Using Technology and Protecting Patient Information and Confidentiality
For this assignment, please note three attachments: First is the rubric - a guide to how the paper is to be written. The second and third attachments are two peer reviews of the original paper. This assignment is to revise the paper based on the two peer reviews. Details: In this assignment, you will rewrite your Literature Review Draft, which includes the utilization of the feedback from the peer review process, if needed. Your paper will consist of 1,500-2,000 words that utilize the research process, incorporate three articles, and include the following: An introduction to topic. An explanation of how the literature review is used in research. A discussion of the ethical considerations for data collection. An explanation of what the data reveals in terms of statistical analysis. An evaluation of whether there is enough information to make a decision on the effectiveness of the specific study. A summary of the conclusions from the literature review. Provide a copy of each peer review of your paper with your final submission. Prepare this assignment according to the guidelines found in the APA Style Guide, An abstract is required. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Using Technology and Protecting Patient Information and Confidentiality
Evelyn Booker
Grand Canyon University
Communication and Application of Research Practice
October 20, 2016
Using Technology and Protecting Patient Information and Confidentiality
Health care is changing due to new technologies, paper –based patient records have been transformed to electronic records for easier access. Remote patient monitoring is becoming feasible due to technological improvement. Adopting new technology is ideal to improve quality health care. However, privacy and security concerns need to be addressed. Hacking is a common occurrence that has necessitated the development of highly secured information reservoirs. According to the American College of Healthcare Executives (ACHE) (2012), healthcare delivery requires personal access to patient’s information, meaning that health care facilities are among the most information-rich institutions that exist today. When one seeks care, the expectation is that they will divulge most of their personal information to strangers with the hope that it will be kept a secret and offered the protection and confidentiality that it deserves (Health Information Technology, 2015). As the risk of compromising patient confidentiality increases, state laws, and national standards are not adequate to address the growing concern. Therefore, health care system needs to ensure that patient’s records are secure minimizing any violation of patient's right to privacy. This review will assess technology usage and protection of patient information and confidentiality. The paper present different views presented in various literatures supporting the need for partnership between healthcare and technology to address current issues that make it easier for malicious people to infringe on other people's privacy.
Literature Review
According to the University of Toronto (2016), a literature review is a piece of a research paper that is used to convey or show the bigger picture with regards to a particular topic by referencing other researchers' works. With regards to this particular topic, there are numerous accounts explain how information reservoirs have become vulnerable. Evidence presented by numerous research highlights challenges involved in maintaining information privacy, confidentiality and protecting patient’s data. There is no doubt that technology has improved quality care delivery, but the levels of violation have also increased.
Electronic health records are emerging as a new trend. Health information is digitalized to improve the quality of care. However, technology has come with multifarious effects regarding security, privacy, and confidentiality of patient's data. Health records systems have weak functions. That is why healthcare organizations need to pay attention to ensuring proper control measures are in place to protect patient information from misuse (Symantec, 2016).
Research reveals that few hospitals use old traditional storage to keep patient data; EHR is a wave that has improved information accessibility. However, several studies present major issues related to security, confidentiality, and privacy of electronic health information systems. In one of the stud...
π Other Visitors are Viewing These APA Essay Samples:
- Strategy for Disseminating Results of a Project to Key Stakeholders and Nursing Community2 pages/β550 words | 1 Source | APA | Health, Medicine, Nursing | Essay |
- Research Summary and Ethic: Obesity Among Children4 pages/β1100 words | 3 Sources | APA | Health, Medicine, Nursing | Essay |
- Parkinson's Disease5 pages/β1375 words | 10 Sources | APA | Health, Medicine, Nursing | Essay |
- What Roles do Each Play in the Quality of U.S. Health Care1 page/β275 words | 4 Sources | APA | Health, Medicine, Nursing | Essay |
- Use of Technology in Instructional Delivery4 pages/β1100 words | 2 Sources | APA | Health, Medicine, Nursing | Essay |
- Research Summary and Ethical Consideration4 pages/β1100 words | 2 Sources | APA | Health, Medicine, Nursing | Essay |
- SLP Module 1: Ethical Dilemma in Environmental Health2 pages/β550 words | 3 Sources | APA | Health, Medicine, Nursing | Essay |