CIS 450 Aspen University Module 5 Information Technology Education Methods Essay

User Generated

fny235

Health Medical

cis 450

Aspen University

CIS

Description

Information Security in a World of Technology

Write an essay 1600 words total addressing each of the following points/questions. Be sure to completely answer all the questions for each bullet point. There should be three sections, one for each item number below, as well as the introduction and conclusion paragraphs. Separate each section in your paper with a clear heading that allows your professor to know which bullet you are addressing in that section of your paper. Support your ideas with at least four (4) scholarly citations, they cannot be older than year 2016 using APA citations in your essay. References: Use the appropriate APA style in-text citations and references for all resources utilized to answer the questions. The cover page and reference page do not count towards the minimum word amount. Format: Save your assignment as a Microsoft Word document (.doc or .docx)

A.The textbook discusses several education methods. Discuss each method with an example of how the method could be used in the organization. Then discuss how you will evaluate the method and learning.

B.Healthcare continues to be a lucrative target for hackers with weaponized ransomware, misconfigured cloud storage buckets, and phishing emails. Discuss how an organization can protect patients’ information through:

Security mechanisms

Administrative and Personnel Issues

Level of access

Handling and Disposal of Confidential Information

C.You are providing education to staff on phishing and spam emails. Using the different educational methods discussed in Chapter 12:

Provide examples of how each method can be used

How will the method and learning be evaluated?

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

1

CIS450 Module 5

Student Name
Institution
Code
Instructor’s Name
Date

2

Information Security in a World of Technology
Introduction
Information technology has become a critical ingredient in advancing healthcare systems'
competence and excellence across the world. In all matters related to healthcare reforms,
Information Technology is always at the core as professionals and politicians take a significant
focus on it. The development, implementation, and distribution of effective, safe, and complex
healthcare systems is a huge challenge that the United States experiences. The United States is one
of the industrialized countries that spend heavily on healthcare per capita. However, despite
massive spending, it still depends on other countries to provide it with healthcare systems.
However, in recent years the federal government has taken the initiative to solve this problem. The
country is investing heavily in IT professionals whore are required to provide the best healthcare
solutions by electronically submitting healthcare reports. But the introduction of Information
Technology in the healthcare sector comes at a cost. Many hackers have identified healthcare
systems as targets to conduct malicious acts. This means that healthcare systems are more
vulnerable than any other systems in the world. Therefore this paper will discuss educational
methods to improve security awareness in the healthcare sector.
Education Methods
There are a couple of education methods that can be used to provide security awareness.
The first method is Instructor-Led Training (ILT), which involves an instructor addressing a group
of learners who can either connect through an AV technology or attend classes. This kind of
education method requires enough time to create the instructors' content for the learners. The
content development requires the instructor to take an average of 100 hours (Hebda et al., 2019).

3

After that, the learners are exposed to a kinetic learning experience that requires training computer
hardware and database training to understand how computers work in the real world. ILT
effectively provides training to groups that are made up of moderate learners without the need to
have lessons as they create a positive mood among the learners. The instructor should begin the
training by explaining their goal to the students to understand the training context. It is crucial to
ensure that the content instructor is teaching to the group of learners is relevant to them. Proper
preparation for the most effective learning experiences and testing how the sessions will be run is
critical (Min et al., 2016). The instructor must learn the required skills for an effective coach...

Similar Content

Related Tags