knowledge management and information mining providing features at each stage of

Knowledge management and information mining providing

This preview shows page 7 - 10 out of 22 pages.

knowledge management and information mining, providing features at each stage of a data’s life cycle, from understanding the business requirements to follow-up evaluations. For an effective data life cycle plan, organizations needs to identify a data custodian whose primary role is the day-to-day data manager. Management plays a key role as well to enforce and approve of data classification and destruction of critical data. The stages recommended are listed below along
Image of page 7
TELECONSULT AND ITS CONTENT MANAGEMENT STRATEGY 8 with further description of each of the requirements. The business cycle is iterative and a living document to allow for change management as part of the process. Stages 1. Business requirements 2. Planning 3. Development 4. Review 5. Implementation 6. Follow-up Business Requirements Medical TeleConsult is compliant with ISO 9001-2000 standards and Lean Six Sigma certified with more than 200 business analysts and data engineers that provide in-depth support through the entire business life cycle. Understanding the business model helps to align data management programs help facilitate the medical and dental organizations’ priorities without hindering existing processes. Planning Planning is a comprehensive process that requires all major stakeholders. It is absolutely necessary to have executive leadership oversight in the planning and approval for the planning and the rest of the process is aligned with business process and timelines. Development Once the business requirements and initial planning is complete, TeleConsult can apply their expertise and consult with the stakeholders of the medical professional workforce to assist the organization in developing a formal content management plan. TeleConsult will also offer
Image of page 8
TELECONSULT AND ITS CONTENT MANAGEMENT STRATEGY 9 awareness training for all workforce on-site as well as through online platforms for maximum audience participation. Awareness training will include data vulnerabilities such as malware, phishing and spamming, as well as how best to secure data across the network. Review The medical organizations struggle with their management enforcing policy on the change management process for data retention since leaving data on the network is a security vulnerability and is open to hackers or inside threats. Management need to identify role players that will guard and be the data custodians. The same role-players involved in the planning and developing of the data management plan will also participate in the review process through a formal review or change management process enforced by senior management team. Implementation Implementation is the enforcement of the approved plan using the below key performance indicators identified; 1. Data Flow Procedure by Content Type 2. Records Management 3. Information Management Policies 4. Workflow Process 5. Data Security Follow-up The follow-up process will come in multiple format, both formal and informal evaluations.
Image of page 9
Image of page 10

You've reached the end of your free preview.

Want to read all 22 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes