11 Apr 2022

169

Protecting Healthcare Data from Cyber Criminals

Format: APA

Academic level: Master’s

Paper type: Capstone Project

Words: 482

Pages: 2

Downloads: 0

Data Analysis: Methods

The information needed for the topic at hand ranges from healthcare to cybercrime. Healthcare aims at preventing, diagnosing, and treating health-related issues in human beings. Health professionals in different sectors have to operate on different levels (primary, secondary, and tertiary) to assist patients. They are responsible for patients’ medical history, clinical and medical data, and much more. This kind of information should be well secured to not fall into the wrong hands and be used for the wrong reasons. Cybercrime has become rampant in the current era. 

An analysis plan for this data will require a combination of various methods. We will use the qualitative approach to analyze texts and narratives from people. This method answers questions such as “How,” “What,” and “Why.” Quantitative analysis, which uses measurements, will come in handy to help us identify the seriousness of the matter at hand. This will help us to explore the topic of discussion. Text analysis will be used to analyze texts (WHO, n.). It is a technique used to extract machine-readable facts. The aim of using this method is to structure data. We will need to go through lots of information and convert them into pieces that can be easily read, managed, and interpreted. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Statistical analysis will also be of importance to the project. This method will help us collect and interpret data from the qualitative approach (WHO, n.). It will also help us validate the data that we will collect. Lastly, we will employ predictive analysis. This will help us to determine how often the issue at hand occurs. Patterns and trends of the issue at hand will be identified using this method. 

Risk Analysis: Obstacles and Potential Issues

Poor Planning

First and foremost, one of the obstacles that we may encounter as a team is poor planning. It may be not easy, or we may disagree on each of us's responsibilities and duties as a team. We may also not be able to prioritize ideas and steps effectively. To avoid this, we will have to outline every member of the team's responsibilities and outline how the steps follow each other to completion. 

Inadequate Finances

Another obstacle may be financial support. Being students, we may lack the funds necessary to enable us to carry out the project as efficiently as we should. To avoid this, we plan to reduce our expenses as much as possible to cut the project's costs. 

Stakeholders and Key Decision-Makers

Likely, we may also encounter a problem with the stakeholders and key decision-makers. Stakeholders are the people who take part in the project or are affected by the project in one way or another. The best way to counter the problem is to create a collaborative working environment with them. Involve them in all the phases of the project and ensure that they agree with our plan. 

Changing Requirements

There is also a chance that we may encounter changing requirements of the project. Changes in the project may interfere with our timelines making us miss out on our deadlines. We have decided to put in extra efforts to ensure that we present our plan to the key persons a few days before the deadline to find enough time to include the changes made into our program. 

Reference

World Health Organization (WHO). (n.). Data, Analysis, and Presentation. Retrieved on 26th March 2021 from www.who.int  

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Protecting Healthcare Data from Cyber Criminals.
https://studybounty.com/protecting-healthcare-data-from-cyber-criminals-capstone-project

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 69

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 436

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 111

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 63

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 158

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration