SlideShare a Scribd company logo
1 of 21
1
9
The Complexity and Evolving Technologies of the Healthcare
Industry
Good Student
University of Maryland Global Campus
Course
Instructor
Date
The Complexity and Evolving Technologies of the Healthcare
Industry
The healthcare industry as we know it is constantly evolving
and growing exponentially every year for many reasons, such as
regulation changes from federal and state agencies, changes to
coverage from health insurance companies, illness trends,
developments in medicine, and demographics of medical staff.
Two of the most important reasons are due to the evolving
medical needs of patients and the advancements in technology
that provide viable options to these patients in need. These
technology advancements in the healthcare arena has generated
interest from cybercriminals. Cybercriminals have no preference
in whom they target if they can gain profit or cause a negative
impact to the end user(s). When these vulnerabilities are
discovered and attacks occur in the healthcare industry, it could
literally mean the difference between life and death for patients.
This critical outcome has created a high demand for
cybersecurity and technical personnel in this industry to
implement them. Three of the top trends in the healthcare
industry as it relates to cybersecurity are the increased dangers
of 3D printing in medicine, revolution of big data and advanced
analytics in the healthcare system, and Internet of Things (IoT)
and cloud computing as a security threat to healthcare. This
paper will focus on the complexity of the healthcare industry
and how transitioning to the Internet of Things and cloud
computing has created a large security threat to all medical
practices around the world.
Top Trends of the Healthcare Industry
Technologists and companies around the world have embraced
the importance and endless possibilities of 3D printing (NAICS
323111). 3D printing is a manufacturing process that creates a
three dimensional object by incrementally adding material until
the object is complete (this contrasts with subtractive
manufacturing techniques such as carving or milling, in which
an object is created by selectively removing parts from a piece
of raw material) (Lacoma, 2018). Many manufacturing
companies first began using 3D printing to resolve some of their
most difficult problems and improve the efficiency of their
processes. The healthcare industry began to take notice and
medical experts began developing ideas on how this technology
could be implemented in their medical practices. 3D printing in
healthcare makes it possible for medical professionals to
provide patients with a new form of treatment in several ways.
3D printing is used for the development of new surgical cutting
and drill guides, prosthetics as well as the creation of patient-
specific replicas of bones, organs, and blood vessels (Izukor,
2019).
Although the benefits of using this technology in medicine are
endless, the process has created a heightened risk of misuse or
tampering by cybercriminals. If a hacker can obtain the digital
design files or proprietary information about the design of a
medical product such as prosthetics, they could potentially
introduce flawed design modifications. For example, in some
cases, simply changing the orientation of a product during 3D
printing may affect its strength and utility for a specific purpose
(Redding, 2019). These unwanted modifications could lead to
severe damage to patients and cost the healthcare industry
millions in settlements. This scenario has created the demand
for better cybersecurity against these attackers. Security experts
have begun encouraging these companies to begin using
removable drives exclusively, soundproofing walls, installing
firewalls, and unplugging these printers from the internet to
help with reducing the number of successful cyber-attacks.
The introduction of big data (NAICS 518210) within the
healthcare industry is building momentum and seemingly
transforming the way patients and healthcare providers are
providing services. Currently, the primary data pools for the
big-data revolution in healthcare are activity (claims) and cost
data, clinical data, pharmaceutical R&D data, and patient
behavior and sentiment data (Groves, Kayyali, et al., 2013). As
the data from these four data pools accumulate over time,
analytic teams can develop advanced algorithms, applications,
proactive treatments, trends, and insights that are impactful to
all stakeholders of the healthcare industry. Advanced analytics
is key to ensuring data is quickly reviewed and the best options
are made available to health professionals. For example, claims
data may show that a patient has tried three treatments for
cancer, but only the clinical data show us which was effective
in shrinking the tumor (Groves, Kayyali, et al., 2013). Examples
such as this demonstrate how this data can help with the
outcome of a patients’ health, assist physicians with choosing
the proper procedures, and reduce cost on unnecessary
treatments. In parallel to the implementation of Big Data across
all medical practices, personal data such as electronic medical
records and devices are constantly being compromised by
criminals. Each of these incidents result in fines and
remediation cost to patients. For example, in 2018 a major
health insurance company paid a record $16 million HIPPA fine
when nine million patient health records were exposed (Baker,
2019). For now, to address the need for better cybersecurity, the
Department of Health and Human Services (HHbS) released
reports on cybersecurity best practices and understanding the
risks of using certain technologies.
The Internet of Things (IoT) (NAICS 541330) is currently
a relatively new market not only in the healthcare industry, but
most industries. The IoT is a megatrend in next-generation
technologies that can impact the whole business spectrum and
can be thought of as the interconnection of uniquely identifiable
smart objects and devices within today’s internet infrastructure
with extended benefits (Islam, et al., 2015). With the
introduction of IoT in healthcare, cloud computing has played a
pivotal role in their complimentary relationship. While IoT
produces large amounts of data, the primary responsibility of
cloud computing (NAICS 541519) is to ensure the data is
guided and stored in the correct locations. These technologies
have helped to improve the efficiency in healthcare operations.
With the growing complexity of this industry along with the
adoption of IoT and cloud computing, a large security threat is
beginning to manifest itself within healthcare.
Growing complexity of the healthcare industry
The importance of the healthcare industry is undeniably
vital to most living beings and species as patients visit medical
facilities as often as once a year or as many as five times a
week to meet with their health professionals. As the population
continues to live longer lives, the higher the demand for
healthcare services. The reason the healthcare industry is
perceived as complex is due to the multilayers of medical
services, growth of industry worldwide, lengthy list of laws and
regulations, advancements in technologies, unique cost models,
and the differences between each layer. For example, the health
care system comprises networks of components (hospitals,
clinics, nursing homes, rehabilitation units, patient homes,
families, and patients) that interact nonlinearly on different
scales (the patient, family, medical center, and government),
and often produce unintended consequences (adverse drug
reactions, nosocomial infections, rehospitalizations, and
functional decline) (Lipsitz, 2012). Every year these
components change as well as grow exponentially in size which
inadvertently impacts consumers of the healthcare industry. In
order to address some of the complexity and industry growth,
technology advancements were implemented and continually
improved in which we will be described next.
The adoption of IoT and cloud computing
As the populations continue to thrive into longer years, decline
in health professionals, growth of electronic data, and the
demand for remote medical monitoring, the advancements of
technology have provided solutions to many of these issues.
One example of the IoT in healthcare is the Continuous Glucose
Monitor (CGM) that monitors the blood glucose levels. The
body sensor collects data and uses Wi-Fi to send information to
the appropriate cloud infrastructure. When the readings are
above normal levels, the physician and patient are notified
along with corrective actions. A similar technology is the
Bluetooth-enabled weight scale and blood pressure cuff that
tracks patients’ conditions following cancer treatments as soon
as they depart the medical facility. Like the CGM, cloud
computing is vital when this data is collected from the sensor as
it needs to be stored, processed, and made available in a user-
friendly dashboard/application within seconds of collection.
The cloud computing infrastructure provides the essential
resources (like CPU, storage and application servers) for
deploying the web application and the interfaces that enable the
communication with the sensors and the various external
systems (Doukas & Maglogiannis, n.d.). The adoption of IoT
and cloud computing has saved lives due to proactive
monitoring, reduced costs to medical providers, and has made
viewing patients’ current vitals readily available from any
network connected device.
The costly security threat of healthcare technology
As more technology is implemented throughout the industry, the
security threat grows in parallel. Adding connectivity to these
devices has led to revolutions in medical science and have
changed the way institutions are able to care for patients, but
not without added risks. Without proper cybersecurity in place,
electronic patient records containing personally identifiable
information and network connected medical devices are subject
to cyber criminals. When criminals can illegally access this
sensitive data, they manipulate the functionality of medical
devices, perform ransomware attacks on systems at medical
facilities, create false identities, and other attacks that
negatively impact operations.
Whenever data is exposed to the internet, the risk of the data
being compromised is prevalent, but the stakes are much higher
when it relates to healthcare and the protection of patients.
How healthcare can address the security threats
Any network connected devices are vulnerable to be attacked by
cybercriminals, but there are security best practices that could
limit or prevent these security threats. At a minimum, the IT
staff could ensure users regularly perform security updates,
educate users about phishing techniques, deploy encryption
tools, enforce strong password combinations, and provide users
with security best practices. In addition, health systems and
companies should communicate cybersecurity plans to
community leaders, policymakers, patients and other
stakeholders to build confidence and generate best practices
(Baker, 2019). Collaboration in and outside this industry is
essential in order to maintain and adapt to the constantly
changing landscape of cybersecurity.
Conclusion
To conclude, this paper provided information regarding top
trends in the healthcare industry as it relates to cybersecurity. It
also discussed the security threat that this industry currently
faces with the growth of technology advancements in the
medical field. Depending on the sensitivity of data collected by
cybercriminals, the damages could result in huge financial
losses, reduction in employment, life-threatening scenarios, or
even closure of medical facilities. In order to mitigate the
multiple security threats in this industry, the IT department
within each medical provider would need to strategically
develop guidelines and policies that involve implementing
various security best practices without impacting medical
operations.
ReferencesBaker, M. (4 February 2019). Big Data Transforming
Healthcare, But Cybersecurity Issues Loom.
https://www.wileyconnect.com/home/2019/2/4/big-data-
transforming-healthcare-but-cybersecurity-issues-loomBurrill,
S. & Beaudoin, D (2019). 2019 US and global health care
industry outlook.
https://www2.deloitte.com/us/en/pages/life-sciences-
and-health-care/articles/us-and-global-health-care-industry-
trends-outlook.html
Doukas, C. & Maglogiannis, I. (n.d.). Bringing IoT and cloud
computing towards pervasive healthcare.
https://www.researchgate.net/profile/Ilias_Maglogiannis/publica
tion/261431852_Bringing_IoT_and_Cloud_Computing_towards
_Pervasive_Healthcare/links/563c7e4708ae45b5d288eb41.pdf
Groves, P., Kayyali, B., Knott, D., & Kuiken, S. (2013
January). The ‘big data’ revolution in healthcare.
http://repositorio.colciencias.gov.co/bitstream/handle/11146/46
5/1661-
The_big_data_revolution_in_healthcare.pdf?sequence=1&isAllo
wed=y
Islam, S.M., Kwak, D., Kabir, H., Hossain, M., & Kwak, K. (4
July 2015). The Internet of Things for health care: A
comprehensive survey.
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7113786
Izukor, C. (6 May 2019). Cyber security trends in healthcare.
Retrieved from
https://blog.veriato.com/cyber-security-trends-in-
healthcare
Lacoma, T. (16 June 2018). What is 3D printing? Here’s
everything you need to know.
https://www.digitaltrends.com/computing/what-is-3d-
printing/
Lipsitz, L. (18 July 2012). Understanding health care as a
complex system.
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3511782/
Redding, H. (5 July 2017). The cybersecurity risks of 3D
printing.
https://bdtechtalks.com/2017/07/05/the-cybersecurity-
risks-of-3d-printing/
Respond to at least two of your peers by extending,
refuting/correcting, or adding additional nuance to their posts.
Post #1
Jessica Rincon
St. Thomas University
NUR 417 AP2
Prof. Yedelis Diaz
10/16/2022
Elder Abuse
According to Santos et al. (2019), elder abuse is the failure to
protect an elderly person from harm or to provide for his or her
basic needs, by a caregiver. The definition of elder abuse also
includes intentional or unintentional actions or inactions of a
caregiver that create a serious risk of harm or cause harm to a
vulnerable elder. Lecture Notes (Slide 5) present that elder
abuse can be domestic, institutional, or result from self-neglect.
The seven types of elder abuse are self-neglect, abandonment,
physical abuse, emotional abuse, neglect, material and financial
exploitation, and sexual abuse.
Weissberger et al. (2020) define physical abuse as intentionally
causing an elderly person physical injury, harm, pain, distress,
or functional impairment through the use of force. Forms of
physical abuse include inappropriate use of physical or
medication restraints, physical punishment, hitting, and
slapping. Self-neglect, as the name suggests, is any self-
inflicted behavior that threatens the elderly person’s safety and
health (Weissberger et al., 2020). Actions such as failure to
provide self with appropriate hygiene and adequate food are
self-neglect. The elder abuse of abandonment is closely related
to that of self-neglect, except that it is perpetrated by the
elderly person’s caregiver.
Neglect also shares similar characteristics as it is defined as the
failure of the caretaker to meet the necessary basic needs, such
as adequate clothing, shelter, food, social stimulation, and
medical attention, of an elderly person (Weissberger et al.,
2020). Emotional abuse refers to causing an elderly person
anguish, psychological pain, distress, fear, and geographic
isolation through verbal and non-verbal interactions. Disrespect,
threats, and humiliation qualify as forms of emotional abuse
(Weissberger et al., 2020). Lastly, sexual abuse is unwanted or
forced sexual interaction or contact, while financial exploitation
refers to fraudulent, unauthorized, or improper use of the
property of an elderly person by a trusted individual, caregiver,
or stranger for the benefit of the exploiter and not the elderly
person (Weissberger et al., 2020).
Approaching Ethical Dilemmas
Euthanasia, suicide, and assisted suicide to present the most
common forms of ethical dilemmas nurses face in their delivery
of care. The primary approach to such ethical dilemmas is to
rely on the professional codes of ethics that govern nursing
practice. These codes of ethics are based on the ethical
principles of self-determination or autonomy, beneficence,
nonmaleficence, justice, and veracity (Lecture Notes, Slide 31).
For example, the code of ethics for nurses states that nurses
should not participate in assisted suicide (Lecture Notes, Slide
32). Therefore, nurses must acquaint themselves with the
provisions of the professional ethical codes of the practice for
guidance on how to respond to the various ethical dilemmas
regarding euthanasia, suicide, and assisted suicide. Nurses
should also consult ethics committees for advice on dilemmas
and value conflicts, as this is part of the role of such
committees.
Consequently, nurses must know the laws of the state within
which they practice, particularly regarding these ethical
dilemmas. This is because nurses have the responsibility of
facilitating informed decision-making on such issues, which
they can only achieve when they have adequate knowledge of
laws and regulations on the issue. For instance, all 50 states
consider an act of affirmative euthanasia an illegal criminal
offense (Lecture Notes, Slide 32). With such knowledge, it
becomes easier for nurses to address ethical dilemmas
concerning euthanasia. In other words, nurses can either rely on
their knowledge of the ethical principles and laws concerning
the ethical dilemma in question or seek the advice of others,
such as ethics committees, when faced with ethical dilemmas
regarding euthanasia, suicide, and assisted suicide.
References
Lecture Notes. (n.d.). Chapter 3: Legal and Ethical Issues.
Santos, A. J., Nunes, B., Kislaya, I., Gil, A. P., & Ribeiro, O.
(2019). Elder abuse victimization patterns: latent class analysis
using perpetrators and abusive behaviors. BMC
geriatrics, 19(1), 1-11.
Weissberger, G. H., Goodman, M. C., Mosqueda, L., Schoen, J.,
Nguyen, A. L., Wilber, K. H., ... & Han, S. D. (2020). Elder
abuse characteristics based on calls to the National Center on
elder abuse resource line. Journal of Applied
Gerontology, 39(10), 1078-1087.
Post #2
Lisa Wright
St. Thomas University
NUR 417: Aging and End of Life
Yedelis Diaz
October 20, 2022
Elder Abuse
Aging is a normal biological process that we all life
goes through. As one age, their functions become diminished,
and they need enhanced attention to lead whole lives. While the
process does not lead to disease or disability, it does reduce
one’s capacity to respond to such challenges. Due to their
vulnerable state, the elderly often gets abused since they cannot
speak for themselves or cannot. National Council on Aging
(n.d.) estimates that about five million elders experience abuse
annually, which is staggering. This assignment module will
examine the types of abuse identified by the National Center on
Elder Abuse (NCEA) and how I would approach the ethical
dilemmas and the considerations that accompany Euthanasia,
suicide, and assisted suicide.
Types of Elder Abuse
The NCEA outlines several types of elder abuse that we
should look out for to help the population (National Center on
Elder Abuse, n.d.).
Physical Abuse
This abuse takes the form of physical force leading to
injuries and harm to the elderly. It can also include improper
use of restraints, medication, or feeding them by force. Its
symptoms include fractures, bruises, and unexplained bleeding
or injuries.
Sexual Abuse
It involves an involuntary engagement in the act of sex
with an elderly. Without consent, any act of sex is deemed
abuse, and it is a deplorable phenomenon that some among the
population endure. It is characterized by strange venereal
illnesses or bruising in the breast and pelvic region.
Emotional or Psychological Abuse
This inflicts pain and suffering on the elderly using
voiced or non-verbal means. When an older adult feels helpless
from what someone says since they cannot fend for themselves,
this is emotional abuse. Its main symptoms include withdrawal
or being overly restless.
Neglect
This is refusing to realize one’s responsibilities towards
an older adult. Due to their advanced age and reduced
functionality, they need assistance to get by, and when it is not
rendered, this is considered neglect.
Abandonment
This is the desertion of the elderly that results in
dereliction of their care. It is primarily witnessed in family
situations where a family member takes on the responsibility
and then abandons the person (Ludvigsson et al., 2022).
Financial exploitation
It is the misuse of an elderly’s wealth by taking
advantage of their low capacity to use or protect it. It can be
forging their signatures or cashing their checks without their
direction.
Self-Neglect
These are situations when the elderly are at risk through
self-harm or failure to care for themselves properly. At this
stage, assistance is called for mostly from family members.
Ethical Dilemmas Regarding Euthanasia, Suicide, and Assisted
Suicide
Euthanasia
While the right to life is guaranteed, the question
remains whether the right to end it should also be granted. It is
also a dilemma to determine in what situations life should be
ended. While it is illegal in the country, some argue that it is
not suitable for someone to be denied the right to die with
dignity while being granted the right to live in anguish
(Buchbinder, 2018). Regardless of the ethical dilemma and
situation, I may face, I would stand by my ethical obligation of
doing no harm.
Assisted Suicide
I believe assisted suicide contradicts the healthcare
professional’s oath and mandate of caring and healing. While it
may present a compelling case for death, for instance, of
constant and anguishing pain due to terminal illnesses with
close to no hope of treatment, allowing assisted suicide would
ultimately result in more harm than good.
Suicide
Suicide should not be condoned under any
circumstance. Despite what a patient is going through or how
bleak their situation may appear, care should always be
prioritized and administered to the last possible stage of life
while respecting the patient’s autonomy. Pain control and
proper communication should also be highly prioritized.
Conclusion
Life is sacred and should always be treated as such. It is
deplorable to witness the elderly abused because they cannot
advocate for themselves. The worst part of the situation is that
most cases remain unreported. Regarding care for the elderly,
healthcare professionals need to be meticulously keen to ensure
that their quality of life is not impaired under any
circumstances. Decisions on the end of life are also a sore spot
and a point of contest among different perspectives. Regardless
of the approach, the consensus is that life is precious and should
be preserved. This assignment module explored the types of
abuse identified by the National Center on Elder Abuse (NCEA)
and how I would approach the ethical dilemmas and the
considerations that accompany Euthanasia, suicide, and assisted
suicide.
References
Buchbinder, M. (2018). Access to Aid-in-Dying in the United
States: Shifting the debate from rights to justice.
American Journal of Public Health,
108(6), 754. https://doi.org/10.2105/AJPH.2018.304352
Ludvigsson, M., Wiklund, N., Swahnberg, K., & Simmons, J.
(2022). Experiences of elder abuse: a qualitative study among
victims in Sweden.
BMC Geriatrics,
22(1), 1–12. https://doi.org/10.1186/S12877-022-02933-
8/FIGURES/2
National Center on Elder Abuse. (n.d.).
NCEA - Abuse types. https://ncea.acl.gov/Suspect-
Abuse/Abuse-Types.aspx
National Council on Aging. (n.d.).
Get the facts on elder abuse.
https://www.ncoa.org/article/get-the-facts-on-elder-abuse
1
7
Trends in the [Fill in relevant term(s) here] Industry
Comment by Kathleen Hogan: Note to students: This
template is intended to help you organize the parts of your
Trends project so that you build each section as directed.
You will submit a draft to your professor of the first part at the
end of Week 2. This is important! Use the feedback from your
professor to refine your trends section and correct any errors in
your reference citations. Then work on the issue of interest,
review and edit your work, and submit your completed paper at
the end of Week 3. It you want to send a draft to the writing
tutors, build in time to get that feedback and use it for your
final.
Please delete all the instructions/notes within this template
before submitting your final paper. In the web version, click
the three dots in the upper right corner and select delete thread.
In the desktop version, right click on the comment and select
delete.
Good luck!!
[Fill in your first and last name]
University of Maryland Global Campus
[Fill in your course name]
[Fill in instructor’s name]
[Fill in due date]
[Insert a page break after your last line of text so your first
page will always be on a new page no matter how much you edit
your paper. In Word, go to “Insert” and choose “Page Break”.]
Trends in the [Fill in relevant term(s) here] Industry
Comment by Kathleen Hogan: Put your title here as it’s
written on your title page. It is a Level 1 heading (centered and
bold). Read more about APA Level Headings (apa.org).
This first section (due at the end of Week 2 for a review)
consists of the title page, introductory paragraph, Level 1 and
Level 2 headings, discussion of three trends, and your
references page. Within your introductory paragraph, introduce
your industry and clearly identify the top three trends your
research has uncovered. Remember to use in-text citations if
you are using others’ ideas (Hogan, 2021). Your final sentence
should be a transition that leads into the discussion of your first
trend in the body of your paper. Comment by Kathleen
Hogan: For a refresher, go here: In-Text Citations - APA 7th
Edition Citation Examples - LibGuides at University of
Maryland Global Campus (umgc.edu) ***This is an excellent
website to bookmark for future use!
Discussion of Three Trends
[Name of Trend #1] Comment by Kathleen Hogan: This is a
Level 2 heading (left-justified and bold). Continue this pattern
for Trends 2 and 3.
In this section, introduce and discuss Trend #1 in 1-2
paragraphs. Explain how this trend is new to the industry and
what it signals for the industry. Note that all paragraphs are
indented a tab at 0.5”. Also, all lines are double spaced. The
final sentence of this paragraph should lead into the first
sentence of the next paragraph. You will have an opportunity to
revise this section when you receive feedback from your
professor on your draft.
[Name of Trend #2]
In this section, introduce and discuss Trend #1 in 1-2
paragraphs. Explain how this trend is new to the industry and
what it signals for the industry. The final sentence of this
paragraph should lead into the first sentence of the next
paragraph. You will have an opportunity to revise this section
when you receive feedback from your professor on your draft.
[Name of Trend #3]
In this section, introduce and discuss Trend #1 in 1-2
paragraphs. Explain how this trend is new to the industry and
what it signals for the industry. The final sentence of this
paragraph should lead into the first sentence of the next
paragraph. You will have an opportunity to revise this section
when you receive feedback from your professor on your draft.
An Important Emerging Issue Comment by Kathleen Hogan:
This is where the next section begins.
In this section you will identify an emerging issue or problem
within your industry. This could be one of your three trends, or
it can be related to the industry. This section will be around 2-3
double-spaced pages.
This section begins with an introductory paragraph that
identifies an emerging issue or problem and makes a claim
about its significance in your industry.
[Theme] Comment by Kathleen Hogan: To organize this
section for your reader, use Level 2 headings (left-justified and
bold) to organize information by theme.
For the rest of the paper, you will develop an argument that
supports this claim (clearly stated in your introduction). The
body paragraphs need to describe and justify your proposed
approach to the issue and explain how it relates to how other
organizations or experts have addressed the same issue based on
their research. When you present your argument, you should
also be prepared to anticipate and refute counterarguments or
alternative approaches. By showing that you understand other
approaches and being very clear about how your approach is
preferable, you are more likely to make a compelling argument.
Use information from your sources to support your ideas while
ensuring that your own voice and ideas are primary in the paper.
Again, be sure to include in-text citations when you are using
ideas from your sources. If you include any quoted material,
please include the location of the material as well as the author
and year (Hogan, 2021, p. 2). Do not rely on quoted material.
This paper should represent
your thoughts based on a synthesis of ideas that
contributed to your thesis.
[Theme]
Continue to describe and justify your proposed approach to the
issue and explain how it relates to how other organizations or
experts have addressed the same issue based on research.
[Theme]
Continue to describe and justify your proposed approach to the
issue and explain how it relates to how other organizations or
experts have addressed the same issue based on research.
You may not have a third theme or may need an additional
Level 2 headings for more themes – adjust the template as
needed.
Conclusion
Based on the above discussion of three trends and a deeper
discussion of an important issue, this section will consist of 1-3
paragraphs that provide conclusions about the trends, the
emerging issue, and their overall impact on the direction of the
industry. You may discuss areas of uncertainty that require
further research, but do not introduce anything new here except
to make focused conclusions about the trends and issue based on
your synthesis of the ideas from your resources and your own
thoughts. Well done!!!
[Insert a page break after your last line of text so your
References page will always be on a new page no matter how
much you edit your paper. In Word, go to “Insert” and choose
“Page Break”.]
References Comment by Kathleen Hogan: See the UMGC
Library's General Rules - APA 7th Edition Citation Examples -
LibGuides at University of Maryland Global Campus
(umgc.edu) for additional guidance.
An example of a student paper in APA 7 format can be found
here: Sample Annotated Student Paper in APA Style.
Remember: All sources that you use in your paper must be
listed here AND cited in the body of your paper.
Biggs, S., & Nadeau, K. (1992, December).
Students with Attention Deficit Disorder (ADD).
Presented at Chesapeake Psychological Services to members of
Nation’s Capital Area Disability Support Services Coalition.
http://www.adult-add.org/study/student/study_study_tips.htm
Comment by Kathleen Hogan: Note that the second line of
each citation is indented. First type in all your citations. Then
highlight them and go to “Paragraph” and click the arrow to see
all settings. When you set a “Hanging” indention and line
spacing at “Double”, your citations should be correct.
Booth, R. C. (1998).
List of appropriate school-based accommodations and
interventions. Highland Park, Ill.: National Attention Deficit
Disorder Association.
http://www.add.org/content/school/list.htm
General information about Attention-Deficit/Hyperactivity
Disorder fact sheet number 19 (FS19). (1999, August). The
Academy for Educational Development and the Office of
Special Education Programs. http://www.adult-
add.org/study/teacher/study_teach_tips.htm
Hallowell, E. M., & Ratey, J. J. (1994).
Driven to distraction: Recognizing and coping with
Attention Deficit Disorder from childhood through adulthood.
Pantheon Books.
Latham, P. H. (2000).
Attention Deficit Disorder in college faculty and
students: Partners in education. National Center for Law and
Learning Disabilities. http://www.adult-
add.org/study/student/study_student_college.htm
Robertson, A. S. (2000).
ADD/ADHD: What does it mean for parents and
families when their child is diagnosed with this condition?
http://www.adult-add.org/medical/research/research_family.htm
image1.png

More Related Content

Similar to 19The Complexity and Evolving Technolog.docx

(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthcMoseStaton39
 
Cybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxCybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxMarket iT
 
The role of the internet of things in healthcare future trends and challenges
The role of the internet of things in healthcare future trends and challengesThe role of the internet of things in healthcare future trends and challenges
The role of the internet of things in healthcare future trends and challengesNoman Shaikh
 
HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerAmer Nazar
 
projects nursing writers.pdf
projects nursing writers.pdfprojects nursing writers.pdf
projects nursing writers.pdfsdfghj21
 
Review paper on Big Data in healthcare informatics
Review paper on Big Data in healthcare informaticsReview paper on Big Data in healthcare informatics
Review paper on Big Data in healthcare informaticsIRJET Journal
 
Role of IoT and Cloud Computing in Digital Healthcare.pdf
Role of IoT and Cloud Computing in Digital Healthcare.pdfRole of IoT and Cloud Computing in Digital Healthcare.pdf
Role of IoT and Cloud Computing in Digital Healthcare.pdfrectified
 
1.Forecast of Healthcare Software Development Trends in 2023.pdf
1.Forecast of Healthcare Software Development Trends in 2023.pdf1.Forecast of Healthcare Software Development Trends in 2023.pdf
1.Forecast of Healthcare Software Development Trends in 2023.pdfBelayet Hossain
 
How the Internet of Things Is Transforming Medical Devices
How the Internet of Things Is Transforming Medical DevicesHow the Internet of Things Is Transforming Medical Devices
How the Internet of Things Is Transforming Medical DevicesCognizant
 
According to Khristich an expert in projects and.docx
According to Khristich an expert in projects and.docxAccording to Khristich an expert in projects and.docx
According to Khristich an expert in projects and.docxwrite4
 
Blockchain technology in healthcare
Blockchain technology in healthcareBlockchain technology in healthcare
Blockchain technology in healthcareMarryam Khawaja
 
Acus intel medical_devices
Acus intel medical_devicesAcus intel medical_devices
Acus intel medical_devicesatlanticcouncil
 
The Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and RisksThe Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and Risksatlanticcouncil
 
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docxPOST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docxLacieKlineeb
 
Digital_Health_Zug_Event_04-04-2016
Digital_Health_Zug_Event_04-04-2016Digital_Health_Zug_Event_04-04-2016
Digital_Health_Zug_Event_04-04-2016Michael Dillhyon
 
How Healthcare is Adopting New Technologies? | 7 Best technology | CIO Women ...
How Healthcare is Adopting New Technologies? | 7 Best technology | CIO Women ...How Healthcare is Adopting New Technologies? | 7 Best technology | CIO Women ...
How Healthcare is Adopting New Technologies? | 7 Best technology | CIO Women ...CIOWomenMagazine
 
Big data for healthcare analytics final -v0.3 miz
Big data for healthcare analytics   final -v0.3 mizBig data for healthcare analytics   final -v0.3 miz
Big data for healthcare analytics final -v0.3 mizYusuf Brima
 

Similar to 19The Complexity and Evolving Technolog.docx (20)

(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc
 
Cybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxCybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicaux
 
Sizzling Stats Healthcare It
Sizzling Stats Healthcare ItSizzling Stats Healthcare It
Sizzling Stats Healthcare It
 
The role of the internet of things in healthcare future trends and challenges
The role of the internet of things in healthcare future trends and challengesThe role of the internet of things in healthcare future trends and challenges
The role of the internet of things in healthcare future trends and challenges
 
HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_Amer
 
projects nursing writers.pdf
projects nursing writers.pdfprojects nursing writers.pdf
projects nursing writers.pdf
 
Megatrends
MegatrendsMegatrends
Megatrends
 
Review paper on Big Data in healthcare informatics
Review paper on Big Data in healthcare informaticsReview paper on Big Data in healthcare informatics
Review paper on Big Data in healthcare informatics
 
Big Data in He
Big Data in HeBig Data in He
Big Data in He
 
Role of IoT and Cloud Computing in Digital Healthcare.pdf
Role of IoT and Cloud Computing in Digital Healthcare.pdfRole of IoT and Cloud Computing in Digital Healthcare.pdf
Role of IoT and Cloud Computing in Digital Healthcare.pdf
 
1.Forecast of Healthcare Software Development Trends in 2023.pdf
1.Forecast of Healthcare Software Development Trends in 2023.pdf1.Forecast of Healthcare Software Development Trends in 2023.pdf
1.Forecast of Healthcare Software Development Trends in 2023.pdf
 
How the Internet of Things Is Transforming Medical Devices
How the Internet of Things Is Transforming Medical DevicesHow the Internet of Things Is Transforming Medical Devices
How the Internet of Things Is Transforming Medical Devices
 
According to Khristich an expert in projects and.docx
According to Khristich an expert in projects and.docxAccording to Khristich an expert in projects and.docx
According to Khristich an expert in projects and.docx
 
Blockchain technology in healthcare
Blockchain technology in healthcareBlockchain technology in healthcare
Blockchain technology in healthcare
 
Acus intel medical_devices
Acus intel medical_devicesAcus intel medical_devices
Acus intel medical_devices
 
The Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and RisksThe Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and Risks
 
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docxPOST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
 
Digital_Health_Zug_Event_04-04-2016
Digital_Health_Zug_Event_04-04-2016Digital_Health_Zug_Event_04-04-2016
Digital_Health_Zug_Event_04-04-2016
 
How Healthcare is Adopting New Technologies? | 7 Best technology | CIO Women ...
How Healthcare is Adopting New Technologies? | 7 Best technology | CIO Women ...How Healthcare is Adopting New Technologies? | 7 Best technology | CIO Women ...
How Healthcare is Adopting New Technologies? | 7 Best technology | CIO Women ...
 
Big data for healthcare analytics final -v0.3 miz
Big data for healthcare analytics   final -v0.3 mizBig data for healthcare analytics   final -v0.3 miz
Big data for healthcare analytics final -v0.3 miz
 

More from durantheseldine

Angela’s Ashes​ - Murasaki Shikibu said that the novel happens be.docx
Angela’s Ashes​ - Murasaki Shikibu said that the novel happens be.docxAngela’s Ashes​ - Murasaki Shikibu said that the novel happens be.docx
Angela’s Ashes​ - Murasaki Shikibu said that the novel happens be.docxdurantheseldine
 
ANG1922, Winter 2016Essay 02 InstructionsYour second e.docx
ANG1922, Winter 2016Essay 02 InstructionsYour second e.docxANG1922, Winter 2016Essay 02 InstructionsYour second e.docx
ANG1922, Winter 2016Essay 02 InstructionsYour second e.docxdurantheseldine
 
Anecdotal Records Anecdotal Record Developmental Domain__ _.docx
Anecdotal Records Anecdotal Record Developmental Domain__      _.docxAnecdotal Records Anecdotal Record Developmental Domain__      _.docx
Anecdotal Records Anecdotal Record Developmental Domain__ _.docxdurantheseldine
 
Andy and Beth are neighbors in a small duplex. In the evenings after.docx
Andy and Beth are neighbors in a small duplex. In the evenings after.docxAndy and Beth are neighbors in a small duplex. In the evenings after.docx
Andy and Beth are neighbors in a small duplex. In the evenings after.docxdurantheseldine
 
Andrew John De Los SantosPUP 190SOS 111 Sustainable CitiesMar.docx
Andrew John De Los SantosPUP 190SOS 111 Sustainable CitiesMar.docxAndrew John De Los SantosPUP 190SOS 111 Sustainable CitiesMar.docx
Andrew John De Los SantosPUP 190SOS 111 Sustainable CitiesMar.docxdurantheseldine
 
Android Permissions DemystifiedAdrienne Porter Felt, Erika.docx
Android Permissions DemystifiedAdrienne Porter Felt, Erika.docxAndroid Permissions DemystifiedAdrienne Porter Felt, Erika.docx
Android Permissions DemystifiedAdrienne Porter Felt, Erika.docxdurantheseldine
 
ANDREW CARNEGIE PRINCE OF STEELNARRATOR On November 25th, 1835 i.docx
ANDREW CARNEGIE PRINCE OF STEELNARRATOR On November 25th, 1835 i.docxANDREW CARNEGIE PRINCE OF STEELNARRATOR On November 25th, 1835 i.docx
ANDREW CARNEGIE PRINCE OF STEELNARRATOR On November 25th, 1835 i.docxdurantheseldine
 
Andrew CassidySaint Leo UniversityContemporary Issues in Crimina.docx
Andrew CassidySaint Leo UniversityContemporary Issues in Crimina.docxAndrew CassidySaint Leo UniversityContemporary Issues in Crimina.docx
Andrew CassidySaint Leo UniversityContemporary Issues in Crimina.docxdurantheseldine
 
andrea lunsfordstanford universitymichal brodysono.docx
andrea lunsfordstanford universitymichal brodysono.docxandrea lunsfordstanford universitymichal brodysono.docx
andrea lunsfordstanford universitymichal brodysono.docxdurantheseldine
 
Andrea Azpiazo – Review One. Little Havana Multifamily Developme.docx
Andrea Azpiazo – Review One.  Little Havana Multifamily Developme.docxAndrea Azpiazo – Review One.  Little Havana Multifamily Developme.docx
Andrea Azpiazo – Review One. Little Havana Multifamily Developme.docxdurantheseldine
 
And what we students of history always learn is that the human bein.docx
And what we students of history always learn is that the human bein.docxAnd what we students of history always learn is that the human bein.docx
And what we students of history always learn is that the human bein.docxdurantheseldine
 
and Contradiction in Architecture Robert Venturi .docx
and Contradiction in Architecture Robert Venturi .docxand Contradiction in Architecture Robert Venturi .docx
and Contradiction in Architecture Robert Venturi .docxdurantheseldine
 
Ancient Egypt1The Civilization of the Nile River V.docx
Ancient Egypt1The Civilization of the Nile River V.docxAncient Egypt1The Civilization of the Nile River V.docx
Ancient Egypt1The Civilization of the Nile River V.docxdurantheseldine
 
Anayze a landmark case. The assesment should include a full discussi.docx
Anayze a landmark case. The assesment should include a full discussi.docxAnayze a landmark case. The assesment should include a full discussi.docx
Anayze a landmark case. The assesment should include a full discussi.docxdurantheseldine
 
Anatomy and Physiology of the Digestive SystemObjectives· Iden.docx
Anatomy and Physiology of the Digestive SystemObjectives· Iden.docxAnatomy and Physiology of the Digestive SystemObjectives· Iden.docx
Anatomy and Physiology of the Digestive SystemObjectives· Iden.docxdurantheseldine
 
ANAThe Article Review by Jeanette Keith on Book by Stephanie McCu.docx
ANAThe Article  Review by Jeanette Keith on Book by Stephanie McCu.docxANAThe Article  Review by Jeanette Keith on Book by Stephanie McCu.docx
ANAThe Article Review by Jeanette Keith on Book by Stephanie McCu.docxdurantheseldine
 
Analyzing workers social networking behavior – an invasion of priva.docx
Analyzing workers social networking behavior – an invasion of priva.docxAnalyzing workers social networking behavior – an invasion of priva.docx
Analyzing workers social networking behavior – an invasion of priva.docxdurantheseldine
 
Analyzing and Visualizing Data Chapter 6Data Represent.docx
Analyzing and Visualizing Data Chapter 6Data Represent.docxAnalyzing and Visualizing Data Chapter 6Data Represent.docx
Analyzing and Visualizing Data Chapter 6Data Represent.docxdurantheseldine
 
Analyzing and Visualizing Data Chapter 1The .docx
Analyzing and Visualizing Data Chapter 1The .docxAnalyzing and Visualizing Data Chapter 1The .docx
Analyzing and Visualizing Data Chapter 1The .docxdurantheseldine
 
Analyzing a Primary Source RubricName ______________________.docx
Analyzing a Primary Source RubricName ______________________.docxAnalyzing a Primary Source RubricName ______________________.docx
Analyzing a Primary Source RubricName ______________________.docxdurantheseldine
 

More from durantheseldine (20)

Angela’s Ashes​ - Murasaki Shikibu said that the novel happens be.docx
Angela’s Ashes​ - Murasaki Shikibu said that the novel happens be.docxAngela’s Ashes​ - Murasaki Shikibu said that the novel happens be.docx
Angela’s Ashes​ - Murasaki Shikibu said that the novel happens be.docx
 
ANG1922, Winter 2016Essay 02 InstructionsYour second e.docx
ANG1922, Winter 2016Essay 02 InstructionsYour second e.docxANG1922, Winter 2016Essay 02 InstructionsYour second e.docx
ANG1922, Winter 2016Essay 02 InstructionsYour second e.docx
 
Anecdotal Records Anecdotal Record Developmental Domain__ _.docx
Anecdotal Records Anecdotal Record Developmental Domain__      _.docxAnecdotal Records Anecdotal Record Developmental Domain__      _.docx
Anecdotal Records Anecdotal Record Developmental Domain__ _.docx
 
Andy and Beth are neighbors in a small duplex. In the evenings after.docx
Andy and Beth are neighbors in a small duplex. In the evenings after.docxAndy and Beth are neighbors in a small duplex. In the evenings after.docx
Andy and Beth are neighbors in a small duplex. In the evenings after.docx
 
Andrew John De Los SantosPUP 190SOS 111 Sustainable CitiesMar.docx
Andrew John De Los SantosPUP 190SOS 111 Sustainable CitiesMar.docxAndrew John De Los SantosPUP 190SOS 111 Sustainable CitiesMar.docx
Andrew John De Los SantosPUP 190SOS 111 Sustainable CitiesMar.docx
 
Android Permissions DemystifiedAdrienne Porter Felt, Erika.docx
Android Permissions DemystifiedAdrienne Porter Felt, Erika.docxAndroid Permissions DemystifiedAdrienne Porter Felt, Erika.docx
Android Permissions DemystifiedAdrienne Porter Felt, Erika.docx
 
ANDREW CARNEGIE PRINCE OF STEELNARRATOR On November 25th, 1835 i.docx
ANDREW CARNEGIE PRINCE OF STEELNARRATOR On November 25th, 1835 i.docxANDREW CARNEGIE PRINCE OF STEELNARRATOR On November 25th, 1835 i.docx
ANDREW CARNEGIE PRINCE OF STEELNARRATOR On November 25th, 1835 i.docx
 
Andrew CassidySaint Leo UniversityContemporary Issues in Crimina.docx
Andrew CassidySaint Leo UniversityContemporary Issues in Crimina.docxAndrew CassidySaint Leo UniversityContemporary Issues in Crimina.docx
Andrew CassidySaint Leo UniversityContemporary Issues in Crimina.docx
 
andrea lunsfordstanford universitymichal brodysono.docx
andrea lunsfordstanford universitymichal brodysono.docxandrea lunsfordstanford universitymichal brodysono.docx
andrea lunsfordstanford universitymichal brodysono.docx
 
Andrea Azpiazo – Review One. Little Havana Multifamily Developme.docx
Andrea Azpiazo – Review One.  Little Havana Multifamily Developme.docxAndrea Azpiazo – Review One.  Little Havana Multifamily Developme.docx
Andrea Azpiazo – Review One. Little Havana Multifamily Developme.docx
 
And what we students of history always learn is that the human bein.docx
And what we students of history always learn is that the human bein.docxAnd what we students of history always learn is that the human bein.docx
And what we students of history always learn is that the human bein.docx
 
and Contradiction in Architecture Robert Venturi .docx
and Contradiction in Architecture Robert Venturi .docxand Contradiction in Architecture Robert Venturi .docx
and Contradiction in Architecture Robert Venturi .docx
 
Ancient Egypt1The Civilization of the Nile River V.docx
Ancient Egypt1The Civilization of the Nile River V.docxAncient Egypt1The Civilization of the Nile River V.docx
Ancient Egypt1The Civilization of the Nile River V.docx
 
Anayze a landmark case. The assesment should include a full discussi.docx
Anayze a landmark case. The assesment should include a full discussi.docxAnayze a landmark case. The assesment should include a full discussi.docx
Anayze a landmark case. The assesment should include a full discussi.docx
 
Anatomy and Physiology of the Digestive SystemObjectives· Iden.docx
Anatomy and Physiology of the Digestive SystemObjectives· Iden.docxAnatomy and Physiology of the Digestive SystemObjectives· Iden.docx
Anatomy and Physiology of the Digestive SystemObjectives· Iden.docx
 
ANAThe Article Review by Jeanette Keith on Book by Stephanie McCu.docx
ANAThe Article  Review by Jeanette Keith on Book by Stephanie McCu.docxANAThe Article  Review by Jeanette Keith on Book by Stephanie McCu.docx
ANAThe Article Review by Jeanette Keith on Book by Stephanie McCu.docx
 
Analyzing workers social networking behavior – an invasion of priva.docx
Analyzing workers social networking behavior – an invasion of priva.docxAnalyzing workers social networking behavior – an invasion of priva.docx
Analyzing workers social networking behavior – an invasion of priva.docx
 
Analyzing and Visualizing Data Chapter 6Data Represent.docx
Analyzing and Visualizing Data Chapter 6Data Represent.docxAnalyzing and Visualizing Data Chapter 6Data Represent.docx
Analyzing and Visualizing Data Chapter 6Data Represent.docx
 
Analyzing and Visualizing Data Chapter 1The .docx
Analyzing and Visualizing Data Chapter 1The .docxAnalyzing and Visualizing Data Chapter 1The .docx
Analyzing and Visualizing Data Chapter 1The .docx
 
Analyzing a Primary Source RubricName ______________________.docx
Analyzing a Primary Source RubricName ______________________.docxAnalyzing a Primary Source RubricName ______________________.docx
Analyzing a Primary Source RubricName ______________________.docx
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

19The Complexity and Evolving Technolog.docx

  • 1. 1 9 The Complexity and Evolving Technologies of the Healthcare Industry Good Student University of Maryland Global Campus Course Instructor Date The Complexity and Evolving Technologies of the Healthcare Industry The healthcare industry as we know it is constantly evolving
  • 2. and growing exponentially every year for many reasons, such as regulation changes from federal and state agencies, changes to coverage from health insurance companies, illness trends, developments in medicine, and demographics of medical staff. Two of the most important reasons are due to the evolving medical needs of patients and the advancements in technology that provide viable options to these patients in need. These technology advancements in the healthcare arena has generated interest from cybercriminals. Cybercriminals have no preference in whom they target if they can gain profit or cause a negative impact to the end user(s). When these vulnerabilities are discovered and attacks occur in the healthcare industry, it could literally mean the difference between life and death for patients. This critical outcome has created a high demand for cybersecurity and technical personnel in this industry to implement them. Three of the top trends in the healthcare industry as it relates to cybersecurity are the increased dangers of 3D printing in medicine, revolution of big data and advanced analytics in the healthcare system, and Internet of Things (IoT) and cloud computing as a security threat to healthcare. This paper will focus on the complexity of the healthcare industry and how transitioning to the Internet of Things and cloud computing has created a large security threat to all medical practices around the world. Top Trends of the Healthcare Industry Technologists and companies around the world have embraced the importance and endless possibilities of 3D printing (NAICS 323111). 3D printing is a manufacturing process that creates a three dimensional object by incrementally adding material until the object is complete (this contrasts with subtractive manufacturing techniques such as carving or milling, in which an object is created by selectively removing parts from a piece of raw material) (Lacoma, 2018). Many manufacturing companies first began using 3D printing to resolve some of their most difficult problems and improve the efficiency of their processes. The healthcare industry began to take notice and
  • 3. medical experts began developing ideas on how this technology could be implemented in their medical practices. 3D printing in healthcare makes it possible for medical professionals to provide patients with a new form of treatment in several ways. 3D printing is used for the development of new surgical cutting and drill guides, prosthetics as well as the creation of patient- specific replicas of bones, organs, and blood vessels (Izukor, 2019). Although the benefits of using this technology in medicine are endless, the process has created a heightened risk of misuse or tampering by cybercriminals. If a hacker can obtain the digital design files or proprietary information about the design of a medical product such as prosthetics, they could potentially introduce flawed design modifications. For example, in some cases, simply changing the orientation of a product during 3D printing may affect its strength and utility for a specific purpose (Redding, 2019). These unwanted modifications could lead to severe damage to patients and cost the healthcare industry millions in settlements. This scenario has created the demand for better cybersecurity against these attackers. Security experts have begun encouraging these companies to begin using removable drives exclusively, soundproofing walls, installing firewalls, and unplugging these printers from the internet to help with reducing the number of successful cyber-attacks. The introduction of big data (NAICS 518210) within the healthcare industry is building momentum and seemingly transforming the way patients and healthcare providers are providing services. Currently, the primary data pools for the big-data revolution in healthcare are activity (claims) and cost data, clinical data, pharmaceutical R&D data, and patient behavior and sentiment data (Groves, Kayyali, et al., 2013). As the data from these four data pools accumulate over time, analytic teams can develop advanced algorithms, applications, proactive treatments, trends, and insights that are impactful to all stakeholders of the healthcare industry. Advanced analytics is key to ensuring data is quickly reviewed and the best options
  • 4. are made available to health professionals. For example, claims data may show that a patient has tried three treatments for cancer, but only the clinical data show us which was effective in shrinking the tumor (Groves, Kayyali, et al., 2013). Examples such as this demonstrate how this data can help with the outcome of a patients’ health, assist physicians with choosing the proper procedures, and reduce cost on unnecessary treatments. In parallel to the implementation of Big Data across all medical practices, personal data such as electronic medical records and devices are constantly being compromised by criminals. Each of these incidents result in fines and remediation cost to patients. For example, in 2018 a major health insurance company paid a record $16 million HIPPA fine when nine million patient health records were exposed (Baker, 2019). For now, to address the need for better cybersecurity, the Department of Health and Human Services (HHbS) released reports on cybersecurity best practices and understanding the risks of using certain technologies. The Internet of Things (IoT) (NAICS 541330) is currently a relatively new market not only in the healthcare industry, but most industries. The IoT is a megatrend in next-generation technologies that can impact the whole business spectrum and can be thought of as the interconnection of uniquely identifiable smart objects and devices within today’s internet infrastructure with extended benefits (Islam, et al., 2015). With the introduction of IoT in healthcare, cloud computing has played a pivotal role in their complimentary relationship. While IoT produces large amounts of data, the primary responsibility of cloud computing (NAICS 541519) is to ensure the data is guided and stored in the correct locations. These technologies have helped to improve the efficiency in healthcare operations. With the growing complexity of this industry along with the adoption of IoT and cloud computing, a large security threat is beginning to manifest itself within healthcare. Growing complexity of the healthcare industry The importance of the healthcare industry is undeniably
  • 5. vital to most living beings and species as patients visit medical facilities as often as once a year or as many as five times a week to meet with their health professionals. As the population continues to live longer lives, the higher the demand for healthcare services. The reason the healthcare industry is perceived as complex is due to the multilayers of medical services, growth of industry worldwide, lengthy list of laws and regulations, advancements in technologies, unique cost models, and the differences between each layer. For example, the health care system comprises networks of components (hospitals, clinics, nursing homes, rehabilitation units, patient homes, families, and patients) that interact nonlinearly on different scales (the patient, family, medical center, and government), and often produce unintended consequences (adverse drug reactions, nosocomial infections, rehospitalizations, and functional decline) (Lipsitz, 2012). Every year these components change as well as grow exponentially in size which inadvertently impacts consumers of the healthcare industry. In order to address some of the complexity and industry growth, technology advancements were implemented and continually improved in which we will be described next. The adoption of IoT and cloud computing As the populations continue to thrive into longer years, decline in health professionals, growth of electronic data, and the demand for remote medical monitoring, the advancements of technology have provided solutions to many of these issues. One example of the IoT in healthcare is the Continuous Glucose Monitor (CGM) that monitors the blood glucose levels. The body sensor collects data and uses Wi-Fi to send information to the appropriate cloud infrastructure. When the readings are above normal levels, the physician and patient are notified along with corrective actions. A similar technology is the Bluetooth-enabled weight scale and blood pressure cuff that tracks patients’ conditions following cancer treatments as soon as they depart the medical facility. Like the CGM, cloud computing is vital when this data is collected from the sensor as
  • 6. it needs to be stored, processed, and made available in a user- friendly dashboard/application within seconds of collection. The cloud computing infrastructure provides the essential resources (like CPU, storage and application servers) for deploying the web application and the interfaces that enable the communication with the sensors and the various external systems (Doukas & Maglogiannis, n.d.). The adoption of IoT and cloud computing has saved lives due to proactive monitoring, reduced costs to medical providers, and has made viewing patients’ current vitals readily available from any network connected device. The costly security threat of healthcare technology As more technology is implemented throughout the industry, the security threat grows in parallel. Adding connectivity to these devices has led to revolutions in medical science and have changed the way institutions are able to care for patients, but not without added risks. Without proper cybersecurity in place, electronic patient records containing personally identifiable information and network connected medical devices are subject to cyber criminals. When criminals can illegally access this sensitive data, they manipulate the functionality of medical devices, perform ransomware attacks on systems at medical facilities, create false identities, and other attacks that negatively impact operations. Whenever data is exposed to the internet, the risk of the data being compromised is prevalent, but the stakes are much higher when it relates to healthcare and the protection of patients. How healthcare can address the security threats Any network connected devices are vulnerable to be attacked by cybercriminals, but there are security best practices that could limit or prevent these security threats. At a minimum, the IT staff could ensure users regularly perform security updates, educate users about phishing techniques, deploy encryption tools, enforce strong password combinations, and provide users with security best practices. In addition, health systems and companies should communicate cybersecurity plans to
  • 7. community leaders, policymakers, patients and other stakeholders to build confidence and generate best practices (Baker, 2019). Collaboration in and outside this industry is essential in order to maintain and adapt to the constantly changing landscape of cybersecurity. Conclusion To conclude, this paper provided information regarding top trends in the healthcare industry as it relates to cybersecurity. It also discussed the security threat that this industry currently faces with the growth of technology advancements in the medical field. Depending on the sensitivity of data collected by cybercriminals, the damages could result in huge financial losses, reduction in employment, life-threatening scenarios, or even closure of medical facilities. In order to mitigate the multiple security threats in this industry, the IT department within each medical provider would need to strategically develop guidelines and policies that involve implementing various security best practices without impacting medical operations. ReferencesBaker, M. (4 February 2019). Big Data Transforming Healthcare, But Cybersecurity Issues Loom. https://www.wileyconnect.com/home/2019/2/4/big-data- transforming-healthcare-but-cybersecurity-issues-loomBurrill, S. & Beaudoin, D (2019). 2019 US and global health care industry outlook. https://www2.deloitte.com/us/en/pages/life-sciences- and-health-care/articles/us-and-global-health-care-industry- trends-outlook.html Doukas, C. & Maglogiannis, I. (n.d.). Bringing IoT and cloud computing towards pervasive healthcare. https://www.researchgate.net/profile/Ilias_Maglogiannis/publica tion/261431852_Bringing_IoT_and_Cloud_Computing_towards _Pervasive_Healthcare/links/563c7e4708ae45b5d288eb41.pdf Groves, P., Kayyali, B., Knott, D., & Kuiken, S. (2013
  • 8. January). The ‘big data’ revolution in healthcare. http://repositorio.colciencias.gov.co/bitstream/handle/11146/46 5/1661- The_big_data_revolution_in_healthcare.pdf?sequence=1&isAllo wed=y Islam, S.M., Kwak, D., Kabir, H., Hossain, M., & Kwak, K. (4 July 2015). The Internet of Things for health care: A comprehensive survey. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7113786 Izukor, C. (6 May 2019). Cyber security trends in healthcare. Retrieved from https://blog.veriato.com/cyber-security-trends-in- healthcare Lacoma, T. (16 June 2018). What is 3D printing? Here’s everything you need to know. https://www.digitaltrends.com/computing/what-is-3d- printing/ Lipsitz, L. (18 July 2012). Understanding health care as a complex system. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3511782/ Redding, H. (5 July 2017). The cybersecurity risks of 3D printing. https://bdtechtalks.com/2017/07/05/the-cybersecurity- risks-of-3d-printing/
  • 9. Respond to at least two of your peers by extending, refuting/correcting, or adding additional nuance to their posts. Post #1 Jessica Rincon St. Thomas University NUR 417 AP2 Prof. Yedelis Diaz 10/16/2022 Elder Abuse According to Santos et al. (2019), elder abuse is the failure to protect an elderly person from harm or to provide for his or her basic needs, by a caregiver. The definition of elder abuse also includes intentional or unintentional actions or inactions of a caregiver that create a serious risk of harm or cause harm to a vulnerable elder. Lecture Notes (Slide 5) present that elder abuse can be domestic, institutional, or result from self-neglect. The seven types of elder abuse are self-neglect, abandonment, physical abuse, emotional abuse, neglect, material and financial exploitation, and sexual abuse. Weissberger et al. (2020) define physical abuse as intentionally causing an elderly person physical injury, harm, pain, distress, or functional impairment through the use of force. Forms of physical abuse include inappropriate use of physical or medication restraints, physical punishment, hitting, and slapping. Self-neglect, as the name suggests, is any self- inflicted behavior that threatens the elderly person’s safety and health (Weissberger et al., 2020). Actions such as failure to provide self with appropriate hygiene and adequate food are self-neglect. The elder abuse of abandonment is closely related to that of self-neglect, except that it is perpetrated by the elderly person’s caregiver. Neglect also shares similar characteristics as it is defined as the failure of the caretaker to meet the necessary basic needs, such as adequate clothing, shelter, food, social stimulation, and
  • 10. medical attention, of an elderly person (Weissberger et al., 2020). Emotional abuse refers to causing an elderly person anguish, psychological pain, distress, fear, and geographic isolation through verbal and non-verbal interactions. Disrespect, threats, and humiliation qualify as forms of emotional abuse (Weissberger et al., 2020). Lastly, sexual abuse is unwanted or forced sexual interaction or contact, while financial exploitation refers to fraudulent, unauthorized, or improper use of the property of an elderly person by a trusted individual, caregiver, or stranger for the benefit of the exploiter and not the elderly person (Weissberger et al., 2020). Approaching Ethical Dilemmas Euthanasia, suicide, and assisted suicide to present the most common forms of ethical dilemmas nurses face in their delivery of care. The primary approach to such ethical dilemmas is to rely on the professional codes of ethics that govern nursing practice. These codes of ethics are based on the ethical principles of self-determination or autonomy, beneficence, nonmaleficence, justice, and veracity (Lecture Notes, Slide 31). For example, the code of ethics for nurses states that nurses should not participate in assisted suicide (Lecture Notes, Slide 32). Therefore, nurses must acquaint themselves with the provisions of the professional ethical codes of the practice for guidance on how to respond to the various ethical dilemmas regarding euthanasia, suicide, and assisted suicide. Nurses should also consult ethics committees for advice on dilemmas and value conflicts, as this is part of the role of such committees. Consequently, nurses must know the laws of the state within which they practice, particularly regarding these ethical dilemmas. This is because nurses have the responsibility of facilitating informed decision-making on such issues, which they can only achieve when they have adequate knowledge of laws and regulations on the issue. For instance, all 50 states consider an act of affirmative euthanasia an illegal criminal offense (Lecture Notes, Slide 32). With such knowledge, it
  • 11. becomes easier for nurses to address ethical dilemmas concerning euthanasia. In other words, nurses can either rely on their knowledge of the ethical principles and laws concerning the ethical dilemma in question or seek the advice of others, such as ethics committees, when faced with ethical dilemmas regarding euthanasia, suicide, and assisted suicide. References Lecture Notes. (n.d.). Chapter 3: Legal and Ethical Issues. Santos, A. J., Nunes, B., Kislaya, I., Gil, A. P., & Ribeiro, O. (2019). Elder abuse victimization patterns: latent class analysis using perpetrators and abusive behaviors. BMC geriatrics, 19(1), 1-11. Weissberger, G. H., Goodman, M. C., Mosqueda, L., Schoen, J., Nguyen, A. L., Wilber, K. H., ... & Han, S. D. (2020). Elder abuse characteristics based on calls to the National Center on elder abuse resource line. Journal of Applied Gerontology, 39(10), 1078-1087. Post #2 Lisa Wright St. Thomas University NUR 417: Aging and End of Life Yedelis Diaz
  • 12. October 20, 2022 Elder Abuse Aging is a normal biological process that we all life goes through. As one age, their functions become diminished, and they need enhanced attention to lead whole lives. While the process does not lead to disease or disability, it does reduce one’s capacity to respond to such challenges. Due to their vulnerable state, the elderly often gets abused since they cannot speak for themselves or cannot. National Council on Aging (n.d.) estimates that about five million elders experience abuse annually, which is staggering. This assignment module will examine the types of abuse identified by the National Center on Elder Abuse (NCEA) and how I would approach the ethical dilemmas and the considerations that accompany Euthanasia, suicide, and assisted suicide. Types of Elder Abuse The NCEA outlines several types of elder abuse that we should look out for to help the population (National Center on Elder Abuse, n.d.). Physical Abuse This abuse takes the form of physical force leading to injuries and harm to the elderly. It can also include improper use of restraints, medication, or feeding them by force. Its symptoms include fractures, bruises, and unexplained bleeding or injuries. Sexual Abuse It involves an involuntary engagement in the act of sex with an elderly. Without consent, any act of sex is deemed abuse, and it is a deplorable phenomenon that some among the population endure. It is characterized by strange venereal illnesses or bruising in the breast and pelvic region. Emotional or Psychological Abuse This inflicts pain and suffering on the elderly using voiced or non-verbal means. When an older adult feels helpless from what someone says since they cannot fend for themselves, this is emotional abuse. Its main symptoms include withdrawal
  • 13. or being overly restless. Neglect This is refusing to realize one’s responsibilities towards an older adult. Due to their advanced age and reduced functionality, they need assistance to get by, and when it is not rendered, this is considered neglect. Abandonment This is the desertion of the elderly that results in dereliction of their care. It is primarily witnessed in family situations where a family member takes on the responsibility and then abandons the person (Ludvigsson et al., 2022). Financial exploitation It is the misuse of an elderly’s wealth by taking advantage of their low capacity to use or protect it. It can be forging their signatures or cashing their checks without their direction. Self-Neglect These are situations when the elderly are at risk through self-harm or failure to care for themselves properly. At this stage, assistance is called for mostly from family members. Ethical Dilemmas Regarding Euthanasia, Suicide, and Assisted Suicide Euthanasia While the right to life is guaranteed, the question remains whether the right to end it should also be granted. It is also a dilemma to determine in what situations life should be ended. While it is illegal in the country, some argue that it is not suitable for someone to be denied the right to die with dignity while being granted the right to live in anguish (Buchbinder, 2018). Regardless of the ethical dilemma and situation, I may face, I would stand by my ethical obligation of doing no harm. Assisted Suicide I believe assisted suicide contradicts the healthcare professional’s oath and mandate of caring and healing. While it may present a compelling case for death, for instance, of
  • 14. constant and anguishing pain due to terminal illnesses with close to no hope of treatment, allowing assisted suicide would ultimately result in more harm than good. Suicide Suicide should not be condoned under any circumstance. Despite what a patient is going through or how bleak their situation may appear, care should always be prioritized and administered to the last possible stage of life while respecting the patient’s autonomy. Pain control and proper communication should also be highly prioritized. Conclusion Life is sacred and should always be treated as such. It is deplorable to witness the elderly abused because they cannot advocate for themselves. The worst part of the situation is that most cases remain unreported. Regarding care for the elderly, healthcare professionals need to be meticulously keen to ensure that their quality of life is not impaired under any circumstances. Decisions on the end of life are also a sore spot and a point of contest among different perspectives. Regardless of the approach, the consensus is that life is precious and should be preserved. This assignment module explored the types of abuse identified by the National Center on Elder Abuse (NCEA) and how I would approach the ethical dilemmas and the considerations that accompany Euthanasia, suicide, and assisted suicide. References Buchbinder, M. (2018). Access to Aid-in-Dying in the United States: Shifting the debate from rights to justice. American Journal of Public Health, 108(6), 754. https://doi.org/10.2105/AJPH.2018.304352 Ludvigsson, M., Wiklund, N., Swahnberg, K., & Simmons, J. (2022). Experiences of elder abuse: a qualitative study among victims in Sweden. BMC Geriatrics,
  • 15. 22(1), 1–12. https://doi.org/10.1186/S12877-022-02933- 8/FIGURES/2 National Center on Elder Abuse. (n.d.). NCEA - Abuse types. https://ncea.acl.gov/Suspect- Abuse/Abuse-Types.aspx National Council on Aging. (n.d.). Get the facts on elder abuse. https://www.ncoa.org/article/get-the-facts-on-elder-abuse 1 7 Trends in the [Fill in relevant term(s) here] Industry Comment by Kathleen Hogan: Note to students: This template is intended to help you organize the parts of your Trends project so that you build each section as directed. You will submit a draft to your professor of the first part at the end of Week 2. This is important! Use the feedback from your professor to refine your trends section and correct any errors in your reference citations. Then work on the issue of interest, review and edit your work, and submit your completed paper at the end of Week 3. It you want to send a draft to the writing tutors, build in time to get that feedback and use it for your final. Please delete all the instructions/notes within this template before submitting your final paper. In the web version, click the three dots in the upper right corner and select delete thread.
  • 16. In the desktop version, right click on the comment and select delete. Good luck!! [Fill in your first and last name] University of Maryland Global Campus [Fill in your course name] [Fill in instructor’s name] [Fill in due date] [Insert a page break after your last line of text so your first page will always be on a new page no matter how much you edit your paper. In Word, go to “Insert” and choose “Page Break”.] Trends in the [Fill in relevant term(s) here] Industry Comment by Kathleen Hogan: Put your title here as it’s written on your title page. It is a Level 1 heading (centered and bold). Read more about APA Level Headings (apa.org). This first section (due at the end of Week 2 for a review) consists of the title page, introductory paragraph, Level 1 and Level 2 headings, discussion of three trends, and your references page. Within your introductory paragraph, introduce your industry and clearly identify the top three trends your
  • 17. research has uncovered. Remember to use in-text citations if you are using others’ ideas (Hogan, 2021). Your final sentence should be a transition that leads into the discussion of your first trend in the body of your paper. Comment by Kathleen Hogan: For a refresher, go here: In-Text Citations - APA 7th Edition Citation Examples - LibGuides at University of Maryland Global Campus (umgc.edu) ***This is an excellent website to bookmark for future use! Discussion of Three Trends [Name of Trend #1] Comment by Kathleen Hogan: This is a Level 2 heading (left-justified and bold). Continue this pattern for Trends 2 and 3. In this section, introduce and discuss Trend #1 in 1-2 paragraphs. Explain how this trend is new to the industry and what it signals for the industry. Note that all paragraphs are indented a tab at 0.5”. Also, all lines are double spaced. The final sentence of this paragraph should lead into the first sentence of the next paragraph. You will have an opportunity to revise this section when you receive feedback from your professor on your draft. [Name of Trend #2] In this section, introduce and discuss Trend #1 in 1-2 paragraphs. Explain how this trend is new to the industry and what it signals for the industry. The final sentence of this paragraph should lead into the first sentence of the next paragraph. You will have an opportunity to revise this section when you receive feedback from your professor on your draft. [Name of Trend #3] In this section, introduce and discuss Trend #1 in 1-2 paragraphs. Explain how this trend is new to the industry and what it signals for the industry. The final sentence of this paragraph should lead into the first sentence of the next paragraph. You will have an opportunity to revise this section when you receive feedback from your professor on your draft.
  • 18. An Important Emerging Issue Comment by Kathleen Hogan: This is where the next section begins. In this section you will identify an emerging issue or problem within your industry. This could be one of your three trends, or it can be related to the industry. This section will be around 2-3 double-spaced pages. This section begins with an introductory paragraph that identifies an emerging issue or problem and makes a claim about its significance in your industry. [Theme] Comment by Kathleen Hogan: To organize this section for your reader, use Level 2 headings (left-justified and bold) to organize information by theme. For the rest of the paper, you will develop an argument that supports this claim (clearly stated in your introduction). The body paragraphs need to describe and justify your proposed approach to the issue and explain how it relates to how other organizations or experts have addressed the same issue based on their research. When you present your argument, you should also be prepared to anticipate and refute counterarguments or alternative approaches. By showing that you understand other approaches and being very clear about how your approach is preferable, you are more likely to make a compelling argument. Use information from your sources to support your ideas while ensuring that your own voice and ideas are primary in the paper. Again, be sure to include in-text citations when you are using ideas from your sources. If you include any quoted material, please include the location of the material as well as the author and year (Hogan, 2021, p. 2). Do not rely on quoted material. This paper should represent your thoughts based on a synthesis of ideas that contributed to your thesis. [Theme]
  • 19. Continue to describe and justify your proposed approach to the issue and explain how it relates to how other organizations or experts have addressed the same issue based on research. [Theme] Continue to describe and justify your proposed approach to the issue and explain how it relates to how other organizations or experts have addressed the same issue based on research. You may not have a third theme or may need an additional Level 2 headings for more themes – adjust the template as needed. Conclusion Based on the above discussion of three trends and a deeper discussion of an important issue, this section will consist of 1-3 paragraphs that provide conclusions about the trends, the emerging issue, and their overall impact on the direction of the industry. You may discuss areas of uncertainty that require further research, but do not introduce anything new here except to make focused conclusions about the trends and issue based on your synthesis of the ideas from your resources and your own thoughts. Well done!!! [Insert a page break after your last line of text so your References page will always be on a new page no matter how much you edit your paper. In Word, go to “Insert” and choose “Page Break”.] References Comment by Kathleen Hogan: See the UMGC Library's General Rules - APA 7th Edition Citation Examples - LibGuides at University of Maryland Global Campus (umgc.edu) for additional guidance. An example of a student paper in APA 7 format can be found here: Sample Annotated Student Paper in APA Style. Remember: All sources that you use in your paper must be listed here AND cited in the body of your paper.
  • 20. Biggs, S., & Nadeau, K. (1992, December). Students with Attention Deficit Disorder (ADD). Presented at Chesapeake Psychological Services to members of Nation’s Capital Area Disability Support Services Coalition. http://www.adult-add.org/study/student/study_study_tips.htm Comment by Kathleen Hogan: Note that the second line of each citation is indented. First type in all your citations. Then highlight them and go to “Paragraph” and click the arrow to see all settings. When you set a “Hanging” indention and line spacing at “Double”, your citations should be correct. Booth, R. C. (1998). List of appropriate school-based accommodations and interventions. Highland Park, Ill.: National Attention Deficit Disorder Association. http://www.add.org/content/school/list.htm General information about Attention-Deficit/Hyperactivity Disorder fact sheet number 19 (FS19). (1999, August). The Academy for Educational Development and the Office of Special Education Programs. http://www.adult- add.org/study/teacher/study_teach_tips.htm Hallowell, E. M., & Ratey, J. J. (1994). Driven to distraction: Recognizing and coping with Attention Deficit Disorder from childhood through adulthood. Pantheon Books. Latham, P. H. (2000). Attention Deficit Disorder in college faculty and students: Partners in education. National Center for Law and Learning Disabilities. http://www.adult- add.org/study/student/study_student_college.htm
  • 21. Robertson, A. S. (2000). ADD/ADHD: What does it mean for parents and families when their child is diagnosed with this condition? http://www.adult-add.org/medical/research/research_family.htm image1.png