Information Technology IT Has Expanded Essay

Question:

How To The Information Technology IT Has Expanded?

Answer:

Introduction

Information Technology (IT) has expanded and is being used at such a massive scale that its absence from the business operations and organizations can no longer be imagined. Also, it has become the need to innovate and develop new services and applications so that customer expectations are met. One of the industries in which IT has a great role to play is the healthcare sector. The application and need of IT in Tunstall healthcare has been carried out to understand the role of IT in business (Tunstallhealthcare, 2017).

Need of IT

Tunstall Healthcare is an Australian based organization that is a leading provider of healthcare solutions to the customers. There are millions of people and end users that are associated with Tunstall along with its partners and staff members. It is required for Tunstall to manage its healthcare services and solutions with the use of IT in its architecture. It will allow the organization to achieve its objectives in a better way.

Importance of IT

Tunstall provides the healthcare solutions to the patients in various health conditions such as chronic diseases, dementia, epilepsy and many more. Remote health monitoring and services is a necessity so that the people that reside in the remote areas and do not have access to the medical centres may also avail the health services provided by Tunstall. Also, tele-health monitoring will allow Tunstall to achieve its business objective of providing best in-class healthcare services to the customers (Sawa, 2011).

Requirements of IT for Tunstall

In order to reach out to the maximum number of users and the ones that are staying in the rural areas, it will be necessary to develop a tele-health monitoring system that shall allow the users to keep a track of their health at all times (Chae, 2012).

IT will play an important role in this case as the system will be designed using the basic components of IT such as software, hardware, networks, information management systems etc. These components will enable the resources to come up with a required system for Tunstall (Lee, 2016).

Usage of IT in Tunstall

The tele-health monitoring system that will be designed for Tunstall shall be capable of accomplishing the following.

  • Patients shall be allowed to login to the tele-health monitoring system to view them health details and medical reports (Dimitrov, 2016).
  • Patients shall be allowed to feed their medical data.
  • Medical and clinical staff members shall be able to view the data that is fed by the patients and shall be able to analyze it.
  • Clinical and medical staff shall be able to upload the medical reports through the system.
  • Information shall be efficiently managed by the system in terms of its addition, deletion, modification and storage along with other data operations (Park, 2011).
  • Reports that are present on the system shall get downloaded as per the desired format.

There are also certain aspects in terms of system qualities that must be included in the tele-health monitoring system.

  • Tele-health monitoring system shall have a key quality as system performance. This is the quality that will allow the users to have a good experience with the system as the response given by the system will be quick.
  • System usability will also be a desirable and mandatory property that shall be included in the teal-health monitoring system. It will allow the system to be designed in accordance with the specifications that are provided (Ng, Sim and Tan, 2006).
  • Tele-health monitoring system shall have a key quality as system reliability. This is the quality that will allow the users to view and gain valid and verified information from the system
  • System agility will also be a desirable and mandatory property that shall be included in the teal-health monitoring system. It will make the system flexible and adaptable to all the possible scenarios that may occur.
  • Tele-health monitoring system shall have a key quality as system availability. This is the quality that will allow the users to access their health data and details at any time (Al Ameen, Liu and Kwak, 2010).
  • System maintainability will also be a desirable and mandatory property that shall be included in the teal-health monitoring system. It will allow the system to be upgraded or modified easily.
  • Tele-health monitoring system shall have a key quality as system security. This is the quality that will allow the users to be assured that their private and sensitive health information is always protected.

Benefits & Advantages of IT

Tunstall will have several advantages and benefits with the use of IT in its architecture.

  • Health conditions of Australia will improve as Tunstall is the prime provider of healthcare solutions and will be able to reach more number of people with the use of IT.
  • Objectives that are determined along with the goals and aims will be achieved rapidly and accurately.
  • The patients along with the staff members associated with Tunstall will be able to have richer and better experience.
  • Information will be managed effectively and there will be lesser chances of its loss or displacements.

Posisble Risks

  • Health information stored in the tele-health systems and the automated information systems may be breached and accessed by the attackers.
  • Tracking of the patterns that are used by the staff members or the patients may be done.
  • Attacks related to the network and the information passing on through the network may take place.

Integrity Attacks

  • Tunstall is an organization that deals with the health information of the patients and the health information is considered to be sensitive and critical in nature. Any damages to this information results in a lot of damage to the users and the organization and the impact on the integrity can have devastating impacts. The same may occur by execution of message alterations by the malevolent entities which will involve use of practices by which either the content or the structure will be modified (M.M. El-Emary, Q. Husain and A. Alyoubi, 2012).
  • Tunstall is an organization that deals with the health information of the patients and the health information is considered to be sensitive and critical in nature. Any damages to this information results in a lot of damage to the users and the organization and the impact on the integrity can have devastating impacts. The same may occur by execution of media alterations by the malevolent entities which will involve use of practices by which either the content or the structure will be modified.

Attacks on Availability

  • Deterioration of the quality of tele-health monitoring system and other information systems will impact the availability which is the key quality to be included.
  • There may also be denial attacks that may be executed to hamper the availability of the systems (Jadhav, 2017).

IT Maintenance & IT Monitoring

IT may act as a boon to the organizations such as Tunstall only when there is adequate maintenance and monitoring of the components that are associated with it.

Maintenance of IT is referred to the post-deployment activities that include tracking and upgrades. Tele-health monitoring and other information systems will be developed as per the latest available technology. However, the technology that is latest in the present times is sure to get obsolete after a certain period of time. It will therefore be required to maintain the IT components by regularly upgrading them. It will also assist in the avoidance of the security risks and attacks that may otherwise occur.

Monitoring of IT is another practice that will be required to be carried out. It will comprise of two components as validation and verification. Verification is a form of monitoring that shall include evaluations, reviews, inspections and audits at regular intervals. These techniques will make sure that any of the attempts to violate the security is got hold of and treated with immediate effect. These shall be primarily carried out by the administration and management of Tunstall to make sure that there are system and network audits along with reviews and inspection executed.

There will also be a number of validation processes that will be needed to be carried out. These processes will include the application of technical control and testing techniques so that the risks to the security are avoided.

  • One of the greatest inventions of IT is the automated tools that are designed to automatically execute a particular task or an activity. In case of Tunstall, there are several risks that may occur in terms of denial attacks, malware attacks etc. These risks will be prevented with the installation of automated tools such as anti-attack tools designed for preventing the attacks of any form of a malware or denial attempt.
  • Identity management is also one of the significant technical steps that shall be taken which shall include the validation of the user identity through authentication and access control measures.
  • The primary aim of the validation techniques will be to keep the information protected in all the scenarios. This aim will be realized only when the information will be encrypted in all the locations so that the attackers do not succeed in acquiring it.
  • There are various testing techniques that shall also be carried out to validate the IT systems aspects and the defects that may be present in them.

Conclusion

IT is a necessity of the modern day systems and organizations. Healthcare industry is one of the most significant and huge industries that has several organizations that are working under it. One such organization is Tunstall that is based out of Australia and provides healthcare solutions to the users. There are millions of people and end users that are associated with Tunstall along with its partners and staff members. It is required for Tunstall to manage its healthcare services and solutions with the use of IT in its architecture. IT will play an important role in this case as the system will be designed using the basic components of IT such as software, hardware, networks, information management systems etc. These components will enable the resources to come up with a required system for Tunstall.

References

Al Ameen, M., Liu, J. and Kwak, K. (2010). Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications. Journal of Medical Systems, 36(1), pp.93-101.

Chae, Y. (2012). Management Issues in Healthcare Information Technology. Healthcare Informatics Research, 18(2), p.85.

Dimitrov, D. (2016). Medical Internet of Things and Big Data in Healthcare. Healthcare Informatics Research, 22(3), p.156.

Jadhav, R. (2017). Security Issues and Solutions in Wireless Sensor Networks. International Journal of Computer Applications, 162(2), pp.14-19.

Lee, J. (2016). Future of the Smartphone for Patients and Healthcare Providers. Healthcare Informatics Research, 22(1), p.1.

M.M. El-Emary, I., Q. Husain, K. and A. Alyoubi, B. (2012). Security issues of wireless sensor networks in various applications. International Journal of Academic Research, 4(6), pp.317-328.

Ng, H., Sim, M. and Tan, C. (2006). Security issues of wireless sensor networks in healthcare applications. BT Technology Journal, 24(2), pp.138-144.

Park, H. (2011). Pervasive Healthcare Computing: EMR/EHR, Wireless and Health Monitoring. Healthcare Informatics Research, 17(1), p.89.

Sawa, T. (2011). Leveraging Devices, Data and Discovery for Smarter Healthcare in Japan. Healthcare Informatics Research, 17(3), p.184.

Tunstallhealthcare (2017). Tunstall Healthcare. [online] Tunstallhealthcare.com.au. Available at: [Accessed 18 May 2017].

How to cite this essay: