Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12

Healthcare.

Extracts from this essay...

Introduction

ISM Healthcare Prepared by Group A5 Table of Contents 1. Introduction...................................................................................................... 2. Healthcare......................................................................................................... 3. Hospitals............................................................................................................ 4. Ecommerce........................................................................................................ 5. Advantages of Ecommerce .................................................................................. 6. Biometrics.......................................................................................................... 7. Advantages of Biometrics...................................................................................... 8. Grid Computing................................................................................................... 9. Advantages of Grid Computing............................................................................... 10. .NET and XML.................................................................................................... 11. Advantages of .NET and XML................................................................................ 12. AutoID.............................................................................................................. 13. Advantages of Auto-ID.......................................................................................... 14. Wireless............................................................................................................ 15. Advantages of wireless......................................................................................... 16. Summary............................................................................................................ 17. Recommendations................................................................................................... 18. References.............................................................................................................. Executive Summary The healthcare industry is currently investing heavily in technology allowing improvements in security standards, efficient communication between departments via a cell phone or web enabled devices, and an increase in sharing of information for research and diagnostics, resulting in a better alignment of business solutions Hospitals need to manage an enormity of data. With increasing customer needs and a demand from within the industry, technology is continuing to support and change the infrastructure of.the healthcare. With E-commerce, biometrics, grid computing, auto -ID wireless, Net and XML, the efficiency and accuracy of information in healthcare is magnified. E-commerce has allowed the healthcare industry to connect with its customers boosting the relationship with suppliers and buyers and reducing the costs of procurement. Biometrics marks the end of newspaper reports of hospitals operating on the wrong person, giving the wrong dosage of drugs, losing babies to kidnappers and employing people with an unsuitable care record.

Middle

With ecommerce hospitals supplies can be tracked and recorded efficiently. 5 Biometrics Based on analysis of physiological or behavioural characteristics, biometrics are an automated method for people recognition. They include fingerprints, retinal and iris scanning, hand and finger geometry, voice patterns, facial recognition, and other techniques. The biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. 5.1 Advantages of Biometrics Biometric recognition can be used in identification mode, where the biometric system identifies a person from the entire enrolled population by searching a database for a match. This type of application has applications for healthcare recruitment where individuals listed on police databases may need to be checked. A system also can be used in verification mode, where the biometric system authenticates a person's claimed identity from his/her previously enrolled pattern, this method can be used to ensure that the correct individual is prescribed repeat drugs at the correct dosage etc. Verification biometrics may also be used for building and ward entry checks to ensure that only registered personnel and visitors gain automatic entry. Hospital theatres would benefit from the use of biometrics to identify the patient on the bed and bring up the medical records to ensure they undergo the correct procedure and that any allergies are highlighted prior to drug provision.

Conclusion

No new networks need to be installed, everything runs over the Internet. There are already many XML protocols in place to support healthcare (such as DocScope), this means that it will not be necessary to develop a large number of new programs. Advantages of .NET and XML This combination of programming language and software is however not limited to patient data. The system can be used for storing and transmitting any sort of information. Keeping control of drug inventories can be made easier, ordering medical equipment from suppliers can be made seamless, all that is required is an internet terminal and the correct .net and XML combination. Efficient use and storage of data is one of today's major challenges. The consequences of the use of incorrect data can be both harmful to the health of the patient and expensive for the Hospital. The combination of .net and XML will not only simplify the access to patient data but will secure consistency and help combat mistakes in dispensing whilst opening up avenues for improving the efficacy of capital spend. The below diagram shows a patients file stored in XML `format. XML presents the patients data on the screen. Figure 3 Summary. Currently the health industry is spending more money developing advance management system information's and tools to utilise the advance technology that is available.

The above preview is unformatted text

Found what you're looking for?

  • Start learning 29% faster today
  • Over 150,000 essays available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Over 180,000 student essays
  • Every subject and level covered
  • Thousands of essays marked by teachers

Related University Degree Computer Science

  1. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    They tend to be built in a requirements-free, rapid-development environment, all done with limited management support (Glass, 2000). This combination of factors makes it very difficult for the testers to fully test the system to a high degree of quality.

  2. Ethics and professionalism in computing - examples from Facebook and Google

    They restrict access to personal information to Google employees, contractors and agents who need to know that information in order to process it for them, and who are subject to strict contractual confidentiality obligations and may be disciplined or terminated if they fail to meet these obligations.

  1. Free essay

    UK Copyright and File Sharing

    5 star(s)

    sharing their content, the government are also reducing the threat posed on people's computers from computer misuse. Online piracy has been the subject of much controversy of late, and whatever legislative measures the government may take, if any, there will always be considerable opposition to their action.

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    (2003). A Brief History of the Object-Oriented Approach. ACM SIGSOFT Software Engineering Notes. 28(2) pp. 1-10. Summary: This paper contains an in-depth description of the Object-Oriented (O-O) paradigm and its approach defining the term utilizing literature from Rentsch, Pascoe, Robson, Nygarrd and Wegner. The derivatives of the Object-Oriented approach are identified, its use within programming languages, Office Information Systems, Systems Simulation and so forth.

  1. What is research?

    The extent to which different approaches and measures are used in a research project can therefore be seen as an extension of the (A?)/authorial voice which is more or less explicit according to style and agenda. The Author's idea of a spectrum of quantitative and qualitative sources and information types

  2. Methods and technology used in Computer Forensics

    still exist within the spool, unless removed by the user or specific system configuration. This is a popular method within computer forensics used in the pursuit of individuals downloading child pornography. Posessing limited knowledge of computers, they print off the illicit images, before then deleting the soft copies, thinking that they have covered their activity.

  1. Lifecycle Management Of Information Technology Project In Construction

    Complex ?y?tem? contain the den?e web of cau?al connection? among their component?. The part? affect each other in many way?. 3. Complex ?y?tem? exhibit interdependence of their component?. The behavior of part? i? dependent upon other part?. If ?y?tem i? broken apart, component? no longer function (like part? of human body).

  2. My aim is to develop and provide a proposal to the Surgery of a ...

    These email will then have to be stored together as an archive so it will be easier for the receptionist to find out who's got an appointment what time and date, and if anyone has missed any appointments. 5.1.5 Site, which will allow the surgery to e-mail different practices and hospitals within the Local Health Authority.

  • Over 180,000 essays
    written by students
  • Annotated by
    experienced teachers
  • Ideas and feedback to write
    your own great essays

Marked by a teacher

This essay has been marked by one of our great teachers. You can read the full teachers notes when you download the essay.

Peer reviewed

This essay has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the essay page.

Peer reviewed

This essay has been reviewed by one of our specialist student essay reviewing squad. Read the full review under the essay preview on this page.