logo

(PDF) Risk assessment and risk management

   

Added on  2021-04-17

17 Pages3212 Words114 Views
Running Head: RISK ASSESSMENT REPORTRISK ASSESSMENT REPORTName of StudentName of UniversityAuthor’s Note

RISK ASSESSMENT REPORT1Executive SummaryThe usage of wireless and mobile technologies in order to support the achievement ofvarious health objectives contains the ability to transform the situation of delivery of healthservices to patients all over the world. These changes are driven by a certain number offactors. Mobile Health technology provides numerous advantages to the health industry likediagnosing disease, detecting epidemic outbreak, getting better treatment suggestions,providing better assistance to the professionals, convenience, encouraging healthy behavior,education and many more. These advantages are very helpful for the field of medicine andincreases reliability of the overall system. Along with these advantages, it also providesvarious disadvantages and risks to the fields. The disadvantages include threat to privacy ofdata, inaccurate information, lack of approval and regulation and any more. Thesedisadvantages or risks are mentioned in the given report. It states the risks, theirvulnerabilities, impacts on the organization or user, signals provided by them and themitigations to the risks. It also provides the factors by which these risks can be mitigated in adetailed format in the later part of the report. I have been hired as the IT Risk Assessmentlead Consultant of the organization named Gigantic Corporation provided in the scenario. Inthis report, I would analyze and convey the risks faced by the organization which makes itface difficulty in carrying out effective decision making by the stakeholders. The reportdiscusses regarding various risks that the devices used in heath institutes for saving datamight face. These vulnerabilities are arranged in a table and represented in the report. Itfurther discusses regarding various ways to mitigate the risks faced by the devices.

RISK ASSESSMENT REPORT2Table of ContentsIntroduction................................................................................................................................3Discussion..................................................................................................................................4Risk assessment......................................................................................................................4Risk assessment for Gigantic Corporation.................................................................................4Recommendations to mitigate the risks...............................................................................10Conclusion................................................................................................................................13References................................................................................................................................14

RISK ASSESSMENT REPORT3IntroductionMobile health technology has been gaining steam since some years and numerousphysicians are utilizing tablets, smart phones, PCs and many more devices update as well asview the records of patients, email their patients and also fill prescriptions (Steinhubl, Muse& Topol, 2015). The mobile technologies for health care have brought about numerousimprovements in this field. The health institutes found it impossible to provide personalizedand accessible treatments to the patients but the introduction of various technologies havemade it possible. Mobile has affected the healthcare for providers as well as patients in atransformative way. Tele health makes it possible for the patients to connect with any doctorthey want irrespective of their geographical location. I am hired as the IT Risk Assessmentlead Consultant of the organization named Gigantic Corporation provided in the scenario. Inthis report, I would analyze and convey the risks faced by the organization which makes itface difficulty in carrying out effective decision making by the stakeholders.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risk Management: Threats, Vulnerabilities and Prevention Methods
|21
|4785
|434

Risk Assessment based on Cloud Security
|13
|4730
|351

IT Risk Management: Cloud Security
|16
|3858
|422

Risk Assessment based on Cloud Security
|11
|4088
|214

IT Risk Management: Cloud Security
|17
|3863
|237

IT Risk Management: Cyber Security
|20
|4610
|231