SlideShare a Scribd company logo
1 of 7
Running Head: RISK MANAGEMENT IN MOBILE HEALTH CARE INSTITUTIONS 1
ICT PROJECT MANAGEMENT: QUESTION TWO
Risk Management in Mobile Health Care Institutions: The Scranton Medicare’s Case Study
Name
Name of Institution
March 9, 2016
RISK MANAGEMENT IN MOBILE HEALTH CARE INSTITUTIONS 2
Risk Management in Mobile Health Care Institutions: The Scranton Medicare’s Case Study
Introduction
More than in any other discipline, risk management emerges as a very crucial element in health
care. This is affirmed by the fact that while other industries will work hard to implement risk
management strategies that mitigate and prevent financial losses, the risk management strategies
in healthcare are meant to protect patients’ health and safety. Moreover, because healthcare
parameters have evolved to a stage where mobile healthcare have become a daily aspect of
provisioning healthcare services have to necessitate more elaborate and extensive risk
management strategies (Modi & Mohanty, 2015). For efficient delivery of mobile health
services, the correct merging of the mobile devices and the existing Information Technology
systems is required such that sensitive patients’ data can safely be dispatched from one mobile
device to another. Such implementations call for efficient and timely risk response and
management strategies (Dillardm, 2015).
M-Health in Scranton Medicare
Working in a health or clinical environment requires unconstrained mobility. This is especially
evident for nurses and health providers who are always on the move to provide patients’ care at
different locations. Since the clinical information systems were first introduced in health centers,
this mobility has been considered disadvantaged by the interactions with computers. However,
popularity in use and application of mobile personal assistants such as smartphones has made it
easier to gain access to clinical data at all time and places.
M-Health, mHealth or Mobile Health can be defined as a public and medical health practice
supported by the use of mobile devices such as patient monitoring devices, mobile phones,
RISK MANAGEMENT IN MOBILE HEALTH CARE INSTITUTIONS 3
personal digital assistants (PDAs), tablets, and other wireless devices (Healthit.gov, 2015).
According to Ventola (2014), M-Health is a revolutionary strategy that is drastically changing
the outlook towards healthcare internationally. With mobile healthcare, it is possible for health
providers to access the latest medical offerings as well as the patients’ clinical data at any place
and time. Further, mHealth allows patients with chronic conditions to stay constantly in touch
with their doctors without necessarily having to be physically available at the hospital (Modi &
Mohanty, 2015).
Key Steps to Identifying and Managing Risks at Scranton Medicare
Offering mobile healthcare solutions require that the health providers understand the users’
mobile device and their mobility habits as well as how they change. This implies that all user
needs and goals, as well as the behavior of the selected apps that would ultimately drive the
expected outcomes, must first be studied sufficiently (Ventola, 2014). Also, understanding these
behaviors make it possible for Scranton to structure its education and training programs as well
as the use policies for the service (Dillardm, 2015).
Scranton Medicare needs to question and compare what the business needs versus what the entire
stakeholder community expects and also what habits and devices the customers have versus the
expected market competition and volatility. This study performed extensively allows Scranton to
confirm and establish their mobile app strategies such that all risks are adequately addressed, and
the business goals are achieved (Modi & Mohanty, 2015).
Risks in Scranton’s M-Health
Even though offering M-Health at Scranton comes as a solution to the health provisioning
industry, the solution is accompanied by a set of risks and challenges (Healthit.gov, 2015).
RISK MANAGEMENT IN MOBILE HEALTH CARE INSTITUTIONS 4
Typical risks that are likely to face Scranton Medicare while in a bid to offer M-Health solutions
can be ranked a follows; data confidentiality, market volatility, and integration with the existing
Information Technology (IT) systems. Each of these named risks has a different capacity to
affect the various stakeholders in the healthcare setup including the patients, nurses and doctors,
and the institution itself (Burton, Wu, & Prybutok, 2010).
For instance, as long as the compliance with the Health Insurance Portability and Accountability
Act is an essential requirement for Scranton, security and safeguarding of patients’ personal data
remains a critical concern for the institution. Lack of aggressive data protection strategies in
Scranton Medicare can have adverse effects on both the institution and the patients as the
stakeholders. This is affirmed by the fact that brand damage occurs when the mobile apps used in
M-Health are poorly executed or developed. If the apps are “bugged” or fail to execute, the users
