Saturday, June 15, 2019
Health Information Technology (HIT) Essay Example | Topics and Well Written Essays - 1000 words
Health Information Technology (HIT) - Essay ExampleSo, THP will also strive to ensure that all medical information is utterly trustworthy and clear. This is bound to require many imaginative innovations in information-sharing technology, but it will also ensure security to patients and take care of their concerns in an optimally effective manner.Securing patients records is a big problem for the health care industry. First, it should be understood that healthcare security provided through the use of HIT is very different than new(prenominal) forms of business IT infrastructure (Peterson, cited in Hulme, 2011). This difference is important to acknowledge many challenges encountered in providing healthcare security which will be explored and addressed in THP. For example, thither is this challenge that often healthcare professionals tend to be suspicious of cybersecurity, so they resist this. This resistance becomes a hurdle in the provision of trustworthy healthcare function to pat ients. Research claims that less financial investments are made by the healthcare industry in the area of IT security than any other industry. It is account by the Community Health Systems that hackers stole sensitive information on approximately 4.5 million patients (Lemos, 2014). This shows that HIT is still not taken as disadvantageously as it should be to deliver trustworthy healthcare. It is due to this reason that the security expert David Kennedy claimed healthcare to be the most breached industry in 2011 (Brenner, 2011). If this challenge is effectively handled, HIT can be satisfactorily secured. In THP, cloud systems will be used to protect patient information. Research suggests that majority of cloud services employed in healthcare run medium to high security risk. Skyhigh Networks is a popular cloud security vendor and recently, it made a debate that more than 13% of cloud services used in healthcare are highrisk (Munro, 2014). However, the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment