SlideShare a Scribd company logo
1 of 6
Picot Question
Introduction
Technology keeps advancing at a faster rate than anything else.
The advancements in technology have both positive and
negative impact on patients.
Breach of patient confidential information has been made easier
with advancement in technology.
(Pathak, 2019).
Advancement in technology has led to an increase in data
breach especially in healthcare facilities like hospitals.
2
Clinical Issue
Patient information includes medical records which are private.
Breach of patient confidential information happens when their
private information is disclosed to a third party.
The biggest confidentiality threat is hacking.
Patients are always leaving the personal information at the
hospital.
(Hammouchi, 2019)
(McLeod, 2018).
The patient usually disclose their private information whenever
they visit healthcare facilities.
This information is private and should be protected.
The clinical issue is breach to the confidentiality of patient
information.
3
Cont’
The medical profession involves trust between the professionals
and the patients.
The professionals should maintain the trust by protecting the
patient’s confidentiality.
(Yeng, 2021).
Doctors and other healthcare professionals have a role in
protecting the personal information of the patient.
4
PICOT Question
The focus was on confidentiality of patient information.
The population affected is patient group between the ages of 45-
70 years who are technology savvy.
They are more vulnerable to hackers when accessing portal.
The PICOT question was developed with focus on the older
generation which is not technology savvy.
They are more vulnerable to cyber attacks when using portals.
5
Cont’
Population (P): Patients between 45-70 years.
Intervention (I): Patient portal.
Comparison (C): Patients between 16-40 years of age.
Outcome (O): Losing private information for lack of
understanding of the portal.
The population is patients between the ages of 45-70
Intervention is patient portal
Comparison (C): Patients between 16-40 years of age.
Outcome (O): Losing private information for lack of
understanding of the portal.
6
Research Databases
Search databases included Google Scholar, JSTOR, and Walden
University Library.
Walden University has two databases Computer Science
Database and the Ovid Nursing Books Database.
Search databases included Google Scholar, JSTOR, and Walden
University Library.
7
Level of Evidence
The level of evidence is IV and V
The study will be a descriptive study that will answer how,
what, when, and where.
The evidence is collected from Patients between 45-70 years.
The level of evidence I IV
This is because the study is descriptive.
Evidence is collected from Patients between 45-70 years.
8
Peer-review articleLevel of EvidenceStrengthsMcLeod, A., &
Dolezel, D. (2018). Cyber-analytics: Modeling factors
associated with healthcare data breaches. Decision Support
Systems, Science Direct. 108, 57-68.Level IV- cohort
studyPresents tangible results that show exposure levels,
organizational factors, security factors, and healthcare data
breaches.Pathak, P. R., & Chou, A. (2019). Confidential care
for adolescents in the US Health Care System. Journal of
patient-centered research and reviews, 6(1), 46.Level IV-
Qualitative studyShows how the best practices should be
implemented in the protection of patient data. Seh, A. H.,
Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R.,
& Ahmad Khan, R. (2020, June). Healthcare data breaches:
Insights and implications. In Healthcare (Vol. 8, No. 2, p. 133).
Multidisciplinary Digital Publishing Institute.Level IV- cohort
studyThe article shows how healthcare systems are highly
exposed to the external threats to information security
breachWalker-Roberts, S., Hammoudeh, M., & Dehghantanha,
A. (2018). A systematic review of the availability and efficacy
of countermeasures to internal threats in healthcare critical
infrastructure. IEEE Access, 6, 25167-25177.Level V- Evidence
gathered from Systematic review of qualitative study.The
results show how a reactive approach may not be the best
methods for protecting the patients’ private records.
References
Hammouchi, H., Cherqi, O., Mezzour, G., Ghogho, M., & El
Koutbi, M. (2019). Digging deeper into data breaches: An
exploratory data analysis of hacking breaches over time.
Procedia Computer Science, 151, 1004-1009.
McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling
factors associated with healthcare data breaches. Decision
Support Systems, Science Direct. 108, 57-68.
Pathak, P. R., & Chou, A. (2019). Confidential care for
adolescents in the US Health Care System. Journal of patient-
centered research and reviews, 6(1), 46.
Yeng, P. K., Szekeres, A., Yang, B., & Snekkenes, E. A. (2021).
Mapping the Psychosocialcultural Aspects of Healthcare
Professionals’ Information Security Practices: Systematic
Mapping Study. JMIR Human Factors, 8(2), e17604.

