Thesis: Threats of Electronic Health Records

Anonymous
timer Asked: Mar 4th, 2019
account_balance_wallet $9.99

Question Description

- This is a traditional research:

Purpose statement: Healthcare industries are concerned with privacy and security related issues resulting from the use of Electronic Health Records (EHR). The purpose of this traditional research paper is to examine the effects of security and privacy related threats against confidentiality, integrity, and accessibility of healthcare information. The paper will also explore security measures and best practices for implementation in order to reduce the risk of these threats.

-It should have an extract, table of content, 15 to 20 content pages, 10 to 12 references with in-text citations

- It should include:

1. Introduction

2. Methodology: Search criteria, a compilation of search terms.

3. Literature Review

4. Research questions, Rationale, and hypothesis if any. Bring out security problems associated with this technology with focus on the most current breaches within the US (not more than five years). Use examples in terms of potential damage

5. Discuss possible solutions/recommendations

6. Conclusion.

It should have a cover/reference pages

Please use peer-reviewed articles not older than 5 years.

Tutor Answer

TutorLarra
School: Boston College

Attached.

RUNNING HEAD: ELECTRONIC HEALLTH RECORDS
CONFIDENTIALITY, INTEGRITY AND ACCESSIBILITY THREATS OF
ELECTRONIC HEALTH RECORDS AND POSSIBLE MITIGATIONS

Name
University
Date

1

ELECTRONIC HEALLTH RECORDS

2

Table of Contents
CHAPTER ONE ........................................................................................................................................... 5
1.

Introduction ...................................................................................................................................... 5
1.1Background of the Study.................................................................................................................. 5
1.2The Problem Statement .................................................................................................................... 6
1.3

Research Objectives ..................................................................................................................... 7

1.4Research Questions .......................................................................................................................... 7
1.5 Justification of the Study.............................................................................................................. 8
1.6 The scope of the Study ................................................................................................................. 8
CHAPTER TWO .......................................................................................................................................... 9
2. LITERATURE REVIEW ............................................................................................................................. 9
2.1Introduction ...................................................................................................................................... 9
2.2 Theoretical Review ...................................................................................................................... 9
2.3Conceptual Framework .................................................................................................................. 10
2.4

Empirical Literature Reviews ................................................................................................... 10

2.5

Critique of Existing Literature ................................................................................................... 11

2.6

Summary .................................................................................................................................... 12

CHAPTER THREE .................................................................................................................................... 13
3.0 RESEARCH METHODOLOGY .............................................................................................................. 13
3.1 Research Design............................................................................................................................ 13
3.2 Target Population .......................................................................................................................... 13
3.3 Sample and Sampling Technique .................................................................................................. 13
3.4 Research Instruments .................................................................................................................... 14
3.5 Data Collection Procedure ............................................................................................................ 14
3.6 Data Analysis and Presentations ................................................................................................... 15
CHAPTER FOUR....................................................................................................................................... 16
4.0 RESEARCH FINDINGS AND DISCUSSION ............................................................................................ 16
4.1 Introduction ................................................................................................................................... 16
4.2 Preliminary Study Findings and Discussion ................................................................................. 16
4.3 Statistical Analysis of Study Variable........................................................................................... 18
4.4 Summary of Analysis, Findings, and Discussions ........................................................................ 22

ELECTRONIC HEALLTH RECORDS

3

CHAPTER FIVE ........................................................................................................................................ 23
5.0 SUMMARY, CONCLUSIONS AND RECOMMENDATIONS ................................................................... 23
5.1 Introduction ................................................................................................................................... 23
5.2 Summary of Findings .................................................................................................................... 23
5.3 Conclusion .................................................................................................................................... 24
5.4 Recommendations ......................................................................................................................... 24
5.5 Areas of further research ............................................................................................................... 26
References ................................................................................................................................................... 27

4

ELECTRONIC HEALLTH RECORDS
ABSTRACT

The Electronic Health Records system was implemented as a need to improve healthcare quality,
an increase of trends of stakeholders in the healthcare setting and the escalating healthcare costs.
These factors combined to facilitate the incorporation of the EHR system in delivering fast and
affordable healthcare to patients by storing patient medical records in a central healthcare
delivery system. The use of the EHR system is increasing in various countries like the USA, UK,
and Australia. Each one of these countries has developed its design, adoption and
implementation methods; however, the system is plagued by many challenges, primarily relating
to the confidentiality, integrity, and accessibility of patient’s medical information. This
traditional research paper aims to examine the effects of security and privacy related threats
against confidentiality, integrity, and accessibility of healthcare information. This paper will also
explore security measures and best practices for implementation to reduce the risk of these
threats. The methodology of this research is a scientific survey that relied on the information
provided by 300 health care providers from 30 American hospitals chosen randomly. The
findings of the study reveal that privacy and security concerns related to the adaptation and
utilization of EHRs systems are a real threat that needs immediate address. This paper provides
several recommendations that explain how hospitals can mitigate the privacy and security threats
and realize confidentiality, integrity and accessibility control of their patients’ information.

5

ELECTRONIC HEALLTH RECORDS
CHAPTER ONE
1. Introduction
1.1Background of the Study

When it comes to the process of keeping health records, a patient’s medical record can either be
stored electronically or on a paper-based system. Health records are an essential medical tool
because they enable healthcare providers to access the patient’s history of clinical diagnosis,
previous care providers’ decision-making processes, service coordination, quality evaluation, and
accreditation processes. In the past, a medical record was a paper repository of patient
information which was reviewed for health purposes. It was updated manually which meant that
there were frequent delays often lasting days. Patients rarely viewed the records because
physicians exercised autonomy over them and were stored in institutions basements due to the
paperweig...

flag Report DMCA
Review

Anonymous
Top quality work from this guy! I'll be back!

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors