Posted: May 1st, 2025
Discussion WK4 NURS 8210
HIT Projects and Decision MakersA nurse leader sought to implement greater security in the children’s wing of the hospital by installing a new alarm and monitoring system. Due to budget constraints, the CNO rejected the proposal, stating that current security methods were sufficient. Shortly after this failed proposal, an individual did in fact breach the children’s wing security and abducted a young child. Thankfully, the child was found and returned to her parents; and the CNO quickly found the money to install the new security system.Not all HIT projects have such high-profile stakes. The main takeaway from this example is the importance of getting key stakeholders and decision makers on board when planning a new HIT project.To prepare:
By Day 3 post a cohesive response that addresses the following:
Editorial
© Schattauer 2011
The Role of Modeling in Clinical
Information System Development
Life Cycle
M. Peleg
Department of Information Systems, University of Haifa, Haifa, Israel
A model is an abstraction of some “thing”
(e.g., object, system, process, phenomenon) in our world that we create in order
to understand it better. Models can be
physical (e.g., an architectural model of a
building, a prototype of a user interface),
mathematical (e.g., a model for predicting
the weather, for estimating population
growth), or conceptual (e.g., a clinical algorithm, the logical relationships between
data items in an electronic medical record
(EMR)). Models can be used to describe an
existing complex real-world object or phenomenon, or they can be used as a vehicle
to design a man-made object or system.
While conceptual models can also be specified in narrative, in this discussion we address conceptual models that have a symbolic representation with a diagrammatic
notation. Thus, conceptual models specify
objects or processes, their properties, and
their relationships.
A conceptual model of a proposed process or system has several important benefits, two of which are of great importance.
First, the process of creating a conceptual
model of a system helps its designer to
study the problem domain better, to understand the system’s components and their
relationships, the system’s desired functionality and behavior, and its interaction
with users and other systems. Second, a
conceptual model can facilitate the communication between different stakeholders
of the process (or system), including, for
example, customers, end-users, (medical)
Methods Inf Med 2011; 50: 7–10
Correspondence to:
Mor Peleg, PhD
Department of Information Systems
University of Haifa
Haifa, 31905
Israel
E-mail: morpeleg@mis.hevra.haifa.ac.il
domain experts, system analysts, and software developers; all stakeholders have different expectations from the system. Using
a conceptual model is one of the ways by
which we can narrow the design-reality
gaps [1] between the conceptions of the
system by its different stakeholders.
Conceptual modeling can play important roles in the development life cycle of
health information systems (HIS, e.g.,
EMR systems, computerized physician
order-entry systems (CPOE), and clinical
decision support systems (CDSS)). Organizations find it useful to use a systems development methodology to support the process of developing and maintaining their
information systems [2]. Most system development methodologies identify several
stages in the development of an information system: system conception and planning, identification and analysis of requirements, system design, implementation,
and, finally, use and maintenance. During
the entire system development process,
feedback from users (and other stakeholders) is received, generating new or revising existing requirements. If these requirements are identified early in the development life cycle then it is easier and more
cost-effective to support them than if they
are identified in late stages, especially after
the system is already in use. The system can
be maintained and updated for some time
until so many new requirements are collected that a decision is reached to start a
new cycle of system development.
According to Boehm [3], around 80% of
all errors found in the final software system
can be traced back to the requirements
analysis and design phases. In other words,
many of the errors are in fact due to
requirements that were not elicited, were
not thoroughly developed, or were misunderstood. To address this issue, several
approaches have been developed to support the system development cycle, while
Methods Inf Med 1/2011
Downloaded from www.methods-online.com on 2012-06-25 | IP: 38.102.29.165
For personal or educational use only. No other uses without permission. All rights reserved.
7
8
Editorial
addressing the need for getting the requirements right. Here, we list just these approaches that relate to the papers in this
collection. The reader is referred to [2] for a
review of other approaches. One of the
approaches is the traditional waterfall
approach, which advocates going through
the system’s life-cycle stages in sequence,
spending much effort on the requirement
analysis and system design phases by using
conceptual modeling. This approach is
similar to the one proposed by Osheroff
and colleagues [4], where they developed a
workbook that implementers of a CDSS
can use to work through the process of
identifying stakeholders, determining the
goals and objectives of the CDSS, cataloging the host information system’s capabilities, and selecting, deploying, and monitoring specific CDS interventions. A second
approach, Rapid Application Development
(RAD), decreases the time needed to design and implement an information system
by extensive user involvement, integrated
computer-aided software engineering
(CASE) tools that assist in updating the different conceptual models and migrate the
design specifications into code, and the use
of prototyping. A prototype is developed
after a shorter analysis and design phase.
Users can then try the prototype and provide feedback on the evolving system. A
third approach is adopted by agile methodologies, which follow an iterative development cycle of system versions that have
only a subset of features. The system is released to users who provide feedback. This
process embraces change in the requirements during system development. A
fourth approach is that of the Unified
Process (UP) development methodology,
whose most well-known refinement is
Rational UP (RUP). UP uses objectoriented modeling methods in an iterative
and incremental (i.e., done in portions)
agile design cycle. The cycle includes inception (identification of use cases and risks),
elaboration (analysis and design), construction (coding and possible revision of
analysis and design), and transition into
the next phase, which includes correcting
problems and system testing with users.
Conceptual models used for system
analysis and design are used in all of the
above-mentioned systems development
methodologies. Different models have different focuses. Some focus on data modeling (e.g., Entity-Relationship Diagrams
(ERD) [5], used in [6]), others on process
modeling (e.g., Business Process Modeling
Notation (BPMN) [7], used in [8]), or object-oriented models, which combine data
and process together into objects. The most
famous of the object-oriented models is the
Unified Modeling Language (UML [9],
used in [10]), which has a collection of
many different models, each focusing on a
different perspective of the system: usecase scenarios, static system elements, system interaction with users and external
components, states and activities, and implementation.
The benefits of conceptual modeling
outlined above make conceptual models
natural choices for supporting the requirements analysis and system design phases,
but they could also be used in validation of
the implementation of the system and in
evaluation of its usage, as demonstrated by
one of the papers in this collection [8].
The three articles in this collection,
while focusing on different stages of the
HIS development cycle, all use conceptual
modeling methods. In the paper “A Business Rules Design Framework for a Pharmaceutical Validation and Alert System”
[10], Boussadi and colleagues suggest an
agile and business-oriented design methodology for the implementation and maintenance of business rule-based decision
support systems. They describe their experience in the adaptation of the UP systems development methodology for the
creation and maintenance of business rules
for the validation of drug prescriptions and
the generation of alerts. This adaptation,
called business rule design framework
(BRDF), introduces two new activities into
UP: business rule specification (e.g., medication-associated laboratory testing decision rules) and business rule instantiation.
Business rule specification involves generating semantic templates, domain vocabularies (for the pharmaceutical domain),
and business rules via the Semantics of
Business Vocabulary and Business Rules
(SBVR) formalism, which was developed
by the Object Management Group (OMG),
who also developed UML, which is used
for system modeling in UP. SBVR business
rules are written with a business object
model – a conceptual model which is based
on the UML class diagram, but at the same
time they are expressed in a form very close
to natural language, which makes it easier
for domain experts (pharmacists in this
case) to understand them and be involved
in specification and instantiation of the
business rules. The instantiation of rules
corresponding to the business object
model requires the identification and
naming of relevant relationships between
classes.
While the paper summarized above addressed the entire system development life
cycle, the two other papers in the collection
address its beginning and end phases. The
paper entitled “Options for Diabetes Management in Sub-Saharan Africa (SSA) with
an Electronic Medical Record System” [6]
by Kouematchoua Tchuitcheu and Rienhoff focuses on the early phases of system
conception and analysis. The authors used
a systematic process for performing an
analysis of the requirements for an EMR
system for diabetes management in SubSaharan Africa, where resources are poor,
and evaluating the appropriateness of a
potential EMR system. The methodology
began with a literature analysis about information and communication options for
diabetes care in SSA, followed by a need assessment field survey, which helped them
identify critical issues and needs for improvement of diabetes management. These
issues were used to conceive scenarios involving patient continuity-of-care issues.
Process-oriented analysis of these scenarios led to the specification of functional
requirements for the EMR system. A conceptual model was developed to address a
solution for different cases of patient continuity of care among diabetes care providers. The conceptual model was then
used to analyze the potential impact on the
requirements elicited for diabetes management. A potential EMR system (an opensource EMR system that was used for AIDS
and multi-drug-resistant tubercolsis management in Latin America) was analyzed to
see whether it could support the needed
functionalities inferred from the conceptual model. The needed enhancements to
the ERM system were designed using an
entity-relationship diagram that considers
Methods Inf Med 1/2011
© Schattauer 2011
Downloaded from www.methods-online.com on 2012-06-25 | IP: 38.102.29.165
For personal or educational use only. No other uses without permission. All rights reserved.
Editorial
the conceptual model of continuity of care.
A prototype of the EMR system was created. Validation of the prototype by experts
and users obtained favorable results, demonstrating that it is possible to find IT
solutions for diabetes care in SSA.
The paper “Objectifying User Critique –
A Means of Continuous Quality Assurance
for Physician Discharge Letter Composition” [8] by Oschem, Mahler, and Prokosch
considers the last phase of the system development life cycle: system use and maintenance. The setting for this paper concerns a
new system for composing discharge letters
that was implemented at the University
Hospital Erlangen in Germany. Users complained that the new system was too slow
but these complaints were too vague and
did not allow enough direction into what
needs to be changed in the system. The authors suggest a process-based approach to
objectify user critique. The process starts
by interviewing users to identify a research
question for in-depth evaluation. Then, a
workflow model of the system to be evaluated is created using the BPMN process
modeling notation. A formal hypothesis
and indicators are defined, which map the
user critique to the workflow steps. Indicators are measured and the results are analyzed and hypotheses are tested. Based on
the results, the system is then improved
(optimized).
The three papers demonstrate how
quality assurance (QA) of safe, effective,
and efficient HISs can be achieved and
maintained using systematic processes that
are tightly tied to conceptual models of the
system’s static elements and/or its processes. In [10], different UML diagrams
were used to formulate requirements and
design the pharmaceutical CDSS such that
it meets the requirements of users and
other stakeholders. In the activities that the
authors added to UP, class diagrams that
specify the business object models of the
pharmaceutical CDSS were used to formulate the semantic templates of medicationassociated laboratory testing rules and instantiate them. In [6], functional requirements for the EMR system were derived
based on a process-oriented analysis and
conceptual modeling. The conceptual
model of continuity-of-care processes
helped analyze the different use cases for
the system and determine their relationship to patient data and the required data
transfer between different healthcare institutions. After checking which requirements
were met by the candidate EMR solution,
ERD was used to design extensions to the
EMR that would support the missing
requirements; lastly, in [8], the process
model (workflow) of the discharge summary system was instrumental in defining
indices for evaluating the performance of
different activities supported by the system.
Evaluating these indices values helped in
identifying objectively which activities of
the system should be optimized. Hence,
the process models were part of a method
for continuously assessing the effectiveness
and efficiency of the HIS.
The conceptual models used in the three
papers exhibited the two benefits described
at the beginning of this editorial; they supported understanding, analysis, and design
of the problem (requirements) and solution domains and facilitated communication between stakeholders. The conceptual models helped in organizing the
cognitive thinking processes involved in
structuring a process in terms of its components activities, the data and resources
needed for them, the organizational roles
taking part in them, and the interaction
among system components and users. Such
modeling enabled identifying differences
between the processes supported by different HISs [8] as well as defining needed
extensions to systems to supported needed
requirements [6].
It is interesting to note that conceptual
modeling was beneficial even when the
conceptual models used were not standard
models that have gained experience and
have been shown to be effective for many
system analysis and design projects; while
UML models and the BPMN model are
well-established models, the conceptual
model in [6], which was helpful in analyzing and describing the data needs of different cases of patient continuity of care
among diabetes care providers, was not
expressed in a known formalism. Interestingly, this non-standard model bears some
resemblance to several UML models [9].
Similar to use-case diagrams, it shows how
actors (patient, researcher, health ministry)
are related to different use cases of the EMR
system. Similar to collaboration diagrams,
it shows the relationships and some of the
messages flowing between objects collaborating to perform a particular task (e.g., care
providers from the district hospital can use
a secured connection to access patients’
data stored in the EMR via a server). The
use of standard models with their rich constructs and available user manuals and
guides could help in conceptualizing and
understanding the structure and communication of the system to a greater detail. Use of CASE tools could establish consistency of the specification and, if desired,
could help migrate the specification into
implementation code.
While developing the pharmaceutical
validation and alert CDSS [10], Boussadi
and colleagues realized that the standard
UP system development method that uses
standard UML diagrams was not enough to
support all modeling activities needed to
develop decision rules. Instead of using adhoc methods for that task, or focusing on
the decision rule modeling method without its relationship to the other steps involved in the system development life cycle,
the authors decided to adapt and extend the
standard UP method to their needs. In this
way, the modeling of the clinical logic is
done via a model that is integrated with
other system modeling methods within the
development methodology.
Using standard (or augmented) systems
development methodologies and modeling
methods has its benefits, but the drawback
is that they are not particularly tailored to
the domain of healthcare. Several research
groups have developed modeling languages
and development process for clinical
guideline-based DSS. Examples of such
modeling languages include Asbru, EON,
GLIF3, Guide, and PROforma [11]. These
modeling languages use conceptual models
that allow modelers to specify clinical
guidelines as task networks. Using such
models helps in conceptualizing clinical
guidelines as networks of clinical actions
and decisions that unfold over time, can
express clinical concepts, abstractions, and
relationships, and include patient information models that aid in linking the specified
guideline to EMR data. In addition, the
specifications of clinical guidelines in those
modeling languages are formal enough to
© Schattauer 2011
Methods Inf Med 1/2011
Downloaded from www.methods-online.com on 2012-06-25 | IP: 38.102.29.165
For personal or educational use only. No other uses without permission. All rights reserved.
9
10
Editorial
enable them to be computer-interpretable,
allowing their execution using guideline
execution engines that in some cases can
also link to EMRs to retrieve patient data.
Based on experience in modeling using
guideline modeling languages, several
groups have suggested methodologies for
developing the computer-interpretable
guideline specifications [12, 13]. However,
these methodologies, while focusing on the
guideline logic, do not cover the process of
eliciting the requirements and designing the
front-end of a CDSS, which interacts with
users and delivers advice based on the computer-interpretable guideline specification;
these steps that are essential for developing
CDDS are best supported by existing standard system development methodologies
and modeling methods [14].
References
1. Heeks R. Health information systems: Failure, success and improvisation. Int J Med Inform 2006; 75:
125–137.
2. Hoffer JA, George JF, Valacich JS. Modern Systems
Analysis and Design. 4th edition. Addison-Wesley;
2005.
3. Boehm B. Software Engineering Economics. Englewood Cliffs, NJ: Prentice-Hall; 1981.
4. Osheroff JA, Pifer EA, Sittig DF, Jenders RA, Teich
JM. Clinical Decision Support Implementers’
Workbook. Chicago: Healthcare Information and
Management Systems Society; 2004.
5. Chen P. The Entity Relationship Model: Toward a
Unified View of Data. ACM Transactions on Database Systems 1976; 1: 9–36.
6. Kouematchoua Tchuitcheu G, Rienhoff O. Options
for Diabetes Management in Sub-Saharan Africa
with an Electronic Medical Record System. Methods Inf Med 2011; 50 (1): 11– 22.
7. Initiative BPM. Business Process Modeling Notation (BPMN) Version 1.0. 2004. http://www.
bpmi.org/downloads/BPMN-V1.0.pdf
8. Oschem M, Mahler V, Prokosch HU. Objectifying
User Critique – A Means of Continuous Quality
Assurance for Physician Discharge Letter Composition. Methods Inf Med 2011; 50 (1): 23 –35.
9. Booch G, Rumbaugh J, Jacobson I. The Unified
Modeling Language User Guide. Addison-Wesley
Longman, Inc.; 1998.
10. Boussadi A, Bousquet C, Sabatier B, Caruba T,
Durieux P, Degoulet P. A Business Rules Design Framework for a Pharmaceutical vVlidation
and Alert System. Methods Inf Med 2011; 50 (1):
36–50.
11. Peleg M, Tu SW, Bury J, Ciccarese P, Fox J, Greenes
RA, et al. Comparing Computer-Interpretable
Guideline Models: A Case-Study Approach. J Am
Med Inform Assoc 2003; 10 (1): 52–68.
12. Shalom E, Shahar Y, Lunenfeld E, Taieb-Maimon M,
Young O, Goren-Bar D, et al. The Importance of
Creating an Ontology-Specific Consensus Before a
Markup-Based Specification of Clinical Guidelines.
In: Proceedings of the biennial European Conference on Artificial Intelligence (ECAI). Riva del
Garda, Italy; 2006.
13. Peleg M, Wang D, Fodor A, Keren S, Karnieli E.
Lessons learned from adapting a generic narrative
diabetic-foot guideline to an institutional decisionsupport system. In: ten Teije A, Miksch S, Lucas P,
editors. Computer-based Medical Guidelines and
Protocols: A Primer and Current Trends. Stud
Health Technol Inform 2008; 139: 243–252.
14. Peleg M, Shachak A, Wang D, Karnieli E. Using
multi-perspective methodologies to study user interactions with the front-end of a guideline-based
decision-support system for diabetic-foot care. Int J
Med Inform 2009; 78 (7): 482–493.
Methods Inf Med 1/2011
© Schattauer 2011
Downloaded from www.methods-online.com on 2012-06-25 | IP: 38.102.29.165
For personal or educational use only. No other uses without permission. All rights reserved.
INFORMATION SYSTEMS
Ransomware in Hospitals: What Providers
Will Inevitably Face When Attacked
Bruno Kelpsas* and Adam Nelson†
The healthcare industry is the #1 industry targeted by attackers. It is imperative
for organizations to reevaluate the way they approach cybersecurity, rather than
resting on their laurels in what is currently seen as the “new normal” security
mindset. Currently, the industry is responding to compromises on a reactive
basis, much like the way in which the financial services industry simply replaces
consumers’ credit cards after a retail breach, such as the recent attacks on Target
and Home Depot. This security mindset is predicated on a lack of enforcement,
the absence of appropriate penalties, and a culture of risk mitigation. Due to this
attitude of acceptance, patients are consistently at risk of having their personally
identifiable information compromised. To reset how healthcare organizations
think about cybersecurity, measures must be taken proactively to protect businesses against impending attacks. Otherwise, breaches are likely to continue
until stricter enforcements and penalties are put in place for healthcare companies and stakeholders.
*Director of Cloud Healthcare for NTT
DATA. †Vice President of HealthCare
and Life Sciences for NTT DATA.
Copyright © 2016 by
Greenbranch Publishing LLC.
KEY WORDS: Cybersecurity; ransomware; healthcare; CryptoLocker; CryptoWall;
healthcare cybersecurity.
O
ne Friday, Sally, a member of a local hospital’s
finance team, received an overdue billing statement from a Salesforce.com e-mail. Because
it is the end of the month, she considered this
e-mail a routine part of billing and reporting. Sally opened
the e-mail, as well as the attached contract in Word format.
Suddenly, the screen of Sally’s monitor turned to a red
warning screen..
Sally froze. She had heard about cyber threats in training, but in a Salesforce.com billing statement? Who would
be as sophisticated as that? Sally immediately picked up
the phone and called the IT department.
Too late.
Sally had just experienced a highly advanced cybersecurity breach known as ransomware—this one specifically
referred to as CryptoWall (CW). In the following moments,
Sally, IT, hospital executives, nurses, doctors, and patients
would discover that valuable database files had been
locked. Because of the threat to hospital operations and the
emergency department, patients were moved to another
physical facility for care.
Typically, the only way for the hospital to regain access
to its information is to pay the hacking agent a requested
fee using Bitcoin. Directors of the hospital Board are now
faced with the decision: Pay or don’t pay?
According to the regular cyber threat reporting of NTT
Group, a global solutions company that provides next-generation managed security services, ransomware recently accounted for 30% of malware activity. The ransomware Sally
encountered, CW, accounted for nearly half of the reported
ransomware attacks from June to November 2015.1 During
January 2016, Solutionary has already observed nearly 3,100
possible CW infections, all sourcing from the United States.2
Such CW emails come in the disguised form of Salesforce.
com or even official IRS e-mails during tax periods.
Healthcare providers are
discovering they are a soft
target for highly sophisticated
cybercriminals.
Healthcare providers are discovering they are a soft
target for highly sophisticated cybercriminals. It is nearly
impossible for ransomware victims to crack a hacker’s
www.greenbranch.com | 800-933-3711
67
68 Medical Practice Management
| July/August 2016
crypto keys. The FBI is even on record advising ransomware victims to just pay.
A very similar case to Sally’s situation occurred recently,
on February 5, 2016, at Hollywood Presbyterian Hospital.
An original ransom of $3.4 million was whittled down to
$17,000.3 This is not unusual. Typically, the ransom team
wants a quick payday. They will even provide customer
service by offering the crypto keys to a couple of locked files
to show goodwill. One estimate quoted by the head of the
Federal Trade Commission (FTC) indicated more than $27
million was paid in the first two months after CryptoLocker
ransomware was released, with many of the individual payments ultimately being less than $1000.4
The most recent ransomware attack took place on
March 28, 2016, with MedStar Health, a Washington,
DC–based hospital chain. Prior to this attack, three other
hospitals—Methodist Hospital in Henderson, Kentucky,
Chino Valley Medical Center and Desert Valley Hospital in
California—were held by ransomware around March 23.5
YOU’VE BECOME A VICTIM OF
RANSOMWARE: WHAT’S NEXT?
Now, back to Sally and her hospital’s Board of Directors.
All board members have gathered in a large conference
room, and the burning question they face now is: Should
they pay? Does the Board have options? Simply put: Yes.
If the hospital has been
preemptive in its security
planning, it can refuse to pay.
As long as the hospital has been preemptive in its security planning, it can refuse to pay. Has the IT team created
appropriate backups of databases and storage? Is there
already a business continuity plan in place in case of such
situations? A robust disaster recovery plan would include
several alternatives. Are other security controls, especially
monitoring, threat intelligence, and incident response,
hardened to ensure the current ransomware risk is isolated? If encryption has been applied to network drives,
shares, and removable media, the hospital has increased
confidence that any outgoing data cannot be opened. Further, if the IT team has composed end-user privileges using
a segregation-of-duty model, that also will assist in isolating the threat. Furthermore, if the hospital does pay, it will
likely be added to a ransomware “payers list,” potentially
making this the first of many more incidents.
On the other hand, the hospital should pay if it has
a questionable backup and no business continuity. If
security controls are lacking, the hospital may be vulnerable in other IT domains. Basic security hygiene (e.g., application patches and updates) is another open door the
ransomware could already be violating or inviting other
hackers to join. Board members in the room are reminded
security controls should also include hardware. For example, recent Cisco, Juniper, and Fortinet updates and notices
around security vulnerabilities have been communicated
to customers. Does the hospital have physical devices from
any of these vendors? Of even greater concern are not just
IT devices but the “keep current” status of MRI scanners
and IV pumps. Those, too, can be used as backdoors for
hackers. Speaking of vendors, how current are the business associate agreements with third parties? The impact
on business costs can also be mitigated if the hospital has
appropriate cybersecurity insurance.
An organization’s Chief Information Officer (CIO)
and Chief Information Security Officer (CISO) must be
equipped to respond to these questions in case of an attack. This information will ultimately determine the final
decision.
GOVERNMENT ORGANIZATIONS
WILL TAKE NOTICE
Either way, the hospital needs to take swift action. A “war
room” should be created. Those attending should include
the obvious actors: CEO, CIO, CISO, IT Directors (Application, Data, Network), and the HIPAA lead for both federal
and state regulations. In addition, the hospital’s legal representative should be present, as well as a public relations
officer. A representative from the hospital’s insurance company should also be available, for two coverage reasons:
property and personal [patient] liability, and cybersecurity
insurance coverage. Another individual who should also be
considered for the war room is a representative from law
enforcement, such as the FBI.
As the operational key players in the war room weigh
their options, the Board of Directors must concern themselves with their governance mandate. They will have to
update their quarterly and annual reports with details
about the security incident and steps taken. Board members are not only fretting about HIPAA—there are now even
more well-funded Federal players overseeing the security
landscape: the Security and Exchange Commission (SEC)
and the FTC. Both are heavily staffed with legal teams,
budgets and legal authority. In contrast, their HIPAA counterpart, the Office for Civil Rights, has hardly even begun to
conduct audits.
A healthcare provider previously would not have considered the SEC a concern for security oversight. However,
the SEC is now requiring companies to disclose cyber risks
and material breaches. This agency is now providing guidance on how companies accurately report their security
disposition. Ignorance is no longer an excuse.
The FTC is also playing a more active role in protecting
consumers. In August 2015, the FTC’s case at the Third
www.greenbranch.com | 800-933-3711
Kelpsas and Nelson | Ransomware 69
Figure 1. Four pillars and three layers of cybersecurity preparedness. IR, incident response; IRP, incident
response plan; PHI, protected health information; SDLC, systems development life cycle; SLA, service level
agreement; SOPs, standard operating procedures.
Court of Appeals against Wyndham Worldwide Corporation proved Wyndham failed to uphold promised security
with a lack of firewalls and basic protections (United States
Court of Appeals for the Third Circuit, No. 14-3514; Federal
Trade Commission v. Wyndham Worldwide Corporation).
The FTC also plays a dominant role in federal government
action against cyber threats. Its Computer Crime and Intellectual Property Section (CCIPS) has 270 prosecutors
focused on high-tech crimes and espionage. Their involvement with last summer’s takedown of the global CryptoLocker ransomware scheme, known as Gameover ZeuS,
shows their ability to enforce policy.
Returning back to the war room: members have become
numb to the HIPAA “Wall of Shame.” What will now make
them sit up in their chairs is the possibility of the SEC and
FTC walking through the door. The SEC now expects full
transparency in reporting out to shareholders. Past disclosures will need to be examined by the Board. Regarding a
Form of Disclosure for the hospital’s ransomware incident,
a supplemental disclosure should be immediately crafted.
At minimum, the annual obligation is to disclose in the
SEC 10-K annual report material information about special
risks, followed by updates on previous disclosures. If the
hospital Board identifies the recent ransomware breach as
a major breach, an SEC 8-K special report should be filed
immediately to notify investors of specified events.
The FTC expects not only consumer protection, but also
some reporting of breaches to the CCIPS. The Caremark
claims litigation case provides a landmark legal precedent
in enforcing board governance of corporate controls (In
re Caremark International Inc. Derivative Litigation, 698
A.2d 959 (Del. Ch. 1996)). It stated the Board of Directors’
“duty of care” was negligent with internal controls, allowing employees to commit criminal offences. The Caremark
decision thus asserted that a Board of Directors has a duty
to ensure appropriate information and reporting systems
are in place to provide the Board and top management with
timely and accurate information.
HOW DO WE MOVE FORWARD?
As Board members craft a governance response, they will
also reevaluate their cybersecurity insurance. Yes, they can
foresee not only that their premiums will increase, but also
www.greenbranch.com | 800-933-3711
70 Medical Practice Management
| July/August 2016
that their ceiling of coverage will be lowered. They can now
only hope to prove to their insurance carrier they are taking
appropriate action to not be at risk again.
When Sally returns to work on Monday, she will most
likely come back to end-user security training, for herself
and the entire staff. She (and they) will have to keep up
with a global threat. RaaS (Ransomware-as-a-Service) is
as established as any private sector industry. Hackers can
sign up to a RaaS on the Dark Web. They are then provided
access to an affiliate console. There they can walk through
the process of receiving their ransomware exploit kit. They
will configure settings and campaigns of which targets they
would like to attack. There are even metrics on success
rates, installations, and how much ransom to demand.
Poor Sally. She is up against a global movement. There
is hope, though. By implementing a preemptive security
model, Sally’s hospital can harden its security surface area.
Sally’s training will also be critical. This is where leadership
from the Board of Directors becomes critical.
All organizations need a proactive and comprehensive
cybersecurity plan. However, although many operations
have the “right” plan and necessary hardware, software,
and processes in place, the reality is that many do not have
the time and resources to implement their response plan
and fulfill the necessary documentation requirements for
HIPAA, the SEC, and State regulations, in addition to ensuring business continuity. Therefore, to get started, healthcare
organizations must focus on the four pillars of security:
77 Governance risk and compliance;
77 Security monitoring and management;
77 Threat intelligence; and
77 Incident response.
Furthermore, organizations must layer their efforts
from basic responsiveness to advanced responsiveness,
and, finally, become preemptive. A variety of capabilities
exist within the four pillars and the three layers that should
be prioritized and preferably automated (Figure 1). It is
essential to enlist the right outside talent to conduct this
effort immediately. Finally, once this strategy is developed
and implemented, companies must conduct an internal
review and gauge where teams will align with internal
security: be out of the security business, own some of it, or
close the gaps. Ensure there is balance between managing
the unexpected and current resources.
In Sally’s case, after following this advice, the future of
the hospital’s security, brand and revenue is in the hands
of the Board of Directors. All has been laid out for them to
do. But will they do it?
Will decision-makers just respond to the breach and
return to business as usual? Will the Board commit the
appropriate funding and resources? Will Sally receive improved training?
The hackers downloading the next exploit kit off the
Dark Web are expecting that the hospital will not do any of
those things. Y
REFERENCES
1. Microsoft Malware Protection Center. Figure 2. [Crowti]. https://www.
microsoft.com/security/portal/mmpc/shared/ransomware.aspx.
2. Solutionary Security Threat Report-2016. https://www.solutionary.
com/threat-intelligence/threat-reports/monthly-threat-reports/
2016/01/security-threat-report-january-2016/.
3. Ragan S. Ransomware takes Hollywood hospital offline, $3.6M
demanded by attackers. CSO Magazine. February 14, 2016; http://
www.csoonline.com/article/3033160/security/ransomware-takeshollywood-hospital-offline-36m-demanded-by-attackers.html.
4. Assistant Attorney General Leslie R. Caldwell. Remarks at the Georgetown Cybersecurity Law Institute, Washington, DC. May 20, 2015;
https://www.justice.gov/opa/speech/assistant-attorney-generalleslie-r-caldwell-delivers-remarks-georgetown-cybersecurity.
5. Mannion C. Three U.S. Hospitals Hit in string of ransomware attacks.
NBC News. March 23, 2016; www.nbcnews.com/tech/security/
three-u-s-hospitals-hit-string-ransomware-attacks-n544366.
NEW!
A Field Guide to Physician Coding
THIRD EDITION
Order your copy today at
www.greenbranch.com or call (800) 933-3711
www.greenbranch.com | 800-933-3711
Reproduced with permission of the copyright owner. Further reproduction prohibited without
permission.
Perspectives From Nurse Leaders
and Chief Information Officers
on Health Information Technology
Implementation
STEVEN SZYDLOWSKI and CHRISTINA SMITH
Abstract. To enhance the limited empirical evidence in the
literature, the authors developed new knowledge and information on the basis of implementation experiences (e.g.,
strategic planning, goals, outcomes, barriers, mistakes) of
hospital executives with actual health information technology
(HIT). The authors asked why hospital leaders implement
HIT and how they do so, and then applied the answers to
the theoretical framework of change management and leadership. The authors accomplished this through a qualitative
research study design. Various employees from different levels
of the organizational chart provide their perspectives, allowing the authors to examine internal trends related to HIT.
The authors examined external trends through a comparative
analysis of healthcare markets.
may seem minimal. However, the term medical
mistake implies that the death could have been
prevented. It is clear that 44,000–98,000 preventable deaths is an unacceptable number. At present, a solution advocated by the IOM to decrease
preventable medical errors is to increase the use of
HIT(IOM 1999).
Importance of Research
Healthcare technology and information systems are
defined as technology “used within a healthcare
organization to facilitate communication, integrate information, document healthcare interventions, perform record keeping, or otherwise support the functions of the organization” (Shortliffe
and Perreault 2001, 774). This technology has had
a positive impact on the delivery of healthcare in
a number of ways. Overall, HITs provide clinical
support services, aid in medical decision making,
increase an organization’s quality of patient care,
and reduce medical errors. Specifically, technology
such as a physician order-entry system also can
increase timeliness and efficiency by providing a
faster turnaround for tests and medication orders
(Weir et al. 2000) and can enhance patient safety
through built-in alarms and warnings. Furthermore, patient electronic medical records (EMR)
can increase communication and interoperability
Keywords: change leadership, change management, health
information technology, implementation
I
n 1999, the Institute of Medicine (IOM) published the report “To Err Is Human” in which
IOM examined ways to decrease medical errors
and enhance patient safety. That report initiated a
period of increased attention to patient safety and
health information technology (HIT). To prepare
this influential report, the IOM conducted studies in 1997 that indicated that of the 33.6 million
people admitted to hospitals in the United States,
44,000–98,000 people died as a result of medical
mistakes (IOM 1999, 26). In comparison with
the number of admissions, 44,000–98,000 deaths
Steven Szydlowski, DHA, is an assistant professor in the Department of Health Administration and Human Resources at the
University of Scranton. He serves as program director for the graduate human resource management program and researches
integrative medicine and leadership. Christina Smith is a graduate student in the master of health administration program at the
University of Scranton and researches leadership impact on achieving strategic hospital goals.
Copyright © 2008 Heldref Publications
3
4
Vol. 87, no. 1 Winter 2009
among medical facilities, expand consumers’ knowledge and responsibility for their own
healthcare needs, and establish standardization
within the healthcare industry.
According to Travers and Downs (2000), HIT
systems improve “the way information is collected,
stored, retrieved and processed by clinicians” (1).
Even the federal government of the United States
has noticed the issue of HIT, thus stressing its
importance. President G. W. Bush mandated a
push toward the automation of the healthcare
industry within the next 10 years. As a result, the
president recently established the Office of the
National Coordinator for Health Information
Technology, which falls under the Department
of Health and Human Services, to facilitate this
change (Travers and Downs).
Literature Review and Theoretical Perspective
Some people may ask, “What is the trick to
obtaining the benefits of HIT?” In response, we
state that individuals must primarily recognize that
the benefits of HIT depend on successful systematic implementation. It is not uncommon to see
an organization spend large amounts of money on
HIT systems and fail to implement them because
of poor change leadership. Thus, numerous theorists and researchers have devised theories and
processes on how to best manage HIT implementation in a healthcare organization.
Kotter (1998) stated, “all institutions need effective leadership, but nowhere is the need greater
than in the organization seeking to transform itself ”
(5–6). From this premise, Kotter formulated an
eight-stage change process, which he found to be
effective when applied to the implementation of
technology in a healthcare setting. The steps in this
change process are to (1) establish a sense of urgency, (2) form a powerful guiding coalition, (3) create
a vision, (4) communicate the vision, (5) empower
others to act on the vision, (6) plan for and create
short-term wins, (7) consolidate improvements and
produce still more change, and (8) institutionalize
new approaches (Kotter 1998, 6).
Kotter wrote, “no organization today—large or
small, local or global—is immune to change”
(1998, 1). This statement is true particularly in
society today, when technology advances daily. Relative to his eight-stage change process, Kotter identified common mistakes that managers make during
implementation. “Producing change is about 80
percent leadership—establishing direction, aligning,
motivating, and inspiring people—and about 20
percent management—planning, budgeting, organizing, and problem solving” (1998, 7).
Other researchers have reported theories with
ideas similar to those of Kotter. In the article “Four
Fs Equal A+,” Blair (2005) interviewed Brian
Dieter, vice president and chief financial officer
(CFO) at Mary Greeley Medical Center (MGMC)
in Ames, Iowa. Dieter provided tips on the basis
of the implementation experiences in his hospital.
Among this list of tips, he included the following
advice: (1) purchase from a single-source vendor to
ensure that every piece of equipment in the hospital coincides, (2) hire an in-house consultant, (3)
participate in demos, and (4) acquire the support
of the hospital’s staff. Still, the two most essential
points of Dieter’s advice are to (1) conduct site visits to other facilities that use the same equipment
and (2) engage in extensive training (Blair 2005).
Conducting site visits is crucial because implementing technology should not be a leap of faith.
Information systems are too expensive to be used
blindly. Therefore, hospital administrators should
do their research to see how products are used.
Then, the final purchase should be the result of an
educated decision. With regard to training, Blair
quoted Dieter as saying, “there is no such thing as
too much training” (Blair 2005, 3). He was absolutely correct. The installation of new technology
systems within a hospital is a change that affects
many and sometimes all departments. Thus, training must be a comprehensive effort.
Blair (2005) reported on Dieter’s model, called
the Four Fs Systems. Hospital administrators use
this model to support HIT purchase decisions.
The Four Fs—functionality, fit, future, and
finance—must all be used when deciding to purchase information technology (IT) systems. Making a purchase decision and implementation are
long processes, taking extensive time and effort.
However, if reasoned and well prepared, purchasing and implementing HIT pay off in the end. In
the conclusion of his interview, Dieter said,
Getting it right isn’t a matter of luck or timing.
There are numerous ways that IT-related transformations can go wrong, and maybe a dozen
ways that they can succeed. Mary Greeley Medical
Center secured its present and positioned itself
for the future with an intense focus on its Four
Fs approach, supported by planning, unceasing
concern for patients’ well-being and a zeal for
employee participation. May the fruits of their
labor be sweet. (Blair 2005, 3)
5
HOSPITAL TOPICS: Research and Perspectives on Healthcare
Krizner (2004) provided another theoretical
perspective by identifying four crucial steps that
are necessary for successful HIT implementation.
These four steps are to (1) develop a vision to
which the entire organization can be committed,
(2) monitor the change process and review the
strategic plan, (3) empower employees, and (4)
instill communication and feedback. In accord
with the aforementioned theories, hospital administrators must take all four steps to achieve successful implementation (Krizner).
Glaser (2005) believed that HIT implementation failure is often the result of the “actions and
inactions of senior leadership” (1). Glaser focused
on five factors that lead to HIT implementation
failure. These factors are (1) failure to respect
uncertainty, (2) undernourished initiatives, (3)
failure to anticipate short-term disruptions, (4)
invisible progress, and (5) disregard for the stability and maturity of the technology (Glaser).
