SlideShare a Scribd company logo
Picot Question
Introduction
Technology keeps advancing at a faster rate than anything else.
The advancements in technology have both positive and
negative impact on patients.
Breach of patient confidential information has been made easier
with advancement in technology.
(Pathak, 2019).
Advancement in technology has led to an increase in data
breach especially in healthcare facilities like hospitals.
2
Clinical Issue
Patient information includes medical records which are private.
Breach of patient confidential information happens when their
private information is disclosed to a third party.
The biggest confidentiality threat is hacking.
Patients are always leaving the personal information at the
hospital.
(Hammouchi, 2019)
(McLeod, 2018).
The patient usually disclose their private information whenever
they visit healthcare facilities.
This information is private and should be protected.
The clinical issue is breach to the confidentiality of patient
information.
3
Cont’
The medical profession involves trust between the professionals
and the patients.
The professionals should maintain the trust by protecting the
patient’s confidentiality.
(Yeng, 2021).
Doctors and other healthcare professionals have a role in
protecting the personal information of the patient.
4
PICOT Question
The focus was on confidentiality of patient information.
The population affected is patient group between the ages of 45-
70 years who are technology savvy.
They are more vulnerable to hackers when accessing portal.
The PICOT question was developed with focus on the older
generation which is not technology savvy.
They are more vulnerable to cyber attacks when using portals.
5
Cont’
Population (P): Patients between 45-70 years.
Intervention (I): Patient portal.
Comparison (C): Patients between 16-40 years of age.
Outcome (O): Losing private information for lack of
understanding of the portal.
The population is patients between the ages of 45-70
Intervention is patient portal
Comparison (C): Patients between 16-40 years of age.
Outcome (O): Losing private information for lack of
understanding of the portal.
6
Research Databases
Search databases included Google Scholar, JSTOR, and Walden
University Library.
Walden University has two databases Computer Science
Database and the Ovid Nursing Books Database.
Search databases included Google Scholar, JSTOR, and Walden
University Library.
7
Level of Evidence
The level of evidence is IV and V
The study will be a descriptive study that will answer how,
what, when, and where.
The evidence is collected from Patients between 45-70 years.
The level of evidence I IV
This is because the study is descriptive.
Evidence is collected from Patients between 45-70 years.
8
Peer-review articleLevel of EvidenceStrengthsMcLeod, A., &
Dolezel, D. (2018). Cyber-analytics: Modeling factors
associated with healthcare data breaches. Decision Support
Systems, Science Direct. 108, 57-68.Level IV- cohort
studyPresents tangible results that show exposure levels,
organizational factors, security factors, and healthcare data
breaches.Pathak, P. R., & Chou, A. (2019). Confidential care
for adolescents in the US Health Care System. Journal of
patient-centered research and reviews, 6(1), 46.Level IV-
Qualitative studyShows how the best practices should be
implemented in the protection of patient data. Seh, A. H.,
Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R.,
& Ahmad Khan, R. (2020, June). Healthcare data breaches:
Insights and implications. In Healthcare (Vol. 8, No. 2, p. 133).
Multidisciplinary Digital Publishing Institute.Level IV- cohort
studyThe article shows how healthcare systems are highly
exposed to the external threats to information security
breachWalker-Roberts, S., Hammoudeh, M., & Dehghantanha,
A. (2018). A systematic review of the availability and efficacy
of countermeasures to internal threats in healthcare critical
infrastructure. IEEE Access, 6, 25167-25177.Level V- Evidence
gathered from Systematic review of qualitative study.The
results show how a reactive approach may not be the best
methods for protecting the patients’ private records.
References
Hammouchi, H., Cherqi, O., Mezzour, G., Ghogho, M., & El
Koutbi, M. (2019). Digging deeper into data breaches: An
exploratory data analysis of hacking breaches over time.
Procedia Computer Science, 151, 1004-1009.
McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling
factors associated with healthcare data breaches. Decision
Support Systems, Science Direct. 108, 57-68.
Pathak, P. R., & Chou, A. (2019). Confidential care for
adolescents in the US Health Care System. Journal of patient-
centered research and reviews, 6(1), 46.
Yeng, P. K., Szekeres, A., Yang, B., & Snekkenes, E. A. (2021).
Mapping the Psychosocialcultural Aspects of Healthcare
Professionals’ Information Security Practices: Systematic
Mapping Study. JMIR Human Factors, 8(2), e17604.

