Powepoint

Picot Question

 

Introduction

    • Technology keeps advancing at a faster rate than anything else.
    • The advancements in technology have both positive and negative impact on patients.
    • Breach of patient confidential information has been made easier with advancement in technology.

 

 

(Pathak, 2019).

  • Advancement in technology has led to an increase in data breach especially in healthcare facilities like hospitals.

*

Clinical Issue

  • Patient information includes medical records which are private.
  • Breach of patient confidential information happens when their private information is disclosed to a third party.
  • The biggest confidentiality threat is hacking.
  • Patients are always leaving the personal information at the hospital.

 

(Hammouchi, 2019)

(McLeod, 2018).

  • The patient usually disclose their private information whenever they visit healthcare facilities.
  • This information is private and should be protected.
  • The clinical issue is breach to the confidentiality of patient information.

*

Cont’

    • The medical profession involves trust between the professionals and the patients.
    • The professionals should maintain the trust by protecting the patient’s confidentiality.

 

 

(Yeng, 2021).

Doctors and other healthcare professionals have a role in protecting the personal information of the patient.

*

Picot Question

  • Patients between the ages of 45-70 years who have signed up for the hospital’s portal are likely to lose their private information for lack of understanding of the portal compared to patients between 16-40 years of age.

Patients between the ages of 45-70 years who have signed up for the hospital’s portal are likely to lose their private information for lack of understanding of the portal compared to patients between 16-40 years of age.

*

Cont’

  • The focus was on confidentiality of patient information.
  • The patient’s do not fully comprehend how they can use the portal.
  • The lack of understanding makes them vulnerable to hackers.
  • They do not follow security protocols while using the portal.
  • The PICOT question was developed with focus on the older generation which is not technology savvy.
  • They lack an understanding on how to use the portal.

*

Cont’

  • Population (P): Patients between 45-70 years.
  • Intervention (I): understand the usage of the portal.
  • Comparison (C): Patients between 16-40 years of age.
  • Outcome (O): Losing private information for lack of understanding of the portal.

The population is patients between the ages of 45-70

Intervention is understand the usage of the portal.

Comparison (C): Patients between 16-40 years of age.

Outcome (O): Losing private information for lack of understanding of the portal.

 

*

Research Databases

  • Search databases included Google Scholar, JSTOR, and Walden University Library.
  • Walden University has two databases Computer Science Database and the Ovid Nursing Books Database.
  • Search databases included Google Scholar, JSTOR, and Walden University Library.

*

Level of Evidence

  • The level of evidence is IV and V
  • The study will be a descriptive study that will answer how, what, when, and where.
  • The evidence is collected from Patients between 45-70 years.
  • The evidence is collected from and compared with patients with 14 and 40 years of age.
  • The level of evidence I IV
  • This is because the study is descriptive.
  • Evidence is collected from Patients between 45-70 years.

*

Peer-review article Level of Evidence Strengths
McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, Science Direct. 108, 57-68. Level IV- cohort study Presents tangible results that show exposure levels, organizational factors, security factors, and healthcare data breaches.
Pathak, P. R., & Chou, A. (2019). Confidential care for adolescents in the US Health Care System. Journal of patient-centered research and reviews, 6(1), 46. Level IV- Qualitative study Shows how the best practices should be implemented in the protection of patient data.
Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Ahmad Khan, R. (2020, June). Healthcare data breaches: Insights and implications. In Healthcare (Vol. 8, No. 2, p. 133). Multidisciplinary Digital Publishing Institute. Level IV- cohort study The article shows how healthcare systems are highly exposed to the external threats to information security breach
Walker-Roberts, S., Hammoudeh, M., & Dehghantanha, A. (2018). A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access, 6, 25167-25177. Level V- Evidence gathered from Systematic review of qualitative study. The results show how a reactive approach may not be the best methods for protecting the patients’ private records.

 

 

 

 

 

 

 

 

 

 

References

  • Hammouchi, H., Cherqi, O., Mezzour, G., Ghogho, M., & El Koutbi, M. (2019). Digging deeper into data breaches: An exploratory data analysis of hacking breaches over time. Procedia Computer Science, 151, 1004-1009.
  • McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, Science Direct. 108, 57-68.
  • Pathak, P. R., & Chou, A. (2019). Confidential care for adolescents in the US Health Care System. Journal of patient-centered research and reviews, 6(1), 46.
  • Yeng, P. K., Szekeres, A., Yang, B., & Snekkenes, E. A. (2021). Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study. JMIR Human Factors, 8(2), e17604.