become frustrated and quickly lose interest in the app. According to (Modi & Mohanty, 2015),
over 75% of the M-Health users look up for personal information, whereas less that 30% of the
M-Health institutions have mobile devices use policies (Modi & Mohanty, 2015). This implies
that if at all Scranton Medicare is to lie on the safer side; it has to have definitive rules,
regulations, and policies for its mobile health users to make sure that the Protected Health
Information (PHI) data is handled correctly.
Another risk that is most likely to affect Scranton’s organizational success is market volatility.
M-Health devices and market conditions evolve rapidly. Also, the demand for M-Health can be
fickle based on consumer habits and the latest social trends. Therefore, since all these factors
concurrent to market volatility are in the patients’ or the payers’ margin, it is important for
Scranton to keep on and stay current where the mobile health apps are updated and often
refreshed (Dillardm, 2015).
RISK MANAGEMENT IN MOBILE HEALTH CARE INSTITUTIONS 5
There is also a typical risk accompanied with the integration of M-Health parameters to the
existing IT systems within Scranton Medicare. If the mobile devices are going to work in real-
time, then it is important to integrate them into the existing health IT standards and systems.
Failure to address this risk appropriately is likely to result in delayed services delivery for
Scranton since patients’ data is not circulated to all the concerned stakeholders and health
providers a required. The exact result of such an occurrence is demeaned brand quality and
damage for Scranton Medicare (Dillardm, 2015).
Education, Training, and Policies for Risk Mitigation
There exist a large set of mitigation strategies which Scranton Medicare can adopt to ensure the
risks mentioned above do not reach their execution stage. Foremost and even before M-Health is
integrated with the existing IT systems, all the latest M-Health technologies, including their
challenges and opportunities, need to be adequately researched and studied. This way, it is
possible to identify all loopholes likely to penetrate the service during its integration and hence
the risk is neutralized (Modi & Mohanty, 2015).
Education and training, also, is an essential risk mitigation strategy. The M-Health users may
become frustrated and even lose interest in using the mobile health apps not because apps are
“bugged” or fail to execute, but because they do not know how to manipulate and use them
(Burton, Wu, & Prybutok, 2010). Therefore, training programs for community health workers,
nurses, and doctors on how to access and use the latest solutions in healthcare treatments emerge
as a crucial undertaking. Scranton could load some mobile devices with healthcare Apps and
once used by doctors and nurses; the mobile devices can be sent out to the surrounding
communities with trained community health workers that they also could teach and train each
other users (Dillardm, 2015).
RISK MANAGEMENT IN MOBILE HEALTH CARE INSTITUTIONS 6
Conclusion
Risk management is a very crucial operations strategy for all healthcare institutions. Healthcare
providers such a Scranton need to realize that however much its Mobile Health service appears
as a solution to the surrounding communities, it is accompanied by multiple threats and risks.
The above analysis provides some typical and actual risks that are likely to become Scranton’s
M-Health service. According to the analysis, all the business stakeholders including the doctors
and nurses, the patients, and the institution itself are likely to be affected diversely if any of the
risks are to be executed. As such, the paper proposes some key steps along which Scranton can
follow to identify and adequately manage these risks. Education, training, and policies for risk
mitigation at Scranton Medicare are also discussed. Most of these risk mitigation strategies insist
on establishing a correlative study to understand both the stakeholder preferences and the current
M-Health Technologies such that all possible risks are identified and neutralized at the
preliminary stages of implementing the service.
RISK MANAGEMENT IN MOBILE HEALTH CARE INSTITUTIONS 7
Reference List
Burton, P., Wu, Y., & Prybutok, V. (2010). Social network position and its relationship to the
performance of IT professionals. IEEE Computer Society, 7, 121-137.
Dillardm, J. (2015). The data analysis process: 5 steps towards better decision making. The big
sky associates, 2(1), 1-18.
Healthit.gov. (2015). Protected Health Information - Health IT makes it possible. . Retrieved
March 9, 2016, from Patients & Families | HealthIT.gov.:
http://www.healthit.gov/patients-families/what-you-can-do-protect-your-health-
information
Modi, K., & Mohanty, R. B. (2015). M-Health: Challenges, benefits, and key issues to successful
implementation. New York: White Paper. Infosys Limited.
Ventola, C. (2014). Mobile Devices and Apps for Health Care Professionals: Uses and Benefits.
Pharmacy and Therapeutics, 39(5), 356.

More Related Content

What's hot

Nur3563 group project sol1 2
Nur3563 group project sol1 2Nur3563 group project sol1 2
Nur3563 group project sol1 2JLANurse
 
Unleashing the Potential of Social Media in Drug Safety Exploring the Increas...
Unleashing the Potential of Social Media in Drug Safety Exploring the Increas...Unleashing the Potential of Social Media in Drug Safety Exploring the Increas...
Unleashing the Potential of Social Media in Drug Safety Exploring the Increas...Covance
 
MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...
MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...
MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...hiij
 
mHealth Israel: PwC emerging mhealth paths for growth
mHealth Israel: PwC emerging mhealth paths for growthmHealth Israel: PwC emerging mhealth paths for growth
mHealth Israel: PwC emerging mhealth paths for growthLevi Shapiro
 
Next Gen Pharmacy: mHealth, Wearables, and Invisibles
Next Gen Pharmacy: mHealth, Wearables, and InvisiblesNext Gen Pharmacy: mHealth, Wearables, and Invisibles
Next Gen Pharmacy: mHealth, Wearables, and InvisiblesKevin Clauson
 
Healthcare Effectiveness - Technological stepping stones to confront healthca...
Healthcare Effectiveness - Technological stepping stones to confront healthca...Healthcare Effectiveness - Technological stepping stones to confront healthca...
Healthcare Effectiveness - Technological stepping stones to confront healthca...NEORIS
 
Using technology-enabled social prescriptions to disrupt healthcare
Using technology-enabled social prescriptions to disrupt healthcareUsing technology-enabled social prescriptions to disrupt healthcare
Using technology-enabled social prescriptions to disrupt healthcareDr Sven Jungmann
 
Engaging patients through social media imshealth 2014
Engaging patients through social media imshealth 2014Engaging patients through social media imshealth 2014
Engaging patients through social media imshealth 2014Georgi Daskalov
 
IDC White Paper - Integrated Patient Record - Empowering Patient Centric Care...
IDC White Paper - Integrated Patient Record - Empowering Patient Centric Care...IDC White Paper - Integrated Patient Record - Empowering Patient Centric Care...
IDC White Paper - Integrated Patient Record - Empowering Patient Centric Care...buntib
 
Annual Results and Impact Evaluation Workshop for RBF - Day Five - New Techno...
Annual Results and Impact Evaluation Workshop for RBF - Day Five - New Techno...Annual Results and Impact Evaluation Workshop for RBF - Day Five - New Techno...
Annual Results and Impact Evaluation Workshop for RBF - Day Five - New Techno...RBFHealth
 
New technologies and Results Based Financing
New technologies and Results Based Financing New technologies and Results Based Financing
New technologies and Results Based Financing BlueSquare.org S.A.
 
Medical Informatics Update 2013 Program
Medical Informatics Update 2013 ProgramMedical Informatics Update 2013 Program
Medical Informatics Update 2013 Programpaulgoldfarb
 
mHealth Israel_Ralf Jahns_Research2Guidance_The EU Countries’ mHealth App Mar...
mHealth Israel_Ralf Jahns_Research2Guidance_The EU Countries’ mHealth App Mar...mHealth Israel_Ralf Jahns_Research2Guidance_The EU Countries’ mHealth App Mar...
mHealth Israel_Ralf Jahns_Research2Guidance_The EU Countries’ mHealth App Mar...Levi Shapiro
 
Taking the digital pulse - why healthcare providers need an urgent digital ch...
Taking the digital pulse - why healthcare providers need an urgent digital ch...Taking the digital pulse - why healthcare providers need an urgent digital ch...
Taking the digital pulse - why healthcare providers need an urgent digital ch...Rick Bouter
 

What's hot (20)

Nur3563 group project sol1 2
Nur3563 group project sol1 2Nur3563 group project sol1 2
Nur3563 group project sol1 2
 
PHRQLpeds
PHRQLpedsPHRQLpeds
PHRQLpeds
 
Unleashing the Potential of Social Media in Drug Safety Exploring the Increas...
Unleashing the Potential of Social Media in Drug Safety Exploring the Increas...Unleashing the Potential of Social Media in Drug Safety Exploring the Increas...
Unleashing the Potential of Social Media in Drug Safety Exploring the Increas...
 
