Software Development Life-Cycle Discussion

  

1) Within the Discussion Board area, write 600-800 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Agile development methodologies have become very common in software development and information technology (IT) departments. Agile methodologies provide many advantages in terms of flexibility and adaptability. Complete the following for this assignment:

  • Explore agile development and agile IT approaches that are specific to health care organizations.
  • Explain 3 advantages of using an agile approach, and identify 2 challenges of an agile approach.
  • Explain the differences between using agile for project-based work and operational-based IT work.

Note: Use APA style to cite at least 4 scholarly sources from the last 5 years.

2) Within the Discussion Board area, write 600-800 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Meaningful use was a major regulatory driver of health care information technologies. Complete the following:

  • Research 1 academic article on the topic of health care meaningful use regulations, and then select 1      meaningful use objective.
  • For the identified meaningful use objective, suggest 1 information system implementation that could be used to achieve the identified objective.

Note: Use APA style to cite at least 4 scholarly sources from the last 5 years.

3) Within the Discussion Board area, write 600-800 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Health care information and system security is a major consideration for small and large health care organizations. Complete the following for this assignment:

  • Conduct research to find 1 security breach in a health care organization that has occurred in the past five years.
  • Research the breach, and then explain what could have been done to avoid or mitigate the impact of the security breach.
  • Conduct additional research to understand the penalties that health care organizations may be subject to if they fail to secure health care data.
  • Based on your research of the incident and the potential penalties, create a memo to a senior leader within a health care organization explaining why funding is justified to fund security-focused health care information technology projects.

Note: Use APA style to cite at least 4 scholarly sources from the last 5 years.

4) The Health Information Data Exchange is an emerging topic within health care systems. In 600-800 words, discuss the following:

  • Explain what use the health information data exchange could provide for a health care organization.
  • How could an organization use standardized data from other organizations?
  • Explain why a major organization would be interested in integrating its systems with the exchange.
  • Consider how the health information data exchange can lead to the availability of big data, and suggest 1 additional use of the data collected by a health care organization when integrating a health information data exchange.

Note: Use APA style to cite at least 4 scholarly sources from the last 5 years.

5) Implementing systems is often more challenging than designing systems. Consider a large health care organization that is implementing a major system that must interface with multiple external systems, and complete the following in 600-800 words:

  • Select 1 of the following components of such an implementation, and explain what would be required      to implement this aspect of the project:
    • User training
    • Documentation of the system for support or operations
    • Documenting the system for regulatory approval
    • Evaluating the system for security concerns
    • Evaluating the system for implementing the system at a new facility that the organization has       acquired

Note: Use APA style to cite at least 4 scholarly sources from the last 5 years.