Powepoint
Picot Question
Introduction
-
- Technology keeps advancing at a faster rate than anything else.
- The advancements in technology have both positive and negative impact on patients.
- Breach of patient confidential information has been made easier with advancement in technology.
(Pathak, 2019).
- Advancement in technology has led to an increase in data breach especially in healthcare facilities like hospitals.
*
Clinical Issue
- Patient information includes medical records which are private.
- Breach of patient confidential information happens when their private information is disclosed to a third party.
- The biggest confidentiality threat is hacking.
- Patients are always leaving the personal information at the hospital.
(Hammouchi, 2019)
(McLeod, 2018).
- The patient usually disclose their private information whenever they visit healthcare facilities.
- This information is private and should be protected.
- The clinical issue is breach to the confidentiality of patient information.
*
Cont’
-
- The medical profession involves trust between the professionals and the patients.
- The professionals should maintain the trust by protecting the patient’s confidentiality.
(Yeng, 2021).
Doctors and other healthcare professionals have a role in protecting the personal information of the patient.
*
Picot Question
- Patients between the ages of 45-70 years who have signed up for the hospital’s portal are likely to lose their private information for lack of understanding of the portal compared to patients between 16-40 years of age.
Patients between the ages of 45-70 years who have signed up for the hospital’s portal are likely to lose their private information for lack of understanding of the portal compared to patients between 16-40 years of age.
*
Cont’
- The focus was on confidentiality of patient information.
- The patient’s do not fully comprehend how they can use the portal.
- The lack of understanding makes them vulnerable to hackers.
- They do not follow security protocols while using the portal.
- The PICOT question was developed with focus on the older generation which is not technology savvy.
- They lack an understanding on how to use the portal.
*
Cont’
- Population (P): Patients between 45-70 years.
- Intervention (I): understand the usage of the portal.
- Comparison (C): Patients between 16-40 years of age.
- Outcome (O): Losing private information for lack of understanding of the portal.
The population is patients between the ages of 45-70
Intervention is understand the usage of the portal.
Comparison (C): Patients between 16-40 years of age.
Outcome (O): Losing private information for lack of understanding of the portal.
*
Research Databases
- Search databases included Google Scholar, JSTOR, and Walden University Library.
- Walden University has two databases Computer Science Database and the Ovid Nursing Books Database.
- Search databases included Google Scholar, JSTOR, and Walden University Library.
*
Level of Evidence
- The level of evidence is IV and V
- The study will be a descriptive study that will answer how, what, when, and where.
- The evidence is collected from Patients between 45-70 years.
- The evidence is collected from and compared with patients with 14 and 40 years of age.
- The level of evidence I IV
- This is because the study is descriptive.
- Evidence is collected from Patients between 45-70 years.
*
Peer-review article | Level of Evidence | Strengths |
McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, Science Direct. 108, 57-68. | Level IV- cohort study | Presents tangible results that show exposure levels, organizational factors, security factors, and healthcare data breaches. |
Pathak, P. R., & Chou, A. (2019). Confidential care for adolescents in the US Health Care System. Journal of patient-centered research and reviews, 6(1), 46. | Level IV- Qualitative study | Shows how the best practices should be implemented in the protection of patient data. |
Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Ahmad Khan, R. (2020, June). Healthcare data breaches: Insights and implications. In Healthcare (Vol. 8, No. 2, p. 133). Multidisciplinary Digital Publishing Institute. | Level IV- cohort study | The article shows how healthcare systems are highly exposed to the external threats to information security breach |
Walker-Roberts, S., Hammoudeh, M., & Dehghantanha, A. (2018). A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access, 6, 25167-25177. | Level V- Evidence gathered from Systematic review of qualitative study. | The results show how a reactive approach may not be the best methods for protecting the patients’ private records. |
References
- Hammouchi, H., Cherqi, O., Mezzour, G., Ghogho, M., & El Koutbi, M. (2019). Digging deeper into data breaches: An exploratory data analysis of hacking breaches over time. Procedia Computer Science, 151, 1004-1009.
- McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, Science Direct. 108, 57-68.
- Pathak, P. R., & Chou, A. (2019). Confidential care for adolescents in the US Health Care System. Journal of patient-centered research and reviews, 6(1), 46.
- Yeng, P. K., Szekeres, A., Yang, B., & Snekkenes, E. A. (2021). Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study. JMIR Human Factors, 8(2), e17604.