Patient apps IMS
Patient apps IMSPatient apps IMS
Patient apps IMS
 
Tteh.000536
Tteh.000536Tteh.000536
Tteh.000536
 
MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...
MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...
MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...
 
mHealth Israel: PwC emerging mhealth paths for growth
mHealth Israel: PwC emerging mhealth paths for growthmHealth Israel: PwC emerging mhealth paths for growth
mHealth Israel: PwC emerging mhealth paths for growth
 
Next Gen Pharmacy: mHealth, Wearables, and Invisibles
Next Gen Pharmacy: mHealth, Wearables, and InvisiblesNext Gen Pharmacy: mHealth, Wearables, and Invisibles
Next Gen Pharmacy: mHealth, Wearables, and Invisibles
 
Healthcare Effectiveness - Technological stepping stones to confront healthca...
Healthcare Effectiveness - Technological stepping stones to confront healthca...Healthcare Effectiveness - Technological stepping stones to confront healthca...
Healthcare Effectiveness - Technological stepping stones to confront healthca...
 
Using technology-enabled social prescriptions to disrupt healthcare
Using technology-enabled social prescriptions to disrupt healthcareUsing technology-enabled social prescriptions to disrupt healthcare
Using technology-enabled social prescriptions to disrupt healthcare
 
Engaging patients through social media imshealth 2014
Engaging patients through social media imshealth 2014Engaging patients through social media imshealth 2014
Engaging patients through social media imshealth 2014
 
IDC White Paper - Integrated Patient Record - Empowering Patient Centric Care...
IDC White Paper - Integrated Patient Record - Empowering Patient Centric Care...IDC White Paper - Integrated Patient Record - Empowering Patient Centric Care...
IDC White Paper - Integrated Patient Record - Empowering Patient Centric Care...
 
Annual Results and Impact Evaluation Workshop for RBF - Day Five - New Techno...
Annual Results and Impact Evaluation Workshop for RBF - Day Five - New Techno...Annual Results and Impact Evaluation Workshop for RBF - Day Five - New Techno...
Annual Results and Impact Evaluation Workshop for RBF - Day Five - New Techno...
 
New technologies and Results Based Financing
New technologies and Results Based Financing New technologies and Results Based Financing
New technologies and Results Based Financing
 
Medical Informatics Update 2013 Program
Medical Informatics Update 2013 ProgramMedical Informatics Update 2013 Program
Medical Informatics Update 2013 Program
 
130613
130613130613
130613
 
Digital Pharma
Digital PharmaDigital Pharma
Digital Pharma
 
Karthik_Shanghai
Karthik_ShanghaiKarthik_Shanghai
Karthik_Shanghai
 
mHealth Israel_Ralf Jahns_Research2Guidance_The EU Countries’ mHealth App Mar...
mHealth Israel_Ralf Jahns_Research2Guidance_The EU Countries’ mHealth App Mar...mHealth Israel_Ralf Jahns_Research2Guidance_The EU Countries’ mHealth App Mar...
mHealth Israel_Ralf Jahns_Research2Guidance_The EU Countries’ mHealth App Mar...
 
Taking the digital pulse - why healthcare providers need an urgent digital ch...
Taking the digital pulse - why healthcare providers need an urgent digital ch...Taking the digital pulse - why healthcare providers need an urgent digital ch...
Taking the digital pulse - why healthcare providers need an urgent digital ch...
 

Similar to Ict project management question one risk management in mobile health care institutions (1)

Mobile health applications risk management framework
Mobile health applications risk management frameworkMobile health applications risk management framework
Mobile health applications risk management frameworkKipkoech Benard
 
Technology Acceptance Model for Mobile Health Systems
Technology Acceptance Model for Mobile Health SystemsTechnology Acceptance Model for Mobile Health Systems
Technology Acceptance Model for Mobile Health SystemsIOSR Journals
 
Mobile Health(mHealth): A Technology in Healthcare
Mobile Health(mHealth): A Technology in HealthcareMobile Health(mHealth): A Technology in Healthcare
Mobile Health(mHealth): A Technology in HealthcareDr. Priyanka Wandhe
 
Download the State of Healthcare Report
Download the State of Healthcare Report Download the State of Healthcare Report
Download the State of Healthcare Report D R
 
Presenter StudentInstitution Grantham UniversityDate July.docx
Presenter StudentInstitution Grantham UniversityDate July.docxPresenter StudentInstitution Grantham UniversityDate July.docx
Presenter StudentInstitution Grantham UniversityDate July.docxshpopkinkz
 
balasegaran-2015-cae-652012
balasegaran-2015-cae-652012balasegaran-2015-cae-652012
balasegaran-2015-cae-652012Sathya Bala
 
m-HEALTH- CAN IT IMPROVE INDIAN PUBLIC HEALTH SYSTEM
m-HEALTH- CAN IT IMPROVE INDIAN PUBLIC HEALTH SYSTEMm-HEALTH- CAN IT IMPROVE INDIAN PUBLIC HEALTH SYSTEM
m-HEALTH- CAN IT IMPROVE INDIAN PUBLIC HEALTH SYSTEMRuchi Dass
 
Challenges of Healthcare Application Development
Challenges of Healthcare Application DevelopmentChallenges of Healthcare Application Development
Challenges of Healthcare Application DevelopmentMarie Weaver
 
D.TALKS at D.CAMP in Seoul, South Korea
D.TALKS at D.CAMP in Seoul, South KoreaD.TALKS at D.CAMP in Seoul, South Korea
D.TALKS at D.CAMP in Seoul, South KoreaSanthosh Kumaraswamy
 
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral HealthcareAppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral HealthcareEd Dodds
 
E health in Nigeria Current Realities and Future Perspectives. A User Centric...
E health in Nigeria Current Realities and Future Perspectives. A User Centric...E health in Nigeria Current Realities and Future Perspectives. A User Centric...
E health in Nigeria Current Realities and Future Perspectives. A User Centric...Ibukun Fowe
 
How Fitness And Wellness Apps Are Transforming The Healthcare Industry In Los...
How Fitness And Wellness Apps Are Transforming The Healthcare Industry In Los...How Fitness And Wellness Apps Are Transforming The Healthcare Industry In Los...
How Fitness And Wellness Apps Are Transforming The Healthcare Industry In Los...Moon Technolabs Pvt. Ltd.
 
NURS 6050 GCU Nursing in Florida Presentation.docx
NURS 6050 GCU Nursing in Florida Presentation.docxNURS 6050 GCU Nursing in Florida Presentation.docx
NURS 6050 GCU Nursing in Florida Presentation.docxstirlingvwriters
 
A Review Role of Mobile Application for Medical Services
A Review Role of Mobile Application for Medical ServicesA Review Role of Mobile Application for Medical Services
A Review Role of Mobile Application for Medical Servicesijtsrd
 
iMinds insights on citizen health empowerment
iMinds insights on citizen health empowermentiMinds insights on citizen health empowerment
iMinds insights on citizen health empowermentiMindsinsights
 
Contemporary health-information-technology-hit-opportunities-and-challenges-j...
Contemporary health-information-technology-hit-opportunities-and-challenges-j...Contemporary health-information-technology-hit-opportunities-and-challenges-j...
Contemporary health-information-technology-hit-opportunities-and-challenges-j...KATALYSTPUBLISHINGGR
 
Contemporary health-information-technology-hit-opportunities-and-challenges
Contemporary health-information-technology-hit-opportunities-and-challengesContemporary health-information-technology-hit-opportunities-and-challenges
Contemporary health-information-technology-hit-opportunities-and-challengesKATALYSTPUBLISHINGGR1
 

Similar to Ict project management question one risk management in mobile health care institutions (1) (20)

Mobile Health
Mobile HealthMobile Health
Mobile Health
 
Mobile health applications risk management framework
Mobile health applications risk management frameworkMobile health applications risk management framework
Mobile health applications risk management framework
 
