Question
Question 1 Neema Hospital, owned by pharmacy giant Tiba East Africa Limited, is a retail healthcare provider with more than 2000 locations established in all
Question 1
Neema Hospital, owned by pharmacy giant Tiba East Africa Limited, is a retail healthcare provider with more than 2000 locations established in all major towns throughout the East African Region. The centers are designed to have pharmacy, and a hospital where they treat patients with minor injuries or sicknesses. More than 4.2 million patient visits have been documented since the company's inception in 2010. By creating a healthcare delivery model that responds to consumer demand, Neema Hospital makes access to high-quality medical treatment easier for more East Africans. As more patients used Neema Hospital centers, one issue the company faced was how to exchange medical information between the care physicians in this centers. As Caroline Sang, chief information officer of Neema Hospital, explains, "There are a number of things we do very well with physicians in the centers, except connect electronically. We've been looking for a HMIS solution to connect and share data across all our centers. Assume you are the CIO, considering this experience's at Neema Hospital, answer the following questions:
a) Which HMIS development methodology between bespoke or off the shelf software should be most appropriate for Neema Hospital? Justify your answer, by detailing the merits and demerits of the approach you have chosen. How would the CIO apply agile software development methodologies in the chosen development methodology? (5 marks)
b) Explain how the CIO would use Project management methodologies and capital budgeting models in the acquisition and implementation of the Neema Hospital HMIS (5 marks)
c) What management, organization, and technology factors/problems are likely to face the CIO Caroline Sang in the process of acquisition and implementation of the HMIS project for Neema Hospital? Explain what the CIO should do to mitigate/reduce or eliminate such problems beforehand. (5 marks)
d) Explain at least 5 major threats to the data and information systems operations. Which are the likely vulnerabilities to be exploited by these threats: For each threat you have described, explain some countermeasures that the CIO should implement. (5 marks)
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started