan and objectives- lack of
communication is main reason for project failure.
Queensland health organization is directly
communicated with the stakeholder to identify the
need and requirement. Strategy planning is the best
part of Queensland organization to control the
business process. (Barik, Das & Lenka, 2016).
Queensland hire more employee to manage the entire
business activities. In this project, it can be found
fault at every stage of project implementation.
2. Who is responsible for the failure and why?
The main reason of project failure is that
when IBM was taken on as a reseller by the
Queensland Government to implement an SAP
HR payroll system for its health system. But the
start date for the project expanded from eight to
26 months and when it finally went live on
March 14, a litany of major problems ensued.
The Queensland government has used an auditor
report to blame IBM for illegal service
provided, according to report, IBM relaunches
the project again to government and also
implement SAP payroll system for health
services. There are various health staffers
because of project failure and the project cost
increases from $6.20 Million to $64.5 million.
According to My opinion, IBM is responsible
for managing the project and payroll system of
Queensland. This organization will supply the
services and create problem so that IBM is
responsible for failure the project (Diwan,
Ghaleb & Abd, 2018). Government claim IBM
and provide notice to give final payment.
First of All, IBM delivered the
Queensland project to government for
providing the health services.
They have more responsibilities to
monitor and control their functionality
and then after delivered the project.
IBM developing new project for
Queensland health organization and sell the
product to company. But for some reason this
project has failed. This is the major issue that
faced by IBM. Queensland health organization
finally taken legal action against the company.
communication is main reason for project failure.
Queensland health organization is directly
communicated with the stakeholder to identify the
need and requirement. Strategy planning is the best
part of Queensland organization to control the
business process. (Barik, Das & Lenka, 2016).
Queensland hire more employee to manage the entire
business activities. In this project, it can be found
fault at every stage of project implementation.
2. Who is responsible for the failure and why?
The main reason of project failure is that
when IBM was taken on as a reseller by the
Queensland Government to implement an SAP
HR payroll system for its health system. But the
start date for the project expanded from eight to
26 months and when it finally went live on
March 14, a litany of major problems ensued.
The Queensland government has used an auditor
report to blame IBM for illegal service
provided, according to report, IBM relaunches
the project again to government and also
implement SAP payroll system for health
services. There are various health staffers
because of project failure and the project cost
increases from $6.20 Million to $64.5 million.
According to My opinion, IBM is responsible
for managing the project and payroll system of
Queensland. This organization will supply the
services and create problem so that IBM is
responsible for failure the project (Diwan,
Ghaleb & Abd, 2018). Government claim IBM
and provide notice to give final payment.
First of All, IBM delivered the
Queensland project to government for
providing the health services.
They have more responsibilities to
monitor and control their functionality
and then after delivered the project.
IBM developing new project for
Queensland health organization and sell the
product to company. But for some reason this
project has failed. This is the major issue that
faced by IBM. Queensland health organization
finally taken legal action against the company.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
3. Do some research on the use of IT by
hospitals/health departments – give
examples of success stories of IT
implementations and outline reasons for
the success.
Information technology is the best part
of Queensland organization manage the
business operations and process in effective
manner. Extensive system testing is the best
factor for organization and this testing is more
extensive for greater success. Queensland
health organization is implementing the project
only for employees.
Health care services includes different
areas such as administrative, clinical and
financial (Jennings & Stadler, 2015).
For example- Queensland organization
is linked with IBM to provide the best quality
of service to their customer. This organization
designed and develop an efficient program by
using information technology which help in
managing the interdepartmental operations
including administrative staff, physicians,
employee nurses etc. This organization is
improving patient satisfaction or hospital
facilities and services. The Queensland help for
increasing their efficiency and capability.
They are also using own portal system
to perform different operations such as online
payment services, technical equipment,
computer system artificial hardware etc. this
system will help in diagnosing the diseases and
its stages (Jonas & Mansfeld, 2017).
Reason of success-
There is some important reason of success the
Queensland organization. This organization is
providing the best services to their customers.
This is the best things for increasing the
efficiency. Information technology is
expanding all over the world.
hospitals/health departments – give
examples of success stories of IT
implementations and outline reasons for
the success.
Information technology is the best part
of Queensland organization manage the
business operations and process in effective
manner. Extensive system testing is the best
factor for organization and this testing is more
extensive for greater success. Queensland
health organization is implementing the project
only for employees.
Health care services includes different
areas such as administrative, clinical and
financial (Jennings & Stadler, 2015).
For example- Queensland organization
is linked with IBM to provide the best quality
of service to their customer. This organization
designed and develop an efficient program by
using information technology which help in
managing the interdepartmental operations
including administrative staff, physicians,
employee nurses etc. This organization is
improving patient satisfaction or hospital
facilities and services. The Queensland help for
increasing their efficiency and capability.
They are also using own portal system
to perform different operations such as online
payment services, technical equipment,
computer system artificial hardware etc. this
system will help in diagnosing the diseases and
its stages (Jonas & Mansfeld, 2017).
Reason of success-
There is some important reason of success the
Queensland organization. This organization is
providing the best services to their customers.
This is the best things for increasing the
efficiency. Information technology is
expanding all over the world.
An advancement of technology is useful for
improving health care services:
The electronic health record- It is an efficient
platform for storing the information of patient
and organizations. The electronic health record
is digital version of patient’s documentation
chart and it is based on real time, record the
detail and information of particular patient.
This system will help in providing security and
safety. It contains different details such as:
Contain customer medications,
treatment plans, laboratory, test
outcomes, diagnoses, allergies,
appointment dates and time, medical
history etc.
It allows accessing the evidence by
using tools that help for taking decision
about patient’s health and care. This electronic health record useful for
providing workflow of streamline and
automate.
M-health – Mobile health is health care device
which help in checking the actual condition of
patients. It is tool in order to test the health
conditions. M-health device is based on
advance technology and useful for providing
the information of particular diseases. For
example- blood pressure can be identified with
the help of instrument. Mobile health device is
an essential for each and every people for
calculating the actual issue and complications
with the help of mobile device.
Portal technology- portal technology is the
best platform providing the facilities and
services for company to manage detail. This
platform allows accessing information
effectively and efficiently (Kerzner & Kerzner,
2017). Portal system is a process that collect or
store information in efficient manner. Hospital
and health department uses own system for
maintaining their services. This is useful for
patient to determine the appointment time;
schedule and it also maintains the information
of particular patients and customer.
improving health care services:
The electronic health record- It is an efficient
platform for storing the information of patient
and organizations. The electronic health record
is digital version of patient’s documentation
chart and it is based on real time, record the
detail and information of particular patient.
This system will help in providing security and
safety. It contains different details such as:
Contain customer medications,
treatment plans, laboratory, test
outcomes, diagnoses, allergies,
appointment dates and time, medical
history etc.
It allows accessing the evidence by
using tools that help for taking decision
about patient’s health and care. This electronic health record useful for
providing workflow of streamline and
automate.
M-health – Mobile health is health care device
which help in checking the actual condition of
patients. It is tool in order to test the health
conditions. M-health device is based on
advance technology and useful for providing
the information of particular diseases. For
example- blood pressure can be identified with
the help of instrument. Mobile health device is
an essential for each and every people for
calculating the actual issue and complications
with the help of mobile device.
Portal technology- portal technology is the
best platform providing the facilities and
services for company to manage detail. This
platform allows accessing information
effectively and efficiently (Kerzner & Kerzner,
2017). Portal system is a process that collect or
store information in efficient manner. Hospital
and health department uses own system for
maintaining their services. This is useful for
patient to determine the appointment time;
schedule and it also maintains the information
of particular patients and customer.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Remote monitoring tools-This tool is useful
for patient worldwide and it is helpful for
monitoring the system. It also helps patient to
reduce the cost and unnecessary visits to
physician’s office. This tool will collect
information about applications and hardware.
Information technology service provider helps
in solving the problem and issues. There are
different tools such as remote desktop
monitoring, support and customer information.
ERP and SAP system helps for
organization to test the complete parallel pay
testing and performed different operations.
There is some important reason for project
success discuss in given below:
System testing and data quality- Extensive
system testing is the main factor which help in
providing the best quality of services.
Queensland Health project cannot be test
completely and it classified the defects into
different categories. Data is an essential part of
organization which help in performing
different operations. There are important
reasons for successful project:
Client consultant relationship
project management
Effective communication
Communication- communication problem is
the main factor that affect the entire business
process. Queensland organisation and IBM has
lack of communication that affect the entire
business project. It is required for health
department to maintain good relationship with
client and consultant.
Project management and complexity- Project
complexity is developed many complications
in the entire project. The lack of clarity about
the government role and lack of single project
accountability.
Client consultant relationship complexity- The
relationship between client and consultant is
also important for organization to manage the
business aspects.
What would you recommend the Health
Department to do to fix the current
problems?
Health department playing important
role for fixing the problem in hospital and
department. There are different types of
problem discuss:
Client consultant relationship
complexity- The relationship between client
and consultant is the main important factor
because sometimes, it creates an effective
bound between Queensland organization and
IBM. A poor consultant relationship is
generated in effective communication. This is
for patient worldwide and it is helpful for
monitoring the system. It also helps patient to
reduce the cost and unnecessary visits to
physician’s office. This tool will collect
information about applications and hardware.
Information technology service provider helps
in solving the problem and issues. There are
different tools such as remote desktop
monitoring, support and customer information.
ERP and SAP system helps for
organization to test the complete parallel pay
testing and performed different operations.
There is some important reason for project
success discuss in given below:
System testing and data quality- Extensive
system testing is the main factor which help in
providing the best quality of services.
