Friday, July 26, 2019
Health Information Technology (HIT) Essay Example | Topics and Well Written Essays - 1000 words
Health Information Technology (HIT) - Essay Example So, THP will also strive to ensure that all medical information is absolutely trustworthy and clear. This is bound to require many imaginative innovations in information-sharing technology, but it will also ensure security to patients and take care of their concerns in an optimally effective manner. Securing patientsââ¬â¢ records is a big problem for the healthcare industry. First, it should be understood that healthcare security provided through the use of HIT is very different than other forms of business IT infrastructure (Peterson, cited in Hulme, 2011). This difference is important to acknowledge many challenges encountered in providing healthcare security which will be explored and addressed in THP. For example, there is this challenge that often healthcare professionals tend to be suspicious of cybersecurity, so they resist this. This resistance becomes a hurdle in the provision of trustworthy healthcare services to patients. Research claims that less financial investments are made by the healthcare industry in the area of IT security than any other industry. It is reported by the Community Health Systems that hackers stole ââ¬Å"sensitive information on approximately 4.5 million patientsâ⬠(Lemos, 2014). This shows that HIT is still not taken as seriously as it should be to deliver trