MOBILE PHARMACY Harriet Carter – October 12, 2014 Wilmington University - EDT 6005.

Slides:



Advertisements
Similar presentations
Infrastructure Services. Introducing Al-Futtaim Technologies One of the regions leading System Integrators Strong partnerships with leading global ICT.
Advertisements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Offshore Transmission Giles Stevens Head of offshore electricity transmission.
EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
Which server is right for you? Get in Contact with us
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Mission, Aims and Objectives
Chapter 3 Ethics, Privacy & Security
Built on the Powerful Microsoft Azure Platform, Nimble Schedule Streamlines and Automates Scheduling with Cloud-Based Mobile Services MICROSOFT AZURE ISV.
November 2009 Network Disaster Recovery October 2014.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
Securing Information Systems
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
Summer-DISC 6341© Andrew Schwarz, 2002Slide 1 Lecture 7 Session 1 Integration in a Complex Environment.
Business Continuity for Facilities Managers Peter Carr FastTrack Solutions Ltd
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
1 Our Expertise and Commitment – Driving your Success An Introduction to Transformation Offering November 18, 2013 Offices in Boston, New York and Northern.
Joseph Ferracin Director IT Security Solutions Managing Security.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
IT in the Swedish public sector Britta Johansson
Anderson School of Management University of New Mexico.
Dell Connected Security Solutions Simplify & unify.
7 Information Security.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
CUONG NGUYEN PRIYA PAKHANAVAR RUSSELL ROBINSON RPC Hotels.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Microsoft Office 365 Proposal Presentation
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
An Airlines and Tour management application. Business Overview  This App will be developed for emerging travel enterprises that wish to enter into the.
Take Control of Your Contracts with Dolphin 365, a Companion Product to Microsoft Office 365 That Leverages Your Investment and Reduces Risk OFFICE 365.
Online Security Myths & Challenges HIGHER COLLEGES OF TECHNOLOGY Abeer Nijmeh Account Manager April 14, 2002.
SDN & NFV Driving Additional Value into Managed Services.
Securing Information Systems
With Office 365, Collaborative Solution by Qorus Streamlines Document Assembly and Enhances Productivity for Any Business-Critical Documents OFFICE 365.
Securing Information Systems
STEPS TO A CLOUD READY DATA CENTER
ESign365 Add-In Gives Enterprises and Their Users the Power to Seamlessly Edit and Send Documents for e-Signature Within Office 365 OFFICE 365 APP BUILDER.
Utilize Internal Data via Mobile Business Apps
Uniting Office 365 and PRINCE2, UPrince and Project Online Make Managing Structured Projects More Efficient Without Increased Overhead Costs OFFICE 365.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
CHAPTER 4 Information Security.
Securing Information Systems
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
PostBeyond Delivers an Enterprise Solution That Strengthens Communications with Employees and Integrates Seamlessly with Microsoft Office 365 OFFICE 365.
Office 365 Integration Enables WebUntis Users to Sign in Using Office 365 Account Information and to Export WebUntis Timetables Directly to Outlook OFFICE.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Oregon Prescription Drug Monitoring Program
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
Cloud Consulting Services and Solutions
Cloud Computing LegalRun Solutions Why It’s Right for You!
Presentation transcript:

MOBILE PHARMACY Harriet Carter – October 12, 2014 Wilmington University - EDT 6005

Problem Statement Flexibility Time saving Helping disables Providing medicines from the nearest located store

Project solution Mobile Pharm App (GPS enabled) Enables customer to buy prescribed drugs from nearest pharmacy in low price This App allows customers to upload and refill their prescriptions Provides both home delivery and pick-up at store options Collaborating with CVS and Walgreens pharmacy stores across the United States

 SCOPE OF PHARM APP Pharmaceuticals being a Vast Growing Industry, it’s Utilization & Services are enhanced effectively.

 GOALS AND OBJECTIVES

 CONDITIONS Submit his/her own identity card for security reasons. Prescription details have to be clearly visible. Time or date intimated for delivery of medicines is just an estimation.

Data Flow Diagram:

 ORGANIZATIONAL IMPACTS Consumer Impact. Environmental Impact.

 ISSUES Operating smart phones for old aged group Intrusion of Malware, viruses which may corrupt App.

 PROJECT RISKS Investment. Customer loyalty.

 ASPECTS Business. Technical.

Use cases

 ASSUMPTIONS CVS and Walgreens signed to work together. CVS and Walgreens also agreed to collaborate with few other pharmacy firms.

 CONSTRAINTS Experienced employees. New generation technology.

Security Authentication and password security Antivirus/Malware protection Firewalls Demilitarized zone (DMZ) Virtual Private Network (VPN) SSL Cryptography

Network Solution

Disaster Recovery Identify all threats Natural threats Technical failure Human threats Develop mitigation strategies Create Business Continuity Planning (BCP) Hot site with Sun Guard Arrange data back up with AWS Back up generators

PROS:  Provides an improved home delivery system for medicines.  Sales of CVS and Walgreens can be improved gradually. CONS:  Doesn’t work efficiently when customer destination is far away for both CVS and Walgreens stores.  Doesn’t function when customer is unable to use a mobile.

Saving a second can save a life..!

CEO Harriet Carter Wilmington University - EDT 6005 October 12, 2014