Health Informatics & Inform System – Assignment 4

1.       Discuss at least 3 reasons for using CPOE (computerized patient order entry) (Refer to Article 1 and 2 of the resources. Consider both when building your arguments. feel free to use your own or researched examples if needed).

2.       There are many different EMRs available in the marketplace. What attributes of an EMR make it more suitable than the others for each of the following sizes of practice (a set of attributes for each size practice below):

  • small practices,
  • large multi-specialty groups or community hospitals, and
  • multi-hospital systems?

I expect 3 pages of fact-based material to answer these questions.

Paper should be APA formatted with citation.

Project part 2

  

Project Part 2: Access Controls Procedure Guide

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

§ Understand and document the purpose of each access control change request

§ Know what access controls were in place before any changes

§ Get an approval of change by management

§ Understand the scope of the change, both with respect to users, computers, and objects

§ Have evaluated the expected impact of the change

§ Know how to evaluate whether the change meets the goals

§ Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

§ Status or setting prior to any change

§ Reason for the change

§ Change to implement

§ Scope of the change

§ Impact of the change

§ Status or setting after the change

§ Process to evaluate the change

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

Enterprise risk management/ research paper

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Abhi Assignment

Applying all the code on your selected dataset, complete all codes from Chapter 4

Bivariate Graphs. Make sure you submit to this link two things

1. Your report file showing screenshots of all commands from Rstudio GUI

Make sure you show all Rstudio GUIs

2. Submit your R script code

R vs Python

Several Big Data Visualization tools have been evaluated in this weeks paper. While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day. Compare and contrast the use of R vs Python and identify the pros and cons of each. Provide an example of both programming languages with coding examples as well as your experience in using one or both programming languages in professional or personal work. If you have no experience with either language, please discuss how you foresee using either/both of these languages in visualizing data when analyzing big data.

Practical Connection Assignment Reflection

Practical Connection Assignment Reflection on INFORMATION TECHNOLOGY IMPORTANCE IN STRATEGIC PLANNING. 

How gained knowledge in INFORMATION TECHNOLOGY IMPORTANCE IN STRATEGIC PLANNING subject help you when you are working as a quality assurance analyst in the healthcare organization?

How you will apply what you learn to your current job?

Java Programming

Design a Java application that will read a file containing data related to the US. Crime statistics from 1994-2013.

Here are the codes I have so far:

public class USCrimeClass {

// Crime data fields for each data to retrieve

private int year;

private double populationGrowth;

private int maxMurderYear;

private int minMurderYear;

private int maxRobberyYear;

private int minRobberyYear;

/**

* Crime data constructor to set variables

*/

public USCrimeClass(int year, int populationGrowth, int maxMurderYear, int minMurderYear, int maxRobberyYear, int minRobberyYear){

this.year = year;

this.populationGrowth = populationGrowth;

this.maxMurderYear = maxMurderYear;

this.minMurderYear = minMurderYear;

this.maxRobberyYear = maxRobberyYear;

this.minRobberyYear = minRobberyYear;

}

// Constructor defaults

public USCrimeClass(int count){

this.year = 0;

this.populationGrowth = 0.0;

this.maxMurderYear = 0;

this.minMurderYear = 0;

this.maxRobberyYear = 0;

this.minRobberyYear = 0;

}

/**

* Getter methods for each field

* @return percentage growth and years for murder and robbery

*/

public int getYear() {return this.year; }

public double getPopulationGrowth() {return this.populationGrowth; }

public int getMaxMurderYear() {return this.maxMurderYear; }

public int getMinMurderYear() {return this.minMurderYear; }

public int getMaxRobberyYear() {return this.maxRobberyYear; }

public int getMinRobberyYear() {return this.minRobberyYear; }

// Setter method for each field

public void setYear(int year) {this.year = year;}

public void setPopulationGrowth(double populationGrowth) {this.populationGrowth = populationGrowth;}

public void setMaxMurderYear(int maxMurders) {this.maxMurderYear = maxMurders;}

public void setMinMurderYear(int minMurders) {this.minMurderYear = minMurders;}

public void setMaxRobberyYear(int maxRobbery) {this.maxRobberyYear = maxRobbery;}

public void setMinRobberyYear(int minRobbery) {this.minRobberyYear = minRobbery;}

