Research Proposal: Social Media and Business Value. RFID Technology. HIPAA and Informational Systems of Rural Hospitals.

2021-07-01
7 pages
1795 words
University/College: 
University of California, Santa Barbara
Type of paper: 
Research proposal
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

FIRST PREFERENCE

DERIVING BUSINESS VALUE FROM INTEGRATED SOCIAL MEDIA PRESENCE AND THE MANAGEMENT OF IT FOR OPERATIONAL, TACTICAL, AND STRATEGIC PURPOSES

The purpose of this presentation is to show how information technology has induced business value due to integrating social media within the business sector. Therefore, the presentation will thus be aimed at outlining the major challenges and opportunities resulting from integrated social media which cause business transformation regarding management through enhancing operational, tactical and strategic functions within the business. In this case, the transformation of business attained from social media technologies will constitute derived business value. Ultimately, the presentation will help create an essential mentality and know-how in the audience of how the social media is utilized within the business sector so as to bring an ultimate increase in value while at the same time knowing what challenges are accrued during the utilization and how these challenges could be reduced.

The topic of the presentation will entail a thorough and critical comparison of the gained business value with the adoption of social media technologies. Additionally, the specific implications that social media bears on the management of businesses will be outlined with a focus on the operational, tactical, and strategic purposes of the subject business. The presentation is thus expected to cover subtopics including presence social media in business; pros and cons of social media technology in business; business value definition and significance; management in business and how it impacts business value; integration of social media in management, integration in operational, tactical and strategic sectors; the link between social media and business value; and the challenges in linking management to social media and how they are overcome. Notably, the subtopics will appear in the order in which they have been enlisted here under which relevant figures and dataset will be incorporated. The significance of studying the enlisted subtopics is in the order they appear is that the presentation will start with giving the basic definition of the social media and the business sector and management and outlining their roles, pros, and cons where applicable and link the concepts together. In other words, chunks of information and important concepts defining the topic shall first be defined independently from which an in-depth understanding of the topics and relevant concepts will be developed. For instance, strategic use of online user innovation communities (OUICs) in which case ideation and implementation capabilities of online user innovation will be assessed according to academic sources like Dong and Wu (2015) and Stockdale et al. (2012). This assessment will link management (the strategic aspect) to social media technology (OUICs) to business value (regarding improved innovation and business-consumer relations). The approach of starting with the basic definition and discussion of the topical concepts will offer the audience and the presenter a good background of what the topic is about following which the association of the topical concepts will be well developed and understood by all especially with the incorporation of visual figures and datasets to compliment the discussed theory. In the end, the presentation, by applying the proposed approach, will help meet the stipulated purpose of the presentation as it a shall have addressed the link between social media and management and ultimately to business and at the same time having delivered the knowledge and insights to the audience of the presentation in an up-the-ladder technique where the basic concepts shall be built on so as to deliver the point home with a greater effectiveness and more successfully.

SECOND PREFERENCE

THE CHALLENGES AND REWARDS OF IMPLEMENTING RFID IN A SUPPLY CHAIN RE-ENGINEERING PROCESS

The purpose of this presentation is to explore and discuss the major roles of Radio Frequency Identification (RFID) technology in the supply chain process. Alongside the roles, the processes associated with the implementation of RFID shall be outlined following which the encountered challenges rewards of the technology shall be discussed with a brief comparison of the technology with other existing technologies that perform the same function. Also, the presentation will aim at defining the supply chain process within the business sector and how it is managed and re-engineered. In the end, the presentation will play a role in enlightening the audience (together with the presenter) on how the RFID technology is applied in the supply chain re-engineering process and how they can counter the resulting challenges so as to harness the ripped rewards.

The topic will be focused on how the implementation process of the RFID technology in the supply chain process is beneficial to the involved business and explaining the major challenges encountered in the implementation process where mitigating solutions shall be proposed for each challenge. To do this, the presentation will concentrate on expounding specific subtopics starting from definition levels and on to the interrelations of the defined concepts. The anticipated subtopics to be covered in the presentation, in the order in which they will appear in the presentation, include: definition and history of supply chain management; enablers of the supply chain; definition and history of Radio Frequency Identification and a brief insight into similar technologies; components, standards and frequencies of RFID; steps of implementing RFID in supply chain; rewards of implementing RFID in supply chain; challenges of implementing RFID in supply chain; recommended mitigating practices of the challenges facing RFID. Since the RFID are meant to re-engineer the supply chain and thus cut on costs incurred within the supply process (Coustasse et al., 2013; Nash, 2010), this presentation will concentrate mainly on the role how efficiency and quality of services have improved especially in the hospital sector businesses. For the presentation to be substantial, definitions and background necessary to clarify the topic and enhance delivery to the audience will be done for each concept and the ultimate recommendations drawn from the association of the concepts. The presentation will employ an approach in which relevant definitions will be provided; visual representations of relevant content such as a representation of the RFID system will be included; a link between the RFID and the concept of supply chain management developed; and not to forget the ultimate discussion of the challenges and rewards of the technology within a supply chain process due to use of RFID technology will be given. As a result, the purpose of establishing the common challenges and rewards of RFID technology will be communicated in an effective manner where relevant recommendations shall be proposed applicable to the business world and enlightening to the audience. In a nutshell, the anticipated approach of delivering the presentation will help tackle the topic of interest in full providing important knowledge and insights to the presenter and the audience not only of not only the RFID technology but also the management of the whole supply process. Consequently, the approach will exhaustively achieve the initially stated purpose of the presentation.

THIRD PREFERENCE

HOW HIPAA AND OTHER SIMILAR MANDATES AFFECT THE INFORMATION SYSTEMS OF SMALL RURAL HOSPITALS

The purpose of this presentation is to illustrate how the informational systems of rural hospitals are transformed by the adoption of mandates such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and others such as Health Information Technology for Economic and Clinical Health Act (HITECH). Specifically, the presentation will focus on small hospital facilities located in the rural areas since they are believed to have a lesser disposal to both technological and financial resources which are the major requirements for a successful adoption of the studied mandates. In the end, the presentation will be aimed at informing the audience and the presenter the conditions under which the small rural based hospitals operate in as far as their information systems are concerned and the enactment of the HIPAA and other similar mandates are concerned.

As the topic indicates, it will be solely based on studying the mandates encouraging the use information technologies to impact the information systems of small rural based hospitals. The presentation is expected to cover the topic based on the subtopics: state of small rural hospitals; overview of use of information technology in the small rural hospitals; challenges facing small rural hospitals; HIPAA and other mandates (HITECH) definition and history (overview); role of HIPAA and other mandates in the health sector; needs for integration of mandates in the health systems; compliance with HIPAA and implementation issues; and impacts of HIPAA on the information systems of the health (the topics are arranged in the order with which they shall be arranged in the presentation). For instance, borrowing from academic sources such as Having and David (2007) the regulations imposed by the HIPAA on privacy; electronic and security signature of health institution in terms of technical data security services and technical security mechanisms; and the impact of HIPAA on standards for financial and administrative health care transactions will be highlighted in the presentation. To add on that, the factors required for a facility to comply with HIPAA will be outlined including the technological and financial requirements for the institutions will be determined. In other words, the presentation will employ the approach of introducing the state of the small rural hospital and unfold into how the facilities have progressed in incorporating information technology in their functions such that the need for HIPAA and similar mandates arises. Eventually, the HIPAA shall be focused on including how far it has been incorporated into the health system which will provide a perfect picture of how well and how much it has impacted the health systems information sectors from which relevant conclusions and recommendations shall be offered to for the implementation and adoption of HIPAA mandates in the rural health sector. Notably, this approach will be expected to provide a detailed and all-round study of the role and impact of HIPAA in the health sector with the ultimate role of meeting the aforementioned purpose which as can be gathered from the discussed aspects will enable clear exposition of the topic in an effective and efficient manner both to the audience of the presentation and the presenter. With the bigger picture concerning the HIPAA outlined, it shall be easy to establish exactly what impacts the mandate has on the small rural hospitals which could be used to generalize on the impact that similar mandates have born to the same facilities thus accomplishing the purpose of this presentation effectively.

 

References

Coustasse, A., Tomblin, S., and Slack, C. (2013). Impact of Radio-Frequency Identification (RFID) Technologies on the Hospital Supply Chain: A Literature Review. Perspectives in Health Information Management, 1-17.

Dong, J., Q. and Wu, Weifang. (2015). Business Value of Social Media Technologies: Evidence from Online User Innovation Communities. Journal of Strategic Information Systems, 24, 113-127.

Having, K., and Davis, C., D. (2007). HIPAA Compliance in U.S. Hospitals: A Self-Report of Progress toward the Security Rule. Perspective in Health Information Management, Volume 4. Retrieved 13th July 2017. From https://www.perspectives.ahima.org/hipaa-compliance-in-us-hospitals-a-self-report-of-progress-toward-the-security-rule/

Have the same topic and dont`t know what to write?
We can write a custom paper on any topic you need.

Request Removal

If you are the original author of this essay and no longer wish to have it published on the collegeessaywriter.net website, please click below to request its removal: