Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Please write a discussion. "A Technique for Architecture and Design" is attached.

Question :

Review this week's reading A Technique for Architecture and Design and select one of the points the author discusses and explain, in your own words, why it is important and relevant to translating the design specifications into the physical architecture. Provide an example of that would illustrate or justify your position.

Please write a short response to the following discussions:

Response 1:

After reading the article, I believe that identifying the architecture objectives are important to translating the design specification into the physical architecture. The author has three key points that need to be considered when identifying the architecture objectives,

1) identify your architecture goals at the start,

2) identify who will consume your architecture and

3) identify your constraints.

(Meier, et al., 2009) Identifying the architecture goals first will help you determine what you need to do during each phase and how much time should be spent during the phase

. For instance is the architecture just for researching potential paths, you may spend more time doing research than actually building an architecture. Next, you need to identify your audience that way you can cater your results to them in a way they will understand. Finally, it is important to identify all your constraints to ensure you do not exceed your technology options, usage, and deployment timeline.

Identifying your architecture objectives first will help ensure that your project focused on the goal and letting you know who the end users will be for your architecture and know your constraints. These elements are critical for building an architecture that will be beneficial to the consumers, the organization, and other stakeholders.

Response 2:

Without use cases and scenarios it can be difficult to gain a full understanding of the purpose of a system. Use cases also come in handy during the testing and training phases. They lay the groundwork for understanding how a system is expected to work, and give an IT professional insight into how the system will be utilized, which helps to answer questions surrounding input and output in the process. The knowledge gained through the creation of use cases can be used during the remaining phases of implementation.

For instance, in working with one electronic health record, after interviewing front desk personnel, it was discovered that a workflow for entering and rescinding patient releases of information was more complex considering patient signatures were required, as well as documented evidence when a release was rescinded. Due to a number of regulatory requirements preventing fraud, documents usually cannot simply be deleted from patient records, and if altered require audit trails including time, user information, and reason for the change (Integrity of the Healthcare Record: Best Practices for EHR Documentation (2013 update), 2013).

As a result of this information, the front desk personnel would have the patient sign and complete the release and scan into the record. For releases that were no longer valid, the staff would print out the old release, date and VOID the release, and scan back into the record, and amend the previous record. This use case demonstrated the inputs, outputs, people and processes required of the system design.

Attachment:- chapter_4.rar

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92361661
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Management Information System

Enterprise architecture framework research paper

Enterprise Architecture Framework Research Paper Assignment Purpose of this Assignment This assignment gives you the opportunity to apply your research skills, analysis, and critical thinking skills to describe one of th ...

Please respond to student 150-250 words do you agree or

Please respond to student 150-250 words ...do you agree or disagree One of the concepts that were interesting to me was the idea of bulletproof hosting that was mentioned in the Video "The Most Dangerous Town on the Inte ...

Assignmentthere is a specialization area within information

Assignment There is a specialization area within information security referred to as cyber defense. This specialization has focus in particular on the outer edge, or border, of trusted network and on security across the ...

Assignmentorganizational risk management policy does not

Assignment Organizational risk management policy does not occur in a vacuum; rather it is the result of perception, experiences, and governmental mandates, which all comprise the risk environment of the organization. Thu ...

Discussfor this assignment research a company large or

Discuss For this assignment, research a company, large or small, that has taken advantage of the recent technological advances developed in information systems to grow the E-commerce-side of the business. In what ways ha ...

Choose your roadmap to certification part 2 federal

Choose Your Roadmap to Certification Part 2: Federal Information Security Modernization Act (FISMA) Compliance In this assignment, students will review the federal work sector requirements and executives/organizations pr ...

Assessment instructionsin this assessment you will debug

Assessment Instructions In this assessment, you will debug and fix a given Java console application that uses two dimensional arrays, but the application does not compile nor execute. Your program output should look like ...

Deliverables one ms word that must include an

Deliverables: One MS Word that must include an APA-formatted cover sheet. Step One - Part A: Identifying the Variables Review Chapter 17, Healthcare Data Analytics in the Oachs textbook for definitions of variables. An i ...

Since osi model is a virtual model based on your reading

Since OSI model is a virtual model; based on your reading this week, why do you think the data communication industry would use the layered OSI reference model? What does modeling mean to you? How would you model somethi ...

Answer the following questions 1 discuss in 500 words how

Answer the following Questions : 1) Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As