More Related Content

What's hot

Integrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
Integrating openIMIS in the Undergraduate and Postgraduate Medical CurriculumIntegrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
Integrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
Iris Thiele Isip-Tan
 
Dr. Obumneke Amadi _Transcript
Dr. Obumneke Amadi _TranscriptDr. Obumneke Amadi _Transcript
Dr. Obumneke Amadi _Transcript
Discover Health Global Initiative
 
NLM Georgia Biomedical Informatics
NLM Georgia Biomedical InformaticsNLM Georgia Biomedical Informatics
NLM Georgia Biomedical Informatics
Alison Aldrich
 
MINING HEALTH EXAMINATION RECORDS A GRAPH-BASED APPROACH
MINING HEALTH EXAMINATION RECORDS  A GRAPH-BASED APPROACHMINING HEALTH EXAMINATION RECORDS  A GRAPH-BASED APPROACH
MINING HEALTH EXAMINATION RECORDS A GRAPH-BASED APPROACH
Nexgen Technology
 
Tteh.000536
Tteh.000536Tteh.000536
Infographics for Health: Best Practices
Infographics for Health: Best PracticesInfographics for Health: Best Practices
Infographics for Health: Best Practices
Iris Thiele Isip-Tan
 
Nature
NatureNature
Nature
Editora 247
 
Ethics and sharing health data
Ethics and sharing health dataEthics and sharing health data
Ethics and sharing health data
T.J. Kasperbauer
 
Predicting asthma related emergency department visits using big data
Predicting asthma related emergency department  visits using big dataPredicting asthma related emergency department  visits using big data
Predicting asthma related emergency department visits using big data
redpel dot com
 
Taking A Proactive Approach Towards Responsibility Edited
Taking A Proactive Approach Towards Responsibility   EditedTaking A Proactive Approach Towards Responsibility   Edited
Taking A Proactive Approach Towards Responsibility Edited
kblaas
 
Internet information and email: shaping professional / patients relationship
Internet information and email: shaping professional / patients relationshipInternet information and email: shaping professional / patients relationship
Internet information and email: shaping professional / patients relationship
Francisco Lupiáñez-Villanueva
 
Open science-open-data-pnc-20103
Open science-open-data-pnc-20103Open science-open-data-pnc-20103
Open science-open-data-pnc-20103
hjl7
 
How You can use Twitter as a Tool for PhD Health Research - Phdassistance.com
How You can use Twitter as a Tool for PhD Health Research - Phdassistance.comHow You can use Twitter as a Tool for PhD Health Research - Phdassistance.com
How You can use Twitter as a Tool for PhD Health Research - Phdassistance.com
PhD Assistance
 
The Librarian Reloaded: Evolving Roles in Health Informatics
The Librarian Reloaded: Evolving Roles in Health InformaticsThe Librarian Reloaded: Evolving Roles in Health Informatics
The Librarian Reloaded: Evolving Roles in Health Informatics
Iris Thiele Isip-Tan
 
How can the NHS better exploit social media to stimulate patient involvement?
How can the NHS better exploit social media to stimulate patient involvement?How can the NHS better exploit social media to stimulate patient involvement?
How can the NHS better exploit social media to stimulate patient involvement?Mark Hawker
 
Eysenbach: Infodemiology and Infoveillance
Eysenbach: Infodemiology and InfoveillanceEysenbach: Infodemiology and Infoveillance
Eysenbach: Infodemiology and Infoveillance
Gunther Eysenbach
 
Luciano informs healthcare_2015 Nashville, TN USA July 30 2015
Luciano informs healthcare_2015 Nashville, TN USA July 30 2015Luciano informs healthcare_2015 Nashville, TN USA July 30 2015
Luciano informs healthcare_2015 Nashville, TN USA July 30 2015
Joanne Luciano
 
Statistics For Health Science and Its Impacts
Statistics For Health Science and Its ImpactsStatistics For Health Science and Its Impacts
Statistics For Health Science and Its Impacts
Cashews
 

What's hot (20)

Integrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
Integrating openIMIS in the Undergraduate and Postgraduate Medical CurriculumIntegrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
Integrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
 
Dr. Obumneke Amadi _Transcript
Dr. Obumneke Amadi _TranscriptDr. Obumneke Amadi _Transcript
Dr. Obumneke Amadi _Transcript
 
NLM Georgia Biomedical Informatics
NLM Georgia Biomedical InformaticsNLM Georgia Biomedical Informatics
NLM Georgia Biomedical Informatics
 
MINING HEALTH EXAMINATION RECORDS A GRAPH-BASED APPROACH
MINING HEALTH EXAMINATION RECORDS  A GRAPH-BASED APPROACHMINING HEALTH EXAMINATION RECORDS  A GRAPH-BASED APPROACH
MINING HEALTH EXAMINATION RECORDS A GRAPH-BASED APPROACH
 
Library Database
Library DatabaseLibrary Database
Library Database
 
Tteh.000536
Tteh.000536Tteh.000536
Tteh.000536
 
Infographics for Health: Best Practices
Infographics for Health: Best PracticesInfographics for Health: Best Practices
Infographics for Health: Best Practices
 
Nature
NatureNature
Nature
 
Ethics and sharing health data
Ethics and sharing health dataEthics and sharing health data
Ethics and sharing health data
 
Predicting asthma related emergency department visits using big data
Predicting asthma related emergency department  visits using big dataPredicting asthma related emergency department  visits using big data
Predicting asthma related emergency department visits using big data
 
Taking A Proactive Approach Towards Responsibility Edited
Taking A Proactive Approach Towards Responsibility   EditedTaking A Proactive Approach Towards Responsibility   Edited
Taking A Proactive Approach Towards Responsibility Edited
 
Internet information and email: shaping professional / patients relationship
Internet information and email: shaping professional / patients relationshipInternet information and email: shaping professional / patients relationship
Internet information and email: shaping professional / patients relationship
 
Open science-open-data-pnc-20103
Open science-open-data-pnc-20103Open science-open-data-pnc-20103
Open science-open-data-pnc-20103
 
How You can use Twitter as a Tool for PhD Health Research - Phdassistance.com
How You can use Twitter as a Tool for PhD Health Research - Phdassistance.comHow You can use Twitter as a Tool for PhD Health Research - Phdassistance.com
How You can use Twitter as a Tool for PhD Health Research - Phdassistance.com
 
The Librarian Reloaded: Evolving Roles in Health Informatics
The Librarian Reloaded: Evolving Roles in Health InformaticsThe Librarian Reloaded: Evolving Roles in Health Informatics
The Librarian Reloaded: Evolving Roles in Health Informatics
 
How can the NHS better exploit social media to stimulate patient involvement?
How can the NHS better exploit social media to stimulate patient involvement?How can the NHS better exploit social media to stimulate patient involvement?
How can the NHS better exploit social media to stimulate patient involvement?
 
Hc2011socialmedia
Hc2011socialmediaHc2011socialmedia
Hc2011socialmedia
 
Eysenbach: Infodemiology and Infoveillance
Eysenbach: Infodemiology and InfoveillanceEysenbach: Infodemiology and Infoveillance
Eysenbach: Infodemiology and Infoveillance
 
Luciano informs healthcare_2015 Nashville, TN USA July 30 2015
Luciano informs healthcare_2015 Nashville, TN USA July 30 2015Luciano informs healthcare_2015 Nashville, TN USA July 30 2015
Luciano informs healthcare_2015 Nashville, TN USA July 30 2015
 
Statistics For Health Science and Its Impacts
Statistics For Health Science and Its ImpactsStatistics For Health Science and Its Impacts
Statistics For Health Science and Its Impacts
 

Similar to Picot question introduction technology keeps adva

Security of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docxSecurity of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docx
kaylee7wsfdubill
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docx
write31
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docx
studywriters
 
Informatics and nursing 2015 2016.odette richards
Informatics and nursing 2015 2016.odette richardsInformatics and nursing 2015 2016.odette richards
Informatics and nursing 2015 2016.odette richards
Odette Richards
 
Accessing and Sharing Electronic Personal Health Data.
Accessing and Sharing Electronic Personal Health Data.Accessing and Sharing Electronic Personal Health Data.
Accessing and Sharing Electronic Personal Health Data.
Maria Karampela
 
Accessing and Sharing Electronic Personal Health Data
Accessing and Sharing Electronic Personal Health DataAccessing and Sharing Electronic Personal Health Data
Accessing and Sharing Electronic Personal Health Data
Sofia Ouhbi
 
Big data for health
Big data for healthBig data for health
Big data for health
redpel dot com
 
INTERGRATIVE REVIEW 14Equip.docx
INTERGRATIVE REVIEW             14Equip.docxINTERGRATIVE REVIEW             14Equip.docx
INTERGRATIVE REVIEW 14Equip.docx
vrickens
 
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
Health Informatics New Zealand
 
Nationwide Privacy and Security Framework for Electronic Exchange of.docx
Nationwide Privacy and Security Framework for Electronic Exchange of.docxNationwide Privacy and Security Framework for Electronic Exchange of.docx
Nationwide Privacy and Security Framework for Electronic Exchange of.docx
stirlingvwriters
 
Mitochondrial Disease Community Registry: First look at the data, perspectiv...
Mitochondrial Disease Community Registry:  First look at the data, perspectiv...Mitochondrial Disease Community Registry:  First look at the data, perspectiv...
Mitochondrial Disease Community Registry: First look at the data, perspectiv...
SophiaZilber
 
Health Informatics- Module 1-Chapter 1.pptx
Health Informatics- Module 1-Chapter 1.pptxHealth Informatics- Module 1-Chapter 1.pptx
Health Informatics- Module 1-Chapter 1.pptx
Arti Parab Academics
 
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDSMANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
ijsptm
 
Towards ehr interoperability in tanzania
Towards ehr interoperability in tanzaniaTowards ehr interoperability in tanzania
Towards ehr interoperability in tanzania
IJCSEA Journal
 
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...ICEGOV
 
Running Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docx
Running Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docxRunning Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docx
Running Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docx
wlynn1
 
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
IJCSEA Journal
 
Is Big Data Always Good Data?
Is Big Data Always Good Data? Is Big Data Always Good Data?
Is Big Data Always Good Data?
MyMeds&Me
 
Reply 1Why we need 15 minutes Patient Safety ChecksThis
Reply 1Why we need 15 minutes Patient Safety ChecksThis Reply 1Why we need 15 minutes Patient Safety ChecksThis
Reply 1Why we need 15 minutes Patient Safety ChecksThis
felipaser7p
 

Similar to Picot question introduction technology keeps adva (20)

Security of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docxSecurity of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docx
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docx
 
Security of Health Care Records.docx
Security of Health Care Records.docxSecurity of Health Care Records.docx
Security of Health Care Records.docx
 
Informatics and nursing 2015 2016.odette richards
Informatics and nursing 2015 2016.odette richardsInformatics and nursing 2015 2016.odette richards
Informatics and nursing 2015 2016.odette richards
 
Accessing and Sharing Electronic Personal Health Data.
Accessing and Sharing Electronic Personal Health Data.Accessing and Sharing Electronic Personal Health Data.
Accessing and Sharing Electronic Personal Health Data.
 
Accessing and Sharing Electronic Personal Health Data
Accessing and Sharing Electronic Personal Health DataAccessing and Sharing Electronic Personal Health Data
Accessing and Sharing Electronic Personal Health Data
 
Big data for health
Big data for healthBig data for health
Big data for health
 
INTERGRATIVE REVIEW 14Equip.docx
INTERGRATIVE REVIEW             14Equip.docxINTERGRATIVE REVIEW             14Equip.docx
INTERGRATIVE REVIEW 14Equip.docx
 
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
 
Nationwide Privacy and Security Framework for Electronic Exchange of.docx
Nationwide Privacy and Security Framework for Electronic Exchange of.docxNationwide Privacy and Security Framework for Electronic Exchange of.docx
Nationwide Privacy and Security Framework for Electronic Exchange of.docx
 
Mitochondrial Disease Community Registry: First look at the data, perspectiv...
Mitochondrial Disease Community Registry:  First look at the data, perspectiv...Mitochondrial Disease Community Registry:  First look at the data, perspectiv...
Mitochondrial Disease Community Registry: First look at the data, perspectiv...
 
Health Informatics- Module 1-Chapter 1.pptx
Health Informatics- Module 1-Chapter 1.pptxHealth Informatics- Module 1-Chapter 1.pptx
Health Informatics- Module 1-Chapter 1.pptx
 
Advancing-OSHMS High-Performance WS in OHM
Advancing-OSHMS High-Performance WS in OHMAdvancing-OSHMS High-Performance WS in OHM
Advancing-OSHMS High-Performance WS in OHM
 
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDSMANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
 
Towards ehr interoperability in tanzania
Towards ehr interoperability in tanzaniaTowards ehr interoperability in tanzania
Towards ehr interoperability in tanzania
 
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
 
Running Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docx
Running Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docxRunning Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docx
Running Head LIMITED ACCESS TO HEALTHCARE1LIMITED ACCESS TO.docx
 
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
 
Is Big Data Always Good Data?
Is Big Data Always Good Data? Is Big Data Always Good Data?
Is Big Data Always Good Data?
 
Reply 1Why we need 15 minutes Patient Safety ChecksThis
Reply 1Why we need 15 minutes Patient Safety ChecksThis Reply 1Why we need 15 minutes Patient Safety ChecksThis
Reply 1Why we need 15 minutes Patient Safety ChecksThis
 

More from JUST36

Plan of WorkGloria is employed at Jones University, through .docx
Plan of WorkGloria is employed at Jones University, through .docxPlan of WorkGloria is employed at Jones University, through .docx
Plan of WorkGloria is employed at Jones University, through .docx
JUST36
 
Planning, Implementation, and Evaluation Evaluate the importa.docx
Planning, Implementation, and Evaluation Evaluate the importa.docxPlanning, Implementation, and Evaluation Evaluate the importa.docx
Planning, Implementation, and Evaluation Evaluate the importa.docx
JUST36
 
Planet of the Apes (1974) (Race relations and slavery—turnabout is .docx
Planet of the Apes (1974) (Race relations and slavery—turnabout is .docxPlanet of the Apes (1974) (Race relations and slavery—turnabout is .docx
Planet of the Apes (1974) (Race relations and slavery—turnabout is .docx
JUST36
 
Planning effective English language arts lessons many times incl.docx
Planning effective English language arts lessons many times incl.docxPlanning effective English language arts lessons many times incl.docx
Planning effective English language arts lessons many times incl.docx
JUST36
 
PKI Submission RequirementsFormat Microsoft WordFon.docx
PKI Submission RequirementsFormat Microsoft WordFon.docxPKI Submission RequirementsFormat Microsoft WordFon.docx
PKI Submission RequirementsFormat Microsoft WordFon.docx
JUST36
 
PLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docx
PLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docxPLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docx
PLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docx
JUST36
 
Plato’s Apology The Trial of SocratesSocrates in the trial .docx
Plato’s Apology The Trial of SocratesSocrates in the trial .docxPlato’s Apology The Trial of SocratesSocrates in the trial .docx
Plato’s Apology The Trial of SocratesSocrates in the trial .docx
JUST36
 
Pine tree tops” by Gary SnyderIn the blue night frost haze,.docx
Pine tree tops” by Gary SnyderIn the blue night frost haze,.docxPine tree tops” by Gary SnyderIn the blue night frost haze,.docx
Pine tree tops” by Gary SnyderIn the blue night frost haze,.docx
JUST36
 
Platform as a Service (PaaS) and Infrastructure as a Service (I.docx
Platform as a Service (PaaS) and Infrastructure as a Service (I.docxPlatform as a Service (PaaS) and Infrastructure as a Service (I.docx
Platform as a Service (PaaS) and Infrastructure as a Service (I.docx
JUST36
 
plan for your client Eliza. Since the initial treatment plan, severa.docx
plan for your client Eliza. Since the initial treatment plan, severa.docxplan for your client Eliza. Since the initial treatment plan, severa.docx
plan for your client Eliza. Since the initial treatment plan, severa.docx
JUST36
 
Plan a geographic inquiry to investigate the question. In the pl.docx
Plan a geographic inquiry to investigate the question. In the pl.docxPlan a geographic inquiry to investigate the question. In the pl.docx
Plan a geographic inquiry to investigate the question. In the pl.docx
JUST36
 
PLAGIARISMWhat is it Whose Responsibility is It Wha.docx
PLAGIARISMWhat is it Whose Responsibility is It Wha.docxPLAGIARISMWhat is it Whose Responsibility is It Wha.docx
PLAGIARISMWhat is it Whose Responsibility is It Wha.docx
JUST36
 
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docxPKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
JUST36
 
Pine Valley Furniture wants to use Internet systems to provide value.docx
Pine Valley Furniture wants to use Internet systems to provide value.docxPine Valley Furniture wants to use Internet systems to provide value.docx
Pine Valley Furniture wants to use Internet systems to provide value.docx
JUST36
 
Pick the form of cultural expression most important to you. It could.docx
Pick the form of cultural expression most important to you. It could.docxPick the form of cultural expression most important to you. It could.docx
Pick the form of cultural expression most important to you. It could.docx
JUST36
 
Pick two diseases from each of the following systems HEENT .docx
Pick two diseases from each of the following systems HEENT  .docxPick two diseases from each of the following systems HEENT  .docx
Pick two diseases from each of the following systems HEENT .docx
JUST36
 
Pick only one topic!!!!!!!!!!You will need to choose one topic f.docx
Pick only one topic!!!!!!!!!!You will need to choose one topic f.docxPick only one topic!!!!!!!!!!You will need to choose one topic f.docx
Pick only one topic!!!!!!!!!!You will need to choose one topic f.docx
JUST36
 
Pick one organized religion to research. First, describe the religio.docx
Pick one organized religion to research. First, describe the religio.docxPick one organized religion to research. First, describe the religio.docx
Pick one organized religion to research. First, describe the religio.docx
JUST36
 
Pick one of the 2 (Buddhist Syllogism or Meditation)...The B.docx
Pick one of the 2 (Buddhist Syllogism or Meditation)...The B.docxPick one of the 2 (Buddhist Syllogism or Meditation)...The B.docx
Pick one of the 2 (Buddhist Syllogism or Meditation)...The B.docx
JUST36
 
Pick one of the following terms for your research Moral philosophy,.docx
Pick one of the following terms for your research Moral philosophy,.docxPick one of the following terms for your research Moral philosophy,.docx
Pick one of the following terms for your research Moral philosophy,.docx
JUST36
 

More from JUST36 (20)

Plan of WorkGloria is employed at Jones University, through .docx
Plan of WorkGloria is employed at Jones University, through .docxPlan of WorkGloria is employed at Jones University, through .docx
Plan of WorkGloria is employed at Jones University, through .docx
 
Planning, Implementation, and Evaluation Evaluate the importa.docx
Planning, Implementation, and Evaluation Evaluate the importa.docxPlanning, Implementation, and Evaluation Evaluate the importa.docx
Planning, Implementation, and Evaluation Evaluate the importa.docx
 
Planet of the Apes (1974) (Race relations and slavery—turnabout is .docx
Planet of the Apes (1974) (Race relations and slavery—turnabout is .docxPlanet of the Apes (1974) (Race relations and slavery—turnabout is .docx
Planet of the Apes (1974) (Race relations and slavery—turnabout is .docx
 
Planning effective English language arts lessons many times incl.docx
Planning effective English language arts lessons many times incl.docxPlanning effective English language arts lessons many times incl.docx
Planning effective English language arts lessons many times incl.docx
 
PKI Submission RequirementsFormat Microsoft WordFon.docx
PKI Submission RequirementsFormat Microsoft WordFon.docxPKI Submission RequirementsFormat Microsoft WordFon.docx
PKI Submission RequirementsFormat Microsoft WordFon.docx
 
PLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docx
PLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docxPLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docx
PLAGIARISM SCAN REPORTDate 2020-04-12Words 161Char.docx
 
Plato’s Apology The Trial of SocratesSocrates in the trial .docx
Plato’s Apology The Trial of SocratesSocrates in the trial .docxPlato’s Apology The Trial of SocratesSocrates in the trial .docx
Plato’s Apology The Trial of SocratesSocrates in the trial .docx
 
Pine tree tops” by Gary SnyderIn the blue night frost haze,.docx
Pine tree tops” by Gary SnyderIn the blue night frost haze,.docxPine tree tops” by Gary SnyderIn the blue night frost haze,.docx
Pine tree tops” by Gary SnyderIn the blue night frost haze,.docx
 
Platform as a Service (PaaS) and Infrastructure as a Service (I.docx
Platform as a Service (PaaS) and Infrastructure as a Service (I.docxPlatform as a Service (PaaS) and Infrastructure as a Service (I.docx
Platform as a Service (PaaS) and Infrastructure as a Service (I.docx
 
plan for your client Eliza. Since the initial treatment plan, severa.docx
plan for your client Eliza. Since the initial treatment plan, severa.docxplan for your client Eliza. Since the initial treatment plan, severa.docx
plan for your client Eliza. Since the initial treatment plan, severa.docx
 
Plan a geographic inquiry to investigate the question. In the pl.docx
Plan a geographic inquiry to investigate the question. In the pl.docxPlan a geographic inquiry to investigate the question. In the pl.docx
Plan a geographic inquiry to investigate the question. In the pl.docx
 
PLAGIARISMWhat is it Whose Responsibility is It Wha.docx
PLAGIARISMWhat is it Whose Responsibility is It Wha.docxPLAGIARISMWhat is it Whose Responsibility is It Wha.docx
PLAGIARISMWhat is it Whose Responsibility is It Wha.docx
 
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docxPKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
 
Pine Valley Furniture wants to use Internet systems to provide value.docx
Pine Valley Furniture wants to use Internet systems to provide value.docxPine Valley Furniture wants to use Internet systems to provide value.docx
Pine Valley Furniture wants to use Internet systems to provide value.docx
 
Pick the form of cultural expression most important to you. It could.docx
Pick the form of cultural expression most important to you. It could.docxPick the form of cultural expression most important to you. It could.docx
Pick the form of cultural expression most important to you. It could.docx
 
Pick two diseases from each of the following systems HEENT .docx
Pick two diseases from each of the following systems HEENT  .docxPick two diseases from each of the following systems HEENT  .docx
Pick two diseases from each of the following systems HEENT .docx
 
Pick only one topic!!!!!!!!!!You will need to choose one topic f.docx
Pick only one topic!!!!!!!!!!You will need to choose one topic f.docxPick only one topic!!!!!!!!!!You will need to choose one topic f.docx
Pick only one topic!!!!!!!!!!You will need to choose one topic f.docx
 
Pick one organized religion to research. First, describe the religio.docx
Pick one organized religion to research. First, describe the religio.docxPick one organized religion to research. First, describe the religio.docx
Pick one organized religion to research. First, describe the religio.docx
 
Pick one of the 2 (Buddhist Syllogism or Meditation)...The B.docx
Pick one of the 2 (Buddhist Syllogism or Meditation)...The B.docxPick one of the 2 (Buddhist Syllogism or Meditation)...The B.docx
Pick one of the 2 (Buddhist Syllogism or Meditation)...The B.docx
 
