The information management which applied for the health
care and health is refer as the HIM (Health information management). It is also
known as the practice protecting
digital, acquiring, traditional medical, analyzing and providing quality
services to the patient of the health care. According to the health records of
the widespread computerization, the records is occurred as the traditional
paper-based which can be replaced with the electronic health records (EHRs). In
the current decades the various techniques tools which are using for the health
information and health informatics are continually improving for the betterment
of the information management in the sector of the health care.
The human resource which is required for the Health
Information System as well as hospital information systems both are considered
as the common implementations of HIM. It is also referred as the discipline
which is used to analyzing the information as their organizational resources.
It is also used to covering the uses, values, definition and the distribution
which is required to the organization for its internal programming of the
organization which is commonly processe4d by the by the computer. It is also
used to evaluating the types of the data and its information which is required
to the organization in account to the progress and function effectively.
Literature review of The information management which applied for the health care
According to the research conducted by (Doukas, 2010) it is reviewed that the functionality of the
managing the information data can be provides by the cloud computing and it is
also used for the distribution of the data.
The cloud computing is also used to the universal as well as pervasive manner for supporting the systems
and applications several platforms. The implementation of the mobile system is
also presents by this work which allows the storage of the electronic health
care data. It is also using for the update and retrieval using Cloud Computing.
By using the Google’s Android operating system the mobile application is
developed and it is also used to providing the medical images and management of
patient health records. Bu using the Amazon’s S3 cloud service it has been
evaluated by the developed system. the implementation details for the presents initial results of the system in
practice is summarized in this article (Doukas, 2010).
For achieving two specific goals Healthcare systems
focus and these goals are medical information anywhere and the availability of
e-health applications as well as it also includes the invisibility of
computing. For supporting the wide ranges of the applications as well as the various
which are includes as patient monitoring, management, mobile telemedicine,
emergency response and management, pervasive access to healthcare information,
location-based medical services and it is also used to providing great benefits
for the both medical personnel and
patients (Doukas, 2010)
According to the research conducted by (Mithas, Ramasubbu, & Sambamurthy, 2011) it is reviewed that
several dimensions of IT capabilities have been conceptualized by the
Information systems researchers as well as it is measured by the very few
studies for measuring the measured these capabilities for assessing their
significance for firm performance. In all these studies which is used to
measuring the some IT capabilities and these all can be fail find the link
between competitive advantage, quality of IT infrastructure and suggest a
continuing need for alternative conceptualizations as well as the various
empirical validation for the IT capabilities.
Moreover it is suggested by the prior research which is
related to the conceptualizations of IT
capability and IT infrastructure and it can adequate for firm success
lonely. Meanwhile the ability of the
various firms for the leverage of their
IT infrastructure for providing the reliable, accurate data according to the
proper deadline. It is also known as the information management capability
which can be most important (Mithas, Ramasubbu, &
Sambamurthy, 2011)
According to the research conducted by (Bulgurcu, 2010) it is reviewed that
it is recognized by the several organization for recognizing the employees
which can be often known as the wakes links for the information security. It
also required the great assets for the efforts of reducing the risk which is
related to the information security. The employees who observe according to the
1 Mikko Siponen who is known as the accepting senior editor in this research
study. The “Online Supplements” of this research study is located in the part
of the appendices and the section of the MIS Quarterly’s website (Bulgurcu,
2010)
According to the research conducted by (Soomro, Shah, & Ahmed, 2016) it is reviewed that
the increased online business opportunities are increased by the Information
technology. For the security of the information the serious risks are created
as the opportunities. Recently the issues of the information security were
studied in the context of the technological, but the needs of the security can
be growing for exploring the management role
in information security management (Soomro, Shah, & Ahmed, 2016).
For accumulating the knowledge for the several managerial
roles and the activities which are required for the literature which allows the
mangers for adopting the various holistic approach for the information security
management. The research study is using the approach of the systematic
literature review by which the literature can be synthesized for the roles of
the management for to explore specific managerial activities to enhancing
information security management (Soomro, Shah, & Ahmed, 2016).
According to the research conducted by (Baek, Quang, Liu, Huang, & Xiang, 2012) it is reviewed that
the There are a lot of activities related to management, mainly execution and development
of awareness, security policy information, submission training, enterprise
information architecture development, management of IT infrastructure and human
resources management and IT alignment, had an important effect on the information
security quality management. Therefore, this study makes a new contribution by an
all-inclusive method to information security is required and it also recommend
the ways that can be used by the managers to play an active role in security of
business information. This research also opens up many new avenues for further
research in this area (Baek, Quang, Liu, Huang, &
Xiang, 2012).
According to the research conducted by (Baek, Quang,
Liu, Huang, & Xiang, 2012) it is reviewed that
the smart grid is a technical invention that advances reliability, economics,
sustainability and, efficiency of the services related to the electricity. It
is also likely to plays a critical part in recent infrastructure of energy. The
core smart grids challenges, though, are to know how to accomplish dissimilar kinds
of intelligent devices for example smart meters and power assets of the
business efficiently; and how to procedure an enormous quantity of information get
from devices. The foremost impression of framework is to form a classified cloud
computing centers structure to offers diverse computing services types for management
of information and analysis of big data. In accumulation to this organizational
background, the solution related to the security depends on signature, identity-based
encryption, and re-encryption proxy to address serious issues related to security
of framework for information management in the business (Baek, Quang,
Liu, Huang, & Xiang, 2012).
According to the research conducted by (Doukas, 2010)it is reviewed that
the smart grids essential for management of huge amount of data, it is enormously
significant to achieve flows of information professionally. In Smart-Frame, it
is recommend a unified service to handle the flows of information. This facility
takes contributions as the requests of information from service groups and overall
statistics (for example the information amount, arrival time) from storages of information.
By using inputs, the service produces a schedule for information flow, that requires
destinations and sources of data flows and also how they are managed ( for
example it also has definite workers are
functional on flows of information). Both of the information services and storages
groups require to monitor this for execution (Doukas, 2010).
Conclusion of The information management which applied for the health care
Summing up the discussion it can be said that the in the
current decades the various techniques tools which are using for the health
information and health informatics are continually improving. Human resource
which is required for the Health Information System as well as hospital
information systems both are consider as the common implementations of HIM. By
using the Google’s Android operating system the mobile application is developed
and it is also used to providing the medical images and management of patient
health records.
It also required the great assets for the efforts of
reducing the risk which is related to the information security. Recently the
issues of the information security were studied in the context of the
technological. Therefore, this study makes a new contribution by an all-inclusive
method to information security is required and it also recommend the ways that
can be used by the managers. The foremost impression of framework is to form a
classified cloud computing centers structure to offers diverse computing
services types for management of information and analysis of big data. In
Smart-Frame, it is recommend a unified service to handle the flows of
information.
References of The information management which applied for the health care
Baek, J., Q. H., Liu, J.
K., Huang, X., & Xiang, Y. (2012). A secure cloud computing based framework
for big data information management of smart grid. IEEE.
Bulgurcu, B. (2010).
INFORMATION SECURITY POLICY COMPLIANCE: AN EMPIRICAL STUDY OF RATIONALITY-BASED
BELIEFS AND INFORMATION SECURITY AWARENESS. MIS Quarterly, 523-548.
Doukas, C. (2010).
Mobile Healthcare Information Management utilizing Cloud Computing and Android
OS . IEEE, 1037 -1040.
Mithas, S., Ramasubbu,
N., & Sambamurthy, V. (2011). HOW INFORMATION MANAGEMENT CAPABILITY
INFLUENCES FIRM PERFORMANCE. MIS Quarterly, 237-256.
Soomro, Z. A., Shah, M.
H., & Ahmed, J. (2016). Information security management needs more holistic
approach: A literature review. International Journal of Information
Management , 215–225.