Wednesday, February 26, 2020

A GIS process to select a suitable site for locating a hospital in Literature review

A GIS process to select a suitable site for locating a hospital in London where ambulances can reach people within 10 minutes - Literature review Example The site should be big enough to accommodate a hospital with about 7000 rooms where about 800 beds can be placed and more than fifty two thousand hospital equipment and furniture. The stated rooms can appear to be incredibly many but with rooms needed for emergencies, offices, rehabilitations, outpatient and inpatient services; they cannot be enough. A site accommodating such a hospital ought to be as big as forty football pitches to ensure that there is even available space for hospital employees and patients’ families parking. Additionally, the hospital prospected has to have a number of towers to save on cost and land. Currently, most hospitals have to deal with congestion and extreme struggling incase more facilities are needed. Having a lot of land like that stated above ensures that the hospital can build all facilities required. Expansion of hospitals after their construction is always an unavoidable act. For this reason, there is a need of buying land as big as the one stated above to cater for expansion in the later years1. London has four major parts that include the southwest London, southeast London, northeast London and north central London. According to statistics, there are about twenty hospitals in each stated part but most are not newly build. Among these hospitals, a number are faced with difficulties of managing cleanliness. In choosing a site for constructing a hospital, it is essential to ensure that the site is near to multiple sources of water and power. It is essential to realize most hospitals around the London town centre are faced with problems related to water shortages since they did not take precaution during construction. Some locations may have all the other qualities but lack water. This should not be such a major problem since there are artificial build wells and boreholes that can supply the hospital with enough water.

Monday, February 10, 2020

IT Security Essay Example | Topics and Well Written Essays - 1000 words

IT Security - Essay Example For any information system to be operational, government mandated compliances need to be undertaken by the chief information officer (CIO) and government officers. For a system to pass these security compliances it must meet the criteria set for; the system boundaries for the hardware, software, users and interactions with the environment must be clearly defined so as to assess any threats. Therefore, a CIO must provide a plan of action for the system and also state any contingency measures needed in the case of a security threat. Moreover, the chief information officer then gets certification and accreditation from the government once this is achieved (Enloe, 2002). Information systems are required to be secure in order to facilitate business success and their resilience in the changing information society. This means that a CIO ought to ensure that the system is secure enough to deliver vital information and services at the right time with no compromise. This is because secure syst ems increase public confidence and trust in the organization and in their products or services. Information security also ensures that performance of all the stakeholders in the organizations from management to junior staff is effective (Bowen, Chew and Hash, 2007). In addition, security also reduces the chances of risk to the organization and protects the integrity of the information or data stored in the organization. In the design of an information system, the CIO needs to be aware of information security elements, which must be in line with government mandated compliance. Moreover, considering that security planning of a system it is very important for a CIO to know who accesses the system at any time, and thus, the role of an information system officer in the system needs to be understood and clearly defined (Enloe, 2002). The authorizing officers in the organization and other users including the management need to be issued with access codes for authorization. Through this he will track and know who accessed the system at what time and which information was accessed or modified with use of these codes. The CIO should provide the management with the capital estimates required in running and maintaining the whole system and the time required to change or upgrade the system. In addition, he must conduct awareness and training campaigns on the whole organizations. This is to educate the users of a system on the different types of security threats present and how to evade them. Thus, a CIO is required to conduct risk assessment for the organization management, and explain to the personnel and management how the system will meet the organization’s mission and goals (Enloe, 2002). To this effect, the CIO must design a system that provides as stated in NIST: â€Å"Information security protection from unauthorized access, use or disclosure, disruption and modification of information.† The system must also comply with the standards set up for policie s, procedures and guidelines by national law and legislations. The CIO is also responsible for developing and maintaining agency wide information security programs, policies and control techniques for the organizations systems. Moreover, he is required to develop disaster recovery management program, to