Doctors Office
Saturday, November 13, 2010
Blog Entry 7.1 Securing Informations Systems
There are several primary threats to IS security Accidents and Natural Disasters, Employee and Consultants, Links to outside business contacts, and outsiders ie. hackers, and viruses and or malicious code. By implementing various security systems to secure access, data, and usage, we at ferrum Medical can effectivly deter the damage possible by malicious intent. By safeguarding all of our data and usage with the use of a combination of hardware and software based firewalls as wells as anti-viral and anti-malicious code software; to allow for safe user environmental which doesn't allow for tampering or infection of the database. The IS is also safeguarded by a user time limit, so that after a certain preprogrammed amount of time has elapsed, the session becomes inactive and the user is logged out to avoid any potential tampering under a logged in account.Through the use of specialized authentication hardware and software, Ferrum medical can ensure that the users accessing the server through the online site or through the in house terminals are authorized to have access. The access is divided into types and location. For one, only secure data can be accessed onsite, and not sensitive data such as appointment data being viewed by a patient can be viewed outside as well as in side the site. There are administrator, employee, and client types of access. The administrator, being the person who runs the business of Ferrum Medical, has complete access to all data, but sensitive data can only be accessed from a terminal located within the physical building. The Employee has access to all patient, and appointment data as well as supply and prescirption requisition, and the ability to edit any of said data. And the Client level access is to allow the patient to view all their personal data and appointments, only allowing them to access and edit such things as address and to apply for an appointment. Also through the use of human verification and biometrics the system is also made much more secure.
Blog Entry 6.1 web 2.0 pillars
There are four web 2.0 pillars Utilizing the web as a platform, Harnessing Collective Intelligence, Leveraging Data, and Implementing Innovative Web Capabilities. At Ferrum Medical by implementing an IS we can utilize all of the four pillars to produce an effective business advantage. With an implementation of a website we can utilize the web as a platform to promote our business by proving both access and information to both customers and employees. This allows for the users of our website to be informed and continually updated at to the changes being made to the structure, function and amenities offered at Ferrum Medical. By Allowing customers to leave helpful suggestions on our website we Harness Collective intelligence; allowing for a better content experience. We leverage data by collecting non volatile personal data about our patients to better serve our customers by allowing us to determine what areas we need to improve upon and how we can expand to better serve out customers and advance our edge. By the use of an interactive internet telephony service we can easily allow customers to call our hotline and set up and appointment and streamline the process of booking appointments and confirming patient information so that easy, well kepts records can be maintained. All of these pillars are implemented somehow through our home office server.
Sunday, October 24, 2010
Blog Entry 5.3 Intranet
At Ferrum Medical, when an employee or even a patient needs to access their information on our server, they use something called an intranet. From their home office computer or any laptop they can log onto out website and securely access sensitive information. Then through the interconnectivity of a VPN or virtual private network accessed after establishing a connection to the internet, they can access anything they are given access to under their profile. Their data is stored on our home server and after they have gained admittance and after having passed through all the necessary gateways.
Blog Entry 5.2 Extranet
At Ferrum Medical, when a physician logs on to our secure website, they can connect to any pharmacy using our extranet. The physician, being a client uses our server as a proxy between our facility and the pharmacy's server. This client, connects to the internet through a secure firewall to then send and receive sensitive data across a VPN or virtual private network. They after this secure data travels through the VPN it gets verified by the pharamacy's firewall and then get ferried along to its destination, a drug log on the pharmacy server.
Sunday, October 17, 2010
Blog Entry 5.1 Website Analysis
As Ferrum Medical is a business, and all businesses have assets, so too does Ferrum Medical. We like our competitors have a web page, a way to get information out to our clients and inform them of their options. And like any good business we need an advantage, and to gain it we must see what it is that makes our competitors so profitable. So we must delve into their website and analyze it against the six rules of E Commerce. As one of our competitors we chose Centra Health.
www.centrahealth.com
Rule 1: they have various helpful peices of information pertaining to physician selection to ailment symptom categorization.
(5 of 5 )
Rule 2: it is aesthetically pleasing, it is organized and simplistic, not cluttered or chaotic.
(5 of 5)
Rule 3: The website is responsive and quick making it efficient. It is also user friendly, so that many people not just computer elite can utilize the site.
(5 of 5)
Rule 4: It has various multimedia venues and has ways of keeping the user interested.
(5 of 5)
Rule 5: They have enough advertising although it might be possible to do more.
(4 of 5)
Rule 6: Information about Physicians and Diseases is available for the user to easily utilize to become informed and educated.
(5 of 5)
It seems obvious that our larger competitors, given their extensive advertising and marketing budget can appropriatly depict all the important aspects of a good business online, paying special attentipn to the commerce guidelines.
www.centrahealth.com
Rule 1: they have various helpful peices of information pertaining to physician selection to ailment symptom categorization.
(5 of 5 )
Rule 2: it is aesthetically pleasing, it is organized and simplistic, not cluttered or chaotic.
(5 of 5)
Rule 3: The website is responsive and quick making it efficient. It is also user friendly, so that many people not just computer elite can utilize the site.
(5 of 5)
Rule 4: It has various multimedia venues and has ways of keeping the user interested.
(5 of 5)
Rule 5: They have enough advertising although it might be possible to do more.
(4 of 5)
Rule 6: Information about Physicians and Diseases is available for the user to easily utilize to become informed and educated.
(5 of 5)
It seems obvious that our larger competitors, given their extensive advertising and marketing budget can appropriatly depict all the important aspects of a good business online, paying special attentipn to the commerce guidelines.
Sunday, October 10, 2010
Blog Entry 4.4 Database Design
In this Entity Relationship Diagram, there are three main Entities : Customer, Invoice, and Product.
Within each entity there are different attribute types such as Name, but a specific name such as John Smith is an Attribute. Each entity can be described as a table each containing rows and columns, the rows being records and columns being attributes. Each attribute type has its own data type dependent upon the type of information, such as name being text. The customer entity, contains attribute types such as Name, Address, and gender. It also contains a customer key, and ID number that is specific to the individual, such that it can be referred to later. The Product entity contains attribute types such as the type of product, the price and the Product key. Like the customer key it is a reference key used to compare and correlate data in other entites.
Within each entity there are different attribute types such as Name, but a specific name such as John Smith is an Attribute. Each entity can be described as a table each containing rows and columns, the rows being records and columns being attributes. Each attribute type has its own data type dependent upon the type of information, such as name being text. The customer entity, contains attribute types such as Name, Address, and gender. It also contains a customer key, and ID number that is specific to the individual, such that it can be referred to later. The Product entity contains attribute types such as the type of product, the price and the Product key. Like the customer key it is a reference key used to compare and correlate data in other entites.
Blog Entry 4.3 Packet Switching Technology
Due the fact that there are many users online all the time and data is being sent and received simultaneously there needed to be a way in which to send information in a way that computers can understand that can be translated into usable information. Through the TCP many different messages can be sent over the internet via packets in any order that are reassembled later. When computer A wants to share info to computer C in the picture above, the binary data of the message sent from A is broken into manageable packets and delivered to C. This message sent from the computer A, uses TCP to send its message to computer C using package switching. The IP sets the format for the packet and the location it is to be sent, the IP information tells the router where this location is ad sends it on it s way. These packets travel independently of one another and arrive out of order. Each packet has a header and it contains the destination and sending IP address as well as the order in which things should be arranged.
Subscribe to:
Posts (Atom)