Technology Acceptance Model for Mobile Health Systems
Technology Acceptance Model for Mobile Health SystemsTechnology Acceptance Model for Mobile Health Systems
Technology Acceptance Model for Mobile Health Systems
 
Mobile Health(mHealth): A Technology in Healthcare
Mobile Health(mHealth): A Technology in HealthcareMobile Health(mHealth): A Technology in Healthcare
Mobile Health(mHealth): A Technology in Healthcare
 
my publication
my publicationmy publication
my publication
 
M health ppt 모바일 시스템
M health ppt 모바일 시스템M health ppt 모바일 시스템
M health ppt 모바일 시스템
 
Download the State of Healthcare Report
Download the State of Healthcare Report Download the State of Healthcare Report
Download the State of Healthcare Report
 
Presenter StudentInstitution Grantham UniversityDate July.docx
Presenter StudentInstitution Grantham UniversityDate July.docxPresenter StudentInstitution Grantham UniversityDate July.docx
Presenter StudentInstitution Grantham UniversityDate July.docx
 
balasegaran-2015-cae-652012
balasegaran-2015-cae-652012balasegaran-2015-cae-652012
balasegaran-2015-cae-652012
 
m-HEALTH- CAN IT IMPROVE INDIAN PUBLIC HEALTH SYSTEM
m-HEALTH- CAN IT IMPROVE INDIAN PUBLIC HEALTH SYSTEMm-HEALTH- CAN IT IMPROVE INDIAN PUBLIC HEALTH SYSTEM
m-HEALTH- CAN IT IMPROVE INDIAN PUBLIC HEALTH SYSTEM
 
Challenges of Healthcare Application Development
Challenges of Healthcare Application DevelopmentChallenges of Healthcare Application Development
Challenges of Healthcare Application Development
 
D.TALKS at D.CAMP in Seoul, South Korea
D.TALKS at D.CAMP in Seoul, South KoreaD.TALKS at D.CAMP in Seoul, South Korea
D.TALKS at D.CAMP in Seoul, South Korea
 
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral HealthcareAppImpact: A Framework for Mobile Technology in Behavioral Healthcare
AppImpact: A Framework for Mobile Technology in Behavioral Healthcare
 
E health in Nigeria Current Realities and Future Perspectives. A User Centric...
E health in Nigeria Current Realities and Future Perspectives. A User Centric...E health in Nigeria Current Realities and Future Perspectives. A User Centric...
E health in Nigeria Current Realities and Future Perspectives. A User Centric...
 
How Fitness And Wellness Apps Are Transforming The Healthcare Industry In Los...
How Fitness And Wellness Apps Are Transforming The Healthcare Industry In Los...How Fitness And Wellness Apps Are Transforming The Healthcare Industry In Los...
How Fitness And Wellness Apps Are Transforming The Healthcare Industry In Los...
 
NURS 6050 GCU Nursing in Florida Presentation.docx
NURS 6050 GCU Nursing in Florida Presentation.docxNURS 6050 GCU Nursing in Florida Presentation.docx
NURS 6050 GCU Nursing in Florida Presentation.docx
 
A Review Role of Mobile Application for Medical Services
A Review Role of Mobile Application for Medical ServicesA Review Role of Mobile Application for Medical Services
A Review Role of Mobile Application for Medical Services
 
iMinds insights on citizen health empowerment
iMinds insights on citizen health empowermentiMinds insights on citizen health empowerment
iMinds insights on citizen health empowerment
 
Contemporary health-information-technology-hit-opportunities-and-challenges-j...
Contemporary health-information-technology-hit-opportunities-and-challenges-j...Contemporary health-information-technology-hit-opportunities-and-challenges-j...
Contemporary health-information-technology-hit-opportunities-and-challenges-j...
 
Contemporary health-information-technology-hit-opportunities-and-challenges
Contemporary health-information-technology-hit-opportunities-and-challengesContemporary health-information-technology-hit-opportunities-and-challenges
Contemporary health-information-technology-hit-opportunities-and-challenges
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Ict project management question one risk management in mobile health care institutions (1)

  • 1. Running Head: RISK MANAGEMENT IN MOBILE HEALTH CARE INSTITUTIONS 1 ICT PROJECT MANAGEMENT: QUESTION TWO Risk Management in Mobile Health Care Institutions: The Scranton Medicare’s Case Study Name Name of Institution March 9, 2016
  • 2. RISK MANAGEMENT IN MOBILE HEALTH CARE INSTITUTIONS 2 Risk Management in Mobile Health Care Institutions: The Scranton Medicare’s Case Study Introduction More than in any other discipline, risk management emerges as a very crucial element in health care. This is affirmed by the fact that while other industries will work hard to implement risk management strategies that mitigate and prevent financial losses, the risk management strategies in healthcare are meant to protect patients’ health and safety. Moreover, because healthcare parameters have evolved to a stage where mobile healthcare have become a daily aspect of provisioning healthcare services have to necessitate more elaborate and extensive risk management strategies (Modi & Mohanty, 2015). For efficient delivery of mobile health services, the correct merging of the mobile devices and the existing Information Technology systems is required such that sensitive patients’ data can safely be dispatched from one mobile device to another. Such implementations call for efficient and timely risk response and management strategies (Dillardm, 2015). M-Health in Scranton Medicare Working in a health or clinical environment requires unconstrained mobility. This is especially evident for nurses and health providers who are always on the move to provide patients’ care at different locations. Since the clinical information systems were first introduced in health centers, this mobility has been considered disadvantaged by the interactions with computers. However, popularity in use and application of mobile personal assistants such as smartphones has made it easier to gain access to clinical data at all time and places. M-Health, mHealth or Mobile Health can be defined as a public and medical health practice supported by the use of mobile devices such as patient monitoring devices, mobile phones,
  • 3. RISK MANAGEMENT IN MOBILE HEALTH CARE INSTITUTIONS 3 personal digital assistants (PDAs), tablets, and other wireless devices (Healthit.gov, 2015). According to Ventola (2014), M-Health is a revolutionary strategy that is drastically changing the outlook towards healthcare internationally. With mobile healthcare, it is possible for health providers to access the latest medical offerings as well as the patients’ clinical data at any place and time. Further, mHealth allows patients with chronic conditions to stay constantly in touch with their doctors without necessarily having to be physically available at the hospital (Modi & Mohanty, 2015). Key Steps to Identifying and Managing Risks at Scranton Medicare Offering mobile healthcare solutions require that the health providers understand the users’ mobile device and their mobility habits as well as how they change. This implies that all user needs and goals, as well as the behavior of the selected apps that would ultimately drive the expected outcomes, must first be studied sufficiently (Ventola, 2014). Also, understanding these behaviors make it possible for Scranton to structure its education and training programs as well as the use policies for the service (Dillardm, 2015). Scranton Medicare needs to question and compare what the business needs versus what the entire stakeholder community expects and also what habits and devices the customers have versus the expected market competition and volatility. This study performed extensively allows Scranton to confirm and establish their mobile app strategies such that all risks are adequately addressed, and the business goals are achieved (Modi & Mohanty, 2015). Risks in Scranton’s M-Health Even though offering M-Health at Scranton comes as a solution to the health provisioning industry, the solution is accompanied by a set of risks and challenges (Healthit.gov, 2015).
  • 4. RISK MANAGEMENT IN MOBILE HEALTH CARE INSTITUTIONS 4 Typical risks that are likely to face Scranton Medicare while in a bid to offer M-Health solutions can be ranked a follows; data confidentiality, market volatility, and integration with the existing Information Technology (IT) systems. Each of these named risks has a different capacity to affect the various stakeholders in the healthcare setup including the patients, nurses and doctors, and the institution itself (Burton, Wu, & Prybutok, 2010). For instance, as long as the compliance with the Health Insurance Portability and Accountability Act is an essential requirement for Scranton, security and safeguarding of patients’ personal data remains a critical concern for the institution. Lack of aggressive data protection strategies in Scranton Medicare can have adverse effects on both the institution and the patients as the stakeholders. This is affirmed by the fact that brand damage occurs when the mobile apps used in M-Health are poorly executed or developed. If the apps are “bugged” or fail to execute, the users become frustrated and quickly lose interest in the app. According to (Modi & Mohanty, 2015), over 75% of the M-Health users look up for personal information, whereas less that 30% of the M-Health institutions have mobile devices use policies (Modi & Mohanty, 2015). This implies that if at all Scranton Medicare is to lie on the safer side; it has to have definitive rules, regulations, and policies for its mobile health users to make sure that the Protected Health Information (PHI) data is handled correctly. Another risk that is most likely to affect Scranton’s organizational success is market volatility. M-Health devices and market conditions evolve rapidly. Also, the demand for M-Health can be fickle based on consumer habits and the latest social trends. Therefore, since all these factors concurrent to market volatility are in the patients’ or the payers’ margin, it is important for Scranton to keep on and stay current where the mobile health apps are updated and often refreshed (Dillardm, 2015).
  • 5. RISK MANAGEMENT IN MOBILE HEALTH CARE INSTITUTIONS 5 There is also a typical risk accompanied with the integration of M-Health parameters to the existing IT systems within Scranton Medicare. If the mobile devices are going to work in real- time, then it is important to integrate them into the existing health IT standards and systems. Failure to address this risk appropriately is likely to result in delayed services delivery for Scranton since patients’ data is not circulated to all the concerned stakeholders and health providers a required. The exact result of such an occurrence is demeaned brand quality and damage for Scranton Medicare (Dillardm, 2015). Education, Training, and Policies for Risk Mitigation There exist a large set of mitigation strategies which Scranton Medicare can adopt to ensure the risks mentioned above do not reach their execution stage. Foremost and even before M-Health is integrated with the existing IT systems, all the latest M-Health technologies, including their challenges and opportunities, need to be adequately researched and studied. This way, it is possible to identify all loopholes likely to penetrate the service during its integration and hence the risk is neutralized (Modi & Mohanty, 2015). Education and training, also, is an essential risk mitigation strategy. The M-Health users may become frustrated and even lose interest in using the mobile health apps not because apps are “bugged” or fail to execute, but because they do not know how to manipulate and use them (Burton, Wu, & Prybutok, 2010). Therefore, training programs for community health workers, nurses, and doctors on how to access and use the latest solutions in healthcare treatments emerge as a crucial undertaking. Scranton could load some mobile devices with healthcare Apps and once used by doctors and nurses; the mobile devices can be sent out to the surrounding communities with trained community health workers that they also could teach and train each other users (Dillardm, 2015).
  • 6. RISK MANAGEMENT IN MOBILE HEALTH CARE INSTITUTIONS 6 Conclusion Risk management is a very crucial operations strategy for all healthcare institutions. Healthcare providers such a Scranton need to realize that however much its Mobile Health service appears as a solution to the surrounding communities, it is accompanied by multiple threats and risks. The above analysis provides some typical and actual risks that are likely to become Scranton’s M-Health service. According to the analysis, all the business stakeholders including the doctors and nurses, the patients, and the institution itself are likely to be affected diversely if any of the risks are to be executed. As such, the paper proposes some key steps along which Scranton can follow to identify and adequately manage these risks. Education, training, and policies for risk mitigation at Scranton Medicare are also discussed. Most of these risk mitigation strategies insist on establishing a correlative study to understand both the stakeholder preferences and the current M-Health Technologies such that all possible risks are identified and neutralized at the preliminary stages of implementing the service.
  • 7. RISK MANAGEMENT IN MOBILE HEALTH CARE INSTITUTIONS 7 Reference List Burton, P., Wu, Y., & Prybutok, V. (2010). Social network position and its relationship to the performance of IT professionals. IEEE Computer Society, 7, 121-137. Dillardm, J. (2015). The data analysis process: 5 steps towards better decision making. The big sky associates, 2(1), 1-18. Healthit.gov. (2015). Protected Health Information - Health IT makes it possible. . Retrieved March 9, 2016, from Patients & Families | HealthIT.gov.: http://www.healthit.gov/patients-families/what-you-can-do-protect-your-health- information Modi, K., & Mohanty, R. B. (2015). M-Health: Challenges, benefits, and key issues to successful implementation. New York: White Paper. Infosys Limited. Ventola, C. (2014). Mobile Devices and Apps for Health Care Professionals: Uses and Benefits. Pharmacy and Therapeutics, 39(5), 356.