E portfolio and Technology Competency

E portfolio and Technology Competency I’m going to upload a tamplet of the e portfolio you must follow it .

E portfolio and Technology Competency
E portfolio and Technology Competency

I will also upload the competencies and I will upload my assignments they are 10 and for the( technology competency you can talk about how I used the word press in assessment 1 and
for the 12th assignment you can talk about the movies that I made for assessment 2 which I’m taking now by using windows movie
maker ) those two assignment I don’t have like a file to upload for you so write as possible as you can. Portfolios have re-emerged as a means of addressing the complex assessment challenges in postgraduate programs as we transition to competency-based medical education (CBME).

Location of Geometrically Transformed QR Code Images

Location of Geometrically Transformed QR Code Images Description: QR code is a popular monochrome two-dimensional bar code, which is typically used to store website address.

Location of Geometrically Transformed QR Code Images
Location of Geometrically Transformed QR Code Images

In most cases, this information is
retrieved via a camera phone. The QR code is often captured by the user in different location, angle and lighting condition. The aim of this project is to
propose and develop an algorithm that can (1) locate and extract the QR code from the captured image, and (2) correct any geometrical transformation that
exists in the image.
– no more than 10 pages in total, counting from the cover page to the references (does not
include appendices if any)
– typed in A4 pages in a single column with 1.5 line spacing, 4 cm left margin and 2 cm top,
bottom and right margins, and
– typed in a clear font of readable size.

Location of Geometrically Transformed QR Code Images and Report Elements

The report must include the following elements:
– Cover Page, which includes
o Unit Code and Title
o The heading “Proposal and Risk Assessment Report”;
o Project Title, Student Name and Student Number;
o Date;
o Supervisor Name at the bottom of the page;
Page number in all pages except for the front cover page.
– Abstract that is no more than 200 words in length.
– Introduction, which includes:
o Motivation
Provide the reason for undertaking this project and explain why this project is
important. Provide sufficient background information and describe the current;
state of the art.

Location of Geometrically Transformed QR Code Images Objectives

Define the objectives of this project. Identify the scope and the assumption.
o Significance
Describe the significance or the expected benefits of this project. Explain how the
objectives will advance the current state of the art.
– Proposed Approach (ignore)
Break the project into a set of specific tasks. Propose an appropriate and innovative
approach to carry out each of these tasks. These tasks will vary depending on the nature
of the project. For literature review tasks, identify the databases and bodies of literature
that will drive the review. For theoretical tasks, identify the approach that will be
developed. For modelling tasks, identify the computing resources that will be used, or
the platform for the development of any new software. For experimental tasks, describe
the equipment and specific techniques that will be employed. For design tasks, identify
the tools that will be required. Also, ascertain the availability and accessibility of
experimental equipment, computing resources, work space, and so on.
– Timeline (ignore)
Provide a clear description of a well thought out project timeline. The use of graphs is
highly recommended. Determine whether or not the proposed timeline is realistic.
Identify and discuss all items on the critical path. Note that this timeline covers the
entire project in both semesters.
– Health Risk Assessment (*Important)
Provide a thorough assessment of the likely risks associated with the project; this is in
terms of the Occupational, Safety and Health risks. State the plausibility of each risk.
Provide risk management strategies to eliminate or mitigate the risks discussed. Also,
determine whether or not the proposed risk management strategies are plausible and
reasonable. The use of tables to present your findings is highly recommended.
-Progress to Date (ignore)
Summarise any results obtained to date if you have already made substantial progress
by the time of writing the project proposal. Although no marks will be awarded directly
on this section, information presented here will be treated as additional supporting
evidence for statements made in other sections.

Location of Geometrically Transformed QR Code Images Conclusion

Provide a brief conclusion here.
– References (* using IEEE referencing style)
Adequate and relevant references should be provided with complete details and in a
consistent and correct format. Ensure all references are cited properly in text.

Java Programming using eclipse IDE Assignment

Java Programming using eclipse IDE
Java Programming using eclipse IDE

Java Programming using eclipse IDE

Task A: Complete Club Class:
Use the “Club” project in folder “SD1code/lab8” to complete the following exercises. (Instructions are as follows):

1. Within Club define a field for an ArrayList, which holds the current memberships. Use an appropriate import statement and think carefully about the
element type of the list. Don’t forget to instantiate the field in the constructor.

2. Membership of the club is represented by an instance of the Membership object. (You shouldn’t have to modify the existing membership class.) Complete the Join method in Club.

3. Write a main method, which adds two new members to the club and prints out the current size of the club.

Task B: Add methods to Club:
In this exercise, you have to ‘translate’ code documentation into code. First familiarize yourself with how to write documentation.

4.Add the joinedInMonth method to the Club class, which has the following description.
/**
* Determine the number of members who joined in a given month.
* @param month The month we are interested in.
* @ return the number of members who joined in that month.
*/
Public int joinedInMonth (int month)
5.Define a method in Club with the following description:
/**
* Remove from the club’s collection all members who
* who joined in the given month, and return them
* stored in a separate collection object.
* @param month The month of the membership.
* @param year The year of the membership.
* @return The members who joined in the given month
* and year.
*/
public ArrayList<Membership> purge (int month, int year)
As purge method is slightly more challenging than the other methods! Try using some of the other Iteration methods.

We can write this or a similar paper for you! Simply fill the order form!

Why Some IT Projects Succeed and Others Fail

Why Some IT Projects Succeed and Others Fail Critically review relevant academic literature for factors contributing to successful delivery of IT projects.

Why Some IT Projects Succeed and Others Fail
Why Some IT Projects Succeed and Others Fail

You must include the following topics (but you
may also use additional, relevant topics) in your discussion:
Agile project management approaches in terms of project success
• Waterfall project management approach in terms of project success
• Risk Management in terms of project success

Why Some IT Projects Succeed and Others Fail Step 1

Search Middlesex University Learning Resources online databases, books and journals to find information and to gain a broad understanding on the topic. You
may also use Google Scholar and other web resources for this purpose, but remember these should not be used as direct references in your essay, unless the
sources found are authoritative or peer reviewed. Wikipedia may provide useful background reading; but must not be used as a direct reference.

Why Some IT Projects Succeed and Others Fail Step 2

a. Introduction to the essay topic and brief overview of how you will tackle the given topic (approx. 250 words)
b. Provide an overview of Waterfall and Agile Project Management approaches. You must give a clear description of each (approx. 750 words)
c. Then Critically analyse the main differences between the two approaches. Discuss if either approach could contribute to a successful delivery of a
project, or not. Summarise the main points at the end of this section (approx. 750 words)
d. Discuss the importance Risk Management in terms of project success. Discuss if RM could contribute to a successful delivery of a project or not (approx.
750 words)
e. In addition, you may explore (within the 3000 word count) additional project management topics if your research shows these could be beneficial to project
success. Discuss with your local tutor if needed
f. Conclude your findings and provide recommendations to successful IT project delivery (approx. 500 words)
Remember that the word count is 3000 words maximum, be selective with materials chosen
The essay should provide the reader (the marker) with your written understanding of the materials you have researched. All discussion must be supported by
relevant academic sources and correctly referenced using the Harvard method.
• You are highly encouraged to make use of published academic papers, journals articles, conference papers etc. that can be located via Middlesex e-learning
resources
• You must provide a minimum of eight relevant academic references for your essay
• Thoroughly read your sources in order to gain an understanding of the topic and paraphrase the materials you want to include in your essay.
• Your final work must acknowledge the sources you obtained the information from, by using the Harvard referencing system. This needs to take place in text
and a full list of references must be provided at the end

Project X Corporate Security Upgrade

Project X Corporate Security Upgrade Describe a model project to upgrade security at a fictional facility named Project X using the process identified in the three-part Security Architecture and
Engineering series: Basis of Design, Preliminary Design, Design Development, Final Design, Bidding, Negotiation & Procurement, Construction, and Operational.

Project X Corporate Security Upgrade
Project X Corporate Security Upgrade

One source must come from one of the following journals:
Corporate Security
Disaster Prevention and Management
International Journal of Mass Emergencies and Disasters
International Security
Journal of Applied Security Research
The Journal of Physical Security
Journal of Security Administration
Journal of Security Education
Journal of Security Sector Management
Security Journal
In whatever order seems most logical to you, address total system design including barriers, site hardening, access control, lighting, Intrusion Detection
Systems, CCTV, patrols, etc.

Patient Information and Confidentiality Essay

Patient Information and Confidentiality 
      Patient Information and Confidentiality

Patient Information and Confidentiality

Order Instructions:

For this module, explain the threats to patient information and confidentiality that are present in your selected organization (Salisbury,NC VA). Be sure to link them with regulations (e.g., HIPAA and Wi-Fi security).

Module Overview

Concerns over the privacy and security of electronic health information fall into two general categories: (1) concerns about inappropriate releases of information from individual organizations and (2) concerns about the systemic flows of information throughout the healthcare industry and related industries. Inappropriate releases from organizations can result either from authorized users who intentionally or unintentionally access or disseminate information in violation of organizational policy or from outsiders who break into an organization’s computer system. The second category, systemic concerns, refers to the open disclosure of patient-identifiable health information to parties that may act against the interests of the specific patient or may otherwise be perceived as invading a patient’s privacy. These concerns arise from the many flows of data across the healthcare system, between and among providers, payers, and secondary users, with or without the patient’s knowledge. These two categories of concerns are conceptually quite different and require different interventions or countermeasures.

Presentations and Required Readings
https://www.salisbury.va.gov/
•The following is primary reading required for this module: Privacy and Security Concerns 1
•This article discusses the primary goals of information security in healthcare and examines policy and appropriate uses of medical data: Confidentiality of Electronic Medical Records 2
•Zachary Wilson offers a good explanation of the difference between internal and external sources of attacks. Additionally, he illustrates a wide range of vulnerabilities and how they can be exploited. (Do not get hung up in the technical concepts and jargon at this point. We will cover the more technical aspects later in this course.) Vulnerabilities and attacks3
•The following provides a brief overview of basic concepts surrounding information security along with an introduction to vulnerabilities, controls and policies: Security Concepts4
•Read Chapter 4 “Privacy and Confidentiality” from the following book that is available through the eBrary resource, which can be accessed from the TUI CyberLibrary:
?Anderson, J. G. (2002). Ethics and Information Technology : A Case-Based Approach to a Health Care System in Transition. Springer-Verlag New York, Incorporated, Secaucus: NJ. 63-112. Retrieved on September 8, 2007, from the eBrary database.5
•The following is the United States Department of Human Services summary version of the HIPAA Privacy Rule. HIPAA Privacy Rule6
•Wi-Fi Security concerns7

Sources for Presentation Material Referenced Above

For the Record: Protecting Electronic Health Information (1997). Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure Protecting Electronic Health Information. Washington, DC, USA: National Academies Press. 54-81. Retrieved from the eBrary database.

Barrows, R. C., and Clayton, P. D. (1996). Privacy, Confidentiality, and Electronic Medical Records. Journal of the American Medical Health Informatics Association, 3 (2), 139-148. Retrieved from the PubMed Central database.

Wilson, Z. (2001). Hacking: The Basics. SANS Institute. Retrieved from http://www.sans.org/reading_room/whitepapers/hackers/

Quinsey, C. and Brandt, M. (2003). AHIMA Practice Brief: Information Security: An Overview. American Health Information Management Association. Retrieved from http://www.advancedmedrec.com/images/InformationSecurityAnOverview.pdf

Anderson, J. G. (2002). Ethics and Information Technology : A Case-Based Approach to a Health Care System in Transition. Springer-Verlag New York, Incorporated, Secaucus: NJ. 63-112. Retrieved from the eBrary database.

Summary of the Privacy Rules. (2003). U.S. Department of Health and Human Services. Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/

Alam AS, Al Sabah SAA, Chowdhury AR (2007). Wi-Fi Security The Great Challenge. National Conference on Communication and Information Systems. National Conference on Communication and Information Security.

SAMPLE ANSWER

Patient Information and Confidentiality 

Concerns over security and privacy of the electronic health information may be in relation to releasing information inappropriately from an individual organization or the systematic information flows in a healthcare industry as well as the related industries. Information leaks from an organization when unauthorized users purposefully or unintentionally disseminate or access information against the organizational policy. Outsiders could also break into the computer systems. There are also cases where the professionals act against the interests of particular patients, therefore invading the privacy (Anderson, 2002). Data or information is normally exchanged between different professionals, and these concerns could arise in between, either among the secondary users, payers, and providers, either without or with information about the patient. Therefore, countermeasures and interventions are necessary. The aim of this paper is discussing the threats to patient confidentiality and information present in Salisbury,NC VA, with reference to regulations like Wi-Fi security and HIPAA.

Based on HIPAA, security provisions and data privacy is provided to medical information. The regulation guarantees proper protection of health information and at the same time, permitting easy and efficient health information flow for high quality care to be provided. This also helps in protecting the wellbeing and health of the public. There is a particular way in which the healthcare professionals are required to handle all the patient information they come across. The regulation requires that covered entities should have the appropriate physical, technical, and administrative safeguards for guarding the privacy of non-electronic and electronic protected health information (Barrows & Clayton, 1996).

HIPAA offers protections on the insurance information. From the institution’s website, there is a section on insurance and billing. If someone is really interested in the information, he or she can easily hack to acquire it. The link on patient information also has a lot that can be stolen. Therefore, there is a need to the hospital to be  cautious about leaking information as this can easily tarnish the reputation and image, therefore, leading to patient turnover.

From the website, the phone directory provides information about the service, location, and phone for the various patient advocates. This is very risky since someone outside the healthcare institution might call asking for information of a particular patient or staff, or even go to the physical addresses provided (Barrows & Clayton, 1996). Unknowingly, a professional might provide the sensitive information to an outsider, after which it can be used in inappropriate activities.

Data protection has become very pertinent in the modern day technology world. Public WiFi providers should be informed about their obligations as far as the Data Protection Act (1998) is concerned, particularly in relation to the collection and processing of personal information. Salisbury, NC VA is posing immense threats to patient confidentiality and information. A quick scan at the institution’s website makes it evident that the personal information belonging to patients can easily be interfered with. The information might even be stolen and used for malicious activities. Regardless of the fact that the information might need to be used by different healthcare professionals for promoting high quality healthcare, there should be more controls where the external people should not be able to view the data as is the case.

When using internet at the institution, there should be controls, where the guest WiFi can be separated from the business WiFi (Alam, Al Sabah Chowdhury, 2007). This can go a long way in preventing compromises on the sensitive patient information. The hospital should take charge of its information technology privacy and confidentiality, and ensure that the EPOS systems and private networks are protected. WiFi and other forms of internet are normally used at the institution, and considering how delicate the exchange of information and data among and between the professionals has become, the necessary measures need to be taken.

Having noted that there is intensive internet use at the institution, there is a great need to emphasize that in case Wi-Fi passwords are normally offered to the customers or even patients for internet access, then the management should remain informed that this is actually a big risk to the business. This is the reason why there should be a secure and separate system for the guests. A good solution to this can be ensuring that the network is protected, and a secure login can be used (Barrows & Clayton, 1996).

Conclusion

From the foregoing discussion, it has been that patient confidentiality and privacy have been compromised to a great extent. This clearly relates to the storage and exchange of personal and sensitive patient information online or through the various social media platforms. As such, it can be very easy for the outsiders or even people within to exchange and share the information either intentionally or unintentionally. Consequently, the information and reputation of the institution would be compromised. However, there are regulations such as HIPAA and Wi-Fi which offer guidance on what institutions such as Salisbury, NC VA need to do so as to protect the information their patients offer.

References

Alam, A. S., Al Sabah, S.A.A., Chowdhury, A.R. (2007). Wi-Fi Security The Great Challenge. National Conference on Communication and Information Systems. National Conference on Communication and Information Security.

Anderson, J. G. (2002). Ethics and Information Technology : A Case-Based Approach to a Health Care System in Transition. Springer-Verlag New York, Incorporated, Secaucus: NJ. 63-112. Retrieved from the eBrary database.

Barrows, R. C., & Clayton, P. D. (1996). Privacy, Confidentiality, and Electronic Medical Records. Journal of the American Medical Health Informatics Association, 3 (2), 139-148. Retrieved from the PubMed Central database.

We can write this or a similar paper for you! Simply fill the order form!

Ethics in and through Technology Research Paper

Ethics in and through Technology
     Ethics in and through Technology

Ethics in and through Technology

Order Instructions:

Identify a current application for digital technology that you feel has social, moral, and ethical implications for teachers and/or students. Technology is broadly defined to include anything from a piece of hardware (laptop, gaming console, tablet) to software, apps, social media platforms, etc.

*Write a one paper framed to argue its point toward a particular audience. You must first decide who you are considering to be the audience of the paper.

After you write the one page paper, write an additional short policy brief that could be given to the school board, administration, or the legislature with practical recommendations.

SAMPLE ANSWER

Critical Assessment – Ethics in and through Technology

Technology plays a very vital role in the lives of students and the society who have multiple technological devices and use them frequently. Though technology could have negative effects on the students but overall it helps the students to make their schooling much easier. This can be greatly supported by several studies conducted.

A research that emphases on information technology adoption and use within the education sector has been conducted. They analyzed the impact on learning efficacy of technology-mediated learning environments such as characterized by the adoption of tablet based technologies as a radical complement to old-fashioned teaching/learning methods. The study also analyzes the effect or outcome of “Support Activities” on students’ grades. The “Support Activities” are well-defined as the set of concepts similar to “Classmates’ Encouragement”, “Technical Support Availability” and “Teachers’ Encouragement”. It is known that grades are used as a measure of learning efficacy. In this study, a sample of 370 students partook, being attendants of experimental classes by using tablets as a regular working device to obtain to digital resources. The conventional theory reference was established on the theoretical fundamentals of Technology Acceptance Model, by matching the perceived effect of those concepts between grade ranges. The experimental sample was correlated to classes where the same instructors practice traditional learning resources. This is to give a practical understanding of support factors that influence tablet-mediated learning effectiveness. So, the findings showed the dissimilarities between humanistic and scientific subjects. The study confirms that technology alone could not reform and revolutionalize learning and teaching; nevertheless, it contributes to a better-quality experience if there are a deployed support initiatives (Caporarello, Magni, & Pennarola, 2016).

On the other hand, another study was done which seeks to discover the degree to which technology interrupts and occupies the time of a university student and to determine the extent to which these disturbances contribute to superficial stress. The study is a 71-item survey to evaluate perceived stress, disruptions, technology use and social support was overseen to 299 undergraduate learners. The results indicated that 25% of participants have issues and problems with distractions from technology, and more disturbances from technology are associated with advanced levels of perceived stress. Experiencing disruptions from technology is a notable problem among college students and needs to be tackled by student affairs professionals (Gemmill, & Peterson, 2006).

Policy brief

Students of today are now very fond of using modern devices that somehow aid in their studies and the environment they live in.

The people live in a very fast-changing ‘runaway world’ where the economic, social, cultural and political fundamentals of society are being redefined on an incessant basis (Giddens 2000).

The utilization of technologies to improve educational outcomes and support social inclusion in education has two main forms.

