This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Management

Risk Management Approaches

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Risk Management Approaches

Looking back at the turn of the century, I recall observing the earlier versions of mobile phones, PDA’s and tablets, and it is predicted that soon mobile devices will eventually displace the use of personal computers in the healthcare industry. Would the devices only get lighter, smaller, more powerful, and cheaper. It would subsequently require businesses such as Ventana Medical Systems, a USA based Instrument Reagent Systems manufacturer, developer and market, and part of the Roche Diagnostics Division to have to shift to the use of mobile devices in the workplace.

And here we are. It is, as detailed by Veterans Affairs, expected that mobile devices would soon be widely applicable in healthcare services, even replacing the use of desktop computers. Powerful tablets and smartphones are getting distributed everywhere. Nurses, physicians, and other professionals are using them on a routine basis (Andersen, 2019). This aspect can prove to be beneficial to Ventana Medical Systems in their quest to providing treatment and diagnosis on several infectious diseases and cancer. By promoting remote working culture in the business.

As such, in deploying their mobile device management system, it is recommended as all organizations should, Ventana medical systems must select the appropriate risk management approach applicable, practical, and goal-aligned with their business needs. Every business project gets faced with a considerable amount of risks from its instigation to its end. A risk may or may not always be unforeseen and can become a significant threat or opportunity for the organization. As such, I would recommend the use of the Top-Down multi-pass process, as an example of a risk management approach.

The central ideology behind the use of this approach is that the main objective of the procedure requires the organization to have a high level of understanding concerning the project. It being the deployment of a mobile device management system in this case. The Top-Down multi-pass process emphasizes the need for the organization to address some of the critical questions which will require a risk-based decision. For instance, the business should be very aware of the security protocols to be put in place to ensure the organization’s sensitive data and information remains secure, such as HIPAA and NIST security frameworks.

The need for mobile security and safety cannot be emphasized enough. Just taking a close look at some of the significant health information breaches, one can recognize that a majority of those incidents have often involved stolen or lost unencrypted user devices, most preferably mobile devices (DuHadway, 2019). The health industry has a long way to go in securing their mobile devices, as well as taking a more in-depth and careful consideration of whether it is ethical to store patient personal information on mobile devices in the first place.

The top-down multi-pass process is designed to help cover a majority of such questions. Key risk questions are allowed to change after passing one phase of the risk management process going into the next stage, often dependent upon the gathered insights from the previous pass. Every pass presented in each process should be set to uniquely feature all of the identified challenges and threats pertaining to that particular process. Additional advantages of the Top-Down multi-pass process include;

 

 

 

References

Andersen, T. J., & Sax, J. (2019). Strategic Risk Management: A Research Overview. Routledge.

DuHadway, S., Carnovale, S., & Hazen, B. (2019). Understanding risk management for intentional supply chain disruptions: Risk detection, risk mitigation, and risk recovery. Annals of Operations Research283(1), 179-198.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask