Assignment: Technology keeps advancing
Assignment: Technology keeps advancing
The advancements in technology have both positive and negative impact on patients.
Breach of patient confidential information has been made easier with advancement in technology.
(Pathak, 2019).
Advancement in technology has led to an increase in data breach especially in healthcare facilities like hospitals.
2
Clinical Issue
Patient information includes medical records which are private.
Breach of patient confidential information happens when their private information is disclosed to a third party.
The biggest confidentiality threat is hacking.
Patients are always leaving the personal information at the hospital.
(Hammouchi, 2019)
(McLeod, 2018).
The patient usually disclose their private information whenever they visit healthcare facilities.
This information is private and should be protected.
The clinical issue is breach to the confidentiality of patient information.
3
Cont’
The medical profession involves trust between the professionals and the patients.
The professionals should maintain the trust by protecting the patient’s confidentiality.
(Yeng, 2021).
Doctors and other healthcare professionals have a role in protecting the personal information of the patient.
4
PICOT Question
The focus was on confidentiality of patient information.
The population affected is patient group between the ages of 45-70 years who are technology savvy.
They are more vulnerable to hackers when accessing portal.
The PICOT question was developed with focus on the older generation which is not technology savvy.
They are more vulnerable to cyber attacks when using portals.
5
Cont’
Population (P): Patients between 45-70 years.
Intervention (I): Patient portal.
Comparison (C): Patients between 16-40 years of age.
Outcome (O): Losing private information for lack of understanding of the portal.
The population is patients between the ages of 45-70
Intervention is patient portal
Comparison (C): Patients between 16-40 years of age.
Outcome (O): Losing private information for lack of understanding of the portal.
6
Research Databases
Search databases included Google Scholar, JSTOR, and Walden University Library.
Walden University has two databases Computer Science Database and the Ovid Nursing Books Database.
Search databases included Google Scholar, JSTOR, and Walden University Library.
7
Level of Evidence
The level of evidence is IV and V
The study will be a descriptive study that will answer how, what, when, and where.
The evidence is collected from Patients between 45-70 years.
The level of evidence I IV
This is because the study is descriptive.
Evidence is collected from Patients between 45-70 years.
8
Peer-review article | Level of Evidence | Strengths |
McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, Science Direct. 108, 57-68. | Level IV- cohort study | Presents tangible results that show exposure levels, organizational factors, security factors, and healthcare data breaches. |
Pathak, P. R., & Chou, A. (2019). Confidential care for adolescents in the US Health Care System. Journal of patient-centered research and reviews, 6(1), 46. | Level IV- Qualitative study | Shows how the best practices should be implemented in the protection of patient data. |
Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Ahmad Khan, R. (2020, June). Healthcare data breaches: Insights and implications. In Healthcare (Vol. 8, No. 2, p. 133). Multidisciplinary Digital Publishing Institute. | Level IV- cohort study | The article shows how healthcare systems are highly exposed to the external threats to information security breach |
Walker-Roberts, S., Hammoudeh, M., & Dehghantanha, A. (2018). A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access, 6, 25167-25177. | Level V- Evidence gathered from Systematic review of qualitative study. | The results show how a reactive approach may not be the best methods for protecting the patients’ private records. |
Assignment: Technology keeps advancing
References
Hammouchi, H., Cherqi, O., Mezzour, G., Ghogho, M., & El Koutbi, M. (2019). Digging deeper into data breaches: An exploratory data analysis of hacking breaches over time. Procedia Computer Science, 151, 1004-1009.
McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, Science Direct. 108, 57-68.
Pathak, P. R., & Chou, A. (2019). Confidential care for adolescents in the US Health Care System. Journal of patient-centered research and reviews, 6(1), 46.
Yeng, P. K., Szekeres, A., Yang, B., & Snekkenes, E. A. (2021). Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study. JMIR Human Factors, 8(2), e17604.