2 1 Final Project Milestone One Moore
.pdf
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
422
Subject
Business
Date
May 16, 2024
Type
Pages
5
Uploaded by ChefSnow17935 on coursehero.com
2-1: Final Project Milestone One Candace Moore Souther New Hampshire University HIM 422-T3535 Professor George Fisher, MBA January 21
st
, 2024
Milestone One: Problem Solving 2 I.
Summary of the problem. Laws are updated continuously within healthcare to protect the organization of a potential breach. Now, these threats could be accidental or intentional to access personal healthcare information (PHI). The laws that protect against these potential breaches include the Health Insurance Portability Act (HIPAA); which requires implementing security safeguards to protect electronic health information. I have been placed in the role of the Health Information Manager at ABC Hospital, who employs 15 people, 7 of whom are remotely working scattered throughout the region. It has come to my attention that there has been a data breach. Protected Health Information (PHI) was accessed by a coder who investigated their neighbor that had a recent stay at the local hospital involving complications from HIV. This information had been trickled down throughout the neighborhood, which finally got back to the patient and filed a complaint. The Hospitals Legal department took over the complaint and filed a report. The employee was terminated immediately. Termination cannot be the worst that could happen when certain HIPAA rules are violated by employees. In an article from HIPAA Journal, it mentions that “Criminal violations of HIPAA Rules can result in financial penalties and jail time for healthcare employees. A fine up to $50,000 and one year in jail is possible when PHI is knowingly obtained and impermissibly disclosed” (
Alder, 2024). At a lower scale, HIPAA violations could consist of a verbal or written warning and additional training. B. Investigation of Breach To assess the complexity of a breach to develop a structured plan, the breach investigation should be a priority to clarify the scenario in question. To have this framework of a structured plan we require information governance (IG) to avoid any data breaches. In an article
Milestone One: Problem Solving 3 from Cyber defense Magazine, it mentions that it could take years to rebuild documents if there was a breach from a hacker gaining access to company files including financial information or personal details which many time will ruin an entire organization (Team, 2022). This is why it is essential to stay ahead of the ball in keeping patient healthcare information secure. C. Consequences There can be short-term and long-term consequences that can occur against the organization. The short-term consequences are ending the employee in question, showing the patient and other employees that there will be retaliation if a law is broken. The long-term consequences are that the organization can potentially have a negative impact on other patients who go to this Hospital, essentially giving the location and all who is employed there; a “bad name”. Which can persuade the stakeholder’s opinions on staying with this company or moving to another organization. II. Key Stakeholders A. Internal and External Stakeholder’s
The internal stakeholders include owners, investors, board of directors, managers, and employees. These are important individuals interested in the success of our business. External stakeholders include customers, local community, creditors, suppliers, and government entities. In an article from Mad Devs Group it mentions that external stakeholders are individuals or groups outside an organization who are a personal stake in the company's success. Internal stakeholders have more direct control while external stakeholders have indirect control (Zaichenko,2022).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Scenario
Capstone project
Goal Statement: Our goal is to improve the overall mental health status of veterans of the Canadian Armed Forces and RCMP by up to 80% for those struggling with mental health challenges by facilitating real-time accessibility to a peer support platform utilizing a mobile app to fill the gap that currently exists when veterans are awaiting appointments for psychological supports that are currently funded by Veterans Affairs of Canada. We aim to reduce the strain on the general health system due to the repeated appointments with a veteran's primary care practitioner to inquire about further mental health resources and to improve a veterans quality of life while they are adjusting to civilian life in between their federally funded psychological supports.
Please answer in detail
1 communication strategy for the above project
2. Pilot or stakeholder feedback outcomes
3. Recommendation for next steps
arrow_forward
Project Risk Analysis
Sydney, Australia’s M5 East Tunnel was constructed under strict budgetary and schedule requirements, but given the massive traffic delays now hampering commuters, the requirements may have been excessive.
Due to an inexpensive computer system with a high failure rate, the tunnel’s security cameras frequently fail, requiring the operators to close the tunnel due to inability to react to an accident, fire, or excessive pollution inside the tunnel.
The tunnel was built to handle 70,000 vehicles a day, but it now carries 100,000, so any glitch can cause immediate traffic snarls. A managerial risk analysis, including the risk of overuse, might have anticipated these problems and mandated a more reliable set of computers once the costs of failure had been included.
Required:
As the project manager, discuss the risk management process you think might have identified the danger in using a cheap computer system
Discuss the type of risk analysis approach you think would…
arrow_forward
What are the questions to ask to estimate the viability of a DMAIC project
arrow_forward
What is the minimum cost of crashing the following project at Sawaya Robotics by 4 days?
NORMAL
CRASH
TIME (DAYS) TIME (DAYS)
9
7
7
6
5
4
6
4
9
6
ACTIVITY
Design (A)
Wiring (B)
Chip install (C)
Software (D)
Testing (E)
The minimum cost of crashing the following project at Sawaya Robotics by. 4 days is $
NORMAL
COST
200
800
600
1,100
1,200
CRASH
COST
300
875
675
1,300
1,875
IMMEDIATE PREDECESSOR(S)
(enter your response as a whole number).
A, B
C
arrow_forward
With an aid of a diagram, show the relationship between risk assessment and risk management.
arrow_forward
Read and analyze the following article.
Manila Bay Beach Nourishment Project
After years of being known for its polluted waters, Manila Bay suddenly got a facelift as the government
decided to take a big risk by overlaying mounds of artificial white sand (dolomite) on a part of the bay's
naturally gray shoreline.
This project, which is spearheaded by the Department of Environment and Natural Resources (DENR), was
instantly met with harsh disapproval. In September, the overlaying of the dolomite in Manila Bay beach or the
beach nourishment project caught public attention, stirring curiosity and setting off waves of people flocking
to the area to get a glimpse of the "white sands".
Many criticized the project, throwing allegations at the DENR, calling the project a health hazard and a waste
of public funds.
But the DENR emphasized that the beach nourishment with the use of dolomite is a significant component of
the rehabilitation aimed to protect the coastal resources in the area and…
arrow_forward
IBM Global Center for Smarter Analytics
Case Analysis 7: Hamilton County
dropout rates and lagging performance required the
county to address these problems on the individual
student level.
Department of Education
But that meant first finding the students who needed
help, and doing so before their problems led them to
drop out of the Hamilton County school system. At the
end of the day, there's no one better positioned to
sense when the student is in academic trouble than a
teacher or counselor with whom students have a direct
relationship. The trouble is, warning signs are often
complex and cumulative in nature, thus escaping the
notice of frontline educators and administrators. Add
to that the everyday challenges of running a classroom,
and it's all the more understandable how problem
students can fly “under the radar" until it's too late.
PARIMENT
ZONE
TEDUCATION
Kelly recognized that early detection of at-risk
students required a more multidimensional view of
their progress,…
arrow_forward
Define risk management (ERM) for an enterprise and it's benefits?
arrow_forward
Differentiate event, problem and incident. Give example of each.
arrow_forward
Activity 1 (Assessment Phase)
Discuss the major operational threats DHL logistical functions face as a result of global terrorism
Activity 2 (Improvement Phase)
What might the organization do better, to mitigate the terrorist threats to its logistics operations?
Armed forces personnel who cannot address these questions owing to security concerns should examine a larger question What logistical threats does the nation face, and how can these risks be reduced?
arrow_forward
How does the scope of ERM compare to existing risk management approaches?
arrow_forward
What exactly is risk management, and how is it defined? Explain the process of risk management using the diagram.
arrow_forward
III. Risks and Feasibility
This section of your report identifies risks and confirms the feasibility of the information systems development project. Project feasibility analysis verifies whether a project may be started and successfully completed. Your report should address the feasibility issues listed below. Start by clearly describing what issues are addressed by each feasibility category (see the relevant definitions in the textbook), and discuss the feasibility of the project with respect to each category.
Determine organizational and cultural feasibility. This evaluates organizational and cultural issues to identify potential risks for the new system. See pp. 269–270 of the textbook for examples of potential issues.Note: the textbook does not provide an exhaustive list of possibilities!Note: ‘organization’ in this context refers to the Car Sharing community—all stakeholders, but particularly members and prospective members.
Assess technological feasibility. See p. 270 of the…
arrow_forward
Write a report to FAA management that describes the primary cause of the problems, a detailed plan to solve them, shows how the plan solves the problems, and describe any other benefits it will provide.
arrow_forward
Solve the question :
Tony and his team identified some risks during the first month of the Recreation and Wellness Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information. Tony has decided to be more proactive in managing risks. He also wants to address positive risks as well as negative risks.
The question is :
assign a numeric value for the probability and impact of each risk on meeting the main project objective.
arrow_forward
How can PERT/CPM assess the PESTLE Analysis and risk assessment?
arrow_forward
What exactly does risk management entail? Discuss the process of risk management using the diagram.
arrow_forward
Top administrators in a hospital have approved a project to improve the efficiency of pharmaceutical services department by the end of the fiscal year to satisfy new state regulations for the coming year. However, they are concerned about four potential threats (1) the cost to implement the changes may be excessive (2) the pharmacists may resist changes (3) the project may run much longer than expected and not be ready for coming fiscal year, (4) The changes might reduce the quality of drug care in the hospital. The likelihood and negative impact of each threat have been solicited from the managers and are as follows, based on a seven-point scale where seven is the most likely and most negative impact.
Threat
Probability
Impact
1
5
3
2
6
5
3
3
4
4
4
7
Construct a risk matrix and identify what you would consider to be critical, monitor and ignore threats. Explain your reasoning.
arrow_forward
What is the minimum cost of crashing the following project at Sawaya Robotics by 4 days?
NORMAL
CRASH
TIME (DAYS) TIME (DAYS)
NORMAL
COST
8
6
6
4
ACTIVITY
Design (A)
Wiring (B)
Chip install (C)
Software (D)
Testing (E)
8
5335
400
1,000
600
1,000
1,100
CRASH
COST
450
1,100
700
1,300
1,625
IMMEDIATE PREDECESSOR(S)
A, B
C
The minimum cost of crashing the following project at Sawaya Robotics by 4 days is $900 (enter your response as a
whole number).
arrow_forward
Discuss International Project Management Standards, Compare and Contrast PMBOK and APM standard with context of construction Industry? Further discuss strengths and weaknesses of each standard? Detailed Analysis is required.
arrow_forward
the HBR article and analyse your approach as a project manager to communicate the stakeholders during the crisis situation
arrow_forward
How can you integrate sustainability with Enterprise Risk Management (ERM) discuss using a flowchart.
arrow_forward
define risk identification, list the key activities of risk identification, identify the key deliverable of each key activity, and then briefly (i.e., in one to five sentences) elaborate how to create the key deliverable(s
arrow_forward
RISK REGISTER : CYBER SECURITY LAB (KEYLOGGING SOFTWARE). Please add 3 more risks.
Intructions: please see below.
1) Have your team identify the top 5-10 risks for your project (i.e. one of the computers don't work, the electrical system is overloaded when all the computers are on, a component of one of the computers is misplaced or stolen, etc.).
2) Label each of these risks (R1, R2, R3, etc.
3) Identify the Probability/Risk (Likelihood/Consequence) for each of these.
4) Rate each risk as HIGH, MEDIUM, or SMALL.
5) Identify who is responsible for the risk.
6) Identify the steps you will incorporate to mitigate the risk (lessen the risk).
please write following the table given in the image.
arrow_forward
A tech company called TechNova is planning to launch a new product called "NovaPhone".
The product is a high-end smartphone with advanced features and is expected to be a maj
hit in the market. The company's marketing team has come up with a detailed plan to
launch the product successfully.
Question 1: What are the key elements of a successful product launch plan? Question 2:
What are some potential risks or challenges that TechNova may face in launching the new
product?
