• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Healthcare.

Extracts from this document...

Introduction

ISM Healthcare Prepared by Group A5 Table of Contents 1. Introduction...................................................................................................... 2. Healthcare......................................................................................................... 3. Hospitals............................................................................................................ 4. Ecommerce........................................................................................................ 5. Advantages of Ecommerce .................................................................................. 6. Biometrics.......................................................................................................... 7. Advantages of Biometrics...................................................................................... 8. Grid Computing................................................................................................... 9. Advantages of Grid Computing............................................................................... 10. .NET and XML.................................................................................................... 11. Advantages of .NET and XML................................................................................ 12. AutoID.............................................................................................................. 13. Advantages of Auto-ID.......................................................................................... 14. Wireless............................................................................................................ 15. Advantages of wireless......................................................................................... 16. Summary............................................................................................................ 17. Recommendations................................................................................................... 18. References.............................................................................................................. Executive Summary The healthcare industry is currently investing heavily in technology allowing improvements in security standards, efficient communication between departments via a cell phone or web enabled devices, and an increase in sharing of information for research and diagnostics, resulting in a better alignment of business solutions Hospitals need to manage an enormity of data. With increasing customer needs and a demand from within the industry, technology is continuing to support and change the infrastructure of.the healthcare. With E-commerce, biometrics, grid computing, auto -ID wireless, Net and XML, the efficiency and accuracy of information in healthcare is magnified. E-commerce has allowed the healthcare industry to connect with its customers boosting the relationship with suppliers and buyers and reducing the costs of procurement. Biometrics marks the end of newspaper reports of hospitals operating on the wrong person, giving the wrong dosage of drugs, losing babies to kidnappers and employing people with an unsuitable care record. ...read more.

Middle

With ecommerce hospitals supplies can be tracked and recorded efficiently. 5 Biometrics Based on analysis of physiological or behavioural characteristics, biometrics are an automated method for people recognition. They include fingerprints, retinal and iris scanning, hand and finger geometry, voice patterns, facial recognition, and other techniques. The biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. 5.1 Advantages of Biometrics Biometric recognition can be used in identification mode, where the biometric system identifies a person from the entire enrolled population by searching a database for a match. This type of application has applications for healthcare recruitment where individuals listed on police databases may need to be checked. A system also can be used in verification mode, where the biometric system authenticates a person's claimed identity from his/her previously enrolled pattern, this method can be used to ensure that the correct individual is prescribed repeat drugs at the correct dosage etc. Verification biometrics may also be used for building and ward entry checks to ensure that only registered personnel and visitors gain automatic entry. Hospital theatres would benefit from the use of biometrics to identify the patient on the bed and bring up the medical records to ensure they undergo the correct procedure and that any allergies are highlighted prior to drug provision. ...read more.

Conclusion

No new networks need to be installed, everything runs over the Internet. There are already many XML protocols in place to support healthcare (such as DocScope), this means that it will not be necessary to develop a large number of new programs. Advantages of .NET and XML This combination of programming language and software is however not limited to patient data. The system can be used for storing and transmitting any sort of information. Keeping control of drug inventories can be made easier, ordering medical equipment from suppliers can be made seamless, all that is required is an internet terminal and the correct .net and XML combination. Efficient use and storage of data is one of today's major challenges. The consequences of the use of incorrect data can be both harmful to the health of the patient and expensive for the Hospital. The combination of .net and XML will not only simplify the access to patient data but will secure consistency and help combat mistakes in dispensing whilst opening up avenues for improving the efficacy of capital spend. The below diagram shows a patients file stored in XML `format. XML presents the patients data on the screen. Figure 3 Summary. Currently the health industry is spending more money developing advance management system information's and tools to utilise the advance technology that is available. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Marked by a teacher

    UK Copyright and File Sharing

    5 star(s)

    It simply will not work to the desired level. If their aim is to continually spread awareness about how file sharing infringes copyright legislation through sustained advertising to the public, then I shall support them wholeheartedly. Appendices Appendix I: Interview with University of Warwick Student (who wishes to remain anonymous)

  2. Marked by a teacher

    Cisc v risc. To begin this assignment , I will outline the definition ...

    The major advantage for risc architecture was the dramatic reduction in the price of ram ( random access memory) , from 1MB of ram costing $5,000 in 1977 to only costing $6 in 1994.

  1. Ethics and professionalism in computing - examples from Facebook and Google

    Facebook can remove any content or information that user post on Facebook if they believe that it violates this Statement. 3. Facebook will provide user with tools to help them protect your intellectual property rights. 4. If they remove your content for infringing someone else's copyright, and you believe

  2. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    Unfortunately, e-commerce history is filled with expensive failures. Some of which could have been avoided by better testing before the site was opened to the general public (Samaroo, Allott & Hambling, 1999). 6.1 Scalability and performance Websites offer new challenges to developers, as well as testers.

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    (nd). User-Centred CASE Tools for User-Centred Information Systems. Summary: This paper refers to the development of CASE tools which facilitate and support all types of Information software System Building between developers/stakeholders. A researched approach has been applied to identify problems associated with prior CASE tools proposing User-Centred Development advancement for Next Generation CASE tools.

  2. Methods and technology used in Computer Forensics

    for indexed files, but in this case, the data may be deleted or hidden. String searching works off the premise of complex algorithms. The Boyer-Moore Fast String Searching Algorithm is one example of an algorithm that is widely utilised amongst computer forensics circles.

  1. My aim is to develop and provide a proposal to the Surgery of a ...

    connected to a server inside the surgery which may make it run particularly slowly, compared to option 1 that runs on a remote server. Option 3 covers everything required by the end user, however the in-depth security measures will make it particularly hard to design in the short time.

  2. Lifecycle Management Of Information Technology Project In Construction

    fully integrated. In ca?e of current ?ituation, there i? generally the one-to-one relation?hip between document?, computer application? u?ed to create the?e document?, and data ?et? that the?e application? u?e: and all of the?e are capable of little or no integration.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work