Department Of Veterans Affairs Sources for your Essay

HRM and the Department of Veterans Affairs


These authors suggest that supervisory training in particular should have immediate and highly specific impact on work performance and be based on the unique requirements of an organization and corporate culture. In this regard, supervisory training can be viewed as being different from other educational and employee development initiatives that are specifically targeted at preparing people for work and life (Dubois & Rothwell, 2004)

HRM and the Department of Veterans Affairs


Human resource managers have also assumed an increasingly important role in VA organizational changes over the past 30 years. This shift in focus can be linked to the same types of concerns about work alienation that were taking place in the larger American society based on the "quality of working life" movement that began the 1970s; this movement advocated widespread job redesign and enrichment in order to enhance employee well-being (Godard, 2001)

HRM and the Department of Veterans Affairs


75). In this regard, VA has a good reputation for communicating with the public and its veteran clients through various media (Lehrer, 2004), including a user-friendly Web site that offers veterans and their families as well as department personnel access to a wide range of information and services (Find War Heroes Online, 2004)

HRM and the Department of Veterans Affairs


VA will conduct ADR/Mediation Awareness Training sessions for all employees to ensure that employees are aware of the ADR and mediation tools that can be used to effectively resolve workplace conflicts and disputes. By employees being aware of and using these tools, VA anticipates that this will effectively help reduce EEO complaints activity and workplace disputes, which are enormously costly for the department; further, VA also expects to derive intangible benefits such as improved morale and productivity, reduction in future disputes, repaired relationships, improved customer service, and employee trust that are associated with facilitated dispute resolution procedures (Seidler, 2003)

HRM and the Department of Veterans Affairs


This shift in focus can be linked to the same types of concerns about work alienation that were taking place in the larger American society based on the "quality of working life" movement that began the 1970s; this movement advocated widespread job redesign and enrichment in order to enhance employee well-being (Godard, 2001). Human resource management in VA has followed suit, with the concept of "value-added" employees being the focus of current federal HR initiatives (Wilkinson, 2003) Organizational and Individual Resistance

Department of Veterans Affairs Claims Processing Dilemmas


Resolved an average claim appeal in 657 days; and, 4. Would handle 638,000 first-time claims from Iraq War veterans during the next few years (Dyhouse, 2007)

Department of Veterans Affairs Claims Processing Dilemmas


10). Not surprisingly, veterans organization such as the VFW are expressing their concern over the lengthy time required for claims processing (Hanson)

Department of Veterans Affairs Claims Processing Dilemmas


The Veterans Health Administration (VHA): this division employs around 200,000 people in 163 tertiary healthcare facilities (medical centers) and more than 700 community-based outpatient clinics for eligible veteran patients; and, C. The National Cemetery Administration NCA); this division employs around 1,400 individuals in 120 national cemeteries (Kowalski, Harmon, Yorks & Kowalski, 2009)

Data Security Breaches at the Department of Veterans Affairs


Today, through its Veterans Health Administration (VHA), the Department of Veterans Affairs (VA) is the largest healthcare provider in the United States, and millions of veteran patients receive care from its nationwide network of medical centers, outpatient clinics and Vet Centers. In recent years, the VA has committed itself to improving the quality of patient care it provides by implementing a wide range of technological solutions, including electronic healthcare records and a sophisticated communications system (Boyer, 2011)

Data Security Breaches at the Department of Veterans Affairs


216). Some authorities, though, maintain that so-called "cybercrimes" are simply conventional crimes being committed in a new medium (Brenner, 2007)

Data Security Breaches at the Department of Veterans Affairs


The VA has notified and offered credit protection to all 7,054 veterans in the database. VA says the type of security flaw was one that could have exposed veterans' data, including name, address, dates of birth, phone numbers and VA patient identification number, via the Internet (Contractor security flaw puts data of 7,000 veterans at risk, 2014, para

Data Security Breaches at the Department of Veterans Affairs


6). The June 2014 congressional hearing also uncovered the fact from two VA officials that the VA has been hacked numerous times by foreign actors since March 2010 (Gusovsky, 2014)

Data Security Breaches at the Department of Veterans Affairs


Indeed, even the VA concedes that the steps that it has taken to date have not solved the data security problem. According to a Federal Information Security Management Act for Fiscal Year 2014, "VA has made progress developing policies and procedures but still faces challenges implementing components of its agency-wide information security risk management program" (Halliday, 2015, p

Data Security Breaches at the Department of Veterans Affairs


28). It is estimated that the costs of cybercrime each year top $400 billion (Inan & Namin, 2016)

Data Security Breaches at the Department of Veterans Affairs


4). Mismanaged software update (January 15, 2014) This breach occurred when a bungled software update to VA's eBenefits system exposed at least 5,300 veterans' medical and financial information to the public (Konkel, 2014)

Data Security Breaches at the Department of Veterans Affairs


4). Mismanaged software update (January 15, 2014) This breach occurred when a bungled software update to VA's eBenefits system exposed at least 5,300 veterans' medical and financial information to the public (Konkel, 2014)

Data Security Breaches at the Department of Veterans Affairs


4). Computers donated contained patient data A report concerning discarded hard drives and disk sanitization practices revealed that in August 2002 the United States Veterans Administration Medical Center in Indianapolis sold or donated 139 of its computers without removing confidential information from their hard drives, including the names of veterans with AIDS and mental illnesses (Matwyshyn, 2009, p

Data Security Breaches at the Department of Veterans Affairs


It also asked them to require remote users to reauthenticate themselves after 30 minutes of inactivity. In addition, the VA breach resulted in more focus on securing remote systems via the use of endpoint network admission control tools to ensure that any system logging into a network has adequate antivirus and firewall protections, has all the mandated configurations settings and is properly patched (Vijayan, 2007, para

An Analysis of the Organizational Development Contracting Process at the Department of Veterans Affairs


A discussion concerning the implications of these problems for the VA and the steps that can be followed by an OD consultant to resolve them are followed by a summary of the research and important findings concerning these issues in the conclusion. Statement of the problem, including the appropriate intervention level (individual or group) Although the problem is system-wide, the VA has experienced serious problems with patient scheduling at several of its medical centers including most especially the VA's Phoenix Health Care System (PHCS) where patients experienced inordinately lengthy delays in receiving appointments and a separate "secret" list of actual patient scheduling was maintained by top VA officials (Dyhouse, 2014)

An Analysis of the Organizational Development Contracting Process at the Department of Veterans Affairs


It is important to note, though, that the data-gathering process is not a static enterprise but may require supplemental data once the initial data-gathering steps have been completed (Vogelsang & Townsend, 2013). Tools and techniques proposed for use to undertake the project, reasons to choose those tools and techniques, and an explanation of how the tools and techniques are appropriate for the level of the problem identified Pre-prepared questionnaires and interview questions can facilitate the data-gathering process to identify the most appropriate intervention for a given aspect of the system-wide VA problem (Hawkins & Smith, 2006)