12.45
arrow_forward
quetion 1
a)What is a burn-down chart? What purpose does it serve?
b)Why should a project manager be concerned with monitoring a project’s progress?
c) Describe how the SPI and CPI can be used to forecast the final cost of a project?
arrow_forward
Describe project quality management (PQM) for IT projects in terms of planning for quality, quality assurance, and quality control to continuously improve the project’s products and supporting processes. Please provide specific examples.
arrow_forward
Program
Sunday Night Football
The Big Bang Theory.
The Voice
How I Met Your Mother
Agents of S.H.I.E.L.D.
Cost per 30 second spot C3 Rating
$594,000
$317,000
$264,575
$168,435
$169,730
7.9
5.1
3.9
3.2
3.1
1. How many households are expected to watch each program?
2. Calculate the cost per thousand (CPM) and cost per point (CPP) for each program.
3. How should advertisers use these measures when planning a television media buy?
arrow_forward
Slove the quation:
Tony and his team identified some risks during the first month of the Recreation and Wellness Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information. Tony has decided to be more proactive in managing risks. He also wants to address positive risks as well as negative risks.
The quation is ;
Develop a response strategy for one of the negative risks and one of the positive risks. Enter the information in the risk register.
arrow_forward
Mobile phone, once seen as a fashion accessory, has been one of the fastest growing technologies and necessities in the world to date. Against the backdrop:
Interpret and describe the significance of water resistant mobile phone design.
Explain any new understanding.
Propose a model to that effect
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
BUSN 11 Introduction to Business Student Edition
Business
ISBN:9781337407137
Author:Kelly
Publisher:Cengage Learning
Essentials of Business Communication (MindTap Cou...
Business
ISBN:9781337386494
Author:Mary Ellen Guffey, Dana Loewy
Publisher:Cengage Learning
Accounting Information Systems (14th Edition)
Business
ISBN:9780134474021
Author:Marshall B. Romney, Paul J. Steinbart
Publisher:PEARSON
International Business: Competing in the Global M...
Business
ISBN:9781259929441
Author:Charles W. L. Hill Dr, G. Tomas M. Hult
Publisher:McGraw-Hill Education
Related Questions
- Scenario Capstone project Goal Statement: Our goal is to improve the overall mental health status of veterans of the Canadian Armed Forces and RCMP by up to 80% for those struggling with mental health challenges by facilitating real-time accessibility to a peer support platform utilizing a mobile app to fill the gap that currently exists when veterans are awaiting appointments for psychological supports that are currently funded by Veterans Affairs of Canada. We aim to reduce the strain on the general health system due to the repeated appointments with a veteran's primary care practitioner to inquire about further mental health resources and to improve a veterans quality of life while they are adjusting to civilian life in between their federally funded psychological supports. Please answer in detail 1 communication strategy for the above project 2. Pilot or stakeholder feedback outcomes 3. Recommendation for next stepsarrow_forwardProject Risk Analysis Sydney, Australia’s M5 East Tunnel was constructed under strict budgetary and schedule requirements, but given the massive traffic delays now hampering commuters, the requirements may have been excessive. Due to an inexpensive computer system with a high failure rate, the tunnel’s security cameras frequently fail, requiring the operators to close the tunnel due to inability to react to an accident, fire, or excessive pollution inside the tunnel. The tunnel was built to handle 70,000 vehicles a day, but it now carries 100,000, so any glitch can cause immediate traffic snarls. A managerial risk analysis, including the risk of overuse, might have anticipated these problems and mandated a more reliable set of computers once the costs of failure had been included. Required: As the project manager, discuss the risk management process you think might have identified the danger in using a cheap computer system Discuss the type of risk analysis approach you think would…arrow_forwardWhat are the questions to ask to estimate the viability of a DMAIC projectarrow_forward
- What is the minimum cost of crashing the following project at Sawaya Robotics by 4 days? NORMAL CRASH TIME (DAYS) TIME (DAYS) 9 7 7 6 5 4 6 4 9 6 ACTIVITY Design (A) Wiring (B) Chip install (C) Software (D) Testing (E) The minimum cost of crashing the following project at Sawaya Robotics by. 4 days is $ NORMAL COST 200 800 600 1,100 1,200 CRASH COST 300 875 675 1,300 1,875 IMMEDIATE PREDECESSOR(S) (enter your response as a whole number). A, B Carrow_forwardWith an aid of a diagram, show the relationship between risk assessment and risk management.arrow_forwardRead and analyze the following article. Manila Bay Beach Nourishment Project After years of being known for its polluted waters, Manila Bay suddenly got a facelift as the government decided to take a big risk by overlaying mounds of artificial white sand (dolomite) on a part of the bay's naturally gray shoreline. This project, which is spearheaded by the Department of Environment and Natural Resources (DENR), was instantly met with harsh disapproval. In September, the overlaying of the dolomite in Manila Bay beach or the beach nourishment project caught public attention, stirring curiosity and setting off waves of people flocking to the area to get a glimpse of the "white sands". Many criticized the project, throwing allegations at the DENR, calling the project a health hazard and a waste of public funds. But the DENR emphasized that the beach nourishment with the use of dolomite is a significant component of the rehabilitation aimed to protect the coastal resources in the area and…arrow_forward
- IBM Global Center for Smarter Analytics Case Analysis 7: Hamilton County dropout rates and lagging performance required the county to address these problems on the individual student level. Department of Education But that meant first finding the students who needed help, and doing so before their problems led them to drop out of the Hamilton County school system. At the end of the day, there's no one better positioned to sense when the student is in academic trouble than a teacher or counselor with whom students have a direct relationship. The trouble is, warning signs are often complex and cumulative in nature, thus escaping the notice of frontline educators and administrators. Add to that the everyday challenges of running a classroom, and it's all the more understandable how problem students can fly “under the radar" until it's too late. PARIMENT ZONE TEDUCATION Kelly recognized that early detection of at-risk students required a more multidimensional view of their progress,…arrow_forwardDefine risk management (ERM) for an enterprise and it's benefits?arrow_forwardDifferentiate event, problem and incident. Give example of each.arrow_forward
- Activity 1 (Assessment Phase) Discuss the major operational threats DHL logistical functions face as a result of global terrorism Activity 2 (Improvement Phase) What might the organization do better, to mitigate the terrorist threats to its logistics operations? Armed forces personnel who cannot address these questions owing to security concerns should examine a larger question What logistical threats does the nation face, and how can these risks be reduced?arrow_forwardHow does the scope of ERM compare to existing risk management approaches?arrow_forwardWhat exactly is risk management, and how is it defined? Explain the process of risk management using the diagram.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- BUSN 11 Introduction to Business Student EditionBusinessISBN:9781337407137Author:KellyPublisher:Cengage LearningEssentials of Business Communication (MindTap Cou...BusinessISBN:9781337386494Author:Mary Ellen Guffey, Dana LoewyPublisher:Cengage LearningAccounting Information Systems (14th Edition)BusinessISBN:9780134474021Author:Marshall B. Romney, Paul J. SteinbartPublisher:PEARSON
- International Business: Competing in the Global M...BusinessISBN:9781259929441Author:Charles W. L. Hill Dr, G. Tomas M. HultPublisher:McGraw-Hill Education
BUSN 11 Introduction to Business Student Edition
Business
ISBN:9781337407137
Author:Kelly
Publisher:Cengage Learning
Essentials of Business Communication (MindTap Cou...
Business
ISBN:9781337386494
Author:Mary Ellen Guffey, Dana Loewy
Publisher:Cengage Learning
Accounting Information Systems (14th Edition)
Business
ISBN:9780134474021
Author:Marshall B. Romney, Paul J. Steinbart
Publisher:PEARSON
International Business: Competing in the Global M...
Business
ISBN:9781259929441
Author:Charles W. L. Hill Dr, G. Tomas M. Hult
Publisher:McGraw-Hill Education