Glaser also included a list of recommendations to
help healthcare organizations reduce the risk of
failure. Some of these recommendations include
ensuring that IT initiatives have clear objectives, communicating regularly, publicly demonstrating your conviction, showing determination
through tough decisions, creating or changing
the reward system to provide a participation
incentive for implementation success, accepting
and welcoming debate, not discouraging bad
news, understanding that people make mistakes,
realizing that you do not know everything about
organizational change, using the best resources
and staff, and limiting the duration and depth of
short-term disruption.
The theories outlined previously provide a solid
foundation for the beginning stages of HIT implementation. They present ideal implementation
methods, tips on how to successfully manage
change in a healthcare organization, ways to
reduce the risk of implementation failure, and
so forth. However, with the increased use of IT
in the healthcare sector, extensive empirical data
pertaining specifically to real-life implementation
methods, change management tactics, and systematic effects on the organization are increasingly
beneficial. As the health industry becomes more
competitive, and the need for operational efficiencies is critical for success in times of continued
reimbursement cuts and costs increases, hospital
executives are assessing and using HIT as an
instrument to achieve these goals. The successful
implementation of HIT systems is complex. Theoretical information, such as the information in the
present literature review, is available regarding the
topic of change leadership in the implementation
of HIT. Given the knowledge of implementation
theories, processes, and models that are readily
available, we try to help the field by expanding its
knowledge of HIT implementation.
Method
In this study, our purpose was to examine the
trends of healthcare leadership and management
with regard to implementation and management of
IT in the hospital setting. In this article, to enhance
the limited empirical evidence in the literature,
we develop new knowledge and information on
the basis of hospital executives’ actual HIT implementation experiences (e.g., strategic planning,
goals, outcomes, barriers, mistakes). We addressed
research questions in the theoretical framework of
change management, leadership, and management.
We accomplished this investigation through a qualitative research study design and examined internal
trends through the perspectives of various employees from different levels of the organizational chart.
We analyzed external trends through a comparative
analysis of healthcare markets.
We designed this research study to answer the
following two questions by achieving the outlined
objectives for each question.
Hypothesis 1 (H1): Why do hospitals use HIT?
Objective a: Explain barriers and opportunities
with the use of HIT.
Objective b: Describe the case study interviews
of the hospital chief information officers (CIOs)
and nurse managers.
Objective c: Describe the perspectives of CIOs
versus nurse managers.
Objective d: Explain why some hospitals are
more integrated with HIT.
Objective e: Evaluate implications for stakeholders.
H2: How do health executives manage and lead
the integration of HIT to improve health system
efficiency?
Objective a: Identify barriers to HIT implementation.
Objective b: Analyze practical strategies to overcome barriers.
Objective c: Apply those strategies at other hospitals.
We met these objectives by interviewing CIOs
and nurse managers from local hospitals. This
6
Vol. 87, no. 1 Winter 2009
study used a convenience sample of general acute
care community hospitals in Lackawanna and
Luzerne Counties serving the Northeastern Pennsylvania region. We anticipated that 10 hospitals
would participate (hospitals A–J, respectively);
however, only 6 hospitals participated because
of organizational restructuring, a merger, or a
hospital acquisition. Therefore, we conducted 12
qualitative interviews in total. The participating
hospitals ranged in size from 40 licensed beds to
317 licensed beds. A brief summary of the demographics of Lackawanna and Luzerne Counties is
in Table 1 (PA Department of Health, Bureau of
Health Statistics and Research 2005a, 2005b). We
took the following steps to conduct this research:
11. Mailed findings to interviewees and had interviewees review them for accuracy of report.
12. Made minor modifications.
13. Submitted findings for publication by both
researchers.
1. Obtained volunteer commitment by hospital
CIO or equivalent and nurse managers.
2. Prepared informed consent and statement of
privacy forms.
3. Prepared standard scripted questions for interview.
4. Submitted a proposal to the University of
Scranton Departmental Review Board and
Institutional Review Board for approval.
5. Conducted individual phone interviews with
nurse manager and CIO, using one interviewer, with each interview being 1–1.5 hr long
(and tape-recorded for qualitative reliability
and validity).
6. Conducted debriefing sessions between interviewers and kept notes and transcripts in a
secure area.
7. Examined hospital documents, organizational
chart, and other materials.
8. Organized case study database.
9. Recorded summative findings in report format.
10. Compared and related sample with national
characteristics.
Participating hospitals used HIT for a variety
of reasons, as we show in Appendix A. In an
industry with constant change and increasing
emphasis on external forecasting for anticipated
change, the margin for internal inefficiencies has
become slim. As a result, administrative and clinical leaders have become more dependent on HIT
to achieve operational efficiencies. CIOs or their
equivalents have suggested that successful HIT
implementation allows them to focus more on
external adaptation. Although the results of this
study did not support this concept as a common
thought of nurse leaders, both CIOs and nurse
leaders believed that data integration could lead
to better clinical performance and decision making. Among the nurse leaders, data integration was
commonly defined as a timelier, accurate way to
access patient information, which can be used in
clinical decision making. The definition was also
common among CIOs. However, CIOs added to
this definition by suggesting that data integration
includes both clinical and financial data that can
be used in hospital decision making.
Results
We conducted this study on the basis of two primary research questions—described in the Method section—each of which provided noteworthy
results. The significant findings are organized
according to these two primary research issues and
are outlined in the Appendixes.
Use of IT Systems
TABLE 1. Study Demographic Data
Variable
Population (2003)
Male
Female
Median age of population (2003)
% population age 65 and over (2003)
% population with income below poverty line (2001)
Per capita personal income ($; 2003)
% labor force unemployed (2004)
% population eligible for medical assistance (2004)
Lackawanna County
Luzerne County
210,458
99,347
111,111
40.6
18.8
10.2
28,986
6.0
13.9
313,528
151,675
161,853
41.4
19.0
10.3
28,026
6.8
14.5
7
HOSPITAL TOPICS: Research and Perspectives on Healthcare
Although CIOs prioritized HIT use for improved
clinical performance, they also recognized the
value of successful HIT implementation as a longterm return on investment. The initial cost of HIT
equipment, software, training, and system integration is substantial and burdensome. But CIOs
recognized the future cost savings from efficiencies, revenue enhancement from more aligned coding of medical information with billing, reduced
claims denials, more accessible and timely clinical
data that reduces medical errors, and more accurate understanding of service line profitability.
CIOs suggested that if implementation achieves
its predicted integration timeline in the hospital
and is effective, the benefits far outweigh the initial
cost. However, we identify some barriers that can
increase initial cost.
CIOs suggested that the higher level of HIT
implementation could lead to a competitive advantage. Higher levels of HIT implementation produce more timely and comprehensive clinical and
financial reports for decision making, the ability to
more rapidly benchmark clinical performance and
improve protocols for better patient outcomes, and
improved overall quality of care. The nurse leaders
also supported the belief that effective HIT implementation can lead to improved patient outcomes
and quality of care that improve patient satisfaction. Both CIOs and nurse leaders suggested that
higher levels of HIT implementation and use in a
hospital could attract a superior pool of physicians
and specialists admitting patients into the hospital.
The hospital could obtain a competitive advantage
by satisfying patients and attracting high-quality
physicians who refer patients to the hospital. However, hospital executives need to make sure that
referring physicians are familiar and comfortable
with higher levels of HIT, as several of the CIO
interviewees noted.
A few of the CIOs identified the value of HIT
in merger processes. Recent talks on hospital
mergers in the Northeastern Pennsylvania service
area had CIOs assess the ability for cross integration of diverse HIT systems and data sets. HIT
systems can help with the due-diligence process by
obtaining clinical and financial reports for boards
of directors, consultants, legal advisors, and other
key stakeholders in a merger. However, CIO interviewees perceived varying hardware and software
systems with differing organizational policies and
processes regarding HIT use as a real challenge.
Health Executives and HIT Implementation
Appendix B outlines common themes mentioned by participants about how health executives manage and lead integration of HIT to
improve system efficiency. We note that of the
seven common themes of how health executives
integrate HIT to improve hospital efficiency, six
were considered as manager roles, and only one
was identified as a leader role. Both CIOs and
nurse leaders thought that chief executive officer
(CEO) leadership and support of the HIT process
increase the probability of efficient and effective
HIT implementation. Also, both CIOs and nurse
leaders thought that the remaining six themes are
functions of a manager and activities that are more
transactional than transformational.
Barriers to HIT Implementation
From the significant findings, we recognized a
number of barriers to HIT implementation. Both
CIOs and nurse managers identified barriers, all of
which correlated and some of which overlapped.
These barriers are represented in Table 2.
Discussion and Research Implications
We can infer several conclusions and possible
implications on the basis of the study’s findings.
For HIT implementation to be a success, the following factors must be changed or addressed in
the hospital: (1) interdepartmental collaboration
TABLE 2. Perceived Barriers to Health Information Technology (HIT)
Barriers perceived by the
chief information officer
Barriers perceived by the
nurse managers
Not properly managing expectations of HIT
Not enough basic information technology (IT) education
Time demands of training on the end users
Staff literacy with basic software packages
Resource shortages
Poor communication and leadership
Not enough basic IT education
Time demands of training on the end users
Staff literacy with basic software packages
Staff shortages
8
Vol. 87, no. 1 Winter 2009
for HIT implementation, (2) changes in HIT
implementation, (3) balancing clinical time with
HIT training, (4) engaging employees in personal
HIT interest, (5) having a shared vision of HIT
impact on future health, and (6) communication
techniques in HIT implementation.
The research findings from this study support
the need for the management functions of planning, organizing, controlling, evaluating, and staffing. Hospital executives in this study were able to
implement HIT by addressing factors and issues
that are transactional and more associated with
functions of the manager. They have also faced
barriers to successful HIT integration because
of an inability to assess true training needs and
provide the appropriate training, and because of
resource and staffing constraints.
However, further investigation of the underestimated role of transformational leadership may lead
to true buy-in throughout all levels of the hospitals. Leaders can and should impact the enabling
or disenabling managers to perform their functions
in the task of HIT implementation. We hypothesize that major HIT implementation requires
consistent, persistent leadership involvement from
start to full integration. Our research reinforces
the importance of communication for managers
and leaders. Expected HIT end-users, physicians,
and all employees need to be fully informed on
the purpose, process, timeline, and benefits of
the HIT implementation and the process’s buyin from start to finish. Consistent feedback by
employees and administration is necessary through
basic management functions with overarching true
support by senior executives.
This research also suggests that hospitals often
invest in HIT but have not appropriately assessed
the basic computer and software skill set necessary
for nurses and HIT users. We suggest that further
research is needed to identify potential cost savings
by ensuring that necessary computer skills sets and
training are provided for HIT users prior to full
training by vendors on the new HIT system. Both
CIOs and nurse leaders recognized the need for
improved staff computer literacy and basic HIT
education prior to investment in high-cost training
by vendors.
Future researchers could also better answer questions about the preparation, resources, and time
necessary to successfully implement HIT. Both
interviewee groups identified resource shortages as
a barrier to successful implementation. In specific,
nurse managers identified HIT implementation
as extra work on top of an already overbearing
workload on the hospital floors dealing with direct
patient care, medical documentation, and other
nursing-related duties. Further research is needed
to look at the intensity of CEO commitment to
HIT implementation as it impacts availability of
resources necessary for success.
In this article, we depicted a sound understanding of HIT implementation issues and the challenges faced by both CIOs and nurse managers in
Northeastern Pennsylvania. However, we recognize
that the sample of participating hospitals was narrow. Therefore, we suggest that it would benefit the
healthcare industry if future researchers conducted
a similar study with a broader, national sample, by
which they could examine a more comprehensive
picture of implementation trends and issues.
Conclusion
In sum, change theory can lead to more efficient
and effective HIT implementation. If managers
implement HIT on hospital floors without (1)
establishing a sense of urgency; (2) a computerliterate end-user coalition; (3) a communicated
vision of the rewards of HIT implementation,
buy-in throughout the hospital, and stories about
the short-term success of consolidation, and (4 )
institutionalized HIT approaches to obtaining
clinical and business information for decision
making, the leaders are setting up their management team and clinical end-users for a long,
energy-absorbing, inefficient process that can lead
to loss of employee commitment and decreased
return on investment. Therefore, to experience all
of the benefits that HIT can provide, we recommend that hospital managers use change theory
processes when implementing IT.
REFERENCES
Blair, R. 2005. Four Fs equal A+. Health Management Technology 26 (3): 34–35.
Glaser, J. 2005. More on management’s role in IT project failures. Healthcare Financial Management 59 (1): 82–84.
Institute of Medicine (IOM). 1999. To err is human: Building a
safer health system. Washington, DC: National Academy Press.
Kotter, J. P. 1998. Winning at change. Leader to Leader 10
(Fall): 27–33.
Krizner, K. 2004. Clinical transformation initiative starts with a
total vision. Managed Healthcare Executive 14 (10): 54–55.
PA Department of Health, Bureau of Health Statistics
and Research. (2005a). Lackawanna County health profile
2005. Harrisburg, PA: Author. http://www.dsf.health.state.
pa.us/health/lib/health/countyprofiles/2005/lackawanna
.pdf (accessed March 15, 2006).
9
HOSPITAL TOPICS: Research and Perspectives on Healthcare
———. (2005b). Luzerne County health profile 2005. Harrisburg, PA: Author. http://www.dsf.health.state.pa.us/health/
lib/health/countyprofiles/2005/luzerne.pdf (accessed
March 15, 2006).
Shortliffe, E. H., and L. E. Perreault, eds. 2001. Medical informatics: Computer applications in health care and biomedicine.
New York: Springer.
Travers, D. A., and S. M. Downs. 2000. Comparing user
acceptance of a computer system in two pediatric offices:
A qualitative study. Paper presented at the American Medical Informatics Association 2000 Annual Symposium, San
Diego, CA. http://medicine.ucsd.edu/F2000/E001400.
htm (accessed March 19, 2005).
Weir, C. R., R. Crockett, S. Gohlinghorst, and C. McCarthy.
2000. Assessing the implementation process.Paper presented
at the American Medical Informatics Association 2000
Annual Symposium, San Diego, CA. http://medicine.ucsd
.edu/F2000/E001400.htm (accessed March 19, 2005).
APPENDIX A
Question 1
APPENDIX B
Question 2
Why do hospitals use health information technology
(HIT)?
• Need to achieve operational efficiencies
• Data integration
• Long-term return on investment
• Business purposes more than clinical purposes
• Competitive advantage
• Mergers
• Quality of care
• Cost efficiency
How do health executives manage and lead integration
of health information technology (HIT) to improve
health system efficiency?
• CEO leadership
• Capital allocation as a percentage of total operations
budget
• Vendor support and education
• Steering committees
• Internal HIT training
• Information technology (IT) implementation
• IT evaluation
� ��� � ���� � ��� ��� �� � �
� ��� �� � � ��� �� � � �� � �� � �
�������������������������������������������������������������������������������������������������������
�������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������
�������������������������������������������������������������������������������������������
��������������������������������������������������������������������������������������������������
�������������������������������������������������������������������������������������������������
�������������������������������������������������������������������������
�������������������������
����������������������������������
��������������������������������������������������
������������������������������������������������������������������������
������������������������������������
������ ������� � ������
��� � ��� ������
� �� ��������� ��� ����������
��� ������������� � � ��� ������������
�������������� ����������������
���������������
�����������������
��������������������
������������������������������������������������
NURS 8210: Transforming Nursing and Healthcare
Through Technology
Week 4: System Development Life Cycle
“He who fails to plan, plans to fail.” — Proverb
Whether you are building a house, buying a new software
program, or going on vacation, a carefully considered plan
may encourage a positive outcome. In health care,
planning for the adoption and integration of health
information technology systems requires research,
analysis, communication, and collaboration. During the
planning phase, those leading a health information
technology system project must evaluate potential
problems related to patient needs, staff workloads, and
costs, among other things. Planning frameworks can
assist leaders with this task.
This week, you examine a popular planning framework—
the Systems Development Life Cycle (SDLC)—as you
begin your Major Assessment for this course: investigating
a health information technology system or health
information application. You also explore how leaders
facilitate the implementation of HIT projects and consider
strategies for garnering support from key stakeholders and
decision makers.
Learning Objectives
Students will:
•
Analyze how HIT projects are identified and moved
forward within an organization
•
•
Evaluate the impact of leaders and key decision makers
on implementing HIT projects within an organization
Critically analyze the development and implementation
of a health information technology system or application /li>
Learning Resources
Note: To access this week’s required library resources, please
click on the link to the Course Readings List, found in
the Course Materials section of your Syllabus.
Required Readings
Course Text: Ball, M. J., Douglas, J. V., Hinton Walker, P.,
DuLong, D., Gugerty, B., Hannah, K. J., . . . Troseth, M. R. (Eds.)
(2011). Nursing informatics: Where technology and caring
meet (4th ed.). London, England: Springer-Verlag.
• Chapter 17, “Disruptive Innovation: Point of Care”
This chapter uses real-world integration examples to
illustrate the visions and challenges that characterize Smart
Point of Care systems.
Course Text: American Nurses Association. (2008). Nursing
informatics: Scope and standards of practice. Silver Spring,
MD: Author.
• “Standards of Nursing Informatics Practice” (pp. 67-79)
This excerpt presents the specific measurement criteria
found within each nursing informatics standard.
Madsen, M. (2010). Knowledge and information
modeling. Studies in Health Technology & Informatics, 151,
84-103.
Within this article, the overall design models of
information systems are linked to the
metastructures, data, information, knowledge,
and wisdom.
Peleg, M. (2011). The role of modeling in clinical information
system development life cycle. Methods of Information in
Medicine, 50(1), 7-10.
The author of this article discusses the role of conceptual
modeling in health information technology systems and how
it has been an effective component of system development.
Philip, A., Afolabi, B., Adeniran, O., Oluwatolani, O., & Ishaya,
G. (2010). Towards an efficient information systems
development process and management: A review of
challenges and proposed strategies. Journal of Software
Engineering & Applications, 3, 983-989.
This article examines the phases and
methodologies found within the Systems
Development Life Cycle (SDLC), and proposes a
framework for establishing the crucial roles that
participants must play during the SDLC.
Szydlowski, S., & Smith, C. (2009). Perspectives from nurse
leaders and chief information officers on health information
technology implementation. Hospital Topics, 87(1), 3-9.
Required Media
Laureate Education, Inc. (Executive Producer). (2011).
Transforming nursing and healthcare through technology:
Systems analysis. Baltimore, MD: Author.
Note: The approximate length of this media piece is 11
minutes.
The presenters in this week’s media presentation outline the
stages involved when implementing a new technology
system..
Accessible player
Optional Resources
Burgess, L., & Sargent, J. (2007). Enhancing user acceptance
of mandated mobile health information systems: The ePOC
(electronic Point-Of-Care Project) experience. Studies in
Health Technology and Informatics, 129(Pt 2), 1088-1092.
Discussion: Welcome to the Week 4
Discussion area!
Post your responses to the Discussion based on the course
requirements.
Your Discussion postings should be written in standard
edited English and follow APA guidelines as closely as
possible given the constraints of the online platform. Be sure
to support your work with specific citations from this week’s
Learning Resources and additional scholarly sources as
appropriate. Refer to the Essential Guide to APA Style for
Walden Students to ensure your in-text citations and
reference list are correct. Initial postings must be 250–350
words (not including references).
