System Development
A
The technological application assists at the escalation in efficiency and production due to its current developments. The appliances, when utilized sufficiently, increases work output than human beings. The healthcare department acknowledged technological growth by encompassing modern database system instruments in their activities. The hospital facility created an IS application for its production. The hospital IT department created FeldHealthHR software in achieving its organizational objectives. At first, the tool application helps at enhancing management command. The software utilization by the managerial team has effective operations control in the general firm, and by doing so, they make other workers accomplish duties effectively (Porat et al., 2017). Also, the software improves service efficiency offered. Having quality services escalates the reputational image of the hospital, thus registering more revenue. The software also helps at minimizing of time needed in undertaking particular tasks for the organization to attain its strategic goals. Therefore, the hospital performs extended activities at reduced time, hence completing more tasks avoiding queueing. The FeldHealthHR software execution outshines available competitors who do not have any IS solution leading to its substantial success.
1.
Business process engineering focuses on workflow analysis and venture algorithms within an industry. The hospital IT compartments can utilize BPE in the creation and execution of the FeldHealthHR appliance. Basic knowledge application can assist them in the identification of the markets and the critical areas of emphasis in the development process. The consultation merits follow the fact that the BPE can help the IT in evaluating the section requiring more attention than the others (Porat et al., 2017). The IT department’s use of BPM helps it in the process automation of activities leading to worker’s satisfaction. It leads to high productivity since employees focus on customers, hence creating sustainability.
2
Due to the threats of new entrants due to chronic illness and the baby population, I will focus on the differentiation strategy, though the FeldHealthHR software development. Also, I will focus on the Research and Development, especially on areas of specialization, that is, oncology, cardiovascular, among others (Porat et al., 2017). On the supplier bargaining power, the hospital will adopt an efficient supply chain with suppliers to effectively offer products in the hospital for the effective execution of the medical services. On the bargaining power of customers, the company develops the software to enable easy employee onboarding to increase the client value proposition. Also, by offering many services, like orthopedic, oncology, cardiovascular, and gastroenterology, more customers flock to the hospital, thus sales stimulation (Porat et al., 2017). On tackling the threat of substitutes, like surrounding hospitals offering similar services, the FeldHealthHR software will ease the operations, thus satisfying the clients. Finally, on reducing competition rivalry, the hospital will continue hiring different professional employees and adopt the FeldHealthHR software technology for a broader customer base.
3
Firstly, the planning phase will be applied to the FeldHealthHR acquisition process, and the testing and training of the staff, that is, new and old employees. On the analysis, it will be applied to the FeldHealthHR analyzer with a set IS solution, and also in a point of care documentation in the hospital. The design stage will be implemented on checking the seller’s product compatibility with that of Felder Community hospital. Besides, it will be applied in stakeholder assessment in the decision-making process. The SDLC implementation will be used on the double entering of the patient records as well as the admission data. Also, it will be applied to the training of the staff, undertaking medical research on the areas needing improvement, and tracking former products used by patients in the hospital. The maintenance stage will be applied to the tracking of Medicare and billing practices changes in the hospital.
4
The customer’s demands due to the increase in chronic and baby population needed a service speed. The workers required quick orientation and induction to the hospitals, while professionals (doctors) an application that solves the hospital challenges. The shareholders ensured resource allocation and development of IS application for them to exercise a management command in the hospital. The IT developers contribute to providing the best system development implementation matching the organization’s vision.
B Agile development method
1
The utilization of the agile development model reduces potential uncertainties, like bugs, cost overruns, and prerequisite changes, especially when having new supplementary functionality. The method allows software release in iterations. Recurring statements enhance effectiveness by making experts locate and fix defects with the aligned expectations (Kashevnik et al., 2017). Also, it makes users recognize software gains with solid performances. The method depends on real-time communication, and new workers will find it difficult to adjust their working speed. It involves commitment and labor-intensive by the developers since it involves task iteration.
2
The key milestones include prioritization of the tasks in the hospital to enhance flexibility and transparency in the system. It also establishes checkpoints, like the ideal and completed jobs in the hospital, thus making the management to focus on the activities not catered (Kashevnik et al., 2017). Finally, the last milestone includes deliverables, like producing prototypes and other required data needed for the hospital analysis.
C
The FeldHealthHR software execution potential unintentional threats result from individual errors, environmental hazards, and computer failures. For example, lack of system operation knowledge may lead to system breakdown. Also, the environmental risks, like moisture, and rain, may destroy the computers rendering the software operations obsolete. The intentional threats include data theft, Denial of Service, viruses, sabotage, and worms, among others (Porat et al., 2017). For example, when an employee accesses unauthorized information to a third party poses a threat to the organization from the competitors.
1
For the prevention of the physical threats, the organization must lock and have all-round surveillance of the server rooms, securing company printers by blotting them down, and ensuring to have backup files. Also, adding a layer of security (security alarms, and codes) to all portable devices, and disabling the USB ports prevents physical threats (Porat et al., 2017). On the prevention of digital attacks, the company should deploy measures, like thwarting attackers, creation of demilitarised zone and out-of-band deep packet inspection, undertaking holistic technological approaches, and securing computers with anti-viruses.
2
The information should provide compliance and ensure privacy protection to the customers. The people should not share, use any unauthorized database acquired from the company software to a third party, and the software should have encryption and potential security firewalls (Kashevnik et al., 2017). The resources available include time, human resources (experts, among others), money, and computer resources.
D
The SLDC maintenance phase assists people in monitoring the launched software performance in assessing its working proficiency. Therefore, the maintenance phase ensures that the software runs at the performance climax degrees (Aljawarneh et al., 2017). Besides, it also provides that any software bugs, among others, solving in a minimum period.
1
They should provide proper data interpretation, ensure data safety protection by use of feasible surveillance, firewalls, and anti-viruses. They should perform iterate by learning from the collected data and hospital staff (Porat et al., 2017). The IT department should develop a human-centric collection system.
2
The IT department should provide an array of assistance in cases of software itches. The should replace any current software updates, use the Internet in determining the issues, examine the software patches, and performing activities, like( software installation and reinstallation, RAM freeing and performing troubleshooting problems.
References
Aljawarneh, S. A., Alawneh, A., & Jaradat, R. (2017). Cloud security engineering: Early stages of SDLC. Future Generation Computer Systems, 74, 385-392.
Kashevnik, A., Lashkov, I., Parfenov, V., Mustafin, N., & Baraniuc, O. (2017, November). Context-based driver support system development: methodology and case study. In 2017 21st Conference of Open Innovations Association (FRUCT) (pp. 162-171). IEEE.
Porat, R., Bayora, A., Farage, O., & Blayer-gat, A. (2016). U.S. Patent No. 9,419,996. Washington, DC: U.S. Patent and Trademark Office.