SlideShare a Scribd company logo
1 of 35
1
Milestone 1
Deanna Buchanan
Southern New Hampshire University
HIM-500-Q1513
Milestone 1
In the field of health informatics, particular historical events
help inform the management of health information:
1. The 1950s saw the early development of health informatics
through cybernetics and information processing. This entailed
professionals from various fields, such as clinical
documentation and epidemiology.
2. The 1960 to 2000 period saw the evolution of data analysis
and computing. Health information management was facilitated
through the development of electronic medical records systems.
Such systems are vital for health information management since
they provide real-time patient-centered records to authorized
users (Collen & Ball, 2018).
3. There is the period from 2000 to the present where
stakeholders have moved to digitize healthcare processes such
as information sharing, record keeping, and care coordination.
Guidelines
There are several guidelines for technology use that
Feather fall could implement in health information management.
For starters, the medical staff should get the relevant training
required to utilize the technology to facilitate the effective
acquisition, analysis, and protection of patient information.
Training ensures they can tackle any challenges they may
encounter to collect accurate data and analyze it in a way that
benefits patients. Additionally, the medical staff needs to ensure
that the devices they use are beyond the reach of unauthorized
individuals. This is crucial in promoting patient
confidentiality/privacy and securing pertinent data does not get
into the wrong hands (Ozair et al., 2018). Finally, medical
practitioners should provide feedback about their experiences to
ensure that the technology they use can be improved in the
future.
Standard Technologies
There are various standard technologies used in health
information management. For starters, concerning record
keeping, some of the traditional EHR technologies include Epic
Systems and Meditech. Many institutions use these two systems
due to their departmental functionality and extensive usability.
RingCentral Video is a standard technology for
videoconferencing that facilitates open communication and
interactive communications among healthcare providers.
Different practitioners can share information and work together
in real-time to facilitate effective patient care. Finally, there is
the use of Vendor-Neutral Archives (VNAs) and Picture
Archiving and Communication Systems (PACS) when it comes
to processing and storing the medical images of patients (Sirota-
Cohen et al., 2019).
How Roles at Feather fall Interact with Technology
The pertinent roles at Feather fall would interact with
technology through a simple but effective communication
system that ensures all users can get the most out of the health
management technologies on offer. Currently, the staff members
have poor training and no means of effectively communicating
with each other regarding technology use. Also, the staff
utilizes the technologies inappropriately, leading to several
regulations violations. Through effective communication, the
staff members can get training and real-time technical support
to ensure that the technological systems available are used
effectively.
Process for Evaluating New Health Information Technology
Systems
To evaluate new health information technology systems,
the systems will be checked to see the specific problems they
have been designed to tackle. These should be problems that are
relevant to the organization and its stakeholders. Second, the
usability of the system will be evaluated. All stakeholders
should have a general consensus on how easy and effective it is
to use the systems. Training materials and support services
should be in real-time (Sittig & Singh, 2019). Third, the system
will be evaluated to see if it meets the relevant government
regulations and laws and the institution's policy. This is vital in
ensuring the institution is not breaking any laws and is not
susceptible to lawsuits. Finally, the system will be evaluated for
its cost-effectiveness. The cost of purchasing the systems and
maintaining them will be considered. Ideally, the system should
be easy to upgrade and maintain to facilitate sustainability.
References
Collen, M. F., & Ball, M. J. (Eds.). (2018).
The history of medical informatics in the United States.
Springer.
Ozair, F. F., Jamshed, N., Sharma, A., & Aggarwal, P. (2018).
Ethical issues in electronic health records: A general overview.
Perspectives in Clinical Research,
6(2), 73.
Sirota-Cohen, C., Rosipko, B., Forsberg, D., & Sunshine, J. L.
(2019). Implementation and benefits of a vendor-neutral archive
and enterprise-imaging management system in an integrated
delivery network.
Journal of Digital Imaging,
32(2), 211-220.
Sittig, D. F., & Singh, H. (2019). A new socio-technical model
for studying health information technology in complex adaptive
healthcare systems. In
Cognitive informatics for biomedicine (pp. 59-80).
Springer, Cham.
HIM 500 Final Project Guidelines and Rubric
Overview
Practitioners in health information management and healthcare
informatics are expected to be keenly aware of new and
upcoming technologies that might
benefit their organization. This becomes more complex as these
individuals must also consider the impact that those
technologies might have on the practice of
medicine at their institution. When faced with new
technologies, leaders in health information management must
evaluate the state of the organization and
make an informed decision that will affect the organization as a
whole. This means addressing not just the needs of the health
information management team,
but the needs of all roles within the institution, while also
addressing any issues of compliance the organization might be
facing.
For your final project in this course, you will imagine you have
been hired as a contractor for a small medical facility to consult
on the selection of a new
technology. Their organization has been struggling, so you must
first speak to the state of the organization and then offer an
informed recommendation as to
which of the technologies would suit the organization best. The
project is divided into three milestones, which will be submitted
at various points throughout
the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Modules
Three, Five and Seven. The final product will
be submitted in Module Nine.
In this assignment, you will demonstrate your mastery of the
following course outcomes:
• Determine standard technology systems and their uses in
modern healthcare institutions through analysis of current and
historical technology use in
health information management and healthcare informatics
• Analyze the interrelationship between various professional
roles within healthcare institutions and their use of technology
systems for informing
recommendations regarding health information technology
systems
• Determine the potential impact of violating health regulations
and laws regarding health information technology systems on
healthcare organizations
• Develop health information technology recommendations for
healthcare institutions that are compliant with health
regulations and laws and ensure
ethical management of health information
• Determine effective investment of resources in health
information technology for healthcare institutions based on the
needs of the healthcare
institution
Prompt
Imagine you have been contracted to consult on the recent
developments at the Featherfall Medical Center. Featherfall has
been struggling of late; it has had a
series of problems that have prompted your hiring. It has faced
the following issues:
1. Featherfall has recently violated several government
regulations regarding the current state of its technology and
how it is being used. The technology
system is vastly out of date, and staff are not always using the
technology that is in place or they are using the technology
inappropriately. These
problems have lost the institution lots of money for not meeting
government regulations and have caused operational and ethical
problems from
inefficient and ineffective use of technology.
2. The staff at Featherfall are not well-trained on the use of
technology and do not communicate appropriately about
technology use. The roles that
pertinent to your consult are the health information management
team, the clinical staff (doctors, nurses, etc.), and
administrative staff. The health
information management team uses proper coding practices, and
the current technology system serves them well, despite its age.
However, other roles
in the hospital have had issues with the system. Clinical staff,
for instance, have had record-keeping issues both due to lack of
training on the system and
the system itself being out of date. Administrative staff within
the organization have taken issue with the lack of
communication about the technology
and its use between the various roles. When the current
technology system was chosen many years ago, the needs of
these various roles were not
considered.
You will begin by preparing for your consultation. You will
analyze the history of the field as well as determine standard
guidelines for technology use and
standard technologies used in the field. You will also prepare
information for Featherfall regarding the ramifications for
violating health laws and regulations.
Finally, you will use this information to review technology
options that could be implemented at the institution.
Specifically, the following critical elements must be addressed:
I. Preparation for Consult: In this section of your final project,
you will prepare for your consultation on the organization’s
technology choice. To prepare,
you will analyze the field of health information management for
determining standard technologies and guidelines related to
technology use in order to
inform your technology selection.
A. Analyze key historical events in the field of health
informatics for how technology has been used that could inform
the management of health
information. Be sure to support your response with appropriate
examples.
B. Determine guidelines for technology use in the field of
health information management that Featherfall could
implement. Be sure to support
your response with research.
C. Determine the standard technologies currently used in the
field of health information management. Be sure to support your
response with
research. For example, what record-keeping technologies are
typically used in the field?
D. Develop an overview of how the pertinent roles described at
Featherfall would interact with technology.
E. Describe the process you would use to evaluate new health
information technology systems. Be sure that your process will
evaluate new
systems based on how they meet the needs of the organization
and how they are compliant with health regulations and laws.
II. Health Regulations and Laws Ramifications: In this section
of your final project, you will finish your preparation by
reviewing and explaining the
ramifications for the organization if it decides to wait on
addressing its recent violations regarding technology use.
A. Determine how violating health regulations and laws
regarding technology could impact the finances of the
institution if these violations are not
addressed. Be sure to support your response with examples.
B. Determine how violating health regulations and laws
regarding technology could impact the daily operations of the
institution if these violations
are not addressed. Be sure to support your response with
examples.
C. Determine how violating health regulations and laws
regarding technology could impact the security of the health
information in the institution
if these violations are not addressed. Be sure to support your
response with examples.
http://snhu-
media.snhu.edu/files/course_repository/graduate/him/him500/hi
m500_technology_information.pdf
III. Technology System Recommendations: In this final section
of your final project, you will review the provided technology
options and make informed
recommendations to the organization regarding which
technology it should choose.
A. Determine the needs of the various roles of the organization
in a new technology.
B. Recommend a new health information technology system that
meets the following criteria. Be sure to justify how your
recommendations meet
the criteria. The new health technology must:
1. Abide by provided health regulations and laws
2. Align with the needs of all staff members of the previously
described organization
3. Esnsure the ethical management and use of health
information
C. Determine how the organization could more effectively
invest its financial resources into the recommended technology
system. Be sure to
justify your response.
D. Determine how the organization could monitor the use of the
new health information system. Be sure to justify your response.
E. Determine how the organization could effectively invest its
time into the implementation of the new health information
technology system. Be
sure to justify your response.
Milestones
Milestone One: Analyzing the Landscape/Setting the Scene
In Module Three, you will submit a discussion of the history of
healthcare information management/informatics and the current
landscape in terms of
technology. This milestone will set the stage for your project.
This milestone will be graded with the Milestone One Rubric.
Milestone Two: Moving Toward Compliance
In Module Five, you will submit an analysis of how the
company in the case study is noncompliant and the strategies
(general, not specifics) to move them
toward compliance. This milestone will be graded with the
Milestone Two Rubric.
Milestone Three: Recommendations
In Module Seven, you will submit your recommendations for
technology for the institution and how it will be implemented.
This milestone will be graded with
the Milestone Three Rubric.
Final Submission: Health Information Technology
Recommendations
In Module Nine, you will submit your final project. It should be
a complete, polished artifact containing all of the critical
elements of the final product. It should
reflect the incorporation of feedback gained throughout the
course. This submission will be graded with the Final Project
Rubric.
http://snhu-
media.snhu.edu/files/course_repository/graduate/him/him500/hi
m500_technology_information.pdf
Deliverables
Milestone Deliverable Module Due Grading
One Analyzing the Landscape/Setting the Scene Three Graded
separately; Milestone One Rubric
Two Moving Toward Compliance Five Graded separately;
Milestone Two Rubric
Three Recommendations Seven Graded separately; Milestone
Three Rubric
Final Submission: Health Information
Technology Recommendations
Nine Graded separately; Final Project Rubric
Final Project Rubric
Guidelines for Submission: Your health information technology
recommendations should be 6–8 pages in length (plus a cover
page and references) and must be
written in APA format. Use double-spacing, 12-point Times
New Roman font, and one-inch margins. All references cited in
APA format.
Critical Elements Exemplary (100%) Proficient (90%) Needs
Improvement (70%) Not Evident (0%) Value
Preparation for
Consult: Key
Historical Events
Meets “Proficient” criteria, and
examples used demonstrate a
sophisticated awareness for
how the history of health
informatics can inform the
management of health
information
Analyzes key historical events in
the field of health informatics
for how technology has been
used historically that could
inform the management of
health information, supporting
response with appropriate
examples
Analyzes key historical events in
the field of health informatics
for how technology has been
used historically that could
inform the management of
health information, supporting
response with examples, but
analysis is cursory or illogical or
examples are inappropriate
Does not analyze key historical
events in the field of health
informatics
6.2
Preparation for
Consult: Guidelines
Meets “Proficient” criteria, and
research provided
demonstrates a sophisticated
awareness of the standards for
technology use in the field of
health information
management
Determines guidelines for
technology use in the field of
health information
management that Featherfall
could implement, supporting
response with research
Determines guidelines for
technology use in the field of
health information
management that Featherfall
could implement, supporting
response with research, but
determined guidelines are
inappropriate, or supporting
research is misaligned
Does not determine guidelines
for technology use in the field
of health information
management
6.2
Preparation for
Consult: Standard
Technologies
Meets “Proficient” criteria and
demonstrates a comprehensive
awareness of the standard
technologies used in the
modern field of health
information management
Determines the standard
technologies currently used in
the field of health information
management, supporting
response with research
Determines technologies used
in the field of health
information management,
supporting response with
research, but determined
technologies are not standard
currently in the field, or
supporting research is
misaligned
Does not determine
technologies used in the field of
health information
management
6.2
Preparation for
Consult: Roles
Meets “Proficient” criteria and
demonstrates keen insight into
the interrelationship between
the various roles at the
healthcare organization
Develops an overview of how
the various roles at the
healthcare institution interact
with technology and the health
information management team
Develops an overview of how
the roles at the healthcare
institution interact with
technology and the health
information management
team, but overview is cursory
Does not develop an overview
of how the roles at the
healthcare institution interact
with technology and the health
information management team
6.2
Preparation for
Consult: Evaluate
Meets “Proficient” criteria and
demonstrates a sophisticated
evaluation process for health
information technologies
Describes the process that
would be used to evaluate new
health information technology
systems for the institution that
meet the needs of the
organization and how they are
compliant with health
regulations and laws
Describes the process that
would be used to evaluate new
health information technology
systems for the institution, but
description is cursory or
misaligned with the needs of
the organization or health laws
and regulations
Does not describe the process
that would be used to evaluate
new health information
technology systems for the
institution
6.2
Health Regulations
and Laws
Ramifications:
Finances
Meets “Proficient” criteria and
demonstrates a nuanced
appreciation of the potential
financial ramifications of
regulatory violations on
healthcare institutions
Determines how violating
health regulations and laws
regarding technology might
impact the finances of the
institution if these violations
are not addressed, supporting
response with examples
Determines how violating
health regulations and laws
regarding technology might
impact the finances of the
institution if these violations
are not addressed, supporting
response with examples, but
explanation is cursory or
illogical, or supporting
examples are misaligned
Does not determine how
violating health regulations and
laws regarding technology
might impact the finances of
the institution if these
violations are not addressed
6.2
Health Regulations
and Laws
Ramifications: Daily
Operations
Meets “Proficient” criteria and
demonstrates a nuanced
appreciation of the potential
operational ramifications of
regulatory violations on
healthcare institutions
Determines how violating
health regulations and laws
regarding technology might
impact the daily operations of
the institution if these
violations are not addressed,
supporting response with
examples
Determines how violating
health regulations and laws
regarding technology might
impact the daily operations of
the institution if these
violations are not addressed,
supporting response with
examples but explanation is
cursory or illogical, or
supporting examples are
misaligned
Does not determine how
violating health regulations and
laws regarding technology
might impact the daily
operations of the institution if
these violations are not
addressed
6.2
Health Regulations
and Laws
Ramifications:
Security
Meets “Proficient” criteria and
demonstrates a nuanced
appreciation of how regulatory
violations might impact the
security of health information
Determines how violating
health regulations and laws
regarding technology might
impact the security of the
health information in the
institution if these violations
are not addressed, supporting
response with examples
Determines how violating
health regulations and laws
regarding technology might
impact the security of the
health information in the
institution if these violations
are not addressed, supporting
response with examples, but
explanation is cursory or
illogical, or supporting
examples are misaligned
Does not determine how
violating health regulations and
laws regarding technology
might impact the security of the
health information in the
institution if these violations
are not addressed
6.2
Technology System
Recommendations:
Needs
Meets “Proficient” criteria and
demonstrates keen insight into
the potential needs of various
roles within the healthcare
organization
Determines the needs of the
various roles of the
organization in a new
technology
Determines the needs of the
various roles of the
organization in a new
technology, but determination
is cursory
Does not determine the needs
of the various roles of the
organization in a new
technology
6.2
Technology System
Recommendations:
Regulations and Laws
Meets “Proficient” criteria, and
justification demonstrates a
nuanced understanding of how
to best abide by the provided
health regulations and laws
Recommends a new health
information technology that
abides by the provided health
regulations and laws, justifying
response
Recommends new health
information technology that
abides by health regulations
and laws, but
recommendations are cursory
or not justified
Does not recommend and
justify new health information
technology that abides by
health regulations and laws
that the institution is currently
not in compliance with
6.2
Technology System
Recommendations:
Staff
Meets “Proficient” criteria, and
justification demonstrates a
nuanced appreciation of how
technologies can meet the
needs of the various staff at the
healthcare organization
Recommends a new health
information technology that
aligns with the needs of all staff
members of the organization,
justifying response
Recommends a new health
information technology that
aligns with the needs of all staff
members of the organization,
but recommendations are
cursory or not justified
Does not recommend and
justify a new health information
technology that aligns with the
needs of all staff members of
the organization
6.2
Technology System
Recommendations:
Ethical
Meets “Proficient” criteria, and
justification demonstrates a
nuanced appreciation of how
technologies can ensure the
ethical management of health
information
Recommends a new health
information technology that
ensures ethical management
and use of health information,
justifying response
Recommends a new health
information technology that
ensures ethical management
and use of health information,
but recommendations are
cursory or not justified
Does not recommend and
justify a new health information
technology that ensures ethical
management and use of health
information
6.2
Technology System
Recommendations:
Financial Resources
Meets “Proficient” criteria and
demonstrates keen insight into
various ways the organization
can financially invest in the
technology system
Determines how the
organization could more
effectively invest financial
resources into the
recommended technology
system, justifying response
Determines how the
organization could more
effectively invest financial
resources into the
recommended technology
system, but determination is
cursory, illogical, or not justified
Does not determine how the
organization could more
effectively invest financial
resources into the
recommended technology
system
6.2
Technology System
Recommendations:
Monitor
Meets “Proficient” criteria and
demonstrates keen insight into
various ways the organization
can monitor the use of the
technology system
Determines how the
organization could monitor the
use of the new health
information system, justifying
response
Determines how the
organization could monitor the
use of the new health
information system, but
determination is cursory,
illogical, or not justified
Does not determine how the
organization could monitor the
use of the new health
information system
6.2
Technology System
Recommendations:
Time
Meets “Proficient” criteria and
demonstrates keen insight into
various ways the organization
can invest time into the
implementation of the
technology system
Determines how the
organization could effectively
invest time into the
implementation of the new
health information technology
system, justifying response
Determines how the
organization could effectively
invest time into the
implementation of the new
health information technology
system, but determination is
cursory, illogical, or not justified
Does not determine how the
organization could effectively
invest time into the
implementation of the new
health information technology
system
6.2
Articulation of
Response
Submission is free of errors
related to citations, grammar,
spelling, syntax, and
organization and is presented in
a professional and easy-to-read
format
Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
Submission has major errors
related to citations, grammar,
spelling, syntax, or organization
that negatively impact
readability and articulation of
main ideas
Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas
7
Total 100%
1
2
Admission, Discharge, Transfer
System
Deanna Buchanan
SNHU
Based on the two recommended technology systems, the
organization should choose the Admission Discharge and
Transfer (ADT) system based on its numerous features and
advantages. The ADT system is a crucial component in health
care information systems and is commonly used to track
patients starting from when they get into a health care facility
to the time they are discharged or taken to another health care
facility. This information stores different forms of data;
including patients' contact information, names, age, and medical
record numbers. Implementing the ADT system in the
organization will help keep crucial information and make it
more accessible for health care professionals, besides making it
easily transferable to other health care facilities, thus improving
the quality and speed of providing health care services to
patients.
Choosing the ADT system would be the best option because it
has been attributed to various benefits, including improving
patient care, collecting more reliable information, and
interoperability. These systems usually create a workflow that
enhances the collection of crucial information upon admission
of the patient and then stores the data in a well-organized
manner. The ADT system is designed to assist in improving the
quality of patient information by ensuring that it is always
updated while increasing reliability by providing context, for
instance, historical records and notes where possible (Bartley &
Daiker, 2022). This system can play a crucial role in improving
patient care because it collects and organizes data in one easy-
to-use database. This helps health care professionals to improve
the use of patient history, which generally improves the quality
and timeliness of patient care. For instance, if a patient has a
history of a specific health condition or illness, the medical
practitioners will receive notifications immediately after the
patient is admitted to the health care facility. Due to this,
medical professionals can easily determine whether the disease
is relevant to the current concerns and take necessary action.
Additionally, the ADT system has a high level of
interoperability. The medical center can set up an ADT
interface between various hospitals and huge medical systems in
order to notify a patient's care team of admission, discharge, or
transfer to a hospital. This will allow the health care providers
outside the medical center to be well-informed on what took
place during the patient’s visit.
During the implementation of the ADT system in the medical
center, there are various ethical considerations that must be
observed. Every health care facility has to uphold various
technological principles, including accountability, data
protection, and privacy (Shahid et al., 2022). The health care
facility must ensure that patient-sensitive data is safeguarded to
prevent malicious attacks. Most patients also prefer privacy;
hence, the management must ensure that patient information is
not shared with unauthorized persons. Moreover, the
organization could invest its financial resources more
effectively into the ADT system centered on certain factors.
Based on the provided information, the medical center can
effectively invest in the technology system because the cost of
the interface, software, implementation, training, and yearly
maintenance costs is relatively lower than that of the other
recommended system.
There are different ways the organization could effectively
monitor the use of the ADT system. One of the ways would be
by deploying monitoring devices. These monitoring devices can
be placed strategically in the technology system to collect
essential information and place them at ad hoc locations to track
different types of transactions of interest to the organization.
Some of the monitoring devices that can be used include
intrusion prevention systems, audit record monitoring,
malicious code protection software, scanning tools, and network
monitoring software. Moreover, the organization could
effectively invest its time into the implementation of the ADT
system by training and educating the staff members on how to
use this technology system. Training the staff will provide
significant insights on how the system is used and minimize
mistakes which will, in turn, improve the organization's
operations and improve patient care.
References
Bartley, J., & Daiker, M. L. (2022). Technology Environment.
In The CAHIMS Review Guide (pp. 23-42). Productivity Press.
Shahid, J., Ahmad, R., Kiani, A. K., Ahmad, T., Saeed, S., &
Almuhaideb, A. M. (2022). Data protection and privacy of the
internet of healthcare things (IoHTs). Applied Sciences, 12(4),
1927.
1
2
Compliance Policies
Deanna Buchanan
SNHU
Based on the case study, the company has demonstrated
noncompliance in different ways. First, the company was
recently reported to have violated many government regulations
regarding the present state of its technology and how it utilized
that technology. During the implementation of any form of
technology in an organization, there are several rules and
regulations that all entities should comply with. However,
Featherfall does not comply with this law and regulations
because its technology system is outdated; employees are not
able to use the implemented technology while others are using it
inappropriately. Due to such cases, the company has
experienced significant losses besides experiencing operational
and ethical issues resulting from the ineffective use of
technology. Another key issue in the company is not fully
training the staff on how to use the technology, which is against
the set rules and regulations by the government. The lack of
proper training of employees has resulted in many record-
keeping issues, which might lead to inefficiency in operation
and functioning of the company.
The company must take the necessary steps to ensure that it
complies with the set rules and regulations. Compliance while
using different forms of information systems in an organization
is crucial because it prevents an organization from facing
certain issues, including legal issues or inefficiency in its
operations (De-Vaujany et al., 2018). Some of the strategies and
best practices that Featherfall should implement to enhance
compliance include holding compliance audits, implementing
compliance tools, knowing the regulatory environment,
determining compliance goals, training employees, and
reviewing compliance regulations. One of the most effective
ways to help the company comply with the rules and regulations
is to train employees on how to use new software and
information systems. Some of the ways that the relevant experts
can use to train those employees include using the right format
for training, using training incentives for workers to use the
technology, and making training a priority to improve buy-in.
Whenever employees do not follow compliance policies and
regulations, an organization fails to adhere to the set guidelines
and regulations. Training and educating the staff about the
relevant policies is necessary and ensuring that everyone is held
accountable when they do not follow the policies (Ceric et al.,
2022). It is also important for the management to ensure that it
focuses on certain areas of compliance the company needs to
improve most, including a particular law, regulation, or
violation that is costing the company a lot of money. Regular
review of compliance regulations can help the company identify
its weaknesses, which will allow it to improve and keep its
compliance efforts updated.
References
Ceric, A., Small, F., & Morrison, M. (2020). What indigenous
employees’ value in a business training programme:
implications for training design and government policies.
Journal of Vocational Education & Training, 1–21.
https://doi.org/10.1080/13636820.2020.1754886
De-Vaujany, F. X., Fomin, V. V., Haefliger, S., & Lyytinen, K.
(2018). Rules, practices, and information technology: A trifecta
of organizational regulation. Information Systems Research,
29(3), 755-773.
https://doi.org/10.1287/isre.2017.0771

More Related Content

Similar to 1Milestone 1Deanna BuchananSouthern New Hampsh

TOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docxTOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docxturveycharlyn
 
THINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docx
THINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docxTHINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docx
THINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docxrandymartin91030
 
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docxRunning head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docxsusanschei
 
COMPETIVENESS AND PERFORMANCE COMPETIVENESS AN.docx
COMPETIVENESS AND PERFORMANCE         COMPETIVENESS AN.docxCOMPETIVENESS AND PERFORMANCE         COMPETIVENESS AN.docx
COMPETIVENESS AND PERFORMANCE COMPETIVENESS AN.docxdonnajames55
 
HIM 500 Final Project Guidelines and Rubric Overview .docx
HIM 500 Final Project Guidelines and Rubric  Overview .docxHIM 500 Final Project Guidelines and Rubric  Overview .docx
HIM 500 Final Project Guidelines and Rubric Overview .docxpooleavelina
 
Development of Hospital Information Management Systems
Development of Hospital Information Management SystemsDevelopment of Hospital Information Management Systems
Development of Hospital Information Management SystemsINFOGAIN PUBLICATION
 
Nursing Informatics Part 2 Paper.docx
Nursing Informatics Part 2 Paper.docxNursing Informatics Part 2 Paper.docx
Nursing Informatics Part 2 Paper.docx4934bk
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla borokayla_ann_30
 
Nur3563 group project sol1 2
Nur3563 group project sol1 2Nur3563 group project sol1 2
Nur3563 group project sol1 2JLANurse
 
The Application of Data to Problem-SolvingIn the modern era, the.docx
The Application of Data to Problem-SolvingIn the modern era, the.docxThe Application of Data to Problem-SolvingIn the modern era, the.docx
The Application of Data to Problem-SolvingIn the modern era, the.docxtodd801
 
Assignment 2 Complementary Partners Imagine you are working wit.docx
Assignment 2 Complementary Partners Imagine you are working wit.docxAssignment 2 Complementary Partners Imagine you are working wit.docx
Assignment 2 Complementary Partners Imagine you are working wit.docxsalmonpybus
 
Introduction to Nursing Informatics
Introduction to Nursing InformaticsIntroduction to Nursing Informatics
Introduction to Nursing Informaticsjhonee balmeo
 
Transforming Nursing And Healthcare Through Technology.docx
Transforming Nursing And Healthcare Through Technology.docxTransforming Nursing And Healthcare Through Technology.docx
Transforming Nursing And Healthcare Through Technology.docxwrite5
 
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docxInformation and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docxwiddowsonerica
 
Western Kentucky University Memory Care Unit Questions.docx
Western Kentucky University Memory Care Unit Questions.docxWestern Kentucky University Memory Care Unit Questions.docx
Western Kentucky University Memory Care Unit Questions.docxwrite22
 
1. Assignment #2   Technology Project pertinent to their pract
1. Assignment #2   Technology Project pertinent to their pract1. Assignment #2   Technology Project pertinent to their pract
1. Assignment #2   Technology Project pertinent to their practTatianaMajor22
 
TECHNOLOGY USE Assignment 2.docx
TECHNOLOGY USE Assignment 2.docxTECHNOLOGY USE Assignment 2.docx
TECHNOLOGY USE Assignment 2.docxwrite31
 
Health Care Information System
Health Care Information SystemHealth Care Information System
Health Care Information SystemOkoth Morgan
 
implementing Software Codes
implementing Software Codes implementing Software Codes
implementing Software Codes Okoth Morgan
 

Similar to 1Milestone 1Deanna BuchananSouthern New Hampsh (20)

TOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docxTOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
 
THINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docx
THINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docxTHINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docx
THINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docx
 
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docxRunning head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
 
Health Information Technology Workforce Development Program Presentation
Health Information Technology Workforce Development Program PresentationHealth Information Technology Workforce Development Program Presentation
Health Information Technology Workforce Development Program Presentation
 
COMPETIVENESS AND PERFORMANCE COMPETIVENESS AN.docx
COMPETIVENESS AND PERFORMANCE         COMPETIVENESS AN.docxCOMPETIVENESS AND PERFORMANCE         COMPETIVENESS AN.docx
COMPETIVENESS AND PERFORMANCE COMPETIVENESS AN.docx
 
HIM 500 Final Project Guidelines and Rubric Overview .docx
HIM 500 Final Project Guidelines and Rubric  Overview .docxHIM 500 Final Project Guidelines and Rubric  Overview .docx
HIM 500 Final Project Guidelines and Rubric Overview .docx
 
Development of Hospital Information Management Systems
Development of Hospital Information Management SystemsDevelopment of Hospital Information Management Systems
Development of Hospital Information Management Systems
 
Nursing Informatics Part 2 Paper.docx
Nursing Informatics Part 2 Paper.docxNursing Informatics Part 2 Paper.docx
Nursing Informatics Part 2 Paper.docx
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
 
Nur3563 group project sol1 2
Nur3563 group project sol1 2Nur3563 group project sol1 2
Nur3563 group project sol1 2
 
The Application of Data to Problem-SolvingIn the modern era, the.docx
The Application of Data to Problem-SolvingIn the modern era, the.docxThe Application of Data to Problem-SolvingIn the modern era, the.docx
The Application of Data to Problem-SolvingIn the modern era, the.docx
 
Assignment 2 Complementary Partners Imagine you are working wit.docx
Assignment 2 Complementary Partners Imagine you are working wit.docxAssignment 2 Complementary Partners Imagine you are working wit.docx
Assignment 2 Complementary Partners Imagine you are working wit.docx
 
Introduction to Nursing Informatics
Introduction to Nursing InformaticsIntroduction to Nursing Informatics
Introduction to Nursing Informatics
 
Transforming Nursing And Healthcare Through Technology.docx
Transforming Nursing And Healthcare Through Technology.docxTransforming Nursing And Healthcare Through Technology.docx
Transforming Nursing And Healthcare Through Technology.docx
 
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docxInformation and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
 
Western Kentucky University Memory Care Unit Questions.docx
Western Kentucky University Memory Care Unit Questions.docxWestern Kentucky University Memory Care Unit Questions.docx
Western Kentucky University Memory Care Unit Questions.docx
 
1. Assignment #2   Technology Project pertinent to their pract
1. Assignment #2   Technology Project pertinent to their pract1. Assignment #2   Technology Project pertinent to their pract
1. Assignment #2   Technology Project pertinent to their pract
 
TECHNOLOGY USE Assignment 2.docx
TECHNOLOGY USE Assignment 2.docxTECHNOLOGY USE Assignment 2.docx
TECHNOLOGY USE Assignment 2.docx
 
Health Care Information System
Health Care Information SystemHealth Care Information System
Health Care Information System
 
implementing Software Codes
implementing Software Codes implementing Software Codes
implementing Software Codes
 

More from pearlenehodge

Research Paper – Final Submission InstructionsThe Research P.docx
Research Paper – Final Submission InstructionsThe Research P.docxResearch Paper – Final Submission InstructionsThe Research P.docx
Research Paper – Final Submission InstructionsThe Research P.docxpearlenehodge
 
Research PaperUtilizing the unit lessons, textbook, and other outs.docx
Research PaperUtilizing the unit lessons, textbook, and other outs.docxResearch PaperUtilizing the unit lessons, textbook, and other outs.docx
Research PaperUtilizing the unit lessons, textbook, and other outs.docxpearlenehodge
 
Research PaperThe research paper should be a minimum of six do.docx
Research PaperThe research paper should be a minimum of six do.docxResearch PaperThe research paper should be a minimum of six do.docx
Research PaperThe research paper should be a minimum of six do.docxpearlenehodge
 
Research Papertext bookportable literature 8th edition.Troy.docx
Research Papertext bookportable literature 8th edition.Troy.docxResearch Papertext bookportable literature 8th edition.Troy.docx
Research Papertext bookportable literature 8th edition.Troy.docxpearlenehodge
 
Research Paper Topic Induced PsychosisWord count 2000 words.docx
Research Paper Topic Induced PsychosisWord count 2000 words.docxResearch Paper Topic Induced PsychosisWord count 2000 words.docx
Research Paper Topic Induced PsychosisWord count 2000 words.docxpearlenehodge
 
Research paper instructionlThis is a group research paper req.docx
Research paper instructionlThis is a group research paper req.docxResearch paper instructionlThis is a group research paper req.docx
Research paper instructionlThis is a group research paper req.docxpearlenehodge
 
Research PaperEvery organization is faced with some kind of ris.docx
Research PaperEvery organization is faced with some kind of ris.docxResearch PaperEvery organization is faced with some kind of ris.docx
Research PaperEvery organization is faced with some kind of ris.docxpearlenehodge
 
Research paperDo subjective and objective research and answer the .docx
Research paperDo subjective and objective research and answer the .docxResearch paperDo subjective and objective research and answer the .docx
Research paperDo subjective and objective research and answer the .docxpearlenehodge
 
Research Paper Write about the argument between Swinburne .docx
Research Paper Write about the argument between Swinburne .docxResearch Paper Write about the argument between Swinburne .docx
Research Paper Write about the argument between Swinburne .docxpearlenehodge
 
research paper about breast cancer, a detailed look about it, what i.docx
research paper about breast cancer, a detailed look about it, what i.docxresearch paper about breast cancer, a detailed look about it, what i.docx
research paper about breast cancer, a detailed look about it, what i.docxpearlenehodge
 
Research Paper ProposalThe purpose of this 1-2 page proposal is .docx
Research Paper ProposalThe purpose of this 1-2 page proposal is .docxResearch Paper ProposalThe purpose of this 1-2 page proposal is .docx
Research Paper ProposalThe purpose of this 1-2 page proposal is .docxpearlenehodge
 
Research Paper 2 InstructionsYou are required to compose 1 mediu.docx
Research Paper 2 InstructionsYou are required to compose 1 mediu.docxResearch Paper 2 InstructionsYou are required to compose 1 mediu.docx
Research Paper 2 InstructionsYou are required to compose 1 mediu.docxpearlenehodge
 
research into how and to what extent the student and hisher family .docx
research into how and to what extent the student and hisher family .docxresearch into how and to what extent the student and hisher family .docx
research into how and to what extent the student and hisher family .docxpearlenehodge
 
Research into Causality and Treatment wk 3Write a 700- to 1,05.docx
Research into Causality and Treatment wk 3Write a 700- to 1,05.docxResearch into Causality and Treatment wk 3Write a 700- to 1,05.docx
Research into Causality and Treatment wk 3Write a 700- to 1,05.docxpearlenehodge
 
Research II Based on the two attached articles compare and contr.docx
Research II Based on the two attached articles compare and contr.docxResearch II Based on the two attached articles compare and contr.docx
Research II Based on the two attached articles compare and contr.docxpearlenehodge
 
RESEARCH ESSAYThe purpose of this paper is to develop an argument .docx
RESEARCH ESSAYThe purpose of this paper is to develop an argument .docxRESEARCH ESSAYThe purpose of this paper is to develop an argument .docx
RESEARCH ESSAYThe purpose of this paper is to develop an argument .docxpearlenehodge
 
Research on a future MEMS product that is currently under developmen.docx
Research on a future MEMS product that is currently under developmen.docxResearch on a future MEMS product that is currently under developmen.docx
Research on a future MEMS product that is currently under developmen.docxpearlenehodge
 
Research how social media is used in and affects various areas of in.docx
Research how social media is used in and affects various areas of in.docxResearch how social media is used in and affects various areas of in.docx
Research how social media is used in and affects various areas of in.docxpearlenehodge
 
RESEARCH ARTICLES TWO (worth 5 points each or 6 of the final grade.docx
RESEARCH ARTICLES TWO (worth 5 points each or 6 of the final grade.docxRESEARCH ARTICLES TWO (worth 5 points each or 6 of the final grade.docx
RESEARCH ARTICLES TWO (worth 5 points each or 6 of the final grade.docxpearlenehodge
 
Research Manuscript Critique Part 2In this module we learned about.docx
Research Manuscript Critique Part 2In this module we learned about.docxResearch Manuscript Critique Part 2In this module we learned about.docx
Research Manuscript Critique Part 2In this module we learned about.docxpearlenehodge
 

More from pearlenehodge (20)

Research Paper – Final Submission InstructionsThe Research P.docx
Research Paper – Final Submission InstructionsThe Research P.docxResearch Paper – Final Submission InstructionsThe Research P.docx
Research Paper – Final Submission InstructionsThe Research P.docx
 
Research PaperUtilizing the unit lessons, textbook, and other outs.docx
Research PaperUtilizing the unit lessons, textbook, and other outs.docxResearch PaperUtilizing the unit lessons, textbook, and other outs.docx
Research PaperUtilizing the unit lessons, textbook, and other outs.docx
 
Research PaperThe research paper should be a minimum of six do.docx
Research PaperThe research paper should be a minimum of six do.docxResearch PaperThe research paper should be a minimum of six do.docx
Research PaperThe research paper should be a minimum of six do.docx
 
Research Papertext bookportable literature 8th edition.Troy.docx
Research Papertext bookportable literature 8th edition.Troy.docxResearch Papertext bookportable literature 8th edition.Troy.docx
Research Papertext bookportable literature 8th edition.Troy.docx
 
Research Paper Topic Induced PsychosisWord count 2000 words.docx
Research Paper Topic Induced PsychosisWord count 2000 words.docxResearch Paper Topic Induced PsychosisWord count 2000 words.docx
Research Paper Topic Induced PsychosisWord count 2000 words.docx
 
Research paper instructionlThis is a group research paper req.docx
Research paper instructionlThis is a group research paper req.docxResearch paper instructionlThis is a group research paper req.docx
Research paper instructionlThis is a group research paper req.docx
 
Research PaperEvery organization is faced with some kind of ris.docx
Research PaperEvery organization is faced with some kind of ris.docxResearch PaperEvery organization is faced with some kind of ris.docx
Research PaperEvery organization is faced with some kind of ris.docx
 
Research paperDo subjective and objective research and answer the .docx
Research paperDo subjective and objective research and answer the .docxResearch paperDo subjective and objective research and answer the .docx
Research paperDo subjective and objective research and answer the .docx
 
Research Paper Write about the argument between Swinburne .docx
Research Paper Write about the argument between Swinburne .docxResearch Paper Write about the argument between Swinburne .docx
Research Paper Write about the argument between Swinburne .docx
 
research paper about breast cancer, a detailed look about it, what i.docx
research paper about breast cancer, a detailed look about it, what i.docxresearch paper about breast cancer, a detailed look about it, what i.docx
research paper about breast cancer, a detailed look about it, what i.docx
 
Research Paper ProposalThe purpose of this 1-2 page proposal is .docx
Research Paper ProposalThe purpose of this 1-2 page proposal is .docxResearch Paper ProposalThe purpose of this 1-2 page proposal is .docx
Research Paper ProposalThe purpose of this 1-2 page proposal is .docx
 
Research Paper 2 InstructionsYou are required to compose 1 mediu.docx
Research Paper 2 InstructionsYou are required to compose 1 mediu.docxResearch Paper 2 InstructionsYou are required to compose 1 mediu.docx
Research Paper 2 InstructionsYou are required to compose 1 mediu.docx
 
research into how and to what extent the student and hisher family .docx
research into how and to what extent the student and hisher family .docxresearch into how and to what extent the student and hisher family .docx
research into how and to what extent the student and hisher family .docx
 
Research into Causality and Treatment wk 3Write a 700- to 1,05.docx
Research into Causality and Treatment wk 3Write a 700- to 1,05.docxResearch into Causality and Treatment wk 3Write a 700- to 1,05.docx
Research into Causality and Treatment wk 3Write a 700- to 1,05.docx
 
Research II Based on the two attached articles compare and contr.docx
Research II Based on the two attached articles compare and contr.docxResearch II Based on the two attached articles compare and contr.docx
Research II Based on the two attached articles compare and contr.docx
 
RESEARCH ESSAYThe purpose of this paper is to develop an argument .docx
RESEARCH ESSAYThe purpose of this paper is to develop an argument .docxRESEARCH ESSAYThe purpose of this paper is to develop an argument .docx
RESEARCH ESSAYThe purpose of this paper is to develop an argument .docx
 
Research on a future MEMS product that is currently under developmen.docx
Research on a future MEMS product that is currently under developmen.docxResearch on a future MEMS product that is currently under developmen.docx
Research on a future MEMS product that is currently under developmen.docx
 
Research how social media is used in and affects various areas of in.docx
Research how social media is used in and affects various areas of in.docxResearch how social media is used in and affects various areas of in.docx
Research how social media is used in and affects various areas of in.docx
 
RESEARCH ARTICLES TWO (worth 5 points each or 6 of the final grade.docx
RESEARCH ARTICLES TWO (worth 5 points each or 6 of the final grade.docxRESEARCH ARTICLES TWO (worth 5 points each or 6 of the final grade.docx
RESEARCH ARTICLES TWO (worth 5 points each or 6 of the final grade.docx
 
Research Manuscript Critique Part 2In this module we learned about.docx
Research Manuscript Critique Part 2In this module we learned about.docxResearch Manuscript Critique Part 2In this module we learned about.docx
Research Manuscript Critique Part 2In this module we learned about.docx
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

1Milestone 1Deanna BuchananSouthern New Hampsh

  • 1. 1 Milestone 1 Deanna Buchanan Southern New Hampshire University HIM-500-Q1513 Milestone 1 In the field of health informatics, particular historical events help inform the management of health information: 1. The 1950s saw the early development of health informatics through cybernetics and information processing. This entailed professionals from various fields, such as clinical documentation and epidemiology. 2. The 1960 to 2000 period saw the evolution of data analysis and computing. Health information management was facilitated through the development of electronic medical records systems. Such systems are vital for health information management since they provide real-time patient-centered records to authorized users (Collen & Ball, 2018). 3. There is the period from 2000 to the present where stakeholders have moved to digitize healthcare processes such as information sharing, record keeping, and care coordination. Guidelines There are several guidelines for technology use that Feather fall could implement in health information management. For starters, the medical staff should get the relevant training
  • 2. required to utilize the technology to facilitate the effective acquisition, analysis, and protection of patient information. Training ensures they can tackle any challenges they may encounter to collect accurate data and analyze it in a way that benefits patients. Additionally, the medical staff needs to ensure that the devices they use are beyond the reach of unauthorized individuals. This is crucial in promoting patient confidentiality/privacy and securing pertinent data does not get into the wrong hands (Ozair et al., 2018). Finally, medical practitioners should provide feedback about their experiences to ensure that the technology they use can be improved in the future. Standard Technologies There are various standard technologies used in health information management. For starters, concerning record keeping, some of the traditional EHR technologies include Epic Systems and Meditech. Many institutions use these two systems due to their departmental functionality and extensive usability. RingCentral Video is a standard technology for videoconferencing that facilitates open communication and interactive communications among healthcare providers. Different practitioners can share information and work together in real-time to facilitate effective patient care. Finally, there is the use of Vendor-Neutral Archives (VNAs) and Picture Archiving and Communication Systems (PACS) when it comes to processing and storing the medical images of patients (Sirota- Cohen et al., 2019). How Roles at Feather fall Interact with Technology The pertinent roles at Feather fall would interact with technology through a simple but effective communication system that ensures all users can get the most out of the health management technologies on offer. Currently, the staff members have poor training and no means of effectively communicating
  • 3. with each other regarding technology use. Also, the staff utilizes the technologies inappropriately, leading to several regulations violations. Through effective communication, the staff members can get training and real-time technical support to ensure that the technological systems available are used effectively. Process for Evaluating New Health Information Technology Systems To evaluate new health information technology systems, the systems will be checked to see the specific problems they have been designed to tackle. These should be problems that are relevant to the organization and its stakeholders. Second, the usability of the system will be evaluated. All stakeholders should have a general consensus on how easy and effective it is to use the systems. Training materials and support services should be in real-time (Sittig & Singh, 2019). Third, the system will be evaluated to see if it meets the relevant government regulations and laws and the institution's policy. This is vital in ensuring the institution is not breaking any laws and is not susceptible to lawsuits. Finally, the system will be evaluated for its cost-effectiveness. The cost of purchasing the systems and maintaining them will be considered. Ideally, the system should be easy to upgrade and maintain to facilitate sustainability.
  • 4. References Collen, M. F., & Ball, M. J. (Eds.). (2018). The history of medical informatics in the United States. Springer. Ozair, F. F., Jamshed, N., Sharma, A., & Aggarwal, P. (2018). Ethical issues in electronic health records: A general overview. Perspectives in Clinical Research, 6(2), 73. Sirota-Cohen, C., Rosipko, B., Forsberg, D., & Sunshine, J. L. (2019). Implementation and benefits of a vendor-neutral archive and enterprise-imaging management system in an integrated delivery network. Journal of Digital Imaging, 32(2), 211-220. Sittig, D. F., & Singh, H. (2019). A new socio-technical model for studying health information technology in complex adaptive healthcare systems. In Cognitive informatics for biomedicine (pp. 59-80). Springer, Cham. HIM 500 Final Project Guidelines and Rubric Overview Practitioners in health information management and healthcare informatics are expected to be keenly aware of new and upcoming technologies that might benefit their organization. This becomes more complex as these individuals must also consider the impact that those
  • 5. technologies might have on the practice of medicine at their institution. When faced with new technologies, leaders in health information management must evaluate the state of the organization and make an informed decision that will affect the organization as a whole. This means addressing not just the needs of the health information management team, but the needs of all roles within the institution, while also addressing any issues of compliance the organization might be facing. For your final project in this course, you will imagine you have been hired as a contractor for a small medical facility to consult on the selection of a new technology. Their organization has been struggling, so you must first speak to the state of the organization and then offer an informed recommendation as to which of the technologies would suit the organization best. The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Three, Five and Seven. The final product will be submitted in Module Nine. In this assignment, you will demonstrate your mastery of the following course outcomes: • Determine standard technology systems and their uses in modern healthcare institutions through analysis of current and historical technology use in health information management and healthcare informatics • Analyze the interrelationship between various professional roles within healthcare institutions and their use of technology
  • 6. systems for informing recommendations regarding health information technology systems • Determine the potential impact of violating health regulations and laws regarding health information technology systems on healthcare organizations • Develop health information technology recommendations for healthcare institutions that are compliant with health regulations and laws and ensure ethical management of health information • Determine effective investment of resources in health information technology for healthcare institutions based on the needs of the healthcare institution Prompt Imagine you have been contracted to consult on the recent developments at the Featherfall Medical Center. Featherfall has been struggling of late; it has had a series of problems that have prompted your hiring. It has faced the following issues: 1. Featherfall has recently violated several government regulations regarding the current state of its technology and how it is being used. The technology system is vastly out of date, and staff are not always using the technology that is in place or they are using the technology inappropriately. These problems have lost the institution lots of money for not meeting government regulations and have caused operational and ethical problems from
  • 7. inefficient and ineffective use of technology. 2. The staff at Featherfall are not well-trained on the use of technology and do not communicate appropriately about technology use. The roles that pertinent to your consult are the health information management team, the clinical staff (doctors, nurses, etc.), and administrative staff. The health information management team uses proper coding practices, and the current technology system serves them well, despite its age. However, other roles in the hospital have had issues with the system. Clinical staff, for instance, have had record-keeping issues both due to lack of training on the system and the system itself being out of date. Administrative staff within the organization have taken issue with the lack of communication about the technology and its use between the various roles. When the current technology system was chosen many years ago, the needs of these various roles were not considered. You will begin by preparing for your consultation. You will analyze the history of the field as well as determine standard guidelines for technology use and standard technologies used in the field. You will also prepare information for Featherfall regarding the ramifications for violating health laws and regulations. Finally, you will use this information to review technology options that could be implemented at the institution. Specifically, the following critical elements must be addressed:
  • 8. I. Preparation for Consult: In this section of your final project, you will prepare for your consultation on the organization’s technology choice. To prepare, you will analyze the field of health information management for determining standard technologies and guidelines related to technology use in order to inform your technology selection. A. Analyze key historical events in the field of health informatics for how technology has been used that could inform the management of health information. Be sure to support your response with appropriate examples. B. Determine guidelines for technology use in the field of health information management that Featherfall could implement. Be sure to support your response with research. C. Determine the standard technologies currently used in the field of health information management. Be sure to support your response with research. For example, what record-keeping technologies are typically used in the field? D. Develop an overview of how the pertinent roles described at Featherfall would interact with technology. E. Describe the process you would use to evaluate new health information technology systems. Be sure that your process will evaluate new systems based on how they meet the needs of the organization and how they are compliant with health regulations and laws.
  • 9. II. Health Regulations and Laws Ramifications: In this section of your final project, you will finish your preparation by reviewing and explaining the ramifications for the organization if it decides to wait on addressing its recent violations regarding technology use. A. Determine how violating health regulations and laws regarding technology could impact the finances of the institution if these violations are not addressed. Be sure to support your response with examples. B. Determine how violating health regulations and laws regarding technology could impact the daily operations of the institution if these violations are not addressed. Be sure to support your response with examples. C. Determine how violating health regulations and laws regarding technology could impact the security of the health information in the institution if these violations are not addressed. Be sure to support your response with examples. http://snhu- media.snhu.edu/files/course_repository/graduate/him/him500/hi m500_technology_information.pdf III. Technology System Recommendations: In this final section of your final project, you will review the provided technology options and make informed recommendations to the organization regarding which
  • 10. technology it should choose. A. Determine the needs of the various roles of the organization in a new technology. B. Recommend a new health information technology system that meets the following criteria. Be sure to justify how your recommendations meet the criteria. The new health technology must: 1. Abide by provided health regulations and laws 2. Align with the needs of all staff members of the previously described organization 3. Esnsure the ethical management and use of health information C. Determine how the organization could more effectively invest its financial resources into the recommended technology system. Be sure to justify your response. D. Determine how the organization could monitor the use of the new health information system. Be sure to justify your response. E. Determine how the organization could effectively invest its time into the implementation of the new health information technology system. Be sure to justify your response. Milestones Milestone One: Analyzing the Landscape/Setting the Scene In Module Three, you will submit a discussion of the history of healthcare information management/informatics and the current landscape in terms of
  • 11. technology. This milestone will set the stage for your project. This milestone will be graded with the Milestone One Rubric. Milestone Two: Moving Toward Compliance In Module Five, you will submit an analysis of how the company in the case study is noncompliant and the strategies (general, not specifics) to move them toward compliance. This milestone will be graded with the Milestone Two Rubric. Milestone Three: Recommendations In Module Seven, you will submit your recommendations for technology for the institution and how it will be implemented. This milestone will be graded with the Milestone Three Rubric. Final Submission: Health Information Technology Recommendations In Module Nine, you will submit your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Rubric. http://snhu- media.snhu.edu/files/course_repository/graduate/him/him500/hi m500_technology_information.pdf
  • 12. Deliverables Milestone Deliverable Module Due Grading One Analyzing the Landscape/Setting the Scene Three Graded separately; Milestone One Rubric Two Moving Toward Compliance Five Graded separately; Milestone Two Rubric Three Recommendations Seven Graded separately; Milestone Three Rubric Final Submission: Health Information Technology Recommendations Nine Graded separately; Final Project Rubric Final Project Rubric Guidelines for Submission: Your health information technology recommendations should be 6–8 pages in length (plus a cover page and references) and must be written in APA format. Use double-spacing, 12-point Times New Roman font, and one-inch margins. All references cited in APA format. Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value Preparation for Consult: Key
  • 13. Historical Events Meets “Proficient” criteria, and examples used demonstrate a sophisticated awareness for how the history of health informatics can inform the management of health information Analyzes key historical events in the field of health informatics for how technology has been used historically that could inform the management of health information, supporting response with appropriate examples Analyzes key historical events in the field of health informatics for how technology has been used historically that could inform the management of health information, supporting response with examples, but analysis is cursory or illogical or examples are inappropriate Does not analyze key historical events in the field of health informatics 6.2
  • 14. Preparation for Consult: Guidelines Meets “Proficient” criteria, and research provided demonstrates a sophisticated awareness of the standards for technology use in the field of health information management Determines guidelines for technology use in the field of health information management that Featherfall could implement, supporting response with research Determines guidelines for technology use in the field of health information management that Featherfall could implement, supporting response with research, but determined guidelines are inappropriate, or supporting research is misaligned Does not determine guidelines for technology use in the field of health information management 6.2
  • 15. Preparation for Consult: Standard Technologies Meets “Proficient” criteria and demonstrates a comprehensive awareness of the standard technologies used in the modern field of health information management Determines the standard technologies currently used in the field of health information management, supporting response with research Determines technologies used in the field of health information management, supporting response with research, but determined technologies are not standard currently in the field, or supporting research is misaligned Does not determine technologies used in the field of health information management
  • 16. 6.2 Preparation for Consult: Roles Meets “Proficient” criteria and demonstrates keen insight into the interrelationship between the various roles at the healthcare organization Develops an overview of how the various roles at the healthcare institution interact with technology and the health information management team Develops an overview of how the roles at the healthcare institution interact with technology and the health information management team, but overview is cursory Does not develop an overview of how the roles at the healthcare institution interact with technology and the health information management team 6.2 Preparation for Consult: Evaluate
  • 17. Meets “Proficient” criteria and demonstrates a sophisticated evaluation process for health information technologies Describes the process that would be used to evaluate new health information technology systems for the institution that meet the needs of the organization and how they are compliant with health regulations and laws Describes the process that would be used to evaluate new health information technology systems for the institution, but description is cursory or misaligned with the needs of the organization or health laws and regulations Does not describe the process that would be used to evaluate new health information technology systems for the institution 6.2 Health Regulations and Laws
  • 18. Ramifications: Finances Meets “Proficient” criteria and demonstrates a nuanced appreciation of the potential financial ramifications of regulatory violations on healthcare institutions Determines how violating health regulations and laws regarding technology might impact the finances of the institution if these violations are not addressed, supporting response with examples Determines how violating health regulations and laws regarding technology might impact the finances of the institution if these violations are not addressed, supporting response with examples, but explanation is cursory or illogical, or supporting examples are misaligned Does not determine how violating health regulations and laws regarding technology might impact the finances of the institution if these violations are not addressed
  • 19. 6.2 Health Regulations and Laws Ramifications: Daily Operations Meets “Proficient” criteria and demonstrates a nuanced appreciation of the potential operational ramifications of regulatory violations on healthcare institutions Determines how violating health regulations and laws regarding technology might impact the daily operations of the institution if these violations are not addressed, supporting response with examples Determines how violating health regulations and laws regarding technology might impact the daily operations of the institution if these violations are not addressed, supporting response with
  • 20. examples but explanation is cursory or illogical, or supporting examples are misaligned Does not determine how violating health regulations and laws regarding technology might impact the daily operations of the institution if these violations are not addressed 6.2 Health Regulations and Laws Ramifications: Security Meets “Proficient” criteria and demonstrates a nuanced appreciation of how regulatory violations might impact the security of health information Determines how violating health regulations and laws regarding technology might impact the security of the health information in the institution if these violations are not addressed, supporting response with examples
  • 21. Determines how violating health regulations and laws regarding technology might impact the security of the health information in the institution if these violations are not addressed, supporting response with examples, but explanation is cursory or illogical, or supporting examples are misaligned Does not determine how violating health regulations and laws regarding technology might impact the security of the health information in the institution if these violations are not addressed 6.2 Technology System Recommendations: Needs Meets “Proficient” criteria and demonstrates keen insight into the potential needs of various roles within the healthcare organization Determines the needs of the
  • 22. various roles of the organization in a new technology Determines the needs of the various roles of the organization in a new technology, but determination is cursory Does not determine the needs of the various roles of the organization in a new technology 6.2 Technology System Recommendations: Regulations and Laws Meets “Proficient” criteria, and justification demonstrates a nuanced understanding of how to best abide by the provided health regulations and laws Recommends a new health information technology that abides by the provided health regulations and laws, justifying response Recommends new health
  • 23. information technology that abides by health regulations and laws, but recommendations are cursory or not justified Does not recommend and justify new health information technology that abides by health regulations and laws that the institution is currently not in compliance with 6.2 Technology System Recommendations: Staff Meets “Proficient” criteria, and justification demonstrates a nuanced appreciation of how technologies can meet the needs of the various staff at the healthcare organization Recommends a new health information technology that aligns with the needs of all staff members of the organization, justifying response Recommends a new health information technology that
  • 24. aligns with the needs of all staff members of the organization, but recommendations are cursory or not justified Does not recommend and justify a new health information technology that aligns with the needs of all staff members of the organization 6.2 Technology System Recommendations: Ethical Meets “Proficient” criteria, and justification demonstrates a nuanced appreciation of how technologies can ensure the ethical management of health information Recommends a new health information technology that ensures ethical management and use of health information, justifying response Recommends a new health
  • 25. information technology that ensures ethical management and use of health information, but recommendations are cursory or not justified Does not recommend and justify a new health information technology that ensures ethical management and use of health information 6.2 Technology System Recommendations: Financial Resources Meets “Proficient” criteria and demonstrates keen insight into various ways the organization can financially invest in the technology system Determines how the organization could more effectively invest financial resources into the recommended technology system, justifying response Determines how the organization could more effectively invest financial resources into the
  • 26. recommended technology system, but determination is cursory, illogical, or not justified Does not determine how the organization could more effectively invest financial resources into the recommended technology system 6.2 Technology System Recommendations: Monitor Meets “Proficient” criteria and demonstrates keen insight into various ways the organization can monitor the use of the technology system Determines how the organization could monitor the use of the new health information system, justifying response Determines how the organization could monitor the use of the new health information system, but determination is cursory,
  • 27. illogical, or not justified Does not determine how the organization could monitor the use of the new health information system 6.2 Technology System Recommendations: Time Meets “Proficient” criteria and demonstrates keen insight into various ways the organization can invest time into the implementation of the technology system Determines how the organization could effectively invest time into the implementation of the new health information technology system, justifying response Determines how the organization could effectively invest time into the implementation of the new health information technology system, but determination is cursory, illogical, or not justified
  • 28. Does not determine how the organization could effectively invest time into the implementation of the new health information technology system 6.2 Articulation of Response Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read format Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas
  • 29. 7 Total 100% 1 2 Admission, Discharge, Transfer System Deanna Buchanan SNHU
  • 30. Based on the two recommended technology systems, the organization should choose the Admission Discharge and Transfer (ADT) system based on its numerous features and advantages. The ADT system is a crucial component in health care information systems and is commonly used to track patients starting from when they get into a health care facility to the time they are discharged or taken to another health care facility. This information stores different forms of data; including patients' contact information, names, age, and medical record numbers. Implementing the ADT system in the organization will help keep crucial information and make it more accessible for health care professionals, besides making it easily transferable to other health care facilities, thus improving the quality and speed of providing health care services to patients. Choosing the ADT system would be the best option because it has been attributed to various benefits, including improving patient care, collecting more reliable information, and interoperability. These systems usually create a workflow that enhances the collection of crucial information upon admission of the patient and then stores the data in a well-organized manner. The ADT system is designed to assist in improving the quality of patient information by ensuring that it is always updated while increasing reliability by providing context, for instance, historical records and notes where possible (Bartley & Daiker, 2022). This system can play a crucial role in improving patient care because it collects and organizes data in one easy- to-use database. This helps health care professionals to improve the use of patient history, which generally improves the quality and timeliness of patient care. For instance, if a patient has a history of a specific health condition or illness, the medical practitioners will receive notifications immediately after the patient is admitted to the health care facility. Due to this, medical professionals can easily determine whether the disease is relevant to the current concerns and take necessary action.
  • 31. Additionally, the ADT system has a high level of interoperability. The medical center can set up an ADT interface between various hospitals and huge medical systems in order to notify a patient's care team of admission, discharge, or transfer to a hospital. This will allow the health care providers outside the medical center to be well-informed on what took place during the patient’s visit. During the implementation of the ADT system in the medical center, there are various ethical considerations that must be observed. Every health care facility has to uphold various technological principles, including accountability, data protection, and privacy (Shahid et al., 2022). The health care facility must ensure that patient-sensitive data is safeguarded to prevent malicious attacks. Most patients also prefer privacy; hence, the management must ensure that patient information is not shared with unauthorized persons. Moreover, the organization could invest its financial resources more effectively into the ADT system centered on certain factors. Based on the provided information, the medical center can effectively invest in the technology system because the cost of the interface, software, implementation, training, and yearly maintenance costs is relatively lower than that of the other recommended system. There are different ways the organization could effectively monitor the use of the ADT system. One of the ways would be by deploying monitoring devices. These monitoring devices can be placed strategically in the technology system to collect essential information and place them at ad hoc locations to track different types of transactions of interest to the organization. Some of the monitoring devices that can be used include intrusion prevention systems, audit record monitoring, malicious code protection software, scanning tools, and network monitoring software. Moreover, the organization could effectively invest its time into the implementation of the ADT system by training and educating the staff members on how to use this technology system. Training the staff will provide
  • 32. significant insights on how the system is used and minimize mistakes which will, in turn, improve the organization's operations and improve patient care. References Bartley, J., & Daiker, M. L. (2022). Technology Environment. In The CAHIMS Review Guide (pp. 23-42). Productivity Press. Shahid, J., Ahmad, R., Kiani, A. K., Ahmad, T., Saeed, S., & Almuhaideb, A. M. (2022). Data protection and privacy of the internet of healthcare things (IoHTs). Applied Sciences, 12(4), 1927. 1 2
  • 33. Compliance Policies Deanna Buchanan SNHU Based on the case study, the company has demonstrated noncompliance in different ways. First, the company was recently reported to have violated many government regulations regarding the present state of its technology and how it utilized that technology. During the implementation of any form of technology in an organization, there are several rules and regulations that all entities should comply with. However, Featherfall does not comply with this law and regulations because its technology system is outdated; employees are not able to use the implemented technology while others are using it inappropriately. Due to such cases, the company has experienced significant losses besides experiencing operational and ethical issues resulting from the ineffective use of technology. Another key issue in the company is not fully training the staff on how to use the technology, which is against the set rules and regulations by the government. The lack of proper training of employees has resulted in many record-
  • 34. keeping issues, which might lead to inefficiency in operation and functioning of the company. The company must take the necessary steps to ensure that it complies with the set rules and regulations. Compliance while using different forms of information systems in an organization is crucial because it prevents an organization from facing certain issues, including legal issues or inefficiency in its operations (De-Vaujany et al., 2018). Some of the strategies and best practices that Featherfall should implement to enhance compliance include holding compliance audits, implementing compliance tools, knowing the regulatory environment, determining compliance goals, training employees, and reviewing compliance regulations. One of the most effective ways to help the company comply with the rules and regulations is to train employees on how to use new software and information systems. Some of the ways that the relevant experts can use to train those employees include using the right format for training, using training incentives for workers to use the technology, and making training a priority to improve buy-in. Whenever employees do not follow compliance policies and regulations, an organization fails to adhere to the set guidelines and regulations. Training and educating the staff about the relevant policies is necessary and ensuring that everyone is held accountable when they do not follow the policies (Ceric et al., 2022). It is also important for the management to ensure that it focuses on certain areas of compliance the company needs to improve most, including a particular law, regulation, or violation that is costing the company a lot of money. Regular review of compliance regulations can help the company identify its weaknesses, which will allow it to improve and keep its compliance efforts updated.
  • 35. References Ceric, A., Small, F., & Morrison, M. (2020). What indigenous employees’ value in a business training programme: implications for training design and government policies. Journal of Vocational Education & Training, 1–21. https://doi.org/10.1080/13636820.2020.1754886 De-Vaujany, F. X., Fomin, V. V., Haefliger, S., & Lyytinen, K. (2018). Rules, practices, and information technology: A trifecta of organizational regulation. Information Systems Research, 29(3), 755-773. https://doi.org/10.1287/isre.2017.0771