Question

In: Nursing

Assignment 2: Healthcare Informatics and System Breaches Use this Scenario for this Assignment. You are the...

Assignment 2: Healthcare Informatics and System Breaches

Use this Scenario for this Assignment.

You are the Health Information Officer at a large hospital. You have learned a significant information technology failure or breach has occurred within your hospital. Using the Internet or the Strayer University library database, identify other health care organizations or healthcare providers that have recently had a significant information technology failure or breach. Write a report to your staff, notifying them of the failure or breach, who such failures or breaches have affected similar organizations, and how those organizations resolved the issue(s).

Need a four to five (4-5) page report for your staff in which you:

  1. Outline four (4) key factors contributing to the other organizations’ HIMS failures or breaches.
  2. Analyze three (3) ways the HIMS failures impacted the organizations’ operations and patient information protection, privacy, or personal safety.
  3. Diagnose the leadership teams’ reactions to the failures. Analyze whether the leadership teams took sufficient measures to address various stakeholder groups impacted. Next, consider whether the other organizations had sufficient resources in place to prevent these occurrences. If not, identify where most of the failures occurred.
  4. Suggest three (3) outcomes for the facility and state and explain whether you agree with the overall verdict or violation.
  5. Recommend at least three (3) best practices your hospital can adopt to avoid such HIMS failures or breaches in the future. Provide support for these recommendations.
  6. Explain one (1) current government requirement requiring all healthcare organizations to ensure health care and patient information is secure and information breaches and technology failures are minimized.
  7. Use at least four (4) current (2015-2019), quality resources in this assignment. The Google Scholar is a great resource to locate current, quality resources.
  8. Note: Wikipedia and similar websites do not qualify as quality resources.

Solutions

Expert Solution

Health informatics management system is the interdisciplinary study of the design, development, adoption and application of IT based innovation in healthcare services delivery, management and planning.

  • Deals with the resources, devices and methods required to optimize the acquisition, storage, retrieval and the use of information in health and biomedicine.

Following are the four key factors contributing to HIMS failure and breaches:

  1. Improper disclosure: Almost one third of health care security incident involved a person abusing their use of inetrnal resources.It can be a privilege abuse.
  2. Theft: 95% of security incidents with a physical care were attributed to theft in report. Other types include snooping, tampering and surveillance but are less common.
  3. Unauthorized access: Hacking incident occurs when a person intensionally gain unauthorized access to a system or device.
  4. Malware: Malware software is one of the top cause of data breaches around the world.
  • Following are the three ways of HIMS failure and breached imoacted organisation, patient operations, information, protection privacy and personal safety:
  1. Motive : Both economic and non economic factors can motivate attack on health information. Patient health records have economic value to insurers and journalist.
  2. Resources: with respect to resources available to them potential attackers can range from individuals with modest financial and computing resources to well funded and determined intelligence agencies.
  3. Initial Access: Initial access the relationship of the attackers to the target data prior to the initiation of an assault on some stakeholders system.
  • Following are the three ways HIMS practices to avoid HIMS failure and breaches:
  1. Maintain HIPPA compliance and PHI security:. HIMS play an important role in managing the flow of health care informatics. It is regulated by HIPPA which orovide specific rules for the safeguarding of medical information.
  2. Protection from outside: Cyber attacks are a growing threat across all industries. The attacks can take a variety of forms, cybe security threat more common in health care include - malware, ransom ware, phishing attacks . HIMS work to combat these threats by advocating for proper solution.
  3. Influencing standard and laws: Rules and regulations related to HIMS are created at state and federal level to protect throughout.
  • One current organisation to prevent breaches is HIPPA
  • Following are the four current resources:
  1. A study was conducted by Nelson on health informatics. ( Nelson R. Helath informatics: Interprofessional apperent.2016).
  2. A study was conducted on modulation of patient records from paper to electronic media and changes the way dtat is used.( Fenton SH. Health information management: Change with time .2017.Yearb Med Inform.72-77)
  3. Bloomrosen M. Finding from 2017 on the HIM.2018. Yearb amed Informs: 67-73).
  4. Bradley P. Trying together CDI, ICD-10and health care data analytics: How CDI program and ICD-10 are impacting Data Analytics and the benefit to healthcare.2016.J AHIMA: 28-30.

Related Solutions

What are the laws that address healthcare breaches?
What are the laws that address healthcare breaches?
For this assignment, you will read the scenario and then use the provided Excel and Word...
For this assignment, you will read the scenario and then use the provided Excel and Word document templates to complete your assignment before uploading them to the assignment submission area. Scenario Larry and Beth are both married, working adults. They both plan for retirement and consider the $6,000 annual contribution a must. First, consider Beth's savings. She began working at age 20 and began making an annual contribution to her IRA of $6,000 each year until age 32 (12 contributions)....
. Identify moral dilemmas in healthcare informatics that would best be approached with the use of...
. Identify moral dilemmas in healthcare informatics that would best be approached with the use of an ethical decision-making framework , such as the use of smartphones to interact with patients as well as to monitor and assess patient health
Identify moral dilemmas in healthcare informatics that would best be approached with the use of an...
Identify moral dilemmas in healthcare informatics that would best be approached with the use of an ethical decision -making framework, such as the use of smartphones to interact with patients as well as to monitor and assess patients
The nurse should identify which option(s) is an advantage to using informatics in the healthcare system?...
The nurse should identify which option(s) is an advantage to using informatics in the healthcare system? (Select all that apply) Select one or more: a. Communication b. Unavailability of data c. Care Coordination d. Retrieval of data e. Error prevention
Scenario: Imagine that you are working as a mid-level administrator within a healthcare system. You have...
Scenario: Imagine that you are working as a mid-level administrator within a healthcare system. You have been tasked with chairing a strategic planning task force to revise and update the healthcare system’s strategic plan. Your initial task is to call a meeting with your newly created strategic planning task force. Your first item on the agenda is to engage your task force in generating creative approaches to the strategic planning process. Please briefly explain (in a minimum of 250 words)...
(Healthcare informatics) How will you be able to apply what you learned in this course to...
(Healthcare informatics) How will you be able to apply what you learned in this course to your current or future work?
For Part 2 of this assignment, you will use the “Assignment 1 – Linear Kinematics Data”...
For Part 2 of this assignment, you will use the “Assignment 1 – Linear Kinematics Data” excel file. In the data set you are provided with vertical position and time data for a person’s vertical center of mass motion for an unspecified movement task. You will utilize excel in all (well, some…) of its glory to calculate the vertical velocity and vertical acceleration data from the position and time data provided in the excel file. Again you will use the...
In both your work setting and your life, you are experiencing the future of healthcare informatics...
In both your work setting and your life, you are experiencing the future of healthcare informatics accelerating at a rapid pace. In your work setting, which future trends are likely to have the largest effect on patient care and related information systems? Compare and contrast the terms of EHR directions and personal Healthcare informatics. Where do they overlap and where do they differ? Describe how nanomaterials might affect your own life in the near future. Consider the consumer products you...
This assignment asks you to consider a negotiation scenario with family members. Consider this scenario: You...
This assignment asks you to consider a negotiation scenario with family members. Consider this scenario: You and your brother work for your father’s successful family business, which employs 15 individuals. Your role has evolved from being the Chief Machinist to being the General Manager and main salesperson for the business. Your brother has creative talent and is good at designing and fabrication, but is not strong in interpersonal skills. Additionally, your brother does not take care of his personal appearance...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT