14 Oct 2022

158

How to Successfully Leverage IT-Based Techniques

Format: APA

Academic level: Master’s

Paper type: Capstone Project

Words: 533

Pages: 2

Downloads: 0

We intend to develop a strategy that will successfully leverage IT-based techniques and measures to reduce risks of breach and threats to patient privacy within electronic health record systems. We need to carry out research intensively and extensively. Rampant cybercrime activities have been linked to weak security infrastructure and financial constraints (Hellsten, 2018). 

We will employ online research to identify and affirm how widespread cybercrime has become in the United States. The first step will be to identify the articles that we will require for our project. We will use peer-reviewed articles that have been recently written. Then we will examine the papers for information. Various cyber-criminal activities pose a risk to the healthcare sector. The activities include cybersquatting, cyberterrorism, internal threats, identity theft, and external threats (Luna et al., 2016). We need to identify the most common cyber-criminal activity in the United States. We will also get ideas about the strategies that have been employed in hospitals to curb cybercrime. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

We will also need to know how the healthcare sector or hospitals intend to solve the cybercrime problem. For this, we will need to talk to the concerned individuals. We will conduct face-to-face interviews with various personalities in the healthcare sector. Among them will be the chief information security officers, chief information officers, and healthcare cybersecurity experts (Jalali and Keiser, 2018). Observation will also be an excellent way to research since it will give us an accurate picture. Lastly, we will need to uncover the impact of cybercriminal activities on the lives of patients. This will help us to authenticate our project. We will carry out case studies to acquire information. 

As mentioned above, we need to develop a strategy that will leverage IT-based techniques and measures to reduce risks of breach and threats to patient privacy within electronic health record systems. To achieve this, we need to conduct discussions with the stakeholders. Cybersecurity strategies are interdisciplinary, and they involve various stakeholders (Vuulen and Leenen, 2019). Our primary interest in developing the strategy is to prevent crime and police the electronic health record systems. The strategy has to consider and address electronic evidence that affects the capabilities of criminal justice. We need to convince healthcare facilities to adopt the strategy. In this way, we will prevent cybercrime. 

By curbing cybercrime, we will be able to prevent cybercriminals from obtaining wares unlawfully. According to Fuentes (2017), there is a market for personally identifiable information (PII) in the criminal underground world. Electronic health record systems contain information about a patient’s insurance, mailing address, demographics, birthdate, social security number, medications, lifestyle, immunization record, mailing address, family medical history, radiology reports, laboratory results, and vital signs that can be peddled. It may also contain credit card details and invoices. Fuentes (2017) notes that financial information is highly-priced in the criminal underground world. Besides, they can combine portions of PII to acquire access to other services. For instance, a medical insurance ID, date of birth, and a social security number can be combined to obtain medical insurance. 

Most small businesses have settled to use internal audits and strategies to protect their organizations' information (Maahs, 2018). They focus on implementing secure firewalls and regularly updating their antivirus software to prevent hacking. They also run security checks and conduct regular system back-up. This has helped them avoid attacks. 

References 

Fuentes, M. R. (2017). Cybercrime and other threats faced by the healthcare industry. Trend Micro

Hellstén, H. (2018). Cyber risk management in the Finnish healthcare sector (Master's thesis). 

Jalali, M. S., & Kaiser, J. P. (2018). Cybersecurity in hospitals: a systematic, organizational perspective. Journal of medical Internet research , 20 (5), e10059. 

Luna, R., Rhine, E., Myhra, M., Sullivan, R., & Kruse, C. S. (2016). Cyber threats to health information systems: A systematic review. Technology and Health Care , 24 (1), 1-9. 

Maahs, D. L. (2018). Managerial strategies small businesses use to prevent cybercrime. 

Van Vuuren, J., Leenen, L., Pieterse, P., & Police, S. A. (2019, February). Framework for the Development and Implementation of a Cybercrime Strategy in Africa. In Proceedings of the ICCWS 2019 14th International Conference on Cyber Warfare and Security, edited by N. Van Der Waag-Cowling and L. Leenen (pp. 156-167). 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). How to Successfully Leverage IT-Based Techniques.
https://studybounty.com/how-to-successfully-leverage-it-based-techniques-capstone-project

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 70

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 436

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 111

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 63

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 159

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration