StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Proposal on Data Security for The Kingswood, Inc - Business Plan Example

Cite this document
Summary
This paper "Proposal on Data Security for The Kingswood, Inc" explains how paperwork in Kingswood, Inc. can be replaced by an automated system and examines the security mechanisms incorporated to ensure managers, coordinators, and volunteers benefit from an automated system. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
Proposal on Data Security for The Kingswood, Inc
Read Text Preview

Extract of sample "Proposal on Data Security for The Kingswood, Inc"

? Proposal on Data Security INTRODUCTION The Kingswood, Inc. is a small facility that aims to ensure affordable and quality healthcare support to all its patients. Although the facility makes no attempt to prolong life or cure its patients it, however, does its best to ensure its patient always receives the first priority. Kingswood Inc. volunteers and nurses provide basic medical care. It also offers prescription of medicines and non invasive medical procedures to reduce patient symptoms and managing pain. Its tasks also include nurses training, volunteers training, patient counseling, meal preparation and guidance. This document proposes how paperwork in Kingswood, Inc. can be replaced by an automated system. The document aims to examine the security mechanisms incorporated to ensure managers, coordinators and volunteers benefit from an automated system. This document includes methods of collecting data, costs and schedule for completion of the evaluation and qualification. Problem Statement Storage of information is handled at both the finance and administration departments. This is done in spring files and counter books (Kush, 2003). These are the departments that the proposed system aims to help and address its issues. The proposal aims in helping the Hospice manage its data better as it fulfills its core mandate. Patients’ accommodation Information is the main operation handled by Kingswood, Inc. The proposed automated system aims to ensure that the management workflow goes well as it seeks to ensure fewer repetitions and reduced time in processing of information (Baugh, Sue, & Robert, 1995). Objectives The proposed system exhibits the following objectives: 1. Ensuring that its patient data is handled with confidentiality and absolute consistency. 2. Improve the general coordination within the entire hospice team and offices through storage of information in a common database. 3. Ensuring that data is safe from losses associate with paperwork for instance poor backup, misplacement, aging and fire occurrence. 4. It also aims to deliver better data processing and manipulation in comparison to the current manual system. 5. It also aims in improving storage of data as well as presentation as opposed to the current use of files and counter books. 6. The automated system aims in dealing with the security needs of the entire Kingswood, Inc. management. This would be achieved through equipping the computers with encrypted passwords, and having backup data in case of a fire. 7. Being able to search, sort and delete information quickly and in an organized way. Technology used Distributed System Technologies Distributed objects would be used in the context of communications between systems within the facility as well as exchanging data within the external branches. Use of XML tools would allow companies to try and give orders through customized web interfaces. Service Oriented Architectures would be used with the purpose of going paperless. Therefore, Kingswood, Inc. communication with other systems running on any possible stage would be enhanced. The LAN Network Topology The four facilities and central office establish the need for five LAN setup. Each of the facility will be have an internet Service provider to provide them with an internet connection, having each a centralized hub or router at each location for easier management of all systems. In order to support portability in notebook laptops, the hub will support IEEE 802.11g wireless standards. The D- Link Wireless Router fits this need with several ports, up to five, being $70. Using Wi-Fi router as a central access point for each area reduces the number of failure points to the internet connection. Social Media Social media employ web and mobile based forms of technology to support interactive dialogue. It takes many different forms including magazines, internet, social blogs, social networks, wikis, podcasts and many others. Mobile Social Media This media can be used on mobile devices. In comparison to the past traditional media, it offers a higher location and time perception. In this facility, it can be used on the go when one is not near a laptop or desktop machine. Mobile social media would enable the management to write, respond, and browse the internet in real time. With the increase in new devices which are essentially cheap, gadgets which include iPods, phones, tablets, and many others, there is no use of sitting at the office only using the PC. Equipment to be used Hardware Client Systems- In order to meet the requirements of the management team, lightweight laptops, which are portable, can be used for recording observation. For this reason, a standard size notebook personal computer recommended, with a larger screen size, keyboard, DVD player, Intel power Pentium dual-core processing (2.16GHz), and at least 160GB of hard drive storage. Varieties of such laptops are available at an approximate amount of $500 each. The notebook should have Wi-Fi and wireless for all volunteers. The notebook has an advantage over the desktop computer. This is because of the mobility edge and being able to run for hours on battery charge. Notebooks have smaller keyboards. This is effective for volunteers who must use them for reporting functions. Managers need smart phones to be able for easy coordination and monitoring the hospice work progress. They need committed systems that can sprint a wide range of customized software, media and peripherals. Peripherals Kingswood, Inc. needs to digitize paper records from outside organizations into electronic management tool. These functions can be covered in a single multifunction laser printer. Certain devices come with a copier, color laser printer, fax, and scanner, in a single compact design with network capacity for $500. Installing this device at a central office would cover a multitude of office requirements. Server Kingswood, Inc. would not need an in-house means to act as a server, as functionality would be outsourced to online service providers. Software Operating System The notebook can occur with either Ubuntu or Windows 7 preinstalled. Windows offers a higher advantage for better hardware support as Ubuntu usually requires manual configurations and is often not user friendly. Ubuntu has the advantage of offering a wide variety of installed software applications at absolutely no cost, while Windows 7 to the Dell laptops may be found at a cost of $70. Client application Whether the facility will want Windows or Linux Operating system, Sun Microsystems’s Open Office suite for desktop efficiency is recommended particularly over Microsoft Office suite. Both provide word processing, XML, web publishing, spread sheets, layout and database functions; though, Open Office’s database software can connect with MySQL database, while MS Office cannot. Since Open Office is free, it saves the organization close to $500 per installation compared with MS Office. Server Application In order to maintain a centralized data store without having duplication of data, a server would be required to present data entry and sharing data. Applications must be capable of sharing information as well as providing information in standard criteria. Several applications, such as the .NET web application, have in-built components for maintaining these standards. However, since these applications require an internet connection and a running server to work, in the event of ISP outage, the online application would be inaccessible (Burd, 2006). A fully customized software known as the mums Hospice Software is used to handle all the requirements. It offers a complete application package which includes executive, patient tracking, insurance management and certification tracking (Kiernan, 2007). The application is hosted on a server and its data centralized. In case the Kingswood Inc. may need a website to advertise their services, the application could be hosted through an online company, which offers hosting at fair prices. The amount may vary for as low as $7 a month. With hosting application, the issue of file hosting is left for determination. There are a number of free, open-source document management software, which allows for online hosting available for free in PHP. Additional Information When Kingswood Inc. hospice needs to expand its operations wireless broadband network cards can be used to provide internet access to volunteers on site. They may also want to market their progress outside the country since all that is required is a resourceful website. This would help in bringing more volunteers and sponsors from various parts of the world. The Gantt chart below shows the schedule of the various steps of the Software Development Life Cycle. ACTIVITY WEEK 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Requirement analysis Project approval Project plan Functional specification Software design Coding Software testing Implementation Documentation Conclusion The automated system at Kingswood, Inc. will revolutionize the way the operations flow within the facility. Upon Kingswood Inc. completion, a better competitive advantage would be visible than realized before in comparison to many others. This would translate to better performance and higher productivity of the entire Kingswood, Inc. facility. In addition, the facility would be secure in record keeping since there would be a secure mechanism set across to deal with matters of security. References Baugh, L., Sue, H., & Robert J. (1995). Handbook for writing proposals. Washington, DC: McGraw-Hill.  Burd, S. D. (2006). Systems architecture. 5th ed. Boston, MA: Thomson Course Technology. Kiernan, S. P. (2007). Last rights: Rescuing the end of life from the medical system (revised ed.). London: MacMillan. Kush, R. D. (2003). eClinical trials: Planning and implementation. Boston, MA: CenterWatch / Thomson Healthcare. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Systems Security Term Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Computer Systems Security Term Paper Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1461258-computer-systems-security
(Computer Systems Security Term Paper Example | Topics and Well Written Essays - 1500 Words)
Computer Systems Security Term Paper Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1461258-computer-systems-security.
“Computer Systems Security Term Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1461258-computer-systems-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Proposal on Data Security for The Kingswood, Inc

Security Breaches and Incident Handling in Organization

Network dictionary defines incident handling as “Incident Handling is an action plan for dealing with intrusions, cyber-theft, denial of service, fire, floods, and other security related events.... … This proposal is constructed on the basis of a questionnaire and will highlight solutions for minimizing incident handling and security breaches in an organization.... The effective incident management approach will minimize issues related to security breaches and other possible threats....
7 Pages (1750 words) Research Proposal

PROPOSAL ON CLOUD STORAGE SERVICE

Nonetheless, they as well raise several security and confidentiality issues, as big suppliers become entrusted with mass of potentially ‘sensitive' records.... It is anticipation of the researcher that the proposed idea will be very beneficial for organizations and will facilitate them in improving and enhancing their different processes and procedures by managing huge volumes of data effectively.... The research proposal is an attempt of the researcher to propose a new service that will be playing a crucial role in resolving one of the major issues of corporate society....
13 Pages (3250 words) Research Proposal

Information Security in Supply Chain Security

security in a supply chain has always been an important aspect.... Ever since the supply chains have become technology dependent, the security aspect has faced significant impact from the ‘information security' aspect.... However, this ‘information security' aspect in the supply chain security is not as greatly investigated as the other areas are.... Given the fact that supply chains involve crucial information about organizations, nations as well as about individuals, it is a necessity to ensure the security of all the information....
4 Pages (1000 words) Research Proposal

Campus Safety long proposal

Similarly, the lack of proper systems to monitor security within campus such as security cameras, alarms etc as well as the presence of antisocial elements in the proximity of the campus can also encourage crimes.... The administration and faculty in our campus are aware of the situation but, due to financial constraints they have not been able to implement adequate measures for effectively providing full security within the campus.... Thus, securing campus perimeters, installing “physical access control mechanisms” including interior locks for classrooms and controlled access locks for dormitories etc are some of the traditional means of security in the campuses (Securing Our Future 8)....
3 Pages (750 words) Research Proposal

Job Security and Its Impact on National Security

On the other hand, the Even with the variable pictures portrayed by the different employment versions in the modern society, there has been a keen insight into the impact of securing jobs, particularly among youths, to the general national security.... In this respect, therefore, this study is aimed at investigating the various effects of job security in United Arabs Emirates together with its impacts on the national security of the country.... Predicting the impact of job security and employment among youths to the public policy and law enforcement in the nation could be of much significance in making of informed decisions thus reducing the law enforcement costs and enhancing the effectiveness of the anti-crime strategies (Torka and Schyns, 2007)....
16 Pages (4000 words) Thesis Proposal

Admission proposal (Topic Data Mining)

Interviews will be used to collect quantitative data on data mining usage, associated benefits and ethical and legal issues that organizations face due to usage.... rg is an example of sites that aid data search and its efficiency in availing data is a threat to data privacy and security.... Information technology has aided data use in different fields in which extraction and analysis of data offer bases for informed decisions and therefore facilitate efficiency in professional activities....
2 Pages (500 words) Research Proposal

Automated System for Customs Data Acquisition

Such a process requires a strong system that would ensure the security of information.... Given the fact that supply chains involve crucial information about organizations, nations as well as individuals, it is a necessity to ensure the security of all the information.... Such a process requires a strong system that would ensure the security of information.... This research proposal is an attempt to provide a guideline regarding the research that will be conducted on the information security systems that are used by agencies like customs in various countries....
5 Pages (1250 words) Research Proposal

Privacy and Security of Health Data

This need for implementation of medical data security brings about by the need to safeguard the sensitive medical data records.... Problem StatementAccording to a survey conducted in 2003 by the Consumers Association and Health on behalf of the NHS Information security, showed that there were significant concerns with regard to medical data security and they felt that the records were susceptible to many security breaches.... The research "Privacy and security of Health Data" provides a viable solution to counter the security threats posed to the EMR systems so as to maintain the confidentiality of patients' data records, to investigate the ways in which medical data records are insecurely obtained....
7 Pages (1750 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us