UOTC Enhancing Cybersecurity for The Digital Health Marketplace Paper

User Generated

Gjvaxyr8890

Writing

University of the Cumberlands

Description

2.1 Scholarly Abstract Assignment #1

Create a 2-3 page single-spaced Analysis of Research abstract published scholarly articles related to your mock dissertation topic/research question.

Brevity and being concise are important as this analysis is intended to be a brief summation of the research.

Each abstract must therefore consist of the following in this order:

1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name and qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data (surveys, tests,interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

Additional information on writing scholarly abstracts can be found via this link

See completed example

2.2 Scholarly Abstract Assignment #2

Just like you did in assignment 2.1, you will create a 2-3 page single-spaced Analysis of Research abstract published scholarly articles related to your mock dissertation topic/research question. However, this time you need to review a different methodology than you previously did (i.e. if you reviewed a quantitative article in 2.1, you will do a qualitative one in 2.2 and vice versa).

Brevity and being concise are important as this analysis is intended to be a brief summation of the research.

Each abstract must therefore consist of the following in this order:

1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name and qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data (surveys, tests,interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Surname 1
Name
Institution
Instructor
Date
# Abstract Assignment 1
Bibliographic citation
Tschider, C. A. (2017). Enhancing cybersecurity for the digital health marketplace. Annals
Health L., 26, 1.
Authors
Charlotte A. Tschider who is an accredited scholar in technology with relation to healthcare.
Research concern
With the increased technological growth in healthcare, there is a need to have unique ways that
will help both the patients and healthcare workers have a common goal when it comes to
handling healthcare information. However, the issues have not yet been addressed since there are
rising cases of cyber threats in healthcare. There are different instances that can lead to a breach,
including the accessibility of unauthorized persons' healthcare systems. However, the major
challenge comes in when the available information is shared among parties that are not supposed
to be accessing it. For instance, in the healthcare sector, different nurses operating in the
organization may have access to a patient’s information just because it has posted on the system.
That is a security breach, which should not be allowed in any case. There is also the issue of
using patient`s information in the wrong way and posting it to social media. It may be seen as a

Surname 2
way of helping others learn about certain diseases, but it is regarded as a breach without the
patient's consent. Therefore, the concern of the research is to come up with better ways that
healthcare information can be handled and what the organization and the patients can do to
enhance privacy adherence and eradicate issues of cyber threats.
Research purposes statement
The purpose of the research was to come up with ways during the technological era that can help
eradicate cyber threats in the healthcare sector and assure patient`s information security. Some of
the questions that the research aims to address include;
1. Why do cyber threats increases in the healthcare sector?
2. What can be done to reduce or completely eradicate such threats?
3. Whose role is it to ensure the patient`s information remains private and confidential?
4. With increased technological development, is it possible to have a healthcare system
without cyber threats?
5. If yes, what are the measures to be undertaken?
Precedent literature
A vast amount of research has been conducted in the healthcare sector to come up with a solution
to the existing cyber threats. There are scholars who believe that the threats are here to remain as
long as the technology advances. However, not all agr...


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Content

Related Tags