Digital Transformation Project – Huisartsenpraktijk Portland

13

October

2016

5/5 (1)

Our team is glad to work with a GP’s office named Huisartsenpraktijk Portland (HP for short) for our Digital Transformation Project. As the basic part of Dutch Healthcare System, general practitioner (GP) has played a crucial role in Dutch Healthcare System.

Following are the key findings by analyzing HP’s business model. Firstly, the standard routine to reach GP is described. At start, patient call the general phone number and the assistants will schedule an appointment using Medicom system, which can be seen by GPs from the system. Then the patient could meet GP at the appointment time (Key Activity). Secondly, the Cost Structure of HP includes renting of the building, the cost of medical supplies, and the largest part: human resources (all assistants) cost. To maintain profitability, it is important to keep costs low, especially the human resources costs. Thirdly, currently, the entire IT infrastructure is done by a software called Medicom and mainly used for administrative functions (Role of IT).  Although Medicom system recently created the option for online self scheduling, this option is still in the beginning phases and has many limits.

In conclusion, we agree that IT could help HP to reduce human resource cost by automatizing  assistants’ main daily task (scheduling and planning ). An Automated online planning system is something HP should add to their business model.

A SWOT analysis is applied for the implementation of Automated online planning system.

屏幕快照 2016-10-13 下午3.35.29

In order to grab the opportunity identified by SWOT analysis, three solutions are proposed.

● Developing this function in Medicom system;

pros: Users don’t need to switch another system.

cons: Medicom is a close sourced system. Changes could only be done by the company developing Medicom.

Developing a stand-alone solution with API (Application Programming Interface, allowing external applications to communicate with another application);

pro: It enables the exchange of information between two systems.

It can be used as a complete stand-alone solution.

pros: GPs and assistants have to use two separate systems.

cons: This is cheaper.

Our recommendation for HP are that they could firstly request Medicom to implement the planning solution into their own system. If impossible, the second recommendation is to use the stand alone version with API.

The new system is able to request basic and planning related patient information;

The new system has a predefined list of complaints a patient can have;

For patients who prefer human contact, the assistant will still be available to schedule appointments.

HP faces several risks such as the decrease of customer satisfaction since the system will not include human factors or interactions. Also, another risk is that Medicom is not willing to cooperate.

Reference:

http://praktijkschouten.nl/

http://www.expatica.com/nl/healthcare/Healthcare-in-the-Netherlands_100057.html

Eva Siccama (381230),

Gaston van de Weijer (374902),

Ge Jiang (386449),

and Beibei Wu (457617).

Please rate this

Gig Economy – Changing the Future of Work

6

October

2016

No ratings yet.

It is said that people tend to change jobs several times throughout their working lives. If this is what you are feeling, gig economy might be something you are waiting for.

Gig economy is a situation that temporary jobs are common; organizations give independent workers short-term working contracts. This trend has begun in many counties. A study predicted that, 40% of American workers would become independent contractors by 2020. That’s because in the digital age, the workforce and jobs are increasingly flexible, with less constrains on the working location and working time. As a result, the free workers are able to choose temporary jobs and projects around the world while the employers could select the workers who are most suitable for a specific project from a large talent pool. Companies also benefit from gig economy by saving resources in terms of benefits, office space and training while works are able to achieve work-life balance and choose the job they really like.

At the moment, several software platforms are there, enabling people to find flexible work. For example, any reasonably driver could find a part time job by plugging into Uber or BlaBlaCar. As a designers or computer programmers, ELance and oDesk are the place for you to get short-term assignments. More than a million “manufactures” go to online marketplace Etsy to sell the jewellery, clothing and toys in their free time. Gig economies pop up across many industries, from short-term rentals (Airbnb) to drafting legal contracts (UpCounsel) to housecleaning (Handy).

What kind of effect gig economy will have on future of work? Work provided by digital platforms might varies from high-skilled, high-paid to low-skilled, low-paid. They might be localized or cross borders, vary from developing countries to developed countries. It has potential to create enormous opportunities both for the global workers and employers. At the same time, governments should regulate the industry based on the thoroughly understanding of the new models of work. Responsible platforms will lead to shape new labor markets and design new social contracts.

Source:

http://whatis.techtarget.com/definition/gig-economy

https://www.theguardian.com/commentisfree/2015/jul/26/will-we-get-by-gig-economy

https://www.weforum.org/agenda/2016/06/gig-economy-changing-work/

https://www.wired.com/2016/01/gig-economy-workers/

 

Please rate this

Using Big Data to Fight Against Communication Fraud

6

October

2016

No ratings yet.

Some of us already have the experience of receiving fraud messages or phone calls, claiming that you win a prize or commit a crime. This is one type of communication fraud. Although most of them can be exposed easily, they still resulted in $18,4 billion lost in 2011.

Below are some examples of communication fraud:

– Compromised PBX and voicemail systems ($4.96 billion): crimes connect to a PBX and steal users’ passwords to make international calls.

– Subscription and identity theft ($4.32 billion): thieves steal users’ accounts and identities to use their communications services.

– International revenue share fraud ($3.84 billion): committed by exploiting high call termination rates into some nations, or manipulate data around certain phone numbers with high call termination rates.

– Credit card fraud ($2.40 billion): using communication network or the website, credit card’s information is illegally accessed.

Accessing channels

As explained by the above examples, this type of fraud is committed by accessing user’s personal information. Lawbreakers get access to user information through two common channels. The first one is the IP network. Internet protocol (IP) enable users to communicate with each other in a cheaper and more flexible way. Moreover, through virtual private networks (VPNs), users can connect to corporate applications and services. However, the safety of most of the IP based services is still questionable, which means that your information might be “open” to hackers when you are doing simple business activities, such as checking emails using a public WiFi network. Besides IP network, smartphone is another entry point for communication crimes. Around 96% of smartphones and tablets do not have antivirus apps installed.

Fighting against Communication Fraud using Big Data

Big Data might become practical when it comes to identify illegal acts in the telecommunication industry at early stage.

– Handset fraud prevention: using big data to determine if the applicant is an organized fraudster who attempts to acquire a subsidized high-end handset.

– Dealer fraud prevention: monitoring sales figures on communication services sold through third parties. This can ensure that thieves are not being paid commissions for artificially inflated handset sales and data plan offers.

– Identity fraud prevention: a secured order entry tool is used to catch any unlawful identity attempts by business and residential applicants.

– Customer identification verification: recognizing customers through various data inputs including name, address, and personal credit history details.

– Bad debt recognition: identifying clients with existing bad debt and making determinations. Based on this method and other financial factors, the communications service provider will then decide to welcome the customer or not.

– Multiple activations fraud prevention: recognizing individuals or companies that attempt to activate multiple services within a brief period.

 

Source:

http://www.lavastorm.com/assets/Analyst-Report-Using-Big-Data-to-Put-a-Big-Hurt-on-Comm-Fraud-Lavastorm-Analytics.pdf

http://www.networkworld.com/article/2175363/software/ibm-rolls–big-data–software-to-combat-big-business-fraud.html

Please rate this