More Related Content

What's hot

Integrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
Integrating openIMIS in the Undergraduate and Postgraduate Medical CurriculumIntegrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
Integrating openIMIS in the Undergraduate and Postgraduate Medical CurriculumIris Thiele Isip-Tan
 
NLM Georgia Biomedical Informatics
NLM Georgia Biomedical InformaticsNLM Georgia Biomedical Informatics
NLM Georgia Biomedical InformaticsAlison Aldrich
 
MINING HEALTH EXAMINATION RECORDS A GRAPH-BASED APPROACH
MINING HEALTH EXAMINATION RECORDS  A GRAPH-BASED APPROACHMINING HEALTH EXAMINATION RECORDS  A GRAPH-BASED APPROACH
MINING HEALTH EXAMINATION RECORDS A GRAPH-BASED APPROACHNexgen Technology
 
Infographics for Health: Best Practices
Infographics for Health: Best PracticesInfographics for Health: Best Practices
Infographics for Health: Best PracticesIris Thiele Isip-Tan
 
Ethics and sharing health data
Ethics and sharing health dataEthics and sharing health data
Ethics and sharing health dataT.J. Kasperbauer
 
Predicting asthma related emergency department visits using big data
Predicting asthma related emergency department  visits using big dataPredicting asthma related emergency department  visits using big data
Predicting asthma related emergency department visits using big dataredpel dot com
 
Taking A Proactive Approach Towards Responsibility Edited
Taking A Proactive Approach Towards Responsibility   EditedTaking A Proactive Approach Towards Responsibility   Edited
Taking A Proactive Approach Towards Responsibility Editedkblaas
 
Internet information and email: shaping professional / patients relationship
Internet information and email: shaping professional / patients relationshipInternet information and email: shaping professional / patients relationship
Internet information and email: shaping professional / patients relationshipFrancisco Lupiáñez-Villanueva
 
Open science-open-data-pnc-20103
Open science-open-data-pnc-20103Open science-open-data-pnc-20103
Open science-open-data-pnc-20103hjl7
 
How You can use Twitter as a Tool for PhD Health Research - Phdassistance.com
How You can use Twitter as a Tool for PhD Health Research - Phdassistance.comHow You can use Twitter as a Tool for PhD Health Research - Phdassistance.com
How You can use Twitter as a Tool for PhD Health Research - Phdassistance.comPhD Assistance
 
The Librarian Reloaded: Evolving Roles in Health Informatics
The Librarian Reloaded: Evolving Roles in Health InformaticsThe Librarian Reloaded: Evolving Roles in Health Informatics
The Librarian Reloaded: Evolving Roles in Health InformaticsIris Thiele Isip-Tan
 
How can the NHS better exploit social media to stimulate patient involvement?
How can the NHS better exploit social media to stimulate patient involvement?How can the NHS better exploit social media to stimulate patient involvement?
How can the NHS better exploit social media to stimulate patient involvement?Mark Hawker
 
Eysenbach: Infodemiology and Infoveillance
Eysenbach: Infodemiology and InfoveillanceEysenbach: Infodemiology and Infoveillance
Eysenbach: Infodemiology and InfoveillanceGunther Eysenbach
 
Luciano informs healthcare_2015 Nashville, TN USA July 30 2015
Luciano informs healthcare_2015 Nashville, TN USA July 30 2015Luciano informs healthcare_2015 Nashville, TN USA July 30 2015
Luciano informs healthcare_2015 Nashville, TN USA July 30 2015Joanne Luciano
 
Statistics For Health Science and Its Impacts
Statistics For Health Science and Its ImpactsStatistics For Health Science and Its Impacts
Statistics For Health Science and Its ImpactsCashews
 

What's hot (20)

Integrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
Integrating openIMIS in the Undergraduate and Postgraduate Medical CurriculumIntegrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
Integrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
 
Dr. Obumneke Amadi _Transcript
Dr. Obumneke Amadi _TranscriptDr. Obumneke Amadi _Transcript
Dr. Obumneke Amadi _Transcript
 
NLM Georgia Biomedical Informatics
NLM Georgia Biomedical InformaticsNLM Georgia Biomedical Informatics
NLM Georgia Biomedical Informatics
 
MINING HEALTH EXAMINATION RECORDS A GRAPH-BASED APPROACH
MINING HEALTH EXAMINATION RECORDS  A GRAPH-BASED APPROACHMINING HEALTH EXAMINATION RECORDS  A GRAPH-BASED APPROACH
MINING HEALTH EXAMINATION RECORDS A GRAPH-BASED APPROACH
 
Library Database
Library DatabaseLibrary Database
Library Database
 
Tteh.000536
Tteh.000536Tteh.000536
Tteh.000536
 
Infographics for Health: Best Practices
Infographics for Health: Best PracticesInfographics for Health: Best Practices
Infographics for Health: Best Practices
 
Nature
NatureNature
Nature
 
Ethics and sharing health data
Ethics and sharing health dataEthics and sharing health data
Ethics and sharing health data
 
Predicting asthma related emergency department visits using big data
Predicting asthma related emergency department  visits using big dataPredicting asthma related emergency department  visits using big data
Predicting asthma related emergency department visits using big data
 
Taking A Proactive Approach Towards Responsibility Edited
Taking A Proactive Approach Towards Responsibility   EditedTaking A Proactive Approach Towards Responsibility   Edited
Taking A Proactive Approach Towards Responsibility Edited
 
Internet information and email: shaping professional / patients relationship
Internet information and email: shaping professional / patients relationshipInternet information and email: shaping professional / patients relationship
Internet information and email: shaping professional / patients relationship
 
Open science-open-data-pnc-20103
Open science-open-data-pnc-20103Open science-open-data-pnc-20103
Open science-open-data-pnc-20103
 
How You can use Twitter as a Tool for PhD Health Research - Phdassistance.com
How You can use Twitter as a Tool for PhD Health Research - Phdassistance.comHow You can use Twitter as a Tool for PhD Health Research - Phdassistance.com
How You can use Twitter as a Tool for PhD Health Research - Phdassistance.com
 
The Librarian Reloaded: Evolving Roles in Health Informatics
The Librarian Reloaded: Evolving Roles in Health InformaticsThe Librarian Reloaded: Evolving Roles in Health Informatics
The Librarian Reloaded: Evolving Roles in Health Informatics
 
How can the NHS better exploit social media to stimulate patient involvement?
How can the NHS better exploit social media to stimulate patient involvement?How can the NHS better exploit social media to stimulate patient involvement?
How can the NHS better exploit social media to stimulate patient involvement?
 
Hc2011socialmedia
Hc2011socialmediaHc2011socialmedia
Hc2011socialmedia
 
Eysenbach: Infodemiology and Infoveillance
Eysenbach: Infodemiology and InfoveillanceEysenbach: Infodemiology and Infoveillance
Eysenbach: Infodemiology and Infoveillance
 
Luciano informs healthcare_2015 Nashville, TN USA July 30 2015
Luciano informs healthcare_2015 Nashville, TN USA July 30 2015Luciano informs healthcare_2015 Nashville, TN USA July 30 2015
Luciano informs healthcare_2015 Nashville, TN USA July 30 2015
 
Statistics For Health Science and Its Impacts
Statistics For Health Science and Its ImpactsStatistics For Health Science and Its Impacts
Statistics For Health Science and Its Impacts
 

Similar to Picot question introduction technology keeps adva

Security of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docxSecurity of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docxkaylee7wsfdubill
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docxstudywriters
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docxwrite31
 
Informatics and nursing 2015 2016.odette richards
Informatics and nursing 2015 2016.odette richardsInformatics and nursing 2015 2016.odette richards
Informatics and nursing 2015 2016.odette richardsOdette Richards
 
Accessing and Sharing Electronic Personal Health Data.
Accessing and Sharing Electronic Personal Health Data.Accessing and Sharing Electronic Personal Health Data.
Accessing and Sharing Electronic Personal Health Data.Maria Karampela
 
Accessing and Sharing Electronic Personal Health Data
Accessing and Sharing Electronic Personal Health DataAccessing and Sharing Electronic Personal Health Data
Accessing and Sharing Electronic Personal Health DataSofia Ouhbi
 
INTERGRATIVE REVIEW 14Equip.docx
INTERGRATIVE REVIEW             14Equip.docxINTERGRATIVE REVIEW             14Equip.docx
INTERGRATIVE REVIEW 14Equip.docxvrickens
 
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT Health Informatics New Zealand
 
Nationwide Privacy and Security Framework for Electronic Exchange of.docx
Nationwide Privacy and Security Framework for Electronic Exchange of.docxNationwide Privacy and Security Framework for Electronic Exchange of.docx
Nationwide Privacy and Security Framework for Electronic Exchange of.docxstirlingvwriters
 
Mitochondrial Disease Community Registry: First look at the data, perspectiv...
Mitochondrial Disease Community Registry:  First look at the data, perspectiv...Mitochondrial Disease Community Registry:  First look at the data, perspectiv...
Mitochondrial Disease Community Registry: First look at the data, perspectiv...SophiaZilber
 
Health Informatics- Module 1-Chapter 1.pptx
Health Informatics- Module 1-Chapter 1.pptxHealth Informatics- Module 1-Chapter 1.pptx
Health Informatics- Module 1-Chapter 1.pptxArti Parab Academics
 
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDSMANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDSijsptm
 
Towards ehr interoperability in tanzania
Towards ehr interoperability in tanzaniaTowards ehr interoperability in tanzania
Towards ehr interoperability in tanzaniaIJCSEA Journal
 
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...ICEGOV
 
Running Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docx
Running Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docxRunning Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docx
Running Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docxwlynn1
 
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...IJCSEA Journal
 
Is Big Data Always Good Data?
Is Big Data Always Good Data? Is Big Data Always Good Data?
Is Big Data Always Good Data? MyMeds&Me
 
Reply 1Why we need 15 minutes Patient Safety ChecksThis
Reply 1Why we need 15 minutes Patient Safety ChecksThis Reply 1Why we need 15 minutes Patient Safety ChecksThis
Reply 1Why we need 15 minutes Patient Safety ChecksThis felipaser7p
 

Similar to Picot question introduction technology keeps adva (20)

Security of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docxSecurity of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docx
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docx
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docx
 
Informatics and nursing 2015 2016.odette richards
Informatics and nursing 2015 2016.odette richardsInformatics and nursing 2015 2016.odette richards
Informatics and nursing 2015 2016.odette richards
 
Accessing and Sharing Electronic Personal Health Data.
Accessing and Sharing Electronic Personal Health Data.Accessing and Sharing Electronic Personal Health Data.
Accessing and Sharing Electronic Personal Health Data.
 
Accessing and Sharing Electronic Personal Health Data
Accessing and Sharing Electronic Personal Health DataAccessing and Sharing Electronic Personal Health Data
Accessing and Sharing Electronic Personal Health Data
 
Big data for health
Big data for healthBig data for health
Big data for health
 
INTERGRATIVE REVIEW 14Equip.docx
INTERGRATIVE REVIEW             14Equip.docxINTERGRATIVE REVIEW             14Equip.docx
INTERGRATIVE REVIEW 14Equip.docx
 
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
 
Nationwide Privacy and Security Framework for Electronic Exchange of.docx
Nationwide Privacy and Security Framework for Electronic Exchange of.docxNationwide Privacy and Security Framework for Electronic Exchange of.docx
Nationwide Privacy and Security Framework for Electronic Exchange of.docx
 
Mitochondrial Disease Community Registry: First look at the data, perspectiv...
Mitochondrial Disease Community Registry:  First look at the data, perspectiv...Mitochondrial Disease Community Registry:  First look at the data, perspectiv...
Mitochondrial Disease Community Registry: First look at the data, perspectiv...
 
Health Informatics- Module 1-Chapter 1.pptx
Health Informatics- Module 1-Chapter 1.pptxHealth Informatics- Module 1-Chapter 1.pptx
Health Informatics- Module 1-Chapter 1.pptx
 
Advancing-OSHMS High-Performance WS in OHM
Advancing-OSHMS High-Performance WS in OHMAdvancing-OSHMS High-Performance WS in OHM
Advancing-OSHMS High-Performance WS in OHM
 
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDSMANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
 
Towards ehr interoperability in tanzania
Towards ehr interoperability in tanzaniaTowards ehr interoperability in tanzania
Towards ehr interoperability in tanzania
 
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
 
Running Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docx
Running Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docxRunning Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docx
Running Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docx
 
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
 
Is Big Data Always Good Data?
Is Big Data Always Good Data? Is Big Data Always Good Data?
Is Big Data Always Good Data?
 
Reply 1Why we need 15 minutes Patient Safety ChecksThis
Reply 1Why we need 15 minutes Patient Safety ChecksThis Reply 1Why we need 15 minutes Patient Safety ChecksThis
Reply 1Why we need 15 minutes Patient Safety ChecksThis
 

More from JUST36

Plan of WorkGloria is employed at Jones University, through .docx
Plan of WorkGloria is employed at Jones University, through .docxPlan of WorkGloria is employed at Jones University, through .docx
Plan of WorkGloria is employed at Jones University, through .docxJUST36
 
Planning, Implementation, and Evaluation Evaluate the importa.docx
Planning, Implementation, and Evaluation Evaluate the importa.docxPlanning, Implementation, and Evaluation Evaluate the importa.docx
Planning, Implementation, and Evaluation Evaluate the importa.docxJUST36
 
Planet of the Apes (1974) (Race relations and slavery—turnabout is .docx
Planet of the Apes (1974) (Race relations and slavery—turnabout is .docxPlanet of the Apes (1974) (Race relations and slavery—turnabout is .docx
Planet of the Apes (1974) (Race relations and slavery—turnabout is .docxJUST36
 
Planning effective English language arts lessons many times incl.docx
Planning effective English language arts lessons many times incl.docxPlanning effective English language arts lessons many times incl.docx
Planning effective English language arts lessons many times incl.docxJUST36
 
PKI Submission RequirementsFormat Microsoft WordFon.docx
PKI Submission RequirementsFormat Microsoft WordFon.docxPKI Submission RequirementsFormat Microsoft WordFon.docx
PKI Submission RequirementsFormat Microsoft WordFon.docxJUST36
 
PLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docx
PLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docxPLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docx
PLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docxJUST36
 
Plato’s Apology The Trial of SocratesSocrates in the trial .docx
Plato’s Apology The Trial of SocratesSocrates in the trial .docxPlato’s Apology The Trial of SocratesSocrates in the trial .docx
Plato’s Apology The Trial of SocratesSocrates in the trial .docxJUST36
 
Pine tree tops” by Gary SnyderIn the blue night frost haze,.docx
Pine tree tops” by Gary SnyderIn the blue night frost haze,.docxPine tree tops” by Gary SnyderIn the blue night frost haze,.docx
Pine tree tops” by Gary SnyderIn the blue night frost haze,.docxJUST36
 
Platform as a Service (PaaS) and Infrastructure as a Service (I.docx
Platform as a Service (PaaS) and Infrastructure as a Service (I.docxPlatform as a Service (PaaS) and Infrastructure as a Service (I.docx
Platform as a Service (PaaS) and Infrastructure as a Service (I.docxJUST36
 
plan for your client Eliza. Since the initial treatment plan, severa.docx
plan for your client Eliza. Since the initial treatment plan, severa.docxplan for your client Eliza. Since the initial treatment plan, severa.docx
plan for your client Eliza. Since the initial treatment plan, severa.docxJUST36
 
Plan a geographic inquiry to investigate the question. In the pl.docx
Plan a geographic inquiry to investigate the question. In the pl.docxPlan a geographic inquiry to investigate the question. In the pl.docx
Plan a geographic inquiry to investigate the question. In the pl.docxJUST36
 
PLAGIARISMWhat is it Whose Responsibility is It Wha.docx
PLAGIARISMWhat is it Whose Responsibility is It Wha.docxPLAGIARISMWhat is it Whose Responsibility is It Wha.docx
PLAGIARISMWhat is it Whose Responsibility is It Wha.docxJUST36
 
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docxPKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docxJUST36
 
Pine Valley Furniture wants to use Internet systems to provide value.docx
Pine Valley Furniture wants to use Internet systems to provide value.docxPine Valley Furniture wants to use Internet systems to provide value.docx
Pine Valley Furniture wants to use Internet systems to provide value.docxJUST36
 
Pick the form of cultural expression most important to you. It could.docx
Pick the form of cultural expression most important to you. It could.docxPick the form of cultural expression most important to you. It could.docx
Pick the form of cultural expression most important to you. It could.docxJUST36
 
Pick two diseases from each of the following systems HEENT .docx
Pick two diseases from each of the following systems HEENT  .docxPick two diseases from each of the following systems HEENT  .docx
Pick two diseases from each of the following systems HEENT .docxJUST36
 
Pick only one topic!!!!!!!!!!You will need to choose one topic f.docx
Pick only one topic!!!!!!!!!!You will need to choose one topic f.docxPick only one topic!!!!!!!!!!You will need to choose one topic f.docx
Pick only one topic!!!!!!!!!!You will need to choose one topic f.docxJUST36
 
Pick one organized religion to research. First, describe the religio.docx
Pick one organized religion to research. First, describe the religio.docxPick one organized religion to research. First, describe the religio.docx
Pick one organized religion to research. First, describe the religio.docxJUST36
 
Pick one of the 2 (Buddhist Syllogism or Meditation)...The B.docx
Pick one of the 2 (Buddhist Syllogism or Meditation)...The B.docxPick one of the 2 (Buddhist Syllogism or Meditation)...The B.docx
Pick one of the 2 (Buddhist Syllogism or Meditation)...The B.docxJUST36
 
Pick one of the following terms for your research Moral philosophy,.docx
Pick one of the following terms for your research Moral philosophy,.docxPick one of the following terms for your research Moral philosophy,.docx
Pick one of the following terms for your research Moral philosophy,.docxJUST36
 

More from JUST36 (20)

Plan of WorkGloria is employed at Jones University, through .docx
Plan of WorkGloria is employed at Jones University, through .docxPlan of WorkGloria is employed at Jones University, through .docx
Plan of WorkGloria is employed at Jones University, through .docx
 
Planning, Implementation, and Evaluation Evaluate the importa.docx
Planning, Implementation, and Evaluation Evaluate the importa.docxPlanning, Implementation, and Evaluation Evaluate the importa.docx
Planning, Implementation, and Evaluation Evaluate the importa.docx
 
Planet of the Apes (1974) (Race relations and slavery—turnabout is .docx
Planet of the Apes (1974) (Race relations and slavery—turnabout is .docxPlanet of the Apes (1974) (Race relations and slavery—turnabout is .docx
Planet of the Apes (1974) (Race relations and slavery—turnabout is .docx
 
Planning effective English language arts lessons many times incl.docx
Planning effective English language arts lessons many times incl.docxPlanning effective English language arts lessons many times incl.docx
Planning effective English language arts lessons many times incl.docx
 
PKI Submission RequirementsFormat Microsoft WordFon.docx
PKI Submission RequirementsFormat Microsoft WordFon.docxPKI Submission RequirementsFormat Microsoft WordFon.docx
PKI Submission RequirementsFormat Microsoft WordFon.docx
 
PLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docx
PLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docxPLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docx
PLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docx
 
Plato’s Apology The Trial of SocratesSocrates in the trial .docx
Plato’s Apology The Trial of SocratesSocrates in the trial .docxPlato’s Apology The Trial of SocratesSocrates in the trial .docx
Plato’s Apology The Trial of SocratesSocrates in the trial .docx
 
Pine tree tops” by Gary SnyderIn the blue night frost haze,.docx
Pine tree tops” by Gary SnyderIn the blue night frost haze,.docxPine tree tops” by Gary SnyderIn the blue night frost haze,.docx
Pine tree tops” by Gary SnyderIn the blue night frost haze,.docx
 
Platform as a Service (PaaS) and Infrastructure as a Service (I.docx
Platform as a Service (PaaS) and Infrastructure as a Service (I.docxPlatform as a Service (PaaS) and Infrastructure as a Service (I.docx
Platform as a Service (PaaS) and Infrastructure as a Service (I.docx
 
plan for your client Eliza. Since the initial treatment plan, severa.docx
plan for your client Eliza. Since the initial treatment plan, severa.docxplan for your client Eliza. Since the initial treatment plan, severa.docx
plan for your client Eliza. Since the initial treatment plan, severa.docx
 
Plan a geographic inquiry to investigate the question. In the pl.docx
Plan a geographic inquiry to investigate the question. In the pl.docxPlan a geographic inquiry to investigate the question. In the pl.docx
Plan a geographic inquiry to investigate the question. In the pl.docx
 
PLAGIARISMWhat is it Whose Responsibility is It Wha.docx
PLAGIARISMWhat is it Whose Responsibility is It Wha.docxPLAGIARISMWhat is it Whose Responsibility is It Wha.docx
PLAGIARISMWhat is it Whose Responsibility is It Wha.docx
 
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docxPKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
 
Pine Valley Furniture wants to use Internet systems to provide value.docx
Pine Valley Furniture wants to use Internet systems to provide value.docxPine Valley Furniture wants to use Internet systems to provide value.docx
Pine Valley Furniture wants to use Internet systems to provide value.docx
 
Pick the form of cultural expression most important to you. It could.docx
Pick the form of cultural expression most important to you. It could.docxPick the form of cultural expression most important to you. It could.docx
Pick the form of cultural expression most important to you. It could.docx
 
Pick two diseases from each of the following systems HEENT .docx
Pick two diseases from each of the following systems HEENT  .docxPick two diseases from each of the following systems HEENT  .docx
Pick two diseases from each of the following systems HEENT .docx
 
Pick only one topic!!!!!!!!!!You will need to choose one topic f.docx
Pick only one topic!!!!!!!!!!You will need to choose one topic f.docxPick only one topic!!!!!!!!!!You will need to choose one topic f.docx
Pick only one topic!!!!!!!!!!You will need to choose one topic f.docx
 
Pick one organized religion to research. First, describe the religio.docx
Pick one organized religion to research. First, describe the religio.docxPick one organized religion to research. First, describe the religio.docx
Pick one organized religion to research. First, describe the religio.docx
 
Pick one of the 2 (Buddhist Syllogism or Meditation)...The B.docx
Pick one of the 2 (Buddhist Syllogism or Meditation)...The B.docxPick one of the 2 (Buddhist Syllogism or Meditation)...The B.docx
Pick one of the 2 (Buddhist Syllogism or Meditation)...The B.docx
 
Pick one of the following terms for your research Moral philosophy,.docx
Pick one of the following terms for your research Moral philosophy,.docxPick one of the following terms for your research Moral philosophy,.docx
Pick one of the following terms for your research Moral philosophy,.docx
 

Recently uploaded

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Picot question introduction technology keeps adva

  • 1. Picot Question Introduction Technology keeps advancing at a faster rate than anything else. The advancements in technology have both positive and negative impact on patients. Breach of patient confidential information has been made easier with advancement in technology. (Pathak, 2019). Advancement in technology has led to an increase in data breach especially in healthcare facilities like hospitals. 2 Clinical Issue Patient information includes medical records which are private. Breach of patient confidential information happens when their private information is disclosed to a third party. The biggest confidentiality threat is hacking. Patients are always leaving the personal information at the hospital.
  • 2. (Hammouchi, 2019) (McLeod, 2018). The patient usually disclose their private information whenever they visit healthcare facilities. This information is private and should be protected. The clinical issue is breach to the confidentiality of patient information. 3 Cont’ The medical profession involves trust between the professionals and the patients. The professionals should maintain the trust by protecting the patient’s confidentiality. (Yeng, 2021). Doctors and other healthcare professionals have a role in protecting the personal information of the patient. 4
  • 3. PICOT Question The focus was on confidentiality of patient information. The population affected is patient group between the ages of 45- 70 years who are technology savvy. They are more vulnerable to hackers when accessing portal. The PICOT question was developed with focus on the older generation which is not technology savvy. They are more vulnerable to cyber attacks when using portals. 5 Cont’ Population (P): Patients between 45-70 years. Intervention (I): Patient portal. Comparison (C): Patients between 16-40 years of age. Outcome (O): Losing private information for lack of understanding of the portal. The population is patients between the ages of 45-70 Intervention is patient portal Comparison (C): Patients between 16-40 years of age. Outcome (O): Losing private information for lack of understanding of the portal.
  • 4. 6 Research Databases Search databases included Google Scholar, JSTOR, and Walden University Library. Walden University has two databases Computer Science Database and the Ovid Nursing Books Database. Search databases included Google Scholar, JSTOR, and Walden University Library. 7 Level of Evidence The level of evidence is IV and V The study will be a descriptive study that will answer how, what, when, and where. The evidence is collected from Patients between 45-70 years. The level of evidence I IV This is because the study is descriptive. Evidence is collected from Patients between 45-70 years. 8 Peer-review articleLevel of EvidenceStrengthsMcLeod, A., &
  • 5. Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, Science Direct. 108, 57-68.Level IV- cohort studyPresents tangible results that show exposure levels, organizational factors, security factors, and healthcare data breaches.Pathak, P. R., & Chou, A. (2019). Confidential care for adolescents in the US Health Care System. Journal of patient-centered research and reviews, 6(1), 46.Level IV- Qualitative studyShows how the best practices should be implemented in the protection of patient data. Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Ahmad Khan, R. (2020, June). Healthcare data breaches: Insights and implications. In Healthcare (Vol. 8, No. 2, p. 133). Multidisciplinary Digital Publishing Institute.Level IV- cohort studyThe article shows how healthcare systems are highly exposed to the external threats to information security breachWalker-Roberts, S., Hammoudeh, M., & Dehghantanha, A. (2018). A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access, 6, 25167-25177.Level V- Evidence gathered from Systematic review of qualitative study.The results show how a reactive approach may not be the best methods for protecting the patients’ private records. References Hammouchi, H., Cherqi, O., Mezzour, G., Ghogho, M., & El Koutbi, M. (2019). Digging deeper into data breaches: An exploratory data analysis of hacking breaches over time. Procedia Computer Science, 151, 1004-1009. McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, Science Direct. 108, 57-68.
  • 6. Pathak, P. R., & Chou, A. (2019). Confidential care for adolescents in the US Health Care System. Journal of patient- centered research and reviews, 6(1), 46. Yeng, P. K., Szekeres, A., Yang, B., & Snekkenes, E. A. (2021). Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study. JMIR Human Factors, 8(2), e17604.