The number one is the usage of technologies to endorse social inclusion in terms of educational outcomes and prospects. The Information and Communication Technology (ICT) have long been supported as a predominantly opposite means of permitting citizens to play active parts in improving educational prospects and crucially proposing ways in which the underprivileged individuals could participate in education (Schofield Clark, 2003). The decentralized, intrinsically equitable, and democratic systems of education could be expected by many critics, with individuals – particularly young people – technologically re-placed at its core instead of the periphery. And the number two could be the usage of education to guarantee social insertion in terms of technological outcomes and opportunities. So, in this sense, educational organizations such as colleges, schools, museums, and libraries are used to deliver access to ICTs which training in technology skills and proficiency are seen to offer the students with the info literacy mandated to make the most of the ICTs.

Perhaps the most dominant have been guidelines and policies pursuing to use education to make sure social inclusion in terms of technological outcomes and opportunities. This kind of policy campaign have been typically built around the augmented resourcing of municipal institutions and public like libraries, community centers, schools, subsidizing of IT equipment acquisitions by those students who belong to the low incomes families and the development of formal computer education and support programs.

Recommendations

Here are some recommendations which the school board may consider for the betterment of their students:

  • Use technology to enhance the knowledge and skills of all students including those who cannot afford to buy their own device or gadgets
  • Since technology could help close achievement gaps and improve learning, the students should be encouraged to use technology but in moderation in order not to disrupt their focus on their studies
  • Technology should be efficiently and effectively used in school and the social aspects of the students.
  • Efficiently use the advantage of technology especially to those students who are at risk of dropping out and failing courses. Use technology to search and build rather than to “drill and kill,” and the correct blend of technology and teachers.

References

Caporarello L., Magni M., Pennarola F. (2016). When Teachers Support Students in Technology Mediated Learning. In: Rossignoli C., Gatti M., Agrifoglio R. (eds) Organizational Innovation and Change. Lecture Notes in Information Systems and Organisation, vol 13. Springer, Cham

Gemmill, E., & Peterson, M. (2006). Technology Use Among College Students: Implications for Student Affairs Professionals. NASPA Journal43(2). http://dx.doi.org/10.2202/0027-6014.1640

Giddens, A.(2000). Runaway world: how globalisation is shaping our lives. London: Routledge, 2000.

Schofield Clark, L. (2003). Challenges of social good in the world of Grand Theft Auto and Barbie. New Media & Society, v. 5, n. 1.

We can write this or a similar paper for you! Simply fill the order form!

The Importance of Standards in Information Technology

The Importance of Standards in Information Technology Order Instructions: For your selected organization (Salisbury, NC VA), examine the standards of the applications the IT department uses. In your discussion include the importance of the standards and any issues surrounding the standards (e.g., definitions consistent with other organizations or across applications).

The Importance of Standards in Information Technology
The Importance of Standards in Information Technology

Module Overview
There is a need to describe healthcare concepts in a consistent manner. We as humans are able to assimilate, without confusion, many variations of descriptions. Computers, on the other hand, are very poor at recognizing concepts from inconsistent descriptions.
A preferred term is an agreed-upon short description of a concept, and a concept is an image created by the words that describe it. However, in some cases, a definition of a concept may still be needed. This is because, too often, the wording of a preferred term means something different to different users.
A unique identifier (or code) for each concept is required. Anything would do, as long as it is unique and suitable. If a preferred term is used, its description should not be changed; however, it does sometimes happen. Accordingly, a preferred term is generally not suitable as a code. In fact, words are not efficient ways to store identifiers in computers, as the computer may be required to store an identifier many times. Therefore, the code should be reasonably “compact,” preferably a “number” of some sort. Using a number is not an issue, because the computer can always display equivalent descriptive words that are seen by the users.
Coding is the process of matching a healthcare entity to a term in terminology and assigning it a code. The terminology may be called a coding system. Sometimes rules are offered to improve the accuracy of coding. These rules are commonly known as standards.
In this module, we will explore the language of Health Informatics. We will examine database fundamentals and types of health information data and records, and explore standards used to ensure the information is understood across various systems and disciplines.
This module covers a large amount of area and material. Do not get overwhelmed by trying to dig too deeply into the technical aspects. Indeed, each area can be an entire field of technical study of its own. Instead, focus on the concepts, application, and purpose surrounding structured data and standards as they relate to healthcare information.
Presentations and Required Reading
• Carefully read through the following material, which describes the fundamentals of databases, and their structure and function. Fundamental Database Characteristics1
• Eric McCreath provides a well-illustrated and concise overview of database fundamentals in the following presentation: Database Basics Presentation2
• The following slide presentation identifies various types of medical data and records. Presentation by Peter Szolovits, MIT (February 2002). Nature of Medical Data3
• There are many standards guiding the format and use of healthcare-related information. The following is a comprehensive list and review of these standards. It is not necessary to memorize every one of them. Instead, just get a sense for the vast number of standards that exist. Pay particular attention to those standards that reference Health Level Seven (HL7) and Unified Medical Language System (UMLS). Review of Healthcare Information Standards4
• The following is a list of Standards Organizations. Standards Development Organizations5
• Read through this overview of the Unified Medical Language System. UMLS6
• Jiang Bo provides a good overview of Health Level Seven (HL7) in this presentation. HL77
Sources for Presentation Material Referenced Above
1Beaumont, R. (2000). Database and Database Management Systems. Retrieved from Fundamental Database Characteristics
2McCreath, E. (2002). Lecture Notes for COMP1200: Perspectives on Computing, Information Systems Database Basics. Retrieved from Database Basics Presentation
3Szolovits, P. (2003). Nature of Medical Data. MIT, Intro to Medical Informatics: Lecture-2. Retrieved from http://groups.csail.mit.edu/medg/courses/6872/2003/slides/lecture2-print.pdf
4Blair, J. S. (1999). An Overview of Healthcare Information Standards, IBM Healthcare Solutions. Retrieved from Review of Healthcare Information Standards
5Health Level Seven: Links to Standards Developers. Retrieved from Standards Development Organizations
6Unified Medical Language Fact Sheet. (2003). National Library of Medicine: Office of Communications and Public Liaison. Retrieve from http://www.nlm.nih.gov/pubs/factsheets/umls.html
7Bo, J. (2003). Health Level Seven Overview Presentation. Bioinformatics Institute. Retrieved from HL7
https://www.salisbury.va.gov/

The Importance of Standards in Information Technology Sample Answer

Standards in IT

Standards of Applications used in IT departments at Salisbury, NC, VA

Health data exchange and interoperability has been enhanced by health information technology. To perform aan ccurate data exchange, the information technology standards are used to facilitate interoperability through a common code to encode health information. The standards are perceived as the agreed health information “language” that can be interpreted accurately by a multiple system (Depart of Veterans Affairs, 2012). When developing standards in this healthcare facility, two main concepts are put into considerations including a) syntax-grammar rules for the defined clinical language so that the electronic information can be exchanged accurately with minimal deconstruction; and b) semantics- to ensure that the information components are coded appropriately and their meaning can be understood (Moen & Mæland Knudsen, 2013).

The standards used in this healthcare facility are guided by the Veterans Health Administration (VHA) handbook which contains all the procedures of managing the clinical coding process in the facility. The guiding framework consists  of  guidelines including the  CPT Assistant, Current Procedural Terminology (CPT),  Diagnostic and Statistical Manual of Mental Disorders (DSM) IV, Healthcare Common Procedure Coding System (HCPCS) and International Classification of Disease  Clinical Modification (ICD-CM). Physical observations, clinical assessments and treatment plans are essential elements that require to be documented. There are various data content standards that have been developed to create a framework of optimal health and efficient exchange of information. This is actually vital with the increase focus on use of Electronic Health records (Moen & Mæland Knudsen, 2013).

There is an increased need to create standards and definitions of individual terms in this clinic, coupled with appropriate content standards in order to uniformly capture and collect essential framing structures that define appropriate clinical concepts. This will facilitate effective sending of patient information back and forth between the relevant stakeholders. At this health care facility, the commonly used frameworks for standards in electronic health record system includes National Council for Prescription Drug Programs (NCPDP), Continuity of Care Record/Document, SNOMEDCT, Digital Imaging and Communications in Medicine (DICOM), RxNorm, ICD-9-CM, HL7,  HIPAA, Current Procedural Terminology  (CPT) and ICD-10-CM/PCS (Moen & Mæland Knudsen, 2013).

The use of these standards ensures meaningful performance, monitoring and outcomes evaluation. In addition, the standards allows for consistent, evidence based care through clinical decision support. The National Quality Forum’s Quality Data Model (QDM) offers the potential for precise, well defined, and universally accepted electronic measures that can be used for comparison purposes and for improvement of care (Beaumont, 2000).

The Importance of Standards in Information Technology and Advantages of the standards

The advantages of these standards are that they facilitate a continuation of accuracy through coding data that is reliable and accurate in planners, researchers and clinicians. In addition, the standardized terminology facilitates easy documentation of every aspect of clinic including clinical problem, interventions as well as clinical outcome. Using standardized terminologies aids in structuring of the data entry using a flexible expression that can be understood by all- novice and experts (Moen & Mæland Knudsen, 2013).  The standardized terminologies aids in retrieval of coded data that have multiple attributes or have different levels of specificity. This helps in establishing a common link to the clinical knowledge base, thereby facilitating decision making process. Use of standardized language results into understanding the various continuum of care from different physicians, clinical settings, languages or health care systems. This is attributable to the fact that the various stakeholders involved can easily exchange and apply health information in an appropriate way (Moen & Mæland Knudsen, 2013).

In addition, standardized terminology is used to identify and monitor the outcomes of specific health needs or outcomes by pooling data from various resources. It supports the auditing of quality services and in benchmarking processes that support research. Consequently, it enables reporting of externally clinical and educational specified health statistics; which aids in the identification of individuals who needs proactive intervention (Moen & Mæland Knudsen, 2013).

The Importance of Standards in Information Technology and the Issues surrounding the standards

The main issue is keeping up the pace with the complex and dynamic standards. This makes most of the staff at the healthcare facility to remain unfamiliar with the emerging types of information being gathered or to understand where it fits in the health information standards realm. Most people still don’t understand the relationship between the standard code used and the major topics (Ajami & Arab-Chadegani, 2013).

Therefore, it is important to prioritize and emphasize on health informatics in order to set industry’s expectation. The Health Information Management staffs have a great responsibility to play the role as advocates for application of information technology and in educating their fellow colleagues. This is because standards contributes to longitudinal view of information technology  and calls for the unified expectations on defining of data, its storage and transfer to process, identify and resolve  service users needs.  The ability to apply this information to drive successful decisions in business intelligence is an emerging responsibility for HIM staff (Moen & Mæland Knudsen, 2013).

The Importance of Standards in Information Technology References

Ajami, S., & Arab-Chadegani, R. (2013). Barriers to implement Electronic Health Records (EHRs). Materia Socio-Medica, 25(3), 213–215. http://doi.org/10.5455/msm.2013.25.213-215

Beaumont, R. (2000). Database and Database Management Systems. Retrieved from Fundamental Database Characteristics

Depart of Veterans Affairs. (2012). Health information management clinical coding program procedures. Retrieved from http://library.ahima.org/doc?oid=107104#.WO60IqL-vIU

Moen, A., & Mæland Knudsen, L. M. (2013). Nursing Informatics: Decades of Contribution to Health Informatics. Healthcare Informatics Research, 19(2), 86–92. http://doi.org/10.4258/hir.2013.19.2.86

 

Information Systems the Benefits of TCP vs UDP

Information Systems the Benefits of TCP vs UDP Order Instructions: Please answer all 3 questions.

A. Compare the benefits of TCP vs. UDP. What are the major differences between the two protocols? How do these differences affect the choice of protocol in an application? Justify your choice between UDP and TCP in the following applications:

Information Systems the Benefits of TCP vs UDP
Information Systems the Benefits of TCP vs UDP

1.Remote surgery
2.Online gaming
3.Online shopping

B. Consider telecommuting in terms of managerial decisions. How would managerial style change to account for employees who telecommute a majority of the time? Does this make it easier or more difficult to accomplish common objectives? Why or why not? Provide a rationale to support your answer.

C. A podcast is a digital recording that is available on the Internet for playback on mobile devices or media players. Provide an example of using a podcast as an advertising tool. What could be a possible revenue model of podcasting? How does podcasting differ from traditional advertising? Consider that users choose to subscribe to a podcast whereas traditional advertising is broadcast to the user intermingled with other media. Give examples of mobile applications that can be used for podcasting

Information Systems the Benefits of TCP vs UDP Sampler Answer

Question A

The benefits of TCP Protocol include:control of flow the rate of data exchange, segment size, network control and flow control. On the other hand, the benefits of UDP Protocol include its time sensitivity and ability of its servers towards answering small queries from a large pool of clients (McKeen & Smith, 2014). The differences between TCP and UDP include:  TCP is more reliable than UDP; TCP transmissions are ordered in a sequence whereas messages sent through UDP may not be in a sequence; and finally TCP connection is heavyweight while that of UDP is lightweight (McNurlin, 2009). TCP Protocol is used in remote surgery because of its preferred in a procedure that requires error correction facilities at network interface level. UDP Protocol is the choice for online gaming and online shopping, which are time sensitive applications for online gaming and the servers are requiring the ability of answering small queries from a large pool of clients for online shopping (O’Brien, 2013).