Queensland Health project cannot be test
completely and it classified the defects into
different categories. Data is an essential part of
organization which help in performing
different operations. There are important
reasons for successful project:
Client consultant relationship
project management
Effective communication
Communication- communication problem is
the main factor that affect the entire business
process. Queensland organisation and IBM has
lack of communication that affect the entire
business project. It is required for health
department to maintain good relationship with
client and consultant.
Project management and complexity- Project
complexity is developed many complications
in the entire project. The lack of clarity about
the government role and lack of single project
accountability.
Client consultant relationship complexity- The
relationship between client and consultant is
also important for organization to manage the
business aspects.
What would you recommend the Health
Department to do to fix the current
problems?
Health department playing important
role for fixing the problem in hospital and
department. There are different types of
problem discuss:
Client consultant relationship
complexity- The relationship between client
and consultant is the main important factor
because sometimes, it creates an effective
bound between Queensland organization and
IBM. A poor consultant relationship is
generated in effective communication. This is
the most important problem which is
recommended for health department to fix this
issue. For example- Queensland health
organization and IBM are managing their
relationship by using contractor. corptech is
responsible for engaged with organizations.
IBM is also satisfied both corptech and
Queensland health.
Project management and governance
complexity- The lack of requirement and
underestimation complexity is the major
problem in health department. Queensland
project implementing in the business process
for managing the entire operations and
functions. Some challenges encountered in
project management system. It is required for
health department to manage project and
improve their ability to plan effective
strategies. This planning will help for control
complexity. Queensland health implementation
is extreme challenging for managing and
controlling the project.
recommended for health department to fix this
issue. For example- Queensland health
organization and IBM are managing their
relationship by using contractor. corptech is
responsible for engaged with organizations.
IBM is also satisfied both corptech and
Queensland health.
Project management and governance
complexity- The lack of requirement and
underestimation complexity is the major
problem in health department. Queensland
project implementing in the business process
for managing the entire operations and
functions. Some challenges encountered in
project management system. It is required for
health department to manage project and
improve their ability to plan effective
strategies. This planning will help for control
complexity. Queensland health implementation
is extreme challenging for managing and
controlling the project.
4. Why was ‘’Work-brain’’ not utilized
properly?
Work brain is not utilised properly
because of unsubstantiated position of brain
and it is required for team member should
performing progressive implementation
methodology of Queensland health. It is rolling
out the system in one location.
Queensland organization is
implementing the ESP and LATTICE roasting
solution. Creating interface between the
different system to increase the brain solutions.
It is associated with system to test the
maintenance and update etc.
Queensland health service is minimized
the complexity of project because they are
following department of housing
implementation for changing the structure and
requirement of health. Therefore, it is not
implementing the brain work solution and
performing different interpretation into SAP. It
helps for reducing complexity and risk (aeda,
Sekimoto & Seto, 2016).
Communication issues- Communication is the
most common part of project management.
Effective communications required for health
department to minimize the user resistance. It
is directly impact on positive ways. For
Example- Queensland health organization use
effective communication which help for
utilizing with consultants and employee.
properly?
Work brain is not utilised properly
because of unsubstantiated position of brain
and it is required for team member should
performing progressive implementation
methodology of Queensland health. It is rolling
out the system in one location.
Queensland organization is
implementing the ESP and LATTICE roasting
solution. Creating interface between the
different system to increase the brain solutions.
It is associated with system to test the
maintenance and update etc.
Queensland health service is minimized
the complexity of project because they are
following department of housing
implementation for changing the structure and
requirement of health. Therefore, it is not
implementing the brain work solution and
performing different interpretation into SAP. It
helps for reducing complexity and risk (aeda,
Sekimoto & Seto, 2016).
Communication issues- Communication is the
most common part of project management.
Effective communications required for health
department to minimize the user resistance. It
is directly impact on positive ways. For
Example- Queensland health organization use
effective communication which help for
utilizing with consultants and employee.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TASK B
Risk management strategies associated with
information technology
Risks associated with information technology
Information technology risk is
generated by computers, hardware and
networks so it is required for business process
to aware about the range and nature of risks in
the entire system. The increasing role of
information systems in functional activities of
hospitals has made it necessary for these
institutes to consider the risk management.
From the given case study of Queensland
hospital, it is clearly evident that a single
failure can severely affect the performance of
organisations. The information technology has
made the functional activities very easier and
less time consuming (Marchewka, 2014). This
feature has encouraged hospitals to implement
IT in their routine activities. The hospitals use
IT for managing the records of their
employees, details of patients, biometric
information of their patients and various
departments as well as schedule of doctors. It
allows them to process and exchange this huge
amount of information quickly and with higher
accuracy (Rodríguez, Ortega & Concepción,
2017). However, there are certain risks
associated with this technical advancement.
Some of these risks are as follows:
The corrupt system or complexity in
hardware can lead to complete removal
of information stored on these IT
structures. Hospitals have to manage
biometric information of their patients.
This type of information is always
required for future references in
treatment procedure. The information
loss can cause severe difficulty for
patients to seek medical diagnosis in
the future (TaylorFritsch & Liederbach,
2014).
The cyber threats such as attacks from
virus, hacking, ransomware can affect
the working of hospitals. IT system of
hospitals and other organisations
consist of sensitive information related
to their patients, employees and doctors
(Ren & Dewan, 2015). This
information can be misused for
monetary frauds and other actions
harming individuals’ privacy (Kerzner
& Kerzner, 2017).
IT infrastructure can also be exposed to
disasters such as fire accidents and
other natural events such as flood or
cyclones. These events can abolish the
network completely and may require
higher cost for reinstallation and
securing of stored data.
The organisations can reduce these risks by Risk management strategies for managing IT
Risk management strategies associated with
information technology
Risks associated with information technology
Information technology risk is
generated by computers, hardware and
networks so it is required for business process
to aware about the range and nature of risks in
the entire system. The increasing role of
information systems in functional activities of
hospitals has made it necessary for these
institutes to consider the risk management.
From the given case study of Queensland
hospital, it is clearly evident that a single
failure can severely affect the performance of
organisations. The information technology has
made the functional activities very easier and
less time consuming (Marchewka, 2014). This
feature has encouraged hospitals to implement
IT in their routine activities. The hospitals use
IT for managing the records of their
employees, details of patients, biometric
information of their patients and various
departments as well as schedule of doctors. It
allows them to process and exchange this huge
amount of information quickly and with higher
accuracy (Rodríguez, Ortega & Concepción,
2017). However, there are certain risks
associated with this technical advancement.
Some of these risks are as follows:
The corrupt system or complexity in
hardware can lead to complete removal
of information stored on these IT
structures. Hospitals have to manage
biometric information of their patients.
This type of information is always
required for future references in
treatment procedure. The information
loss can cause severe difficulty for
patients to seek medical diagnosis in
the future (TaylorFritsch & Liederbach,
2014).
The cyber threats such as attacks from
virus, hacking, ransomware can affect
the working of hospitals. IT system of
hospitals and other organisations
consist of sensitive information related
to their patients, employees and doctors
(Ren & Dewan, 2015). This
information can be misused for
monetary frauds and other actions
harming individuals’ privacy (Kerzner
& Kerzner, 2017).
IT infrastructure can also be exposed to
disasters such as fire accidents and
other natural events such as flood or
cyclones. These events can abolish the
network completely and may require
higher cost for reinstallation and
securing of stored data.
The organisations can reduce these risks by Risk management strategies for managing IT
implementing the risk management strategies
in their planning and procedures. These
methods involve various stages such as risk
identification, assessment and mitigation,
response plans and review strategies (Wang,
2016).
General information threats in hospital
industry:
There are important threats includes in the
system describe in given below:
Hardware and software failure-
Hardware and software failure is the most
common problem in hospital industry because
it can damage the entire system, power loss
and data corruptions. Sometimes, data has been
lost due to technical issues and problem.
Hospital always maintain their software and
update on time. It is required for managing the
business process effectively and efficiently
Malware- malware is a type of
software that is designed for disrupting the
computer system. It can damage the operations
and functions of particular system. Attacker
used this software for attacking the entire
details and information of particular
organizations. It will corrupt the entire file and
system.
Spam, scams and phishing- Spam and
Scam is unwanted text and email that is sensed
by hacker. This software will fool the customer
to damage the entire process of computer
structures: The hospitals must include
these policies in their activities so that IT risks
can be eliminated. The risks of information
technology can be avoided by developing
proper understanding of legal aspects of IT
(Rodríguez, Ortega & Concepción, 2017). For
example, hospitals will implement a data
protection technology only when they will be
aware that it is their legal responsibility to
respect the privacy of their patients and
employees. Risk management strategy is
important part of hospital industry to determine
the solution of particular issue and problem.
Every hospital is planning an effective strategy
for identifying the need and requirement of
business. It is a necessary part for hospital and
health department to control and manage
effective manner. The hospital must implement
following strategies for enhancing the
effectiveness and security of their IT
structures.
Risk identification and assessment:
For sustaining the continuous growth, it
is necessary for the organisations to develop
understanding of possible risks. The risks can
be internal as well as external. For example,
the employees of hospital can themselves steal
the passwords and can make unauthorised
transactions (Jonas & Mansfeld, 2017).
Similarly, there are possibilities that cyber
threats such as suspicious software's attack IT
in their planning and procedures. These
methods involve various stages such as risk
identification, assessment and mitigation,
response plans and review strategies (Wang,
2016).
General information threats in hospital
industry:
There are important threats includes in the
system describe in given below:
Hardware and software failure-
Hardware and software failure is the most
common problem in hospital industry because
it can damage the entire system, power loss
and data corruptions. Sometimes, data has been
lost due to technical issues and problem.
Hospital always maintain their software and
update on time. It is required for managing the
business process effectively and efficiently
Malware- malware is a type of
software that is designed for disrupting the
computer system. It can damage the operations
and functions of particular system. Attacker
used this software for attacking the entire
details and information of particular
organizations. It will corrupt the entire file and
system.
Spam, scams and phishing- Spam and
Scam is unwanted text and email that is sensed
by hacker. This software will fool the customer
to damage the entire process of computer
structures: The hospitals must include
these policies in their activities so that IT risks
can be eliminated. The risks of information
technology can be avoided by developing
proper understanding of legal aspects of IT
(Rodríguez, Ortega & Concepción, 2017). For
example, hospitals will implement a data
protection technology only when they will be
aware that it is their legal responsibility to
respect the privacy of their patients and
employees. Risk management strategy is
important part of hospital industry to determine
the solution of particular issue and problem.
Every hospital is planning an effective strategy
for identifying the need and requirement of
business. It is a necessary part for hospital and
health department to control and manage
effective manner. The hospital must implement
following strategies for enhancing the
effectiveness and security of their IT
structures.
Risk identification and assessment:
For sustaining the continuous growth, it
is necessary for the organisations to develop
understanding of possible risks. The risks can
be internal as well as external. For example,
the employees of hospital can themselves steal
the passwords and can make unauthorised
transactions (Jonas & Mansfeld, 2017).
Similarly, there are possibilities that cyber
threats such as suspicious software's attack IT
system. It is unsolicited email that foo the
people into providing the fraud information
(Jonas & Mansfeld, 2017).
Human error- Human error is the most
common problem that arise in data processing,
careless of data disposal and accidentals
opening and infected email attachment etc.
Human error is the common issue because
many people to do wrong mistake for operating
the computer system.
Risk mitigation methods:
Risk mitigation is a process for
planning to develop many options and actions
that help for enhancing the opportunities. This
method is useful for reducing the threats in the
hospital system (Jonas & Mansfeld, 2017).
This is an implementation process of executing
different risk mitigation action the system This
process is monitoring, controlling, planning,
identifying risk, evaluating risk and tracking
risk etc. these are different operations
performed by risk mitigation method. This is
the most important stage in IT risk
management plan. In this stage organisation
makes necessary steps which can handle the
risks affecting information technology of
projects. The hospital can use following
methods to manage and deal with its security
concerns:
The hospital management must monitor
the action of its employees regularly so
system of these hospitals. In all such cases it is
important for these organisations to identify
these risk in prior so that appropriate strategies
can be made to avoid them. Risk identification
is the most common planning to identify the
risk in the computer system. Hospital uses
information technology to increase their
efficiency.
In this way, it can increase their speed and
capability but nowadays, there are so much risk
in information technology due to increase of
cyber-attack. This is the most common
problem arise in business that is damage the
entire process. Risk management is a concept
for managing business operations and
functions. Information technology team using
tools and device that useful for identifying the
threats and unwanted software in the system. It
is very beneficial for hospital to protect their
data and information (Jonas & Mansfeld,
2017).
Response plans:
The another strategy for project risk
governance is the development of response
plan. The mere implementation of mitigation
plans and actions is not sufficient to ensure the
risk free project administration (Jonas &
Mansfeld, 2017). It also requires the response
plan for the strategy. Despite several strategies
there are possibilities that information
people into providing the fraud information
(Jonas & Mansfeld, 2017).
Human error- Human error is the most
common problem that arise in data processing,
careless of data disposal and accidentals
opening and infected email attachment etc.
Human error is the common issue because
many people to do wrong mistake for operating
the computer system.
Risk mitigation methods:
Risk mitigation is a process for
planning to develop many options and actions
that help for enhancing the opportunities. This
method is useful for reducing the threats in the
hospital system (Jonas & Mansfeld, 2017).
This is an implementation process of executing
different risk mitigation action the system This
process is monitoring, controlling, planning,
identifying risk, evaluating risk and tracking
risk etc. these are different operations
performed by risk mitigation method. This is
the most important stage in IT risk
management plan. In this stage organisation
makes necessary steps which can handle the
risks affecting information technology of
projects. The hospital can use following
methods to manage and deal with its security
concerns:
The hospital management must monitor
the action of its employees regularly so
system of these hospitals. In all such cases it is
important for these organisations to identify
these risk in prior so that appropriate strategies
can be made to avoid them. Risk identification
is the most common planning to identify the
risk in the computer system. Hospital uses
information technology to increase their
efficiency.
In this way, it can increase their speed and
capability but nowadays, there are so much risk
in information technology due to increase of
cyber-attack. This is the most common
problem arise in business that is damage the
entire process. Risk management is a concept
for managing business operations and
functions. Information technology team using
tools and device that useful for identifying the
threats and unwanted software in the system. It
is very beneficial for hospital to protect their
data and information (Jonas & Mansfeld,
2017).
Response plans:
The another strategy for project risk
governance is the development of response
plan. The mere implementation of mitigation
plans and actions is not sufficient to ensure the
risk free project administration (Jonas &
Mansfeld, 2017). It also requires the response
plan for the strategy. Despite several strategies
there are possibilities that information
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
that the internal threats can be
eliminated. For accomplishing this IT
department must monitor the activities
of its employees such as which data
they are accessing and what type of
data each individual can access (Jonas
& Mansfeld, 2017). An example can be
considered such as only doctors must
have authority to modify the biometric
parameters of patients. Whenever any
other employee tries to do it, this
should be bringing into notice and
necessary actions must be taken.
The system applications of hospital
must have strong passwords and highly
advanced security features such as data
encryption, antivirus and backup
facilities. It will not only manage the
effect of risk but will also help
organisation to recover after the critical
damage to information technology.
technology risks can trigger the system. Thus,
for such situation IT expert’s emphasis on this
strategy to diminish the losses. The response
plan provides the guidelines to the organisation
so that when IT infrastructure is under risk
then they can take appropriate actions (Taylor,
Fritsch & Liederbach, 2014). For instance,
when hospital observes that their payment
system is not working or their websites and
social media accounts are hacked then they
must immediately report the incident to the
cyber-crime branch. This will help organisation
to quickly recover and to take strict actions
against suspect.
Network traffic must be monitored and
handled with careful plan. For each of
the activity clear guidelines must be
there. Such strategy helps hospital to
limit the exposure of information to
risks.
With regular advancements in
technology the challenges in cyber
threats are also increasing day by day
Review of strategy:
For effective implementation of the
above strategies it is recommended to establish
a review committee which can analyse the
results and performance of the above actions.
This review body must conduct interaction
sessions so that awareness can be created
among employees of hospital. These training
sessions will guide them regarding methods for
improving the security. The training sessions
eliminated. For accomplishing this IT
department must monitor the activities
of its employees such as which data
they are accessing and what type of
data each individual can access (Jonas
& Mansfeld, 2017). An example can be
considered such as only doctors must
have authority to modify the biometric
parameters of patients. Whenever any
other employee tries to do it, this
should be bringing into notice and
necessary actions must be taken.
The system applications of hospital
must have strong passwords and highly
advanced security features such as data
encryption, antivirus and backup
facilities. It will not only manage the
effect of risk but will also help
organisation to recover after the critical
damage to information technology.
technology risks can trigger the system. Thus,
for such situation IT expert’s emphasis on this
strategy to diminish the losses. The response
plan provides the guidelines to the organisation
so that when IT infrastructure is under risk
then they can take appropriate actions (Taylor,
Fritsch & Liederbach, 2014). For instance,
when hospital observes that their payment
system is not working or their websites and
social media accounts are hacked then they
must immediately report the incident to the
cyber-crime branch. This will help organisation
to quickly recover and to take strict actions
against suspect.
Network traffic must be monitored and
handled with careful plan. For each of
the activity clear guidelines must be
there. Such strategy helps hospital to
limit the exposure of information to
risks.
With regular advancements in
technology the challenges in cyber
threats are also increasing day by day
Review of strategy:
For effective implementation of the
above strategies it is recommended to establish
a review committee which can analyse the
results and performance of the above actions.
This review body must conduct interaction
sessions so that awareness can be created
among employees of hospital. These training
sessions will guide them regarding methods for
improving the security. The training sessions
(Four Types of Risk Mitigation and
BCM Governance, Risk and
Compliance, 2013). The hacker can
find new ways to steal the information.
Thus, it is necessary for IT experts that
they must update their knowledge and
skills so that hospital management
system is always prepared to minimize
the damages from sudden events of
networking attacks.
The information exchanged via emails
and other communication systems must
be encrypted so that there are the least
possibilities to access them without
permission. The application system and
software of the organisation must have
strong password for authentication
procedures (Jonas & Mansfeld, 2017).
The regulating bodies of the hospital
must make strict regulations so that
sensitive information such as
passwords of database and records are
not shared to unauthorised persons.
Strict polices must be framed to avoid
such incidents. It will help hospital to
deal with IT risks which are caused due
to misuse of the assigned rights to
individuals.
These mitigation strategies are
considered integral part of the risk
management in IT. Their
can teach employees that how they can update
the security features of their systems and they
must not open suspicious emails or links. It
will help the organisation to eliminate the risks
due to internal errors.
The risk governing committee also
monitors that risk mitigation strategies are
effectively implemented within hospital
(Marchewka, 2014). They also discuss
regarding the improvements which could be
made in the information technology for
enhancing the security attributes. When this
committee observes any weak point in the
security framework they immediately take
action against it. Hence, it is very necessary to
establish such monitoring groups within
organisation. The regular monitoring and
awareness can be highly effective in improving
the performance and quality of IT
infrastructure and successful project
implementation (Jonas & Mansfeld, 2017)).
There are different type of risk mitigation
handling options includes:
Assume and accept- This option is
acknowledged of particular risk and taking
right decision to accept all the issue without
engaging in special efforts. For maintaining the
project, it is required for control the process of
hospital management system.
Avoid- This option will reduce the risk on the
system and it also eliminates the constraints
BCM Governance, Risk and
Compliance, 2013). The hacker can
find new ways to steal the information.
Thus, it is necessary for IT experts that
they must update their knowledge and
skills so that hospital management
system is always prepared to minimize
the damages from sudden events of
networking attacks.
The information exchanged via emails
and other communication systems must
be encrypted so that there are the least
possibilities to access them without
permission. The application system and
software of the organisation must have
strong password for authentication
procedures (Jonas & Mansfeld, 2017).
The regulating bodies of the hospital
must make strict regulations so that
sensitive information such as
passwords of database and records are
not shared to unauthorised persons.
Strict polices must be framed to avoid
such incidents. It will help hospital to
deal with IT risks which are caused due
to misuse of the assigned rights to
individuals.
These mitigation strategies are
considered integral part of the risk
management in IT. Their
can teach employees that how they can update
the security features of their systems and they
must not open suspicious emails or links. It
will help the organisation to eliminate the risks
due to internal errors.
The risk governing committee also
monitors that risk mitigation strategies are
effectively implemented within hospital
(Marchewka, 2014). They also discuss
regarding the improvements which could be
made in the information technology for
enhancing the security attributes. When this
committee observes any weak point in the
security framework they immediately take
action against it. Hence, it is very necessary to
establish such monitoring groups within
organisation. The regular monitoring and
awareness can be highly effective in improving
the performance and quality of IT
infrastructure and successful project
implementation (Jonas & Mansfeld, 2017)).
There are different type of risk mitigation
handling options includes:
Assume and accept- This option is
acknowledged of particular risk and taking
right decision to accept all the issue without
engaging in special efforts. For maintaining the
project, it is required for control the process of
hospital management system.
Avoid- This option will reduce the risk on the
system and it also eliminates the constraints
implementation and monitoring is the
key responsibility of the information
technology experts of the health
institute.
CONCLUSION
From the report it can be concluded that
is necessary for the organisations to manage
and safeguard their infrastructure of
information technology. This approach is very
useful to ensure the smooth execution of the
functional activities of business. The report has
analysed the project failure in Queensland
health institute. It has evaluated the key
reasons and responsible authorities for the
event. The document has also demonstrated the
impact of these IT structures in the success of
hospitals.
Further the report has recommended the need
for health department to resolve the current
issues in their systems. This report has focused
on IT risk management strategies for achieving
the goals of organisations with the help of
information technology. Thus, it can be
concluded from the report that information
systems must be managed with appropriate
strategies so that projects can be accomplished
with better quality and improved security
aspects. It also describes the different strategies
of risk mitigation which help for managing the
business process effectively and efficiently.
and requirement. It can modify according to
the requirement and adjust programs (Maeda,
Sekimoto, and Seto, 2016).
Control- It is implementing the action and
reduce the impact on the risk.
Transfer-The higher authority of hospital
willing to accept the risk that generated in the
system.
Monitor- Hospital IT teams monitoring,
controlling the environment and some changes
affect the nature and impact on the risk.
All options are required for hospital for
developing plan and implementing strategies
effective manner.
key responsibility of the information
technology experts of the health
institute.
CONCLUSION
From the report it can be concluded that
is necessary for the organisations to manage
and safeguard their infrastructure of
information technology. This approach is very
useful to ensure the smooth execution of the
functional activities of business. The report has
analysed the project failure in Queensland
health institute. It has evaluated the key
reasons and responsible authorities for the
event. The document has also demonstrated the
impact of these IT structures in the success of
hospitals.
Further the report has recommended the need
for health department to resolve the current
issues in their systems. This report has focused
on IT risk management strategies for achieving
the goals of organisations with the help of
information technology. Thus, it can be
concluded from the report that information
systems must be managed with appropriate
strategies so that projects can be accomplished
with better quality and improved security
aspects. It also describes the different strategies
of risk mitigation which help for managing the
business process effectively and efficiently.
and requirement. It can modify according to
the requirement and adjust programs (Maeda,
Sekimoto, and Seto, 2016).
Control- It is implementing the action and
reduce the impact on the risk.
Transfer-The higher authority of hospital
willing to accept the risk that generated in the
system.
Monitor- Hospital IT teams monitoring,
controlling the environment and some changes
affect the nature and impact on the risk.
All options are required for hospital for
developing plan and implementing strategies
effective manner.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
REFERENCES
Books and Journals:
Barik, R.K., Das, P.K. & Lenka, R.K. (2016). January. Development and implementation of
SOA based SDI model for tourism information infrastructure management web services.
In Cloud System and Big Data Engineering (Confluence), 2016 6th International
Conference (pp. 748-753). IEEE.
Borena, B. & Negash, S. (2016). IT infrastructure role in the success of a banking system: The
case of limited broadband access. Information Technology for Development, 22(2),
pp.265-278.
Boyes, G.A., Ellul, C. & Irwin, D. (2017). October. Exploring BIM for Operational Integrated
Asset Management-A Preliminary Study Utilising Real-world Infrastructure Data.
In ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information
Sciences (Vol. 4, No. 4W5, pp. 49-56).
Diwan, S.A., Ghaleb, M.H. & Abd, M.H. (2018). Risk Management Framework and Evaluation:
Detail Site Study and Governance of Information Security Risk Management in Medical
Information Technology Infrastructure in Hospitals. Indian Journal of Science and
Technology, 11(14).
Jennings, B. & Stadler, R. (2015). Resource management in clouds: Survey and research
challenges. Journal of Network and Systems Management, 23(3), pp.567-619.
Jonas, A., & Mansfeld, Y. (2017). Exploring the interplay between the use of risk-related
information, risk perception formation, and the stages of travel product
consumption.Current Issues in Tourism, 20(14), 1470-1488.
Kerzner, H., & Kerzner, H. R. (2017). Project management: a systems approach to planning,
scheduling, and controlling. John Wiley & Sons.
Maeda, H., Sekimoto, Y. & Seto, T. (2016). May. An easy infrastructure management method
using on-board smartphone images and citizen reports by deep neural network.
In Proceedings of the Second International Conference on IoT in Urban Space (pp. 111-
113). ACM.
Marchewka, J. T. (2014). Information technology project management. John Wiley & Sons.
Ren, F. & Dewan, S. (2015). Industry-level analysis of information technology return and risk:
what explains the variation?. Journal of Management Information Systems,32(2), 71-103.
Books and Journals:
Barik, R.K., Das, P.K. & Lenka, R.K. (2016). January. Development and implementation of
SOA based SDI model for tourism information infrastructure management web services.
In Cloud System and Big Data Engineering (Confluence), 2016 6th International
Conference (pp. 748-753). IEEE.
Borena, B. & Negash, S. (2016). IT infrastructure role in the success of a banking system: The
case of limited broadband access. Information Technology for Development, 22(2),
pp.265-278.
Boyes, G.A., Ellul, C. & Irwin, D. (2017). October. Exploring BIM for Operational Integrated
Asset Management-A Preliminary Study Utilising Real-world Infrastructure Data.
In ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information
Sciences (Vol. 4, No. 4W5, pp. 49-56).
Diwan, S.A., Ghaleb, M.H. & Abd, M.H. (2018). Risk Management Framework and Evaluation:
Detail Site Study and Governance of Information Security Risk Management in Medical
Information Technology Infrastructure in Hospitals. Indian Journal of Science and
Technology, 11(14).
Jennings, B. & Stadler, R. (2015). Resource management in clouds: Survey and research
challenges. Journal of Network and Systems Management, 23(3), pp.567-619.
Jonas, A., & Mansfeld, Y. (2017). Exploring the interplay between the use of risk-related
information, risk perception formation, and the stages of travel product
consumption.Current Issues in Tourism, 20(14), 1470-1488.
Kerzner, H., & Kerzner, H. R. (2017). Project management: a systems approach to planning,
scheduling, and controlling. John Wiley & Sons.
Maeda, H., Sekimoto, Y. & Seto, T. (2016). May. An easy infrastructure management method
using on-board smartphone images and citizen reports by deep neural network.
In Proceedings of the Second International Conference on IoT in Urban Space (pp. 111-
113). ACM.
Marchewka, J. T. (2014). Information technology project management. John Wiley & Sons.
Ren, F. & Dewan, S. (2015). Industry-level analysis of information technology return and risk:
what explains the variation?. Journal of Management Information Systems,32(2), 71-103.
Rodríguez, A., Ortega, F., & Concepción, R. (2017). An intuitionistic method for the selection of
a risk management approach to information technology projects. Information
Sciences, 375, 202-218.
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism.
Prentice Hall Press.
Wang, Z. (2016). Thoughts on Beijing's Long-Term Rural Infrastructure Management and
Protection Issues from the Perspective of the Government to Effectively Perform Their
Duties. In Mechanical Engineering and Control Systems: Proceedings of 2015
International Conference on Mechanical Engineering and Control Systems
(MECS2015) (pp. 490-493).
Online
Four Types of Risk Mitigation and BCM Governance, Risk and Compliance. (2013). [Online]
Accessed through: <https://www.mha-it.com/2013/05/four-types-of-risk-mitigation/>
a risk management approach to information technology projects. Information
Sciences, 375, 202-218.
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism.
Prentice Hall Press.
Wang, Z. (2016). Thoughts on Beijing's Long-Term Rural Infrastructure Management and
Protection Issues from the Perspective of the Government to Effectively Perform Their
Duties. In Mechanical Engineering and Control Systems: Proceedings of 2015
International Conference on Mechanical Engineering and Control Systems
(MECS2015) (pp. 490-493).
Online
Four Types of Risk Mitigation and BCM Governance, Risk and Compliance. (2013). [Online]
Accessed through: <https://www.mha-it.com/2013/05/four-types-of-risk-mitigation/>
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
20
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
1 out of 26
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.