1. Picot Question
Introduction
Technology keeps advancing at a faster rate than anything else.
The advancements in technology have both positive and
negative impact on patients.
Breach of patient confidential information has been made easier
with advancement in technology.
(Pathak, 2019).
Advancement in technology has led to an increase in data
breach especially in healthcare facilities like hospitals.
2
Clinical Issue
Patient information includes medical records which are private.
Breach of patient confidential information happens when their
private information is disclosed to a third party.
The biggest confidentiality threat is hacking.
Patients are always leaving the personal information at the
hospital.
2. (Hammouchi, 2019)
(McLeod, 2018).
The patient usually disclose their private information whenever
they visit healthcare facilities.
This information is private and should be protected.
The clinical issue is breach to the confidentiality of patient
information.
3
Cont’
The medical profession involves trust between the professionals
and the patients.
The professionals should maintain the trust by protecting the
patient’s confidentiality.
(Yeng, 2021).
Doctors and other healthcare professionals have a role in
protecting the personal information of the patient.
4
3. PICOT Question
The focus was on confidentiality of patient information.
The population affected is patient group between the ages of 45-
70 years who are technology savvy.
They are more vulnerable to hackers when accessing portal.
The PICOT question was developed with focus on the older
generation which is not technology savvy.
They are more vulnerable to cyber attacks when using portals.
5
Cont’
Population (P): Patients between 45-70 years.
Intervention (I): Patient portal.
Comparison (C): Patients between 16-40 years of age.
Outcome (O): Losing private information for lack of
understanding of the portal.
The population is patients between the ages of 45-70
Intervention is patient portal
Comparison (C): Patients between 16-40 years of age.
Outcome (O): Losing private information for lack of
understanding of the portal.
4. 6
Research Databases
Search databases included Google Scholar, JSTOR, and Walden
University Library.
Walden University has two databases Computer Science
Database and the Ovid Nursing Books Database.
Search databases included Google Scholar, JSTOR, and Walden
University Library.
7
Level of Evidence
The level of evidence is IV and V
The study will be a descriptive study that will answer how,
what, when, and where.
The evidence is collected from Patients between 45-70 years.
The level of evidence I IV
This is because the study is descriptive.
Evidence is collected from Patients between 45-70 years.
8
Peer-review articleLevel of EvidenceStrengthsMcLeod, A., &
5. Dolezel, D. (2018). Cyber-analytics: Modeling factors
associated with healthcare data breaches. Decision Support
Systems, Science Direct. 108, 57-68.Level IV- cohort
studyPresents tangible results that show exposure levels,
organizational factors, security factors, and healthcare data
breaches.Pathak, P. R., & Chou, A. (2019). Confidential care
for adolescents in the US Health Care System. Journal of
patient-centered research and reviews, 6(1), 46.Level IV-
Qualitative studyShows how the best practices should be
implemented in the protection of patient data. Seh, A. H.,
Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R.,
& Ahmad Khan, R. (2020, June). Healthcare data breaches:
Insights and implications. In Healthcare (Vol. 8, No. 2, p. 133).
Multidisciplinary Digital Publishing Institute.Level IV- cohort
studyThe article shows how healthcare systems are highly
exposed to the external threats to information security
breachWalker-Roberts, S., Hammoudeh, M., & Dehghantanha,
A. (2018). A systematic review of the availability and efficacy
of countermeasures to internal threats in healthcare critical
infrastructure. IEEE Access, 6, 25167-25177.Level V- Evidence
gathered from Systematic review of qualitative study.The
results show how a reactive approach may not be the best
methods for protecting the patients’ private records.
References
Hammouchi, H., Cherqi, O., Mezzour, G., Ghogho, M., & El
Koutbi, M. (2019). Digging deeper into data breaches: An
exploratory data analysis of hacking breaches over time.
Procedia Computer Science, 151, 1004-1009.
McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling
factors associated with healthcare data breaches. Decision
Support Systems, Science Direct. 108, 57-68.
6. Pathak, P. R., & Chou, A. (2019). Confidential care for
adolescents in the US Health Care System. Journal of patient-
centered research and reviews, 6(1), 46.
Yeng, P. K., Szekeres, A., Yang, B., & Snekkenes, E. A. (2021).
Mapping the Psychosocialcultural Aspects of Healthcare
Professionals’ Information Security Practices: Systematic
Mapping Study. JMIR Human Factors, 8(2), e17604.