RISK MANAGEMENT

Running Head: RISK MANAGEMENT 1

RISK MANAGEMENT 2

Risk Management Program

Liliana Faura

GCU

3/29/2020

Risk Management Program

Introduction

The healthcare sector just like other sectors faces numerous risks that may affect the functionality of an organization if they were to occur or materialize. One such risk and which forms the basis of this paper is physical security. Physical security is crucial to the safety of the personnel, hardware and software found within a healthcare setting (Alguliyev, Imamverdiyev & Sukhostat, 2018). However, certain internal and external factors such as theft, manmade catastrophes, accidents, vandalism, and natural disasters among others may cause very serious damages and loss to a healthcare facility (World Health Organization, 2017). Given the potential damages that can occur to a healthcare facility due to physical security breaches, the topic is very important.

Rationale

As observed in the introduction, health facilities face many threats to their physical security. Despite this many healthcare facilities’ risk management programs increasingly focus on ensuring prevention of the threats that are considered more technical such as the prevention of malware and cyber-attacks especially since the advent and spread of digital technologies (World Health Organization, 2017). Given this, the purpose of the proposed risk management education program is to equip the employees with the knowledge to not only identify potential threats to physical security but also on the reporting mechanisms and the immediate responses to any breach in physical security.

Support

According to Peltier, (2016), physical security is a very crucial yet ignored topic when it comes to risk management in the health sector. This is because it forms the basis through which healthcare facilities can ensure the protection of all other information technologies, personnel and even patient. Moreover, unlike most threats that occur to a healthcare facility, physical security is very easy to breach unless a facility has taken adequate protective and preventive measures (Fennelly, 2016).

Employees within a healthcare facility constitute crucial stakeholders in the management of physical security risks. This is because not only do they contribute to many physical security breaches through accidents, vandalism and even theft but can be very useful in detecting potential threats to physical security and initiating recovery measures in the event of a disaster (Fennelly, 2016). Training employees on physical security is therefore very important in ensuring quick and efficient recovery from disasters and even prevention.

Implementation

The education risk management program will be implemented using the steps described in the preceding section. First, the organization will communicate the purpose of the program to all employees as a basis for obtaining support towards it and ensuring clarity regarding the objectives and expectations of the program (Müller, Strukava, Scholl, Härter, Diouf, Légaré & Buchholz, 2019). Secondly, the implementers will seek approval and identify the required resources for implementing the program. Once this is achieved, the program implementers will select employees to take part in the training and who in turn will be expected to train other employees within the organization (World Health Organization, 2017). This will reduce the time and costs required to implement the program saving the organization crucial resources.

Expected challenges

The main challenge that is expected some resistance from employees since they have been used to acting in a given manner. However, though clear communication and engagement both in the development and implementation of the program the challenge will be addressed. In ddiyion, the program may face certain resource constraints which however can be addressed through partnerships and management support.

Evaluation.

Data on the implementation of the project will be continuously collected. Subsequently, indicators of the expected outcomes will be developed (Peltier, 2016). These indicators will be measures against the actual outcomes from the program to check whether it has met its expectations and within the planned and available budgets or resources.

Opportunities

Besides training employees on physical security, the organization can implement training programs on the protection of technologies and software to safeguard it from any potential beaches in future hence reducing the costs associated with risk mitigation and management.

References

Alguliyev, R., Imamverdiyev, Y., & Sukhostat, L. (2018). Cyber-physical systems and their security issues. Computers in Industry100, 212-223.

Fennelly, L. J. (2016). Effective physical security. Butterworth-Heinemann.

Hopkin, P. (2018). Fundamentals of risk management: understanding, evaluating and implementing effective risk management. Kogan Page Publishers.

Müller, E., Strukava, A., Scholl, I., Härter, M., Diouf, N. T., Légaré, F., & Buchholz, A. (2019). Strategies to evaluate healthcare provider trainings in shared decision-making (SDM): a systematic review of evaluation studies. BMJ open9(6), e026488.

Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications.

World Health Organization. (2017). Patient safety: making health care safer (No. WHO/HIS/SDS/2017.11). World Health Organization

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"