Submission and Grading Information
Grading Criteria
To access your rubric:
Week 4 Discussion Rubric
Post by Day 3 and Respond by Day 6
To participate in this Discussion:
Week 4 Discussion
Week 9 Assignment: Health Information
Technology Project [Major Assessment 5]
In previous Discussions and Applications, you have explored
various aspects of health information technology systems:
the historic development of HIT, how data flows across HIT
systems, and standards and interoperability requirements
including specific terminologies used in your practice
setting. In this Application Assignment, you will have the
opportunity to further develop your analysis skills by closely
examining the implementation of a health information
technology system. As a doctorally prepared nurse, you may
find yourself in the position of leading a HIT project team; to
be an effective leader and move health information
technology projects forward in your organization, you must
be able to logically and critically analyze the many aspects
•
o
▪
▪
▪
▪
▪
▪
▪
▪
▪
▪
and challenges of implementing such a system and then
present your insights in a succinct and professional manner.
This exercise provides an opportunity to hone those skills.
Carefully review the project requirements below and plan
your time accordingly. Be sure to refer to the standards of
nursing informatics practice as you develop this Application,
which serves as your Major Assessment for this course.
To prepare:
Investigate a health information technology system or
health information technology application in your area of
interest. The health information technology
system/application may be in any setting where health care
information is developed or managed. You may choose your
system or application from any organization or virtual
environment.
Examples of health information technology
systems or health information technology applications that
are acceptable include but are not limited to:
Consumer health applications
Clinical information systems
Electronic medical record (EMR) systems in
hospitals or provider offices
Home health care applications
School health applications
Patient portal/personal health record
Public health information systems
Telehealth (i.e., from facility to home)
Simulation laboratories
Health care informatics research and
development centers
•
•
•
•
Discuss your proposed health information technology
system/application with your Instructor before proceeding
with your final selection. You may visit a health care
organization in person or virtually in order to make your
final choice about the health information technology system
or health information technology application of interest.
Choose the best strategy to gain information about your
selected information technology system/application. Some
ways to gather information include virtual visits; vendor
demonstrations; on-site visits; interviews via face-to-face,
phone, or teleconference. You must conduct at least one
interview for this project.
Complete a literature search to gather information
about your selected information technology system. You
may also need to review related scholarly articles to help
answer the questions presented below.
NOTE: In your submitted report, do not share proprietary
information, personal names, or organization names without
permission.
To complete:
Your deliverable is a 12- to 15-page scholarly report, not
counting the title page or references. A successful report
should leave the reader with confidence in understanding
the answers to all the questions listed below. Graphics may
be used to illustrate key points.
Organization Information
Briefly describe the health information technology
system/application and the organization type (hospital,
clinic, public health agency, health care software company,
•
•
•
•
•
•
•
government health information website, private virtual
health information site, etc.).
Is the health information technology
system/application clinical, administrative, educational, or
research related?
What were the key reasons for the development of this
health information technology system/application, i.e., what
made the organization believe this system/application was
needed? How did this organization determine those needs?
Did the organization use specific tools to conduct needs
assessments, staff opinions, or workflows?
How did the organization determine that this specific
system/application could fulfill its predetermined needs?
Who manages this health information technology
system/application and where are they located within the
organization’s administrative structure?
Information System Application Design and
Development
Many health care systems have multiple independent
entities that work together toward the common goal of
providing high-quality care. How did—and do—the various
stakeholders make decisions related to this health
information technology system/application? Were the end
users involved in the development of this health information
technology system/application?
How are individuals trained to use the health
information technology system/application?
How are security issues addressed? How does this
health information technology system/application support a
legally sound health care record?
•
•
•
•
•
•
•
•
•
•
Where did initial funds for this health information
technology system/application come from?
Who manages the budget for this health information
technology system/application?
Have organizational or political issues impacted the
ongoing funding for this health information technology
system/application?
What are the arrangements for planned or unplanned
downtime?
How are health information technology
system/application upgrades scheduled or planned?
How has the health information technology
system/application changed in response to health care
reform and related legislation?
What suggestions could you make regarding changes
needed to support health care reform and related
legislation?
Innovative Aspects of the System
How does the health information technology
system/application utilize technology innovations?
What technology innovations would you recommend
for this organization? What innovations presented in this
course, or found through your own research, could this
organization benefit from?
What innovations could further promote evidencebased practice and efficiency within this organization?
End Product
Your report is a scholarly paper and needs to include a
minimum of 10 citations from peer-reviewed journals. Every
statement made in a scholarly report must be supported by a
reference. Be very cautious when stating your opinion, or
using terms suggesting absolute facts, or values, as these
must be supported by references. Note that textbooks,
including the course texts, are composed of information
cited from other sources (see the reference section in the
course textbooks). With this in mind, there should be an
adequate number of appropriate references (a minimum of
10). Please note that primary sources are to be used. Peerreviewed journal articles should make up the bulk of your
references (90%). If referring to a book, be sure to include
all information in APA style, including specific page numbers
when necessary. Note that an article referred to in a book is
a secondary source. More on this topic is available in
the APA Publication Manual and in the Walden Writing
Center. See also “Policies on Academic Honesty” listed at the
Walden website.
A superior paper demonstrates breadth and depth of
knowledge, and critical thinking appropriate for doctoral
level scholarship. The report must follow APA Publication
Manual guidelines (6th edition) and be free of typographical,
spelling, and grammatical errors. This Application is the
Major Assessment for this course. You will submit this
document by Day 7 of Week 9.
By Day 7 of Week 9
Final Report: 12- to 15-page scholarly report is to be
submitted.
Grading Criteria
Document: Week 9 Major Assessment 5 Rubric (Word
document)
Week in Review
This week you analyzed the development and
implementation of a health information technology
system/application and how HIT projects are identified and
moved forward within an organization. You also evaluated
the impact leaders and key decision makers have on the
implementation of HIT projects. Next week you will
examine the need for constant diligence when working with
patient information and the ethical codes and laws that
govern today’s use of health information technologies.
To go to the next week:
Week 5
Learning Objectives
Students will:
•
•
•
Analyze how HIT projects are identified and moved
forward within an organization
Evaluate the impact of leaders and key decision makers
on implementing HIT projects within an organization
Critically analyze the development and implementation
of a health information technology system or application /li>
Learning Resources
Note: To access this week’s required library resources, please
click on the link to the Course Readings List, found in
the Course Materials section of your Syllabus.
Required Readings
Course Text: Ball, M. J., Douglas, J. V., Hinton Walker, P.,
DuLong, D., Gugerty, B., Hannah, K. J., . . . Troseth, M. R. (Eds.)
(2011). Nursing informatics: Where technology and caring
meet (4th ed.). London, England: Springer-Verlag.
• Chapter 17, “Disruptive Innovation: Point of Care”
This chapter uses real-world integration examples to
illustrate the visions and challenges that characterize Smart
Point of Care systems.
Course Text: American Nurses Association. (2008). Nursing
informatics: Scope and standards of practice. Silver Spring,
MD: Author.
• “Standards of Nursing Informatics Practice” (pp. 67-79)
This excerpt presents the specific measurement criteria
found within each nursing informatics standard.
Madsen, M. (2010). Knowledge and information
modeling. Studies in Health Technology & Informatics, 151,
84-103.
Within this article, the overall design models of
information systems are linked to the
metastructures, data, information, knowledge,
and wisdom.
Peleg, M. (2011). The role of modeling in clinical information
system development life cycle. Methods of Information in
Medicine, 50(1), 7-10.
The author of this article discusses the role of conceptual
modeling in health information technology systems and how
it has been an effective component of system development.
Philip, A., Afolabi, B., Adeniran, O., Oluwatolani, O., & Ishaya,
G. (2010). Towards an efficient information systems
development process and management: A review of
challenges and proposed strategies. Journal of Software
Engineering & Applications, 3, 983-989.
This article examines the phases and
methodologies found within the Systems
Development Life Cycle (SDLC), and proposes a
framework for establishing the crucial roles that
participants must play during the SDLC.
Szydlowski, S., & Smith, C. (2009). Perspectives from nurse
leaders and chief information officers on health information
technology implementation. Hospital Topics, 87(1), 3-9.
Required Media
Laureate Education, Inc. (Executive Producer). (2011).
Transforming nursing and healthcare through technology:
Systems analysis. Baltimore, MD: Author.
Note: The approximate length of this media piece is 11
minutes.
The presenters in this week’s media presentation outline the
stages involved when implementing a new technology
system..
Accessible player
Optional Resources
Burgess, L., & Sargent, J. (2007). Enhancing user acceptance
of mandated mobile health information systems: The ePOC
(electronic Point-Of-Care Project) experience. Studies in
Health Technology and Informatics, 129(Pt 2), 1088-1092.
Discussion: Welcome to the Week 4
Discussion area!
Post your responses to the Discussion based on the course
requirements.
Your Discussion postings should be written in standard
edited English and follow APA guidelines as closely as
possible given the constraints of the online platform. Be sure
to support your work with specific citations from this week’s
Learning Resources and additional scholarly sources as
appropriate. Refer to the Essential Guide to APA Style for
Walden Students to ensure your in-text citations and
reference list are correct. Initial postings must be 250–350
words (not including references).
Submission and Grading Information
Grading Criteria
To access your rubric:
Week 4 Discussion Rubric
Post by Day 3 and Respond by Day 6
To participate in this Discussion:
Week 4 Discussion
Week 9 Assignment: Health Information
Technology Project [Major Assessment 5]
In previous Discussions and Applications, you have explored
various aspects of health information technology systems:
the historic development of HIT, how data flows across HIT
systems, and standards and interoperability requirements
including specific terminologies used in your practice
setting. In this Application Assignment, you will have the
opportunity to further develop your analysis skills by closely
examining the implementation of a health information
technology system. As a doctorally prepared nurse, you may
find yourself in the position of leading a HIT project team; to
be an effective leader and move health information
technology projects forward in your organization, you must
be able to logically and critically analyze the many aspects
and challenges of implementing such a system and then
present your insights in a succinct and professional manner.
This exercise provides an opportunity to hone those skills.
Carefully review the project requirements below and plan
your time accordingly. Be sure to refer to the standards of
nursing informatics practice as you develop this Application,
which serves as your Major Assessment for this course.
To prepare:
•
o
▪
▪
▪
▪
▪
▪
▪
▪
▪
▪
•
•
Investigate a health information technology system or
health information technology application in your area of
interest. The health information technology
system/application may be in any setting where health care
information is developed or managed. You may choose your
system or application from any organization or virtual
environment.
Examples of health information technology
systems or health information technology applications that
are acceptable include but are not limited to:
Consumer health applications
Clinical information systems
Electronic medical record (EMR) systems in
hospitals or provider offices
Home health care applications
School health applications
Patient portal/personal health record
Public health information systems
Telehealth (i.e., from facility to home)
Simulation laboratories
Health care informatics research and
development centers
Discuss your proposed health information technology
system/application with your Instructor before proceeding
with your final selection. You may visit a health care
organization in person or virtually in order to make your
final choice about the health information technology system
or health information technology application of interest.
Choose the best strategy to gain information about your
selected information technology system/application. Some
•
•
•
•
ways to gather information include virtual visits; vendor
demonstrations; on-site visits; interviews via face-to-face,
phone, or teleconference. You must conduct at least one
interview for this project.
Complete a literature search to gather information
about your selected information technology system. You
may also need to review related scholarly articles to help
answer the questions presented below.
NOTE: In your submitted report, do not share proprietary
information, personal names, or organization names without
permission.
To complete:
Your deliverable is a 12- to 15-page scholarly report, not
counting the title page or references. A successful report
should leave the reader with confidence in understanding
the answers to all the questions listed below. Graphics may
be used to illustrate key points.
Organization Information
Briefly describe the health information technology
system/application and the organization type (hospital,
clinic, public health agency, health care software company,
government health information website, private virtual
health information site, etc.).
Is the health information technology
system/application clinical, administrative, educational, or
research related?
What were the key reasons for the development of this
health information technology system/application, i.e., what
made the organization believe this system/application was
needed? How did this organization determine those needs?
•
•
•
•
•
•
•
•
•
Did the organization use specific tools to conduct needs
assessments, staff opinions, or workflows?
How did the organization determine that this specific
system/application could fulfill its predetermined needs?
Who manages this health information technology
system/application and where are they located within the
organization’s administrative structure?
Information System Application Design and
Development
Many health care systems have multiple independent
entities that work together toward the common goal of
providing high-quality care. How did—and do—the various
stakeholders make decisions related to this health
information technology system/application? Were the end
users involved in the development of this health information
technology system/application?
How are individuals trained to use the health
information technology system/application?
How are security issues addressed? How does this
health information technology system/application support a
legally sound health care record?
Where did initial funds for this health information
technology system/application come from?
Who manages the budget for this health information
technology system/application?
Have organizational or political issues impacted the
ongoing funding for this health information technology
system/application?
What are the arrangements for planned or unplanned
downtime?
•
•
•
•
•
•
How are health information technology
system/application upgrades scheduled or planned?
How has the health information technology
system/application changed in response to health care
reform and related legislation?
What suggestions could you make regarding changes
needed to support health care reform and related
legislation?
Innovative Aspects of the System
How does the health information technology
system/application utilize technology innovations?
What technology innovations would you recommend
for this organization? What innovations presented in this
course, or found through your own research, could this
organization benefit from?
What innovations could further promote evidencebased practice and efficiency within this organization?
End Product
Your report is a scholarly paper and needs to include a
minimum of 10 citations from peer-reviewed journals. Every
statement made in a scholarly report must be supported by a
reference. Be very cautious when stating your opinion, or
using terms suggesting absolute facts, or values, as these
must be supported by references. Note that textbooks,
including the course texts, are composed of information
cited from other sources (see the reference section in the
course textbooks). With this in mind, there should be an
adequate number of appropriate references (a minimum of
10). Please note that primary sources are to be used. Peerreviewed journal articles should make up the bulk of your
references (90%). If referring to a book, be sure to include
all information in APA style, including specific page numbers
when necessary. Note that an article referred to in a book is
a secondary source. More on this topic is available in
the APA Publication Manual and in the Walden Writing
Center. See also “Policies on Academic Honesty” listed at the
Walden website.
A superior paper demonstrates breadth and depth of
knowledge, and critical thinking appropriate for doctoral
level scholarship. The report must follow APA Publication
Manual guidelines (6th edition) and be free of typographical,
spelling, and grammatical errors. This Application is the
Major Assessment for this course. You will submit this
document by Day 7 of Week 9.
By Day 7 of Week 9
Final Report: 12- to 15-page scholarly report is to be
submitted.
Grading Criteria
Document: Week 9 Major Assessment 5 Rubric (Word
document)
Week in Review
This week you analyzed the development and
implementation of a health information technology
system/application and how HIT projects are identified and
moved forward within an organization. You also evaluated
the impact leaders and key decision makers have on the
implementation of HIT projects. Next week you will
examine the need for constant diligence when working with
patient information and the ethical codes and laws that
govern today’s use of health information technologies.
To go to the next week:
Week 5
983
J. Software Engineering & Applications, 2010, 3, 983-989
doi:10.4236/jsea.2010.310115 Published Online October 2010 (http://www.SciRP.org/journal/jsea)
Towards an Efficient Information Systems
Development Process and Management: A Review
of Challenges and Proposed Strategies
Achimugu Philip1, Babajide Afolabi2, Oluwaranti Adeniran2, Oluwagbemi Oluwatolani1,
Gambo Ishaya2
1
Computer Science Department, Lead City University, Ibadan, Nigeria; 2Department of Computer Science and Engineering, Obafemi
Awolowo University, Ile-Ife, Nigeria.
Email: {check4philo, tolapeace, igpeni}@yahoo.com, {bafox, aranti}@oauife.edu.ng
Received July 31st, 2010; revised August 26th, 2010; accepted August 31st, 2010.
ABSTRACT
Before Information Systems are developed, they must have undergone a process called Systems Development Life Cycle
(SDLC) using appropriate methodology. The SDLC consists of phases varying from author to author. However, an information systems project can only be successful with intense interaction amongst project manager, systems analyst,
system designers and the end users. Viewed from the project manager’s perspective, the SDLC lacks the essence of
project management activities. Similarly, end users involvement is not clearly specified. The main aim of this paper is to
propose a framework for information systems management and development process which accommodates the views of
the different participants. Furthermore, the paper sharpens the concept of conventional SDLC, on the basis of the proposed framework. In addition, tools and methods that are appropriate for the implementation of the framework are
herein discussed.
Keywords: SDLC, Information Systems, Framework, Project Management, Development, End Users
1. Introduction
The early applications of computers were implemented
without the aid of any explicit Information Systems (IS)
development methodology and appropriate management
techniques. In these early days, the emphasis of computer
applications was towards programming. This meant that
system developers were technically trained but were not
necessarily good communicators. This often meant that
the needs of the users in the application area were not
well established, with the consequence that the IS design
was frequently inappropriate for the application. Few
programmers would follow any formal methodology; in
most cases, they use rule-of-thumb and rely on experience [1].
Estimating the date on which the system will be operational was difficult and applications were frequently behind schedule. Programmers might spend a very large
proportion of their time on correcting and enhancing the
applications which were operational. Typically, a user
will come to the programmer asking for a new report or
Copyright © 2010 SciRes.
modification of one that was already supplied. Often,
these changes had undesirable effects on other parts of
the system, which also had to be corrected. This vicious
circle will continue, causing frustration to both programmers and users. As computers increased rapidly in
number and management was demanding more appropriate systems for their expensive outlay, the situation could
not continue. There were three main changes [2]:
1) The first was a growing appreciation of the part of
the development of the system that concerns analysis and
design and therefore, the role of the system analyst as
well as that of the programmer;
2) The second was realizations that as organizations
were growing in size and complexity; it was desirable to
move away from one-off solutions towards a more integrated approach;
3) The third was an appreciation of the desirability of
an accepted methodology for the development of information systems.
Organizations today are much more concerned about
the effects of competition than they were in the past;
JSEA
984
Towards an Efficient Information Systems Development Process and Management:
A Review of Challenges and Proposed Strategies
therefore, no organization would like to stand the risk of
being overtaken by other competitors on the same playing ground with equal opportunities. Organizations that
acquire prompt delivery of information system projects
and posses efficient management skills will always be at
the fore front of this global digital drive which commands profits for organizations and good quality of services for users and customers. Although, traditional uses
of information technology still exist, new information
systems development has become one of the most important weapons for organizations to gain competitive
advantage. New application development is the most
vigorous for those organizations that recognize information as a resource for achieving their strategic goals.
Existing literature provides some formal methods and
management models for information systems development which cannot explain all the tasks that must be
performed by the diverse group of people that are involved in the development process of information systems. For instance, the waterfall model in isolation cannot fully explain the perspective of the project manager,
same goes to the capability maturity model and hosts of
others. The primary management goal is to build a
working information system under a planned budget and
schedule. The activities such as planning, organizing,
staffing, leading and controlling are of particular importance in managerial activities [3].
The main aim of this paper is to propose a framework
for an efficient information systems development process
and management that will enable information system
projects to be promptly and successfu…
Place an order in 3 easy steps. Takes less than 5 mins.