• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Healthcare.

Extracts from this document...

Introduction

ISM Healthcare Prepared by Group A5 Table of Contents 1. Introduction...................................................................................................... 2. Healthcare......................................................................................................... 3. Hospitals............................................................................................................ 4. Ecommerce........................................................................................................ 5. Advantages of Ecommerce .................................................................................. 6. Biometrics.......................................................................................................... 7. Advantages of Biometrics...................................................................................... 8. Grid Computing................................................................................................... 9. Advantages of Grid Computing............................................................................... 10. .NET and XML.................................................................................................... 11. Advantages of .NET and XML................................................................................ 12. AutoID.............................................................................................................. 13. Advantages of Auto-ID.......................................................................................... 14. Wireless............................................................................................................ 15. Advantages of wireless......................................................................................... 16. Summary............................................................................................................ 17. Recommendations................................................................................................... 18. References.............................................................................................................. Executive Summary The healthcare industry is currently investing heavily in technology allowing improvements in security standards, efficient communication between departments via a cell phone or web enabled devices, and an increase in sharing of information for research and diagnostics, resulting in a better alignment of business solutions Hospitals need to manage an enormity of data. With increasing customer needs and a demand from within the industry, technology is continuing to support and change the infrastructure of.the healthcare. With E-commerce, biometrics, grid computing, auto -ID wireless, Net and XML, the efficiency and accuracy of information in healthcare is magnified. E-commerce has allowed the healthcare industry to connect with its customers boosting the relationship with suppliers and buyers and reducing the costs of procurement. Biometrics marks the end of newspaper reports of hospitals operating on the wrong person, giving the wrong dosage of drugs, losing babies to kidnappers and employing people with an unsuitable care record. ...read more.

Middle

With ecommerce hospitals supplies can be tracked and recorded efficiently. 5 Biometrics Based on analysis of physiological or behavioural characteristics, biometrics are an automated method for people recognition. They include fingerprints, retinal and iris scanning, hand and finger geometry, voice patterns, facial recognition, and other techniques. The biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. 5.1 Advantages of Biometrics Biometric recognition can be used in identification mode, where the biometric system identifies a person from the entire enrolled population by searching a database for a match. This type of application has applications for healthcare recruitment where individuals listed on police databases may need to be checked. A system also can be used in verification mode, where the biometric system authenticates a person's claimed identity from his/her previously enrolled pattern, this method can be used to ensure that the correct individual is prescribed repeat drugs at the correct dosage etc. Verification biometrics may also be used for building and ward entry checks to ensure that only registered personnel and visitors gain automatic entry. Hospital theatres would benefit from the use of biometrics to identify the patient on the bed and bring up the medical records to ensure they undergo the correct procedure and that any allergies are highlighted prior to drug provision. ...read more.

Conclusion

No new networks need to be installed, everything runs over the Internet. There are already many XML protocols in place to support healthcare (such as DocScope), this means that it will not be necessary to develop a large number of new programs. Advantages of .NET and XML This combination of programming language and software is however not limited to patient data. The system can be used for storing and transmitting any sort of information. Keeping control of drug inventories can be made easier, ordering medical equipment from suppliers can be made seamless, all that is required is an internet terminal and the correct .net and XML combination. Efficient use and storage of data is one of today's major challenges. The consequences of the use of incorrect data can be both harmful to the health of the patient and expensive for the Hospital. The combination of .net and XML will not only simplify the access to patient data but will secure consistency and help combat mistakes in dispensing whilst opening up avenues for improving the efficacy of capital spend. The below diagram shows a patients file stored in XML `format. XML presents the patients data on the screen. Figure 3 Summary. Currently the health industry is spending more money developing advance management system information's and tools to utilise the advance technology that is available. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Marked by a teacher

    UK Copyright and File Sharing

    5 star(s)

    sharing their content, the government are also reducing the threat posed on people's computers from computer misuse. Online piracy has been the subject of much controversy of late, and whatever legislative measures the government may take, if any, there will always be considerable opposition to their action.

  2. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    They tend to be built in a requirements-free, rapid-development environment, all done with limited management support (Glass, 2000). This combination of factors makes it very difficult for the testers to fully test the system to a high degree of quality.

  1. Ethics and professionalism in computing - examples from Facebook and Google

    They restrict access to personal information to Google employees, contractors and agents who need to know that information in order to process it for them, and who are subject to strict contractual confidentiality obligations and may be disciplined or terminated if they fail to meet these obligations.

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    (2003). A Brief History of the Object-Oriented Approach. ACM SIGSOFT Software Engineering Notes. 28(2) pp. 1-10. Summary: This paper contains an in-depth description of the Object-Oriented (O-O) paradigm and its approach defining the term utilizing literature from Rentsch, Pascoe, Robson, Nygarrd and Wegner. The derivatives of the Object-Oriented approach are identified, its use within programming languages, Office Information Systems, Systems Simulation and so forth.

  1. What is research?

    The extent to which different approaches and measures are used in a research project can therefore be seen as an extension of the (A?)/authorial voice which is more or less explicit according to style and agenda. The Author's idea of a spectrum of quantitative and qualitative sources and information types

  2. Methods and technology used in Computer Forensics

    still exist within the spool, unless removed by the user or specific system configuration. This is a popular method within computer forensics used in the pursuit of individuals downloading child pornography. Posessing limited knowledge of computers, they print off the illicit images, before then deleting the soft copies, thinking that they have covered their activity.

  1. Lifecycle Management Of Information Technology Project In Construction

    Complex ?y?tem? contain the den?e web of cau?al connection? among their component?. The part? affect each other in many way?. 3. Complex ?y?tem? exhibit interdependence of their component?. The behavior of part? i? dependent upon other part?. If ?y?tem i? broken apart, component? no longer function (like part? of human body).

  2. My aim is to develop and provide a proposal to the Surgery of a ...

    These email will then have to be stored together as an archive so it will be easier for the receptionist to find out who's got an appointment what time and date, and if anyone has missed any appointments. 5.1.5 Site, which will allow the surgery to e-mail different practices and hospitals within the Local Health Authority.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work