Pick one of the following terms for your research Moral philosophy,.docx
Pick one of the following terms for your research Moral philosophy,.docxPick one of the following terms for your research Moral philosophy,.docx
Pick one of the following terms for your research Moral philosophy,.docx
 

Recently uploaded

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

Picot question introduction technology keeps adva

  • 1. Picot Question Introduction Technology keeps advancing at a faster rate than anything else. The advancements in technology have both positive and negative impact on patients. Breach of patient confidential information has been made easier with advancement in technology. (Pathak, 2019). Advancement in technology has led to an increase in data breach especially in healthcare facilities like hospitals. 2 Clinical Issue Patient information includes medical records which are private. Breach of patient confidential information happens when their private information is disclosed to a third party. The biggest confidentiality threat is hacking. Patients are always leaving the personal information at the hospital.
  • 2. (Hammouchi, 2019) (McLeod, 2018). The patient usually disclose their private information whenever they visit healthcare facilities. This information is private and should be protected. The clinical issue is breach to the confidentiality of patient information. 3 Cont’ The medical profession involves trust between the professionals and the patients. The professionals should maintain the trust by protecting the patient’s confidentiality. (Yeng, 2021). Doctors and other healthcare professionals have a role in protecting the personal information of the patient. 4
  • 3. PICOT Question The focus was on confidentiality of patient information. The population affected is patient group between the ages of 45- 70 years who are technology savvy. They are more vulnerable to hackers when accessing portal. The PICOT question was developed with focus on the older generation which is not technology savvy. They are more vulnerable to cyber attacks when using portals. 5 Cont’ Population (P): Patients between 45-70 years. Intervention (I): Patient portal. Comparison (C): Patients between 16-40 years of age. Outcome (O): Losing private information for lack of understanding of the portal. The population is patients between the ages of 45-70 Intervention is patient portal Comparison (C): Patients between 16-40 years of age. Outcome (O): Losing private information for lack of understanding of the portal.
  • 4. 6 Research Databases Search databases included Google Scholar, JSTOR, and Walden University Library. Walden University has two databases Computer Science Database and the Ovid Nursing Books Database. Search databases included Google Scholar, JSTOR, and Walden University Library. 7 Level of Evidence The level of evidence is IV and V The study will be a descriptive study that will answer how, what, when, and where. The evidence is collected from Patients between 45-70 years. The level of evidence I IV This is because the study is descriptive. Evidence is collected from Patients between 45-70 years. 8 Peer-review articleLevel of EvidenceStrengthsMcLeod, A., &
  • 5. Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, Science Direct. 108, 57-68.Level IV- cohort studyPresents tangible results that show exposure levels, organizational factors, security factors, and healthcare data breaches.Pathak, P. R., & Chou, A. (2019). Confidential care for adolescents in the US Health Care System. Journal of patient-centered research and reviews, 6(1), 46.Level IV- Qualitative studyShows how the best practices should be implemented in the protection of patient data. Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Ahmad Khan, R. (2020, June). Healthcare data breaches: Insights and implications. In Healthcare (Vol. 8, No. 2, p. 133). Multidisciplinary Digital Publishing Institute.Level IV- cohort studyThe article shows how healthcare systems are highly exposed to the external threats to information security breachWalker-Roberts, S., Hammoudeh, M., & Dehghantanha, A. (2018). A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access, 6, 25167-25177.Level V- Evidence gathered from Systematic review of qualitative study.The results show how a reactive approach may not be the best methods for protecting the patients’ private records. References Hammouchi, H., Cherqi, O., Mezzour, G., Ghogho, M., & El Koutbi, M. (2019). Digging deeper into data breaches: An exploratory data analysis of hacking breaches over time. Procedia Computer Science, 151, 1004-1009. McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, Science Direct. 108, 57-68.
  • 6. Pathak, P. R., & Chou, A. (2019). Confidential care for adolescents in the US Health Care System. Journal of patient- centered research and reviews, 6(1), 46. Yeng, P. K., Szekeres, A., Yang, B., & Snekkenes, E. A. (2021). Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study. JMIR Human Factors, 8(2), e17604.