}

import java.io.File;

import java.util.Scanner;

import java.io.FileNotFoundException;

public class USCrimeFile {

public static USCrimeClass[] read(String filename){

// Array declaration

USCrimeClass[] stats = new USCrimeClass[20];

Scanner inputReader = null;

// Variable declaration

int count = 0;

String line;

// Access Crime.csv and create array

try {

File file=new File(“Crime.csv”);

inputReader = new Scanner(new File(“Crime.csv”));

// Read first line

inputReader.nextLine();

while (inputReader.hasNext()) {

line = inputReader.nextLine();

String[] data = line.split(“,”);

stats[count] = new USCrimeClass(Integer.parseInt(data[0]));

stats[count].setPopulationGrowth(Integer.parseInt(data[1]));

stats[count].setMaxMurderYear(Integer.parseInt(data[4]));

stats[count].setMinMurderYear(Integer.parseInt(data[4]));

stats[count].setMaxRobberyYear(Integer.parseInt(data[8]));

stats[count].setMinRobberyYear(Integer.parseInt(data[8]));

count++;

}

return stats;

} catch (FileNotFoundException e) {

e.printStackTrace();

return stats;

}

finally {

inputReader.close();

}

}

// Method calculation for population growth rate

public void populationGrowth(USCrimeClass[] data){

double growthRate;

System.out.println(“Population growth rate: “);

for (int i = 0; i < data.length - 1; i++){

growthRate = 100 * (float) (data[i+1].getPopulationGrowth() – data[i].getPopulationGrowth()) / data[i].getPopulationGrowth();

System.out.println(“From ” + data[i].getYear() + ” to ” + data[i + 1].getYear() + ” the population growth was “+ String.format(“%.4f”, growthRate) + “%”);

}

}

// Method to find year with highest murder rate

public String maxMurderYear(USCrimeClass[] data) {

int iSize = data.length;

double currentMurderRate = 0.00;

double mMurderRate;

int murderHighYear = 0;

String stReturnValue;

// Access array

try {

for (int i = 0; i < iSize; i++) {

// Get murder rate

mMurderRate = data[i].getMaxMurderYear();

if (mMurderRate < currentMurderRate) {

murderHighYear = data[i].getYear();

}

currentMurderRate = mMurderRate;

}

stReturnValue = “The murder rate was highest in ” + murderHighYear + “.”;

return stReturnValue;

}

catch(Exception e){

System.out.println(“Exception” + e.getMessage());

return null;

}

}

// Method to find lowest murder year

public String minMurderYear(USCrimeClass[] data) {

int iSize = data.length;

double currentMurderRate = 0.00;

double mMurderRate;

int murderLowYear = 0;

String stReturnValue;

try {

// Access array

for (int i = 0; i < iSize; i++) {

// Get the murder rate

mMurderRate = data[i].getMinMurderYear();

if (mMurderRate > currentMurderRate) {

murderLowYear = data[i].getYear();

}

currentMurderRate = mMurderRate;

}

stReturnValue = “The murder rate was lowest in ” + murderLowYear + “.”;

return stReturnValue;

} catch (Exception e) {

System.out.println(“Exception” + e.getMessage());

return null;

}

}

// Get the year with highest robberies

public String maxRobberyYear(USCrimeClass[] data) {

int iSize = data.length;

double currentRobberyRate = 0.00;

double dRobberyRate;

int robberyHighYear = 0;

String stReturnValue;

// Access array

try {

for (int i = 0; i < iSize; i++) {

// Get the robbery rate

dRobberyRate = data[i].getMaxRobberyYear();

if (dRobberyRate < currentRobberyRate) {

robberyHighYear = data[i].getYear();

}

currentRobberyRate = dRobberyRate;

}

stReturnValue = “The robbery rate was highest in ” + robberyHighYear + “.”;

return stReturnValue;

} catch (Exception e) {

System.out.println(“Exception” + e.getMessage());

return null;

}

}

// Method to find lowest robbery year

public String minRobberyYear(USCrimeClass[] data) {

int iSize = data.length;

double currentRobberyRate = 0.00;

double dRobberyRate;

int robberyLowYear = 0;

String stReturnValue;

// Access array

try {

for (int i = 0; i < iSize; i++) {

// Get robbery rate

dRobberyRate = data[i].getMinRobberyYear();

if (dRobberyRate > currentRobberyRate) {

robberyLowYear = data[i].getYear();

}

currentRobberyRate = dRobberyRate;

}

stReturnValue = “The robbery rate was lowest in ” + robberyLowYear + “.”;

return stReturnValue;

} catch (Exception e) {

System.out.println(“Exception” + e.getMessage());

return null;

}

}

}

import java.util.Scanner;

public class TestUSCrime {

static Scanner input = new Scanner(System.in);

public static void main(String[] args) {

/**

* Reference USCrimeFile

*/

USCrimeFile oUSCrimeFile = new USCrimeFile();

USCrimeClass[] data = USCrimeFile.read(“Crime.csv”);

/**

* Declare variables

*/

long startTime = System.currentTimeMillis();

long endTime;

String userSelect;

while (true)

{

// Welcome prompt

System.out.println(“n******** Welcome to the US Crime Statistical Application********n”);

System.out.println(“n” + “Enter the number of the question you want answered. Enter ‘Q’ to quit the program:n”);

System.out.println(“1. What were the percentages in population growth for each consecutive year from 1994-2013?”);

System.out.println(“2. What year was the murder rate the highest?”);

System.out.println(“3. What year wat the murder rate the lowest?”);

System.out.println(“4. What year was the robbery rate the highest?”);

System.out.println(“5. What year was the robbery rate the lowest?”);

System.out.println(“Q. Quit the program”);

System.out.println(“nEnter your selection: “);

userSelect = input.nextLine();

System.out.println();

switch (userSelect){

case “1”:

oUSCrimeFile.populationGrowth(data);

break;

case “2”:

System.out.println(“The murder rate was highest in ” + oUSCrimeFile.maxMurderYear(data));

break;

case “3”:

System.out.println(“The murder rate was lowest in ” + oUSCrimeFile.minMurderYear(data));

break;

case “4”:

System.out.println(“The robbery rate was highest in: ” + oUSCrimeFile.maxRobberyYear(data));

break;

case “5”:

System.out.println(“The robbery rate was highest in: ” + oUSCrimeFile.minRobberyYear(data));

break;

case “Q”:

System.out.println(“nThank you for trying the US Crime Statistics Program”);

endTime = System.currentTimeMillis();

System.out.println(“nElapsed time in seconds was: ” + (endTime – startTime) / 1000 + “seconds.”);

System.exit(0);

}

}

}

}

5-2 Information Technology Risk Analysis and Cyber Security Policy Assignment, Part 2

 Submit your creation of a cyber-security policy. (Please note: You must use the information that was identified in the risk analysis paper and create an organizational cyber-security policy.) The cyber-security policy will assess how the organization will interpret security issues that occur in the workplace. The cyber-security policy will also distinguish and examine ethical issues in the workplace that pertain to social media, email, and privacy. 

The paper is pertaining to the Twitter data breach that happened earlier this year. No need to go back over the breach but rather a policy to mitigate the security issues within the workplace as identified above.

case study

Answer the four questions noted below.  Please use at least one reference and ensure it’s in APA format (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.

Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?

What are the steps for an incident response plan? How does network security play into an incident response plan? 

What are some major differences between open source and commercialclosed source software and solutions? Should you consider one over the other? 

What are firewalls? What are VPNs? What are some alternatives to a traditional firewall? What are some alternatives to traditional VPNs? How does the alternatives improve the traditional version of both?

Note: The essay should include an APA cover page and at least two reference (academic or professional literature) in APA v7 format.