5 Jul 2022

37

Information Security and Privacy

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 625

Pages: 2

Downloads: 0

Smith, Dinev & Xu (2011) assert that information security and privacy are significant issues in healthcare. Patients prefer that their medical information or record be kept safe and secure. Medical information if not well secured may reach the wrong people who in turn misuse the info thus causing the patient mental torture. Internet, social media and information technology have both negative and positive impacts on information security and privacy in healthcare. If appropriately used technological advancement can assist in keeping patients records safe but at the same time information may be hacked and spread through social media thus compromising information security and privacy in healthcare. The underlying governing principle for effective healthcare delivery of patient-physician relationship is privacy. 

Physicians require information about the patients to facilitate disease diagnosis and treatment. Wager, Lee & Glaser (2017)  note that telemonitoring systems, email, smartphones, telemedicine and webcam have been used in sharing information between patients and physicians to offer diagnosis, counseling and diseases management. Besides, cloud computing has made data storage and access more efficient and reduce costs or wastages involved while using papers. Research shows that use of electronic data in place of paper records has led to ease of workflow, improved public health and lower healthcare costs. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

According to Wager, Lee & Glaser (2017) , there are also organizational and operational problems that administrators encounter due to use internet and information technology in healthcare. Disclosing psychiatric issues, HIV status and other health conditions of a patient cause social stigma. Smith, Dinev & Xu (2011) highlight that threats to patient information security and privacy can be organizational; due to inappropriate data access by internal agents or systemic; arising from the exploitation of disclosed data beyond its intended use just within the information flow chain. External hackers or employees may infiltrate the information system without a legitimate need to still data or make the information infrastructure inoperable. Spouses, insurers, employers and journalists may use technological advancement to steal digitized patient records for economic or other personal reasons that the patient would not approve. Employees may also accidentally transmit patient files to the wrong email. Besides, insiders who have data access may out of curiosity look for information about fellow employees or a celebrity or other patient and transmit it through the social media for revenge or profit. Data breach by leaders, followers, patients and outsiders offer significant threat to privacy and information security. 

Reddick (2012) point out that implementation of enterprise architecture framework has five stages of maturity and each has core elements. The first stage involves creating awareness on the enterprise architecture in the organization. Before implementation, the employees and employers in the employees need to discuss the goals of using information technology and patient information security. In the second stage, the management should build a foundation of the architecture as plans and responsibilities of each employee is developed. The third stage then develops the products according to the selected EAF. Required software, relevant, communication, data collection and data analysis instruments are designed. This stage defines technology, performance, data and service application and tracks the progress made against the plans laid earlier (Reddick, 2012). At stage four, approval of products or efficiency of information technology is done then the enterprise architecture is completed. Finally, in stage five of EAF maturity identification of ongoing IT investment proposals are done while also tracking the benefits of the enterprise architecture. 

Nygård & Olsen (2016) observe that ineffective communication, unclear enterprise architecture roles and lack of commitment impede enterprise architecture. Difficulties in communication between the top management and other parts are perceived to be the primary challenge. Concepts on enterprise architecture are also not known to most of the staff thus making communication more difficult between the Information and Communication Technology personnel and other staff (Nygård & Olsen, 2016) . Lack of role clarity, knowledge and commitment are also major challenges. To overcome the challenges, employees should be well trained and made conversant with concepts used, clarification of roles and responsibilities of the management and other staff will also make implementation of enterprise architecture framework successful. 

References 

Nygård, M., & Olsen, D. H. (2016). Enterprise architecture implementation challenges: an exploratory study of the Norwegian health sector. 

Reddick, C. G. (2012).    Public administration and information technology . Burlington, MA: Jones & Bartlett Learning. 

Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review.    MIS Quarterly ,    35 (4), 989-1016. 

Wager, K. A., Lee, F. W., & Glaser, J. P. (2017).    Healthcare information systems: a Pract1ical approach for healthcare management . John Wiley & Sons. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Information Security and Privacy.
https://studybounty.com/information-security-and-privacy-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Vaccine Choice Canada Interest Group

Vaccine Choice Canada Interest Group Brief description of the group Vaccine Choice Canada, VCC, denotes Canada's leading anti-vaccination group. Initially, the anti-vaccination group was regarded as Vaccination...

Words: 588

Pages: 2

Views: 146

Regulation for Nursing Practice Staff Development Meeting

Describe the differences between a board of nursing and a professional nurse association. A board of nursing (BON) refers to a professional organization tasked with the responsibility of representing nurses in...

Words: 809

Pages: 3

Views: 191

Moral and Ethical Decision Making

Moral and Ethical Decision Making Healthcare is one of the institutions where technology had taken lead. With the emerging different kinds of diseases, technology had been put on the frontline to curb some of the...

Words: 576

Pages: 2

Views: 89

COVID-19 and Ethical Dilemmas on Nurses

Nurses are key players in the health care sector of a nation. They provide care and information to patients and occupy leadership positions in the health systems, hospitals, and other related organizations. However,...

Words: 1274

Pages: 5

Views: 78

Health Insurance and Reimbursement

There are as many as 5000 hospitals in the United States equipped to meet the health needs of a diversified population whenever they arise. The majority of the facilities offer medical and surgical care for...

Words: 1239

Pages: 4

Views: 439

Preventing Postoperative Wound Infections

Tesla Inc. is an American based multinational company dealing with clean energy and electric vehicles to transition the world into exploiting sustainable energy. The dream of developing an electric car was...

Words: 522

Pages: 5

Views: 357

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration