1
9
The Complexity and Evolving Technologies of the Healthcare Industry
Good Student
University of Maryland Global Campus
Course
Instructor
Date
The Complexity and Evolving Technologies of the Healthcare Industry
The healthcare industry as we know it is constantly evolving and growing exponentially every year for many reasons, such as regulation changes from federal and state agencies, changes to coverage from health insurance companies, illness trends, developments in medicine, and demographics of medical staff. Two of the most important reasons are due to the evolving medical needs of patients and the advancements in technology that provide viable options to these patients in need. These technology advancements in the healthcare arena has generated interest from cybercriminals. Cybercriminals have no preference in whom they target if they can gain profit or cause a negative impact to the end user(s). When these vulnerabilities are discovered and attacks occur in the healthcare industry, it could literally mean the difference between life and death for patients. This critical outcome has created a high demand for cybersecurity and technical personnel in this industry to implement them. Three of the top trends in the healthcare industry as it relates to cybersecurity are the increased dangers of 3D printing in medicine, revolution of big data and advanced analytics in the healthcare system, and Internet of Things (IoT) and cloud computing as a security threat to healthcare. This paper will focus on the complexity of the healthcare industry and how transitioning to the Internet of Things and cloud computing has created a large security threat to all medical practices around the world.
Top Trends of the Healthcare Industry
Technologists and companies around the world have embraced the importance and endless possibilities of 3D printing (NAICS 323111). 3D printing is a manufacturing process that creates a three dimensional object by incrementally adding material until the object is complete (this contrasts with subtractive manufacturing techniques such as carving or milling, in which an object is created by selectively removing parts from a piece of raw material) (Lacoma, 2018). Many manufacturing companies first began using 3D printing to resolve some of their most difficult problems and improve the efficiency of their processes. The healthcare industry began to take notice and medical experts began developing ideas on how this technology could be implemented in their medical practices. 3D printing in healthcare makes it possible for medical professionals to provide patients with a new form of treatment in several ways. 3D printing is used for the development of new surgical cutting and drill guides, prosthetics as well as the creation of patient-specific replicas of bones, organs, and blood vessels (Izukor, 2019).
Although the benefits of using this technology in medicine are endless, the process has created a height.
9953330565 Low Rate Call Girls In Rohini Delhi NCR
19The Complexity and Evolving Technolog.docx
1. 1
9
The Complexity and Evolving Technologies of the Healthcare
Industry
Good Student
University of Maryland Global Campus
Course
Instructor
Date
The Complexity and Evolving Technologies of the Healthcare
Industry
The healthcare industry as we know it is constantly evolving
2. and growing exponentially every year for many reasons, such as
regulation changes from federal and state agencies, changes to
coverage from health insurance companies, illness trends,
developments in medicine, and demographics of medical staff.
Two of the most important reasons are due to the evolving
medical needs of patients and the advancements in technology
that provide viable options to these patients in need. These
technology advancements in the healthcare arena has generated
interest from cybercriminals. Cybercriminals have no preference
in whom they target if they can gain profit or cause a negative
impact to the end user(s). When these vulnerabilities are
discovered and attacks occur in the healthcare industry, it could
literally mean the difference between life and death for patients.
This critical outcome has created a high demand for
cybersecurity and technical personnel in this industry to
implement them. Three of the top trends in the healthcare
industry as it relates to cybersecurity are the increased dangers
of 3D printing in medicine, revolution of big data and advanced
analytics in the healthcare system, and Internet of Things (IoT)
and cloud computing as a security threat to healthcare. This
paper will focus on the complexity of the healthcare industry
and how transitioning to the Internet of Things and cloud
computing has created a large security threat to all medical
practices around the world.
Top Trends of the Healthcare Industry
Technologists and companies around the world have embraced
the importance and endless possibilities of 3D printing (NAICS
323111). 3D printing is a manufacturing process that creates a
three dimensional object by incrementally adding material until
the object is complete (this contrasts with subtractive
manufacturing techniques such as carving or milling, in which
an object is created by selectively removing parts from a piece
of raw material) (Lacoma, 2018). Many manufacturing
companies first began using 3D printing to resolve some of their
most difficult problems and improve the efficiency of their
processes. The healthcare industry began to take notice and
3. medical experts began developing ideas on how this technology
could be implemented in their medical practices. 3D printing in
healthcare makes it possible for medical professionals to
provide patients with a new form of treatment in several ways.
3D printing is used for the development of new surgical cutting
and drill guides, prosthetics as well as the creation of patient-
specific replicas of bones, organs, and blood vessels (Izukor,
2019).
Although the benefits of using this technology in medicine are
endless, the process has created a heightened risk of misuse or
tampering by cybercriminals. If a hacker can obtain the digital
design files or proprietary information about the design of a
medical product such as prosthetics, they could potentially
introduce flawed design modifications. For example, in some
cases, simply changing the orientation of a product during 3D
printing may affect its strength and utility for a specific purpose
(Redding, 2019). These unwanted modifications could lead to
severe damage to patients and cost the healthcare industry
millions in settlements. This scenario has created the demand
for better cybersecurity against these attackers. Security experts
have begun encouraging these companies to begin using
removable drives exclusively, soundproofing walls, installing
firewalls, and unplugging these printers from the internet to
help with reducing the number of successful cyber-attacks.
The introduction of big data (NAICS 518210) within the
healthcare industry is building momentum and seemingly
transforming the way patients and healthcare providers are
providing services. Currently, the primary data pools for the
big-data revolution in healthcare are activity (claims) and cost
data, clinical data, pharmaceutical R&D data, and patient
behavior and sentiment data (Groves, Kayyali, et al., 2013). As
the data from these four data pools accumulate over time,
analytic teams can develop advanced algorithms, applications,
proactive treatments, trends, and insights that are impactful to
all stakeholders of the healthcare industry. Advanced analytics
is key to ensuring data is quickly reviewed and the best options
4. are made available to health professionals. For example, claims
data may show that a patient has tried three treatments for
cancer, but only the clinical data show us which was effective
in shrinking the tumor (Groves, Kayyali, et al., 2013). Examples
such as this demonstrate how this data can help with the
outcome of a patients’ health, assist physicians with choosing
the proper procedures, and reduce cost on unnecessary
treatments. In parallel to the implementation of Big Data across
all medical practices, personal data such as electronic medical
records and devices are constantly being compromised by
criminals. Each of these incidents result in fines and
remediation cost to patients. For example, in 2018 a major
health insurance company paid a record $16 million HIPPA fine
when nine million patient health records were exposed (Baker,
2019). For now, to address the need for better cybersecurity, the
Department of Health and Human Services (HHbS) released
reports on cybersecurity best practices and understanding the
risks of using certain technologies.
The Internet of Things (IoT) (NAICS 541330) is currently
a relatively new market not only in the healthcare industry, but
most industries. The IoT is a megatrend in next-generation
technologies that can impact the whole business spectrum and
can be thought of as the interconnection of uniquely identifiable
smart objects and devices within today’s internet infrastructure
with extended benefits (Islam, et al., 2015). With the
introduction of IoT in healthcare, cloud computing has played a
pivotal role in their complimentary relationship. While IoT
produces large amounts of data, the primary responsibility of
cloud computing (NAICS 541519) is to ensure the data is
guided and stored in the correct locations. These technologies
have helped to improve the efficiency in healthcare operations.
With the growing complexity of this industry along with the
adoption of IoT and cloud computing, a large security threat is
beginning to manifest itself within healthcare.
Growing complexity of the healthcare industry
The importance of the healthcare industry is undeniably
5. vital to most living beings and species as patients visit medical
facilities as often as once a year or as many as five times a
week to meet with their health professionals. As the population
continues to live longer lives, the higher the demand for
healthcare services. The reason the healthcare industry is
perceived as complex is due to the multilayers of medical
services, growth of industry worldwide, lengthy list of laws and
regulations, advancements in technologies, unique cost models,
and the differences between each layer. For example, the health
care system comprises networks of components (hospitals,
clinics, nursing homes, rehabilitation units, patient homes,
families, and patients) that interact nonlinearly on different
scales (the patient, family, medical center, and government),
and often produce unintended consequences (adverse drug
reactions, nosocomial infections, rehospitalizations, and
functional decline) (Lipsitz, 2012). Every year these
components change as well as grow exponentially in size which
inadvertently impacts consumers of the healthcare industry. In
order to address some of the complexity and industry growth,
technology advancements were implemented and continually
improved in which we will be described next.
The adoption of IoT and cloud computing
As the populations continue to thrive into longer years, decline
in health professionals, growth of electronic data, and the
demand for remote medical monitoring, the advancements of
technology have provided solutions to many of these issues.
One example of the IoT in healthcare is the Continuous Glucose
Monitor (CGM) that monitors the blood glucose levels. The
body sensor collects data and uses Wi-Fi to send information to
the appropriate cloud infrastructure. When the readings are
above normal levels, the physician and patient are notified
along with corrective actions. A similar technology is the
Bluetooth-enabled weight scale and blood pressure cuff that
tracks patients’ conditions following cancer treatments as soon
as they depart the medical facility. Like the CGM, cloud
computing is vital when this data is collected from the sensor as
6. it needs to be stored, processed, and made available in a user-
friendly dashboard/application within seconds of collection.
The cloud computing infrastructure provides the essential
resources (like CPU, storage and application servers) for
deploying the web application and the interfaces that enable the
communication with the sensors and the various external
systems (Doukas & Maglogiannis, n.d.). The adoption of IoT
and cloud computing has saved lives due to proactive
monitoring, reduced costs to medical providers, and has made
viewing patients’ current vitals readily available from any
network connected device.
The costly security threat of healthcare technology
As more technology is implemented throughout the industry, the
security threat grows in parallel. Adding connectivity to these
devices has led to revolutions in medical science and have
changed the way institutions are able to care for patients, but
not without added risks. Without proper cybersecurity in place,
electronic patient records containing personally identifiable
information and network connected medical devices are subject
to cyber criminals. When criminals can illegally access this
sensitive data, they manipulate the functionality of medical
devices, perform ransomware attacks on systems at medical
facilities, create false identities, and other attacks that
negatively impact operations.
Whenever data is exposed to the internet, the risk of the data
being compromised is prevalent, but the stakes are much higher
when it relates to healthcare and the protection of patients.
How healthcare can address the security threats
Any network connected devices are vulnerable to be attacked by
cybercriminals, but there are security best practices that could
limit or prevent these security threats. At a minimum, the IT
staff could ensure users regularly perform security updates,
educate users about phishing techniques, deploy encryption
tools, enforce strong password combinations, and provide users
with security best practices. In addition, health systems and
companies should communicate cybersecurity plans to
7. community leaders, policymakers, patients and other
stakeholders to build confidence and generate best practices
(Baker, 2019). Collaboration in and outside this industry is
essential in order to maintain and adapt to the constantly
changing landscape of cybersecurity.
Conclusion
To conclude, this paper provided information regarding top
trends in the healthcare industry as it relates to cybersecurity. It
also discussed the security threat that this industry currently
faces with the growth of technology advancements in the
medical field. Depending on the sensitivity of data collected by
cybercriminals, the damages could result in huge financial
losses, reduction in employment, life-threatening scenarios, or
even closure of medical facilities. In order to mitigate the
multiple security threats in this industry, the IT department
within each medical provider would need to strategically
develop guidelines and policies that involve implementing
various security best practices without impacting medical
operations.
ReferencesBaker, M. (4 February 2019). Big Data Transforming
Healthcare, But Cybersecurity Issues Loom.
https://www.wileyconnect.com/home/2019/2/4/big-data-
transforming-healthcare-but-cybersecurity-issues-loomBurrill,
S. & Beaudoin, D (2019). 2019 US and global health care
industry outlook.
https://www2.deloitte.com/us/en/pages/life-sciences-
and-health-care/articles/us-and-global-health-care-industry-
trends-outlook.html
Doukas, C. & Maglogiannis, I. (n.d.). Bringing IoT and cloud
computing towards pervasive healthcare.
https://www.researchgate.net/profile/Ilias_Maglogiannis/publica
tion/261431852_Bringing_IoT_and_Cloud_Computing_towards
_Pervasive_Healthcare/links/563c7e4708ae45b5d288eb41.pdf
Groves, P., Kayyali, B., Knott, D., & Kuiken, S. (2013
8. January). The ‘big data’ revolution in healthcare.
http://repositorio.colciencias.gov.co/bitstream/handle/11146/46
5/1661-
The_big_data_revolution_in_healthcare.pdf?sequence=1&isAllo
wed=y
Islam, S.M., Kwak, D., Kabir, H., Hossain, M., & Kwak, K. (4
July 2015). The Internet of Things for health care: A
comprehensive survey.
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7113786
Izukor, C. (6 May 2019). Cyber security trends in healthcare.
Retrieved from
https://blog.veriato.com/cyber-security-trends-in-
healthcare
Lacoma, T. (16 June 2018). What is 3D printing? Here’s
everything you need to know.
https://www.digitaltrends.com/computing/what-is-3d-
printing/
Lipsitz, L. (18 July 2012). Understanding health care as a
complex system.
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3511782/
Redding, H. (5 July 2017). The cybersecurity risks of 3D
printing.
https://bdtechtalks.com/2017/07/05/the-cybersecurity-
risks-of-3d-printing/
9. Respond to at least two of your peers by extending,
refuting/correcting, or adding additional nuance to their posts.
Post #1
Jessica Rincon
St. Thomas University
NUR 417 AP2
Prof. Yedelis Diaz
10/16/2022
Elder Abuse
According to Santos et al. (2019), elder abuse is the failure to
protect an elderly person from harm or to provide for his or her
basic needs, by a caregiver. The definition of elder abuse also
includes intentional or unintentional actions or inactions of a
caregiver that create a serious risk of harm or cause harm to a
vulnerable elder. Lecture Notes (Slide 5) present that elder
abuse can be domestic, institutional, or result from self-neglect.
The seven types of elder abuse are self-neglect, abandonment,
physical abuse, emotional abuse, neglect, material and financial
exploitation, and sexual abuse.
Weissberger et al. (2020) define physical abuse as intentionally
causing an elderly person physical injury, harm, pain, distress,
or functional impairment through the use of force. Forms of
physical abuse include inappropriate use of physical or
medication restraints, physical punishment, hitting, and
slapping. Self-neglect, as the name suggests, is any self-
inflicted behavior that threatens the elderly person’s safety and
health (Weissberger et al., 2020). Actions such as failure to
provide self with appropriate hygiene and adequate food are
self-neglect. The elder abuse of abandonment is closely related
to that of self-neglect, except that it is perpetrated by the
elderly person’s caregiver.
Neglect also shares similar characteristics as it is defined as the
failure of the caretaker to meet the necessary basic needs, such
as adequate clothing, shelter, food, social stimulation, and
10. medical attention, of an elderly person (Weissberger et al.,
2020). Emotional abuse refers to causing an elderly person
anguish, psychological pain, distress, fear, and geographic
isolation through verbal and non-verbal interactions. Disrespect,
threats, and humiliation qualify as forms of emotional abuse
(Weissberger et al., 2020). Lastly, sexual abuse is unwanted or
forced sexual interaction or contact, while financial exploitation
refers to fraudulent, unauthorized, or improper use of the
property of an elderly person by a trusted individual, caregiver,
or stranger for the benefit of the exploiter and not the elderly
person (Weissberger et al., 2020).
Approaching Ethical Dilemmas
Euthanasia, suicide, and assisted suicide to present the most
common forms of ethical dilemmas nurses face in their delivery
of care. The primary approach to such ethical dilemmas is to
rely on the professional codes of ethics that govern nursing
practice. These codes of ethics are based on the ethical
principles of self-determination or autonomy, beneficence,
nonmaleficence, justice, and veracity (Lecture Notes, Slide 31).
For example, the code of ethics for nurses states that nurses
should not participate in assisted suicide (Lecture Notes, Slide
32). Therefore, nurses must acquaint themselves with the
provisions of the professional ethical codes of the practice for
guidance on how to respond to the various ethical dilemmas
regarding euthanasia, suicide, and assisted suicide. Nurses
should also consult ethics committees for advice on dilemmas
and value conflicts, as this is part of the role of such
committees.
Consequently, nurses must know the laws of the state within
which they practice, particularly regarding these ethical
dilemmas. This is because nurses have the responsibility of
facilitating informed decision-making on such issues, which
they can only achieve when they have adequate knowledge of
laws and regulations on the issue. For instance, all 50 states
consider an act of affirmative euthanasia an illegal criminal
offense (Lecture Notes, Slide 32). With such knowledge, it
11. becomes easier for nurses to address ethical dilemmas
concerning euthanasia. In other words, nurses can either rely on
their knowledge of the ethical principles and laws concerning
the ethical dilemma in question or seek the advice of others,
such as ethics committees, when faced with ethical dilemmas
regarding euthanasia, suicide, and assisted suicide.
References
Lecture Notes. (n.d.). Chapter 3: Legal and Ethical Issues.
Santos, A. J., Nunes, B., Kislaya, I., Gil, A. P., & Ribeiro, O.
(2019). Elder abuse victimization patterns: latent class analysis
using perpetrators and abusive behaviors. BMC
geriatrics, 19(1), 1-11.
Weissberger, G. H., Goodman, M. C., Mosqueda, L., Schoen, J.,
Nguyen, A. L., Wilber, K. H., ... & Han, S. D. (2020). Elder
abuse characteristics based on calls to the National Center on
elder abuse resource line. Journal of Applied
Gerontology, 39(10), 1078-1087.
Post #2
Lisa Wright
St. Thomas University
NUR 417: Aging and End of Life
Yedelis Diaz
12. October 20, 2022
Elder Abuse
Aging is a normal biological process that we all life
goes through. As one age, their functions become diminished,
and they need enhanced attention to lead whole lives. While the
process does not lead to disease or disability, it does reduce
one’s capacity to respond to such challenges. Due to their
vulnerable state, the elderly often gets abused since they cannot
speak for themselves or cannot. National Council on Aging
(n.d.) estimates that about five million elders experience abuse
annually, which is staggering. This assignment module will
examine the types of abuse identified by the National Center on
Elder Abuse (NCEA) and how I would approach the ethical
dilemmas and the considerations that accompany Euthanasia,
suicide, and assisted suicide.
Types of Elder Abuse
The NCEA outlines several types of elder abuse that we
should look out for to help the population (National Center on
Elder Abuse, n.d.).
Physical Abuse
This abuse takes the form of physical force leading to
injuries and harm to the elderly. It can also include improper
use of restraints, medication, or feeding them by force. Its
symptoms include fractures, bruises, and unexplained bleeding
or injuries.
Sexual Abuse
It involves an involuntary engagement in the act of sex
with an elderly. Without consent, any act of sex is deemed
abuse, and it is a deplorable phenomenon that some among the
population endure. It is characterized by strange venereal
illnesses or bruising in the breast and pelvic region.
Emotional or Psychological Abuse
This inflicts pain and suffering on the elderly using
voiced or non-verbal means. When an older adult feels helpless
from what someone says since they cannot fend for themselves,
this is emotional abuse. Its main symptoms include withdrawal
13. or being overly restless.
Neglect
This is refusing to realize one’s responsibilities towards
an older adult. Due to their advanced age and reduced
functionality, they need assistance to get by, and when it is not
rendered, this is considered neglect.
Abandonment
This is the desertion of the elderly that results in
dereliction of their care. It is primarily witnessed in family
situations where a family member takes on the responsibility
and then abandons the person (Ludvigsson et al., 2022).
Financial exploitation
It is the misuse of an elderly’s wealth by taking
advantage of their low capacity to use or protect it. It can be
forging their signatures or cashing their checks without their
direction.
Self-Neglect
These are situations when the elderly are at risk through
self-harm or failure to care for themselves properly. At this
stage, assistance is called for mostly from family members.
Ethical Dilemmas Regarding Euthanasia, Suicide, and Assisted
Suicide
Euthanasia
While the right to life is guaranteed, the question
remains whether the right to end it should also be granted. It is
also a dilemma to determine in what situations life should be
ended. While it is illegal in the country, some argue that it is
not suitable for someone to be denied the right to die with
dignity while being granted the right to live in anguish
(Buchbinder, 2018). Regardless of the ethical dilemma and
situation, I may face, I would stand by my ethical obligation of
doing no harm.
Assisted Suicide
I believe assisted suicide contradicts the healthcare
professional’s oath and mandate of caring and healing. While it
may present a compelling case for death, for instance, of
14. constant and anguishing pain due to terminal illnesses with
close to no hope of treatment, allowing assisted suicide would
ultimately result in more harm than good.
Suicide
Suicide should not be condoned under any
circumstance. Despite what a patient is going through or how
bleak their situation may appear, care should always be
prioritized and administered to the last possible stage of life
while respecting the patient’s autonomy. Pain control and
proper communication should also be highly prioritized.
Conclusion
Life is sacred and should always be treated as such. It is
deplorable to witness the elderly abused because they cannot
advocate for themselves. The worst part of the situation is that
most cases remain unreported. Regarding care for the elderly,
healthcare professionals need to be meticulously keen to ensure
that their quality of life is not impaired under any
circumstances. Decisions on the end of life are also a sore spot
and a point of contest among different perspectives. Regardless
of the approach, the consensus is that life is precious and should
be preserved. This assignment module explored the types of
abuse identified by the National Center on Elder Abuse (NCEA)
and how I would approach the ethical dilemmas and the
considerations that accompany Euthanasia, suicide, and assisted
suicide.
References
Buchbinder, M. (2018). Access to Aid-in-Dying in the United
States: Shifting the debate from rights to justice.
American Journal of Public Health,
108(6), 754. https://doi.org/10.2105/AJPH.2018.304352
Ludvigsson, M., Wiklund, N., Swahnberg, K., & Simmons, J.
(2022). Experiences of elder abuse: a qualitative study among
victims in Sweden.
BMC Geriatrics,
15. 22(1), 1–12. https://doi.org/10.1186/S12877-022-02933-
8/FIGURES/2
National Center on Elder Abuse. (n.d.).
NCEA - Abuse types. https://ncea.acl.gov/Suspect-
Abuse/Abuse-Types.aspx
National Council on Aging. (n.d.).
Get the facts on elder abuse.
https://www.ncoa.org/article/get-the-facts-on-elder-abuse
1
7
Trends in the [Fill in relevant term(s) here] Industry
Comment by Kathleen Hogan: Note to students: This
template is intended to help you organize the parts of your
Trends project so that you build each section as directed.
You will submit a draft to your professor of the first part at the
end of Week 2. This is important! Use the feedback from your
professor to refine your trends section and correct any errors in
your reference citations. Then work on the issue of interest,
review and edit your work, and submit your completed paper at
the end of Week 3. It you want to send a draft to the writing
tutors, build in time to get that feedback and use it for your
final.
Please delete all the instructions/notes within this template
before submitting your final paper. In the web version, click
the three dots in the upper right corner and select delete thread.
16. In the desktop version, right click on the comment and select
delete.
Good luck!!
[Fill in your first and last name]
University of Maryland Global Campus
[Fill in your course name]
[Fill in instructor’s name]
[Fill in due date]
[Insert a page break after your last line of text so your first
page will always be on a new page no matter how much you edit
your paper. In Word, go to “Insert” and choose “Page Break”.]
Trends in the [Fill in relevant term(s) here] Industry
Comment by Kathleen Hogan: Put your title here as it’s
written on your title page. It is a Level 1 heading (centered and
bold). Read more about APA Level Headings (apa.org).
This first section (due at the end of Week 2 for a review)
consists of the title page, introductory paragraph, Level 1 and
Level 2 headings, discussion of three trends, and your
references page. Within your introductory paragraph, introduce
your industry and clearly identify the top three trends your
17. research has uncovered. Remember to use in-text citations if
you are using others’ ideas (Hogan, 2021). Your final sentence
should be a transition that leads into the discussion of your first
trend in the body of your paper. Comment by Kathleen
Hogan: For a refresher, go here: In-Text Citations - APA 7th
Edition Citation Examples - LibGuides at University of
Maryland Global Campus (umgc.edu) ***This is an excellent
website to bookmark for future use!
Discussion of Three Trends
[Name of Trend #1] Comment by Kathleen Hogan: This is a
Level 2 heading (left-justified and bold). Continue this pattern
for Trends 2 and 3.
In this section, introduce and discuss Trend #1 in 1-2
paragraphs. Explain how this trend is new to the industry and
what it signals for the industry. Note that all paragraphs are
indented a tab at 0.5”. Also, all lines are double spaced. The
final sentence of this paragraph should lead into the first
sentence of the next paragraph. You will have an opportunity to
revise this section when you receive feedback from your
professor on your draft.
[Name of Trend #2]
In this section, introduce and discuss Trend #1 in 1-2
paragraphs. Explain how this trend is new to the industry and
what it signals for the industry. The final sentence of this
paragraph should lead into the first sentence of the next
paragraph. You will have an opportunity to revise this section
when you receive feedback from your professor on your draft.
[Name of Trend #3]
In this section, introduce and discuss Trend #1 in 1-2
paragraphs. Explain how this trend is new to the industry and
what it signals for the industry. The final sentence of this
paragraph should lead into the first sentence of the next
paragraph. You will have an opportunity to revise this section
when you receive feedback from your professor on your draft.
18. An Important Emerging Issue Comment by Kathleen Hogan:
This is where the next section begins.
In this section you will identify an emerging issue or problem
within your industry. This could be one of your three trends, or
it can be related to the industry. This section will be around 2-3
double-spaced pages.
This section begins with an introductory paragraph that
identifies an emerging issue or problem and makes a claim
about its significance in your industry.
[Theme] Comment by Kathleen Hogan: To organize this
section for your reader, use Level 2 headings (left-justified and
bold) to organize information by theme.
For the rest of the paper, you will develop an argument that
supports this claim (clearly stated in your introduction). The
body paragraphs need to describe and justify your proposed
approach to the issue and explain how it relates to how other
organizations or experts have addressed the same issue based on
their research. When you present your argument, you should
also be prepared to anticipate and refute counterarguments or
alternative approaches. By showing that you understand other
approaches and being very clear about how your approach is
preferable, you are more likely to make a compelling argument.
Use information from your sources to support your ideas while
ensuring that your own voice and ideas are primary in the paper.
Again, be sure to include in-text citations when you are using
ideas from your sources. If you include any quoted material,
please include the location of the material as well as the author
and year (Hogan, 2021, p. 2). Do not rely on quoted material.
This paper should represent
your thoughts based on a synthesis of ideas that
contributed to your thesis.
[Theme]
19. Continue to describe and justify your proposed approach to the
issue and explain how it relates to how other organizations or
experts have addressed the same issue based on research.
[Theme]
Continue to describe and justify your proposed approach to the
issue and explain how it relates to how other organizations or
experts have addressed the same issue based on research.
You may not have a third theme or may need an additional
Level 2 headings for more themes – adjust the template as
needed.
Conclusion
Based on the above discussion of three trends and a deeper
discussion of an important issue, this section will consist of 1-3
paragraphs that provide conclusions about the trends, the
emerging issue, and their overall impact on the direction of the
industry. You may discuss areas of uncertainty that require
further research, but do not introduce anything new here except
to make focused conclusions about the trends and issue based on
your synthesis of the ideas from your resources and your own
thoughts. Well done!!!
[Insert a page break after your last line of text so your
References page will always be on a new page no matter how
much you edit your paper. In Word, go to “Insert” and choose
“Page Break”.]
References Comment by Kathleen Hogan: See the UMGC
Library's General Rules - APA 7th Edition Citation Examples -
LibGuides at University of Maryland Global Campus
(umgc.edu) for additional guidance.
An example of a student paper in APA 7 format can be found
here: Sample Annotated Student Paper in APA Style.
Remember: All sources that you use in your paper must be
listed here AND cited in the body of your paper.
20. Biggs, S., & Nadeau, K. (1992, December).
Students with Attention Deficit Disorder (ADD).
Presented at Chesapeake Psychological Services to members of
Nation’s Capital Area Disability Support Services Coalition.
http://www.adult-add.org/study/student/study_study_tips.htm
Comment by Kathleen Hogan: Note that the second line of
each citation is indented. First type in all your citations. Then
highlight them and go to “Paragraph” and click the arrow to see
all settings. When you set a “Hanging” indention and line
spacing at “Double”, your citations should be correct.
Booth, R. C. (1998).
List of appropriate school-based accommodations and
interventions. Highland Park, Ill.: National Attention Deficit
Disorder Association.
http://www.add.org/content/school/list.htm
General information about Attention-Deficit/Hyperactivity
Disorder fact sheet number 19 (FS19). (1999, August). The
Academy for Educational Development and the Office of
Special Education Programs. http://www.adult-
add.org/study/teacher/study_teach_tips.htm
Hallowell, E. M., & Ratey, J. J. (1994).
Driven to distraction: Recognizing and coping with
Attention Deficit Disorder from childhood through adulthood.
Pantheon Books.
Latham, P. H. (2000).
Attention Deficit Disorder in college faculty and
students: Partners in education. National Center for Law and
Learning Disabilities. http://www.adult-
add.org/study/student/study_student_college.htm
21. Robertson, A. S. (2000).
ADD/ADHD: What does it mean for parents and
families when their child is diagnosed with this condition?
http://www.adult-add.org/medical/research/research_family.htm
image1.png