Question B

A consideration of telecommuting from the perspective of managerial decisions means that, a lateral direction model of managerial decisions has to be adopted whereby the manager has to engage employees outside an organizational work place that is centralized (Sardeshmukh, Sharma & Golden, 2012). According to Matthews & Williams (2012), the management style has to change from classical management styles to Laissez-faire management style where most of employees work by telecommuting. In this style of management, employees are motivated to work independently and allowed to nurture their creativity by getting a chance for their ideas to flourish. The management should then provide guidance when need and facilitate brainstorming in decision-making, which makes the manager to seem more of a mentor instead of a leader (Matthews & Williams, 2012). This makes it difficult to accomplish common objectives, which require frequent meetings to exchange ideas due to lack of trust and teamwork originating from the lack of frequent face-to-face contact (Sardeshmukh et al., 2012).

Question C

During this era of digital advertising, podcasting has undoubtedly become a substantial channel through which the consumption of digital content take place (McNurlin, 2009). An example of using a podcast as an advertising tool include the use of Apple iTunes app through which advertisers can upload their promotional media clips that are viewed by subscribers as they stream their preferred digital content (O’Brien, 2013). The possible revenue model of podcasting would be through subscriptions whereby a fee is paid, and the difference between a podcast and traditional advertising is that the former is based of digital content consumptions (McKeen & Smith, 2014). Some examples of mobile applications possible for use in podcasting include Apple iTunes app, Oracle, IBM among others.

Information Systems the Benefits of TCP vs UDP References

Matthews, H. S. & Williams, E. (2012). Telework Adoption and Energy Use in Building and Transport Sectors in the United States and Japan. Journal of Infrastructural Systems, 11(1), 21-30. doi:10.1061/(ASCE)1076-0342(2005)11:1(21)

McKeen, J. D. & Smith, H. A. (2014). Making IT Happen: Critical Issues in IT Management, Wiley Series in Information Systems. New York, NY: Prentice Hall.

McNurlin, B. (2009). Information Systems Management in Practice (8th ed.). New York, NY: Prentice Hall.

O’Brien, J. (2013). Management Information Systems: Managing Information Technology in the Internetworked Enterprise. Boston, MA: Irwin McGraw-Hill. ISBN 0-07-112373-3

Sardeshmukh, S. R., Sharma, D., & Golden, T. (2012). Impact of Telework on exhaustion and job engagement: A job demands and resources model. New Technology, Work and Employment, 27(3), 193-207. doi:10.1111/j.1468-005X.2012.00284.x

Leading in Technological Dominated Workplaces

Leading in Technological Dominated Workplaces Order Instructions: Airport industry

ONE major challenge
Biometric E-passports

Leading in Technological Dominated Workplaces

Marking criteria:
• Coherent and convincing identification of a major challenge facing organizations in the contemporary world 20%
• Identification of relevant leadership and negotiation concepts, and insightful application to the essay topic 25%
• Evidence of reading from a range of sources; careful referencing 15%
• Critical and independent thinking 15%
• Good structure: an effective introduction and conclusion, logical organization of material, effective use of paragraphs, integration of all sections into a unitary whole 15%
• The clear expression of ideas, well edited, high standard of presentation and attention to details 10%

You MUST use attached files

Leading in Technological Dominated Workplaces Sample Answer

 

LEADING IN INCREASINGLY TECHNOLOGICAL DOMINATED WORKPLACES

Introduction

Leadership in a technologically dominated workplace is a challenging endeavor that requires targeted strategies to ensure that technology impacts the organizations in a positive manner. In the contemporary world where a majority of work processes are technology-driven, leaders must take strategic actions to manage continuous change, anxiety, fear and related factors associated with technology adoption. It is also imperative that employees have the right capacity to utilize technology by ensuring that they have the required skills and capabilities. The growing use of biometric e-passports presents an example of how technology affects organizations, including the challenges of adoption and implementation. This paper is a discussion on leading in technology dominated workplaces, with a major focus on biometric e-passports. The discussion comprises challenges faced by modern organizations, relevant leadership, and negotiation concepts and their application in the context of leading in a technologically dominated workplace.

Leading in Technological Dominated Workplaces Challenges

There is an evident rise in the use of biometric e-passports, with almost half of UN member states utilizing the technology. Biometric e-passports are aimed at promoting efficiency while reducing costs. The technology which comprises a microprocessor chip with the biometric information of the holder is a combined electric and paper passport (Jules, Molnar & Wagner, 2016). The passport, which utilizes contactless smartcard technology was developed with the objective of improving security and increasing efficiency through automation. To authenticate data, the Public Key Infrastructure (PKI) is used. This infrastructure is significantly expensive and this challenges the technology’s implementation even after security mechanisms have been set up. As a project that is largely considered a government role, challenges are likely to be witnessed in implementation before all airports can adopt the technology. As with any other change process, technology integration in organizations comes with considerable challenges, mostly associated with resistance to change, infrastructure challenges and lack of adequate skills to operate the technology.

Organizations introducing new technologies face the challenge of resistance to change, which refers to the tendency of intended users wanting to maintain the status quo (Saskia Bayerl,  Lauche & Axtell, 2016). In essence, they are not ready to change their mode of operation to adopt new technologies. Therefore, leaders in the technologically dominated organization must be motivated to encourage followers to embrace new technology. Griffin, RW & Moorhead (2011) and Nilsen, et al (2016), identify various factors that lead to technological change resistance. These include fear and uncertainty on what the new technology holds, the need to change processes to accommodate the changes, need for technology-specific skills and possible difficulties in operating new technology. The biometric e-passport currently faces challenges of resistance, with opponents citing that there is no available information regarding what will be included in the chip and the level of security it provides.

Communication plays an imperative role in determining the effectiveness of technology acceptance and adoption in an organisation (Scărlătescu, 2014; Saskia Bayerl, Lauche & Axtell, 2016). This means that employees should be adequately informed regarding any changes in technology or adoption of technology within the organization in order to ensure that they are psychologically prepared. Unfortunately, such communication is overlooked, particularly where hierarchical differences exist, such that employees get to know about the technology when it has already been implemented and they are expected to adopt it. According to Leanne & Waldman (2012), communication aids in reducing resistance to change by involving employees in the change process. In order to achieve this effectively, employees need to be involved from the start, by helping them understand the technology, its use, how it will improve organisational processes and how it will affect their work. When employees are actively involved in the setup process, they are more likely to understand the need for technology and embrace it.

Technology implementation remains one of the most significant challenges in technologically dominated organisations. In their research on adoption and implementation of technology, Kyratsis, Ahmad & Holmes (2012) establish that the ‘how-to’ or the information necessary for effective implementation of innovation at both the organisational and individual level determines the success of technology implementation. There is a need to instill the right knowledge and skills necessary to ensure that employees can effectively execute technology change. In the use of the biometric e-passport, users need knowledge on how to troubleshoot and detect untrustworthy information.

Heshan, Yulin & Haiyun (2016)notes that in the adoption of technology, there is no universal technology and that organisations must seek to identify a structural, strategic and cultural fit before making a decision to adopt. A majority of organisation do not put this into consideration and this ends up affecting its applicability. Many companies will invest in technology because it is a trend in the market, without taking the time to understand how the technology fits into the organisation’s strategy, whether the organisation’s infrastructure is adequate to support the technology effectively and whether the organisation’s culture fits well with the new technology. Where there is no strategic or structural fit, implementation becomes difficult and it ends up being a waste of the organisation’s resources. In the case of biometric e-passports, the challenge has been ensuring that airports are equipped with the necessary infrastructure to support the function.

Technological malfunctions present a significant challenge in the management of technologically dominated organisations. Technology and technological equipment are highly susceptible to malfunctioning and a myriad of risks including power and network challenges, loss of data, malware, intrusion and cyberattacks (Florio, 2012). These affect the use of technology due to disruption of operations. Technology has been known to paralyse organisational operations for long periods of time, leading to losses and major inconveniences. Biometric e-passports require reliable power and internet connection and in the event that these are not available, the e-passports would be rendered useless.

There is a looming challenge over technology integration in organisations, given technology is seen as a substitution for process implementation as opposed to being complementary. With the increasing use of technology, there is increased automation in organisations, which leads to the loss of intellectual knowledge. ISMP Canada (2016) notes that people are so reliant on technology that they cannot solve simple problems without the use of technology. The use of biometric e-passport is one such automation and its use could challenge physical verification, thus increasing the risk of identity theft (Jules, Molnar & Wagner, 2016).

Leadership and negotiation concepts

Leading in technologically dominated workplaces requires proactive leadership, to ensure the effective integration of technology into the organization. Therefore, it is important for leaders in such organizations to identify a leadership style that augments their strategy (Chaneski, 2016).

Transformational leadership encompasses leading by encouraging and motivating others. This means that the leader provides followers with clear goals of the technology and how it will impact their lives. Kunnanatt (2016) notes that in the application of transformational leadership, openness and trust play a significant role in influencing leadership efficiency, hence the need to have an open approach during the implementation of any change process (Effelsberg, Solga & Gurt, 2014). This way, the followers are likely to be motivated to implement the technology because they understand and own the process (Jiao & Zhao, 2014). In addition, they are more actively involved in the development of innovative ways to counter the effects of technological changes. In order to facilitate the smooth adoption of technology, transformational leaders are more likely to provide learning opportunities for followers including pieces of training. Transformational leaders also take the time to inspire and promote intellectual stimulation, such that followers can participate in the development of future technology (Jain & Duggal, 2016). Through recognition of followers who perform well in technology use, leaders can encourage high-level performance and effective adoption of technology (Northouse, 2016). Individualized consideration characterized by interpreting challenges at the individual level to address specific problems also presents transformational leadership as effective leadership in the implementation of technology (Dwyer, et al, 2013).

Transactional leadership is considered less effective in managing change and in particular technological change. This is because instead of influencing followers through empowerment and creating opportunities for learning, leaders use their authority to demand compliance from followers. Transactional leaders are more interested in reaching set goals and give little consideration to how these will be achieved. Accordingly, they are more likely to promise a reward for performance and use punishment for non-performance; without necessarily guiding or empowering followers on what is expected of them. As a result, followers are likely to be dependent on the leader’s power to promote technology adoption, thus inhibiting creativity in implementation (Mullins, 2013). In a majority of cases, followers are not involved in the process of technology adoption and only learn of it when they are required to implement it. Given the level of difficulty involved in utilizing new technology, there is the likelihood of conflicts within the organization because there is no positive influence from the leader (Northouse, 2016). The fact that non-compliance is addressed through punishment leads to more resistance to change and the process of technology adoption may be slow and ineffective.

Maruping & Magni (2015) identify employee ownership of technology as the main driving force towards effective technology adoption. This is effectively addressed under the LMX theory, which seeks to incorporate followers as part of the in the group. Leaders utilizing this style are likely to be inclusive and engaging in a bid to influence greater contribution by the employees. According to Mullins (2013), change processes are more effectively achieved when followers understand what the change is all about and when they are encouraged to participate in the change process. This makes the LMX theory highly applicable for technologically dominated organizations because leaders seek to be on the same level as followers in terms of understanding and interpretation of change. Due to the effective collaboration demonstrated in LMX theory, implementing new technology is likely to be highly effective and less costly.

Leading in Technological Dominated Workplaces Implications for leadership and recommendations

Technologically dominated companies face considerable challenges every time a new technology is being adopted, mostly due to the process of change that may affect the organisation’s culture and disrupt employees from their usual way of doing things. Influencing positive change and adjustment to new technology requires leaders in such organizations to be proactive in terms of involving employees in the process. As in the transformational and LMX theory, involving employees in the process and impacting them through positive influence plays an important role in the acceptance of new technology and motivates them to own the process. In this respect, leaders should refrain from transactional processes and focus on seeing beyond financial incentives. Leaders should focus on creating a purpose for work through motivating and encouraging employees to be part of the organization (Mayfield & Mayfield, 2015).

Communication emerges as an important aspect of promoting effective change adoption. Leaders in technologically dominated organizations need to establish communication with followers in order to understand how technological changes affect them and also provide a channel for obtaining feedback for future needs.

Technology is considered a means to improved efficiency within the organization, made possible through automation. This technically means that work is likely to be done faster and more accurately. Based on this, it is an opportunity for leaders to allow employees shorter working hours as technology increasingly reduces human labor. This would play a great role in enhancing motivation and increasing performance.

