The article "Security Practices and Regulatory Compliance" written by Dr. J. Kwon and M. E. Johnson and published in the September 6th 2012 issue of the Journal of the American Medical Informatics Association offers a good overview of this issue. According to the authors' research, the four main areas most relevant to modern data management systems in the medical field are safeguarding information, auditing processes, Human Resources management, and Third-Party agreements.
While the authors found few significant differences between ...
This solution highlights some of the security measures that healthcare organizations use to protect their data management systems.
Security and the Supply Chain
Read the sources referenced on the Background page. Then, respond to the following questions:
1. Is a security-oriented culture, with respect to the supply chain, just good business? Explain.
2. What are the benefits of viewing security issues beyond the individual firm?
3. Why is RFID technology viewed by many to be an important tool in securing a supply chain?
4. Which of the 10 security competencies discussed in the Closs, Speier, Whipple, and Voss article are likely to be the most challenging to implement? Why?
Display an understanding of how terrorism, and other international developments, can threaten global logistics. Discuss measures that can be taken to reduce these threats.
Blanchard, D. (2006 Dec.) Protecting the Global Supply Chain, Industry Week, Cleveland: Vol. 255, Iss. 12, pg. 43, 2 pgs. [ProQuest doc ID: 219748947]
Closs, D, Spier, C, Whipple, J, M. & Voss, D. (2008 Sep) A Framework for Protecting your Supply Chain, Logistics Management (2002) Highland Ranch: Vol.47, Iss. 9; pg. 45, 1 pgs. [ProQuest doc ID: 197209740]
Sheffi, Y (2001) Supply Chain Management Under the Threat of International Terrorism, International Journal of Logistics Management, Ponte Vedra Beach: Vol. 12, Iss. 2; pg. 1, 11 pgs. [ProQuest doc ID: 235866128]
Suder, G, & Czinkota, M. (2005 Fall) Towards An Understanding of Terrorism Risk in the MNE, Multinational Business Review, Detroit: Vol 13, Iss. 3, pg. 3. [ProQuest doc ID: 194181282]
Zalud, Bill, (2010 May) Every Link in the Chain, Security, Troy: Vol. 47, Iss.5; pg. 28, 3 pgs. [ProQuest doc ID: 197786976]