0      0

222 - The Barriers and Challenges to Implementing Mobile and New Cloud Technologies in Healthcare Information Systems

‐ May 4, 2013 1:15pm

The opportunities for the use of mobile devices as an adjunct to care in prevention, chronic care management, and health care maintenance continue to grow at an ever-increasing rate. This session discusses ways to implement and optimize the use of mobile and cloud technologies in the health care environment. Challenges and barriers to implementation and optimization strategies for achievable results are shared.

Contact hours available until 5/4/2015.

Requirements for Successful Completion:
Complete the learning activity in its entirety and complete the online CNE evaluation.

Faculty, Planners and Authors Conflict of Interest Disclosure:
Speaker: Kathleen McCormick discloses grant/research support and other financial or material support from McGraw-Hill and status as a major stock shareholder of SAIC.
Planning Committee: Laurie Levknecht discloses other financial or material support as an employee of Elsevier CPM Resource Center.

Commercial Support and Sponsorship:
No commercial support or sponsorship declared.

Non-Endorsement of Products:
Accreditation of activities for contact hours does not imply approval or endorsement of any product, advertising, or educational content by ANIA, Anthony J. Jannetti Inc., or the American Nurses Credentialing Center’s Commission on Accreditation.

Accreditation Statement:
This educational activity is jointly provided by Anthony J. Jannetti, Inc. (AJJ) and ANIA.

Anthony J. Jannetti, Inc. is accredited as a provider of continuing nursing education by the American Nurses Credentialing Center's Commission on Accreditation.

Anthony J. Jannetti, Inc. is a provider approved by the California Board of Registered Nursing, provider number, CEP 5387.


  • Describe the benefits of implementing mobile and cloud technology as an adjunct to care in prevention, chronic care management, and healthcare maintenance.
  • Discuss the financial and security issue challenges to implementation.
  • Explore data isolation and other optimization strategies for achievable results.


You must be logged in and own this session in order to post comments.