Leading in Technological Dominated Workplaces Conclusion

Technology adoption, like any other change process, is a complex undertaking that requires effective collaboration and ownership by both the leaders and followers. Having an effective leadership process ensures that change can be managed effectively by encouraging followers to embrace the change. Through an efficient reward and motivation system, leaders can encourage technology adoption in their organizations, through encouraging employee participation. By involving them from the beginning, an organization ensures that it will have employee support during implementation of technology. This is because the employees are conversant with the intended technology, understand its relevance and are of how their roles will be affected by the new changes. In adopting the biometric e-passport, special attention should be paid to the concerns voiced by users in order to ensure that it serves the intended purpose.

Leading in Technological Dominated Workplaces Reference list

Chaneski, WS 2016, Employing the Right Leadership Style, Modern Machine Shop, 89, 6,

  1. 44-46, Business Source Complete, EBSCOhost, viewed 7 December 2016. Retrieved from web.b.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=17&sid=e38606bb-e4d6-4675-87b4-5d60270acaea%40sessionmgr2

Dwyer, P, Bono, J, Snyder, M, Nov, O, & Berson, Y 2013, ‘Sources of Volunteer Motivation:

Transformational Leadership and Personal Motives Influence Volunteer Outcomes’, Nonprofit Management & Leadership, 24, 2, pp. 181-205, Business Source Complete, EBSCOhost, Retrieved from web.b.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=7&sid=e38606bb-e4d6-4675-87b4-5d60270acaea%40sessionmgr2

Effelsberg, D, Solga, M, & Gurt, J 2014, ‘Getting Followers to Transcend Their Self-Interest

for the Benefit of Their Company: Testing a Core Assumption of Transformational Leadership Theory’, Journal Of Business & Psychology, 29, 1, pp. 131-143.

Florio, V 2012, Technological Innovations In Adaptive And Dependable Systems: Advancing

Models And Concepts: Advancing Models And Concepts, Hershey, Pa, Igi Global

Griffin, RW & Moorhead, G 2011, Organizational Behavior, New York, Cengage Learning.

Heshan, S, Yulin, F, & Haiyun (Melody), Z 2016, ‘Choosing a Fit Technology:

Understanding Mindfulness in Technology Adoption and Continuance’, Journal of the Association For Information Systems, 17, 6, pp. 377-412 Retrieved from

web.a.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=6&sid=bf9fa21c-86cd-4b1e-a8b3-7d3233ad267c%40sessionmgr4010&hid=4209

ISMP Canada, 2016, Understanding Human Over-reliance on Technology, ISMP Canada

Safety Bulletin, 16(5), p. 1-6. Retrieved from https://www.ismp-canada.org/download/safetyBulletins/2016/ISMPCSB2016-05_technology.pdf

Jain, P, & Duggal, T 2016, ‘The Influence of Transformational Leadership and Emotional

Intelligence on Organizational Commitment’, Journal Of Commerce & Management Thought, pp. 586-598, Business Source Complete, EBSCOhost, viewed 4 December 2016.

Jiao, H, & Zhao, G 2014, ‘When Will Employees Embrace Managers’ Technological

Innovations? The Mediating Effects of Employees’ Perceptions of Fairness on Their Willingness to Accept Change and its Legitimacy’, Journal of Product Innovation Management, 31, 4, pp. 780-798 Retrieved frimweb.a.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=fc54b441-9747-4c71-88e2-c8e2ce3826c3%40sessionmgr4008&vid=0&hid=4209

Jules, A., Molnar, D & Wagner, D 2016, Security and Privacy issues in E-passports,

Retrieved from https://eprint.iacr.org/2005/095.pdf

Kyratsis, Y, Ahmad, R & Holmes, 2012, Technology adoption and implementation in

organizations: comparative case studies of 12 English NHS Trusts, BMJ Open, 2, 2012. Retrieved from http://bmjopen.bmj.com/content/2/2/e000872.full

Kunnanatt, JT 2016, ‘3d Leadership — Strategy-Linked Leadership Framework for Managing

Teams’, Economics, Management & Financial Markets, 11, 3, pp. 30-55, Business Source Complete, EBSCOhost, viewed 6 December 2016. Retrieved from web.b.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=0&sid=8542807a-b587-4e27-9644-93b216c0891e%40sessionmgr1

Leanne, EA & Waldman, DA 2012, Leadership, Feedback and the Open Communication

Gap, Psychology Press.

Maruping, L, & Magni, M 2015, ‘Motivating Employees To Explore Collaboration

Technology In Team Contexts’, MIS Quarterly, 39, 1, pp. 1-A8 Retrieved from web.a.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=6&sid=89467401-74a0-4582-9970-e2ea96963aa4%40sessionmgr4008&hid=4209

Mayfield, M, & Mayfield, J 2016, ‘The Effects of Leader Motivating Language Use on

Employee Decision Making’, International Journal of Business Communication, 53, 4, pp. 465-484, Retrieved from web.a.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=c545243a-eae4-490c-b381-4bcaac73aa13%40sessionmgr4008&vid=0&hid=4209

Mullins, LJ 2013, Management and Organisational Behaviour, 10th Ed.London: FT Prentice

Hall.

Nilsen, E, Dugstad, J, Eide, H, Gullett, M, & Eide, T 2016, ‘Exploring resistance to

implementation of welfare technology in municipal healthcare services – a longitudinal case study’, BMC Health Services Research, 16, pp. 1-14, Academic Search Premier, EBSCOhost, viewed 6 December 2016. Retrieved from web.a.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=11&sid=bf9fa21c-86cd-4b1e-a8b3-7d3233ad267c%40sessionmgr4010&hid=4209

Northouse, P.G. (2016) Leadership: Theory and Practice (7th Ed.), London: Sage.

Saskia Bayerl, P, Lauche, K, & Axtell, C 2016, ‘Revisiting Group-Based Technology

Adoption As A Dynamic Process: The Role Of Changing Attitude-Rationale Configurations’, MIS Quarterly, 40, 3, pp. 775-DD10 Retrieved from web.a.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=4&sid=6a337dca-eba6-4fc5-a83b-68fc3816a85f%40sessionmgr4009&hid=4209

Scărlătescu, I 2014, ‘The Role of Communication in the Efficient Administration of

Organizational Changes’, Valahian Journal Of Economic Studies, 5, 1, pp. 37-44, Business Source Complete, EBSCOhost, viewed 6 December 2016., Rtrweb.a.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=12&sid=89467401-74a0-4582-9970-e2ea96963aa4%40sessionmgr4008&hid=4209