Analyze vendors who compete in the hit software

Assignment Help Management Information Sys
Reference no: EM131740697

Assignment: Choosing an HIT Vendor Solution

It is very typical for leaders and their staffs to explore market capabilities when it comes to looking for viable and feasible partners who provide health technology solutions.

When examining vendor products, be they software, hardware, or other technologies, it is important to examine not only the vendor sales literature but also objective industry analysis as well.

This process is collaborative and has many dimensions that include looking at the technical, financial, and functional aspects of technology solutions.

As a health care administrator you will collaborate with other leaders such as CIOs, operations managers, CFOs, and CMOs in the analysis of Health Information Technology (HIT) vendor software solutions.

Keeping in mind both the tactical problems that your organization is facing and your organization's overall strategic direction, you will analyze vendors in the marketplace and the HIT products that they sell.

For this two-part Assignment, analyze vendors who compete in the HIT software marketplace using the Independent Physician Office Ambulatory EMR Scenario in your Learning Resources.

After assessing the capabilities and limitations of at least three possible vendor solutions, for Part 2, you will make a recommendation to your leadership team colleagues on which one or two vendors you would feel most comfortable progressing toward the next steps of system acquisition.

Keep in mind that choosing two solutions allows the organization to have potential leverage in negotiations. If your recommendation is one vendor, how do you justify this recommendation?

To Prepare for this Assignment:

Review the Independent Physician Office Scenario in your Learning Resources.

The Assignment-Part 1: Compare and contrast the strengths, weaknesses, opportunities, and threats (SWOT) of three vendors offering an ambulatory Electronic Health Record to independent physician practices.

Construct a table that summarizes your SWOT analysis with an accompanying reference page listing any external resources used in your analysis. Comparisons should include quantitative/evidence-based information as well as qualitative.

Note: The following table is an example of what to construct for Part 1.

Vendor: (Consider Functional, Technical, Operational, and Strategic for each element of the SWOT)ABCStrengths Weaknesses Opportunities Threats

The Assignment-Part 2: Write a 2-page executive summary outlining the one or two IT vendors that you recommend engaging for further acquisition activities such as stakeholder demos and request for proposals. The executive summary should be addressed to the members of your fellow executive leadership team.

Be sure to clearly outline the strategic, operational, technical (IT) requirements, and market reasons for your recommendation. If you are recommending one vendor, justify your strategy to handle the organizations' anticipated loss in negotiating leverage.

Note: You should submit both parts as one document, with Part 1 being an appendix to your executive summary. Your Assignment should show effective application of triangulation of content and resources to show your conclusion and recommendations. See the Week 2 Assignment Rubric for additional requirements related to research and professional writing.

Reference no: EM131740697

Questions Cloud

Discuss basal readers are used exclusively : if conducting a group with 2 and 3 year olds their group participation may depend on
Describe what is meant by decentralization : Describe what is meant by decentralization. Give examples of specific companies and how they choose to decentralize their operations.
Discuss incidents in the life of a slave girl : Having read this, what do her carefully chosen words in this passage tell you about her view of America and of herself
Measure of ph of the acidic solution : What is the pH of a 0.062M HBr aqueous solution that completely dissociates in water? (with correct decimal places, sig figs, and logarithms and the molarity
Analyze vendors who compete in the hit software : Analyze vendors who compete in the HIT software marketplace using the Independent Physician Office Ambulatory EMR Scenario.
Define what is the nature of the counsel that siduri : What is the nature of the counsel that Siduri, the winemaker and celestial barkeep in Gilgamesh, gives him
Find the relative maxima, minima for the given function g : Find the relative maxima, minima for the given function g(x,y)=1/(x2+y2)
Create a fictitious company a brief description : Accounting Information Systems Assignment- Create a fictitious company A brief description about the company, including industry information and products.
Write a critical analysis of war prayer : Write a critical analysis of "War Prayer" by Mark Twain. Many are quite straightforward. Psychological

Reviews

Write a Review

Management Information Sys Questions & Answers

  Define the service level agreement

Your customer has asked you to define the Service Level Agreement (SLA).Write a 2- to 3-page paper that defines the components required in the SLA.

  Discuss about the need of it security

Pick one of the videos and write a response to it. It doesn't have to be long but should be about 2 - 4 paragraphs.

  Perspective of current hot topics in information security

To build an understanding and perspective of current hot topics in Information Security; and To build generic skills including, but not limited to: a capacity for teamwork and collaboration; an ability for critical thinking, analysis and problem solv..

  What is bob best-selling product by total sales

Who is Bob's best customer by total sales? Who is Bob's worst customer by total sales? Who is Bob's best customer by total profit? Who is Bob's worst customer by total profit?

  Discuss about the business intelligence component

Discuss about the ISM Triangle Alignment, ISM Matrix & Infrastructure and Business Intelligence Component.

  Discussion of the information used in the system

A discussion of the information used in the system, A discussion of any information security and ethical concerns with the system, A diagram of the information flow and any elements controlling proper access to the information it uses

  Describe how google uses information to make money

How Does Google Make Money? This video explains how Google uses information to make money. Google collects information from websites and adds it to its search engine.

  Suggest a significant advantage of researching information

Create a scenario that demonstrates the empowerment of health information seekers. Provide support for your rationale.

  Create a gantt chart illustrating the project tasks

As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity rea..

  Describe the comparisons you made for each of the computers

In a 1-2 page paper, describe the comparisons you made for each of the computers. Which computer did you pick and why did you pick that particular one (include a description of the computer from the website)

  Research on the security implications of hippa requirements

Discuss the major types of security mechanisms that must be in place to ensure hospital compliance with HIPPA requirements.

  Technology is an important component of the business

technology is an important component of the business environment.describe how technology is changing the competitive

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd