SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Goal: Provide efficient, fair
                                                    Customer care


 Goal: Patients
    should                Goal: Legal          Goal: Patients                 Goal: Patients
                         Requirements                                                                   Goal: Costs
   wait for a                                     Satisfied                    Should be
                       Should be fulfilledv                                                            Should be low
   short time                                    With results                 Well informed
                                          threat


                         Goal: Privacy
  Goal: Strong                                                         Means: Improving                      threat
                          Should be
  cooperation                                                              The IS
                          protected

                                                   Infl.: Patient
                      threat                      Access has to
                                                    be logged                                        Means: Make use of
                                                                                                         standards

 Goal.: Patients                                                                               Negative impact
 Directly referred        Infl.: People are      threat
To priv specialists                                                                      Means: Introduce
                            conservative
                                                                                          secure system


                                    Means: Heavy
                                   Investment in IT                Means: Introduce                Means: Introduce
                                                               Authentication mechanisms           Logging function

Contenu connexe

Plus de pajo01

Enterprise2
Enterprise2Enterprise2
Enterprise2
pajo01
 
Tenta I S1dec08
Tenta I S1dec08Tenta I S1dec08
Tenta I S1dec08
pajo01
 
I S1 Lesson3 Solution Sketch
I S1 Lesson3 Solution SketchI S1 Lesson3 Solution Sketch
I S1 Lesson3 Solution Sketch
pajo01
 
Processes I S1 H T08
Processes I S1 H T08Processes I S1 H T08
Processes I S1 H T08
pajo01
 
K K I S109
K K I S109K K I S109
K K I S109
pajo01
 
I S1 Lesson2 Solution Sketch
I S1 Lesson2 Solution SketchI S1 Lesson2 Solution Sketch
I S1 Lesson2 Solution Sketch
pajo01
 
Tenta I S1okt09 New
Tenta I S1okt09 NewTenta I S1okt09 New
Tenta I S1okt09 New
pajo01
 

Plus de pajo01 (18)

Practice Research
Practice ResearchPractice Research
Practice Research
 
Unified Service Theory and Perspectives on Services
Unified Service Theory and Perspectives on ServicesUnified Service Theory and Perspectives on Services
Unified Service Theory and Perspectives on Services
 
BPM in crisis
BPM in crisisBPM in crisis
BPM in crisis
 
Tharaka phd presentation2010
Tharaka phd presentation2010Tharaka phd presentation2010
Tharaka phd presentation2010
 
Mturi licentiate presentation
Mturi licentiate presentationMturi licentiate presentation
Mturi licentiate presentation
 
Göran Goldkuhl on Practice Research
Göran Goldkuhl on Practice ResearchGöran Goldkuhl on Practice Research
Göran Goldkuhl on Practice Research
 
2:a generationens sociala medier
2:a generationens sociala medier2:a generationens sociala medier
2:a generationens sociala medier
 
Enterprise2
Enterprise2Enterprise2
Enterprise2
 
Social Media KTH X
Social Media KTH XSocial Media KTH X
Social Media KTH X
 
Design Science Introduction
Design Science IntroductionDesign Science Introduction
Design Science Introduction
 
Anchor Modeling ER09 Presentation
Anchor Modeling ER09 PresentationAnchor Modeling ER09 Presentation
Anchor Modeling ER09 Presentation
 
Tenta I S1dec08
Tenta I S1dec08Tenta I S1dec08
Tenta I S1dec08
 
I S1 Lesson3 Solution Sketch
I S1 Lesson3 Solution SketchI S1 Lesson3 Solution Sketch
I S1 Lesson3 Solution Sketch
 
Processes I S1 H T08
Processes I S1 H T08Processes I S1 H T08
Processes I S1 H T08
 
K K I S109
K K I S109K K I S109
K K I S109
 
I S1 Lesson2 Solution Sketch
I S1 Lesson2 Solution SketchI S1 Lesson2 Solution Sketch
I S1 Lesson2 Solution Sketch
 
Tenta I S1okt09 New
Tenta I S1okt09 NewTenta I S1okt09 New
Tenta I S1okt09 New
 
Value Encounters by Hans Weigand
Value Encounters by Hans WeigandValue Encounters by Hans Weigand
Value Encounters by Hans Weigand
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

I S1 Lesson1 Solution Sketch

  • 1. Goal: Provide efficient, fair Customer care Goal: Patients should Goal: Legal Goal: Patients Goal: Patients Requirements Goal: Costs wait for a Satisfied Should be Should be fulfilledv Should be low short time With results Well informed threat Goal: Privacy Goal: Strong Means: Improving threat Should be cooperation The IS protected Infl.: Patient threat Access has to be logged Means: Make use of standards Goal.: Patients Negative impact Directly referred Infl.: People are threat To priv specialists Means: Introduce conservative secure system Means: Heavy Investment in IT Means: Introduce Means: Introduce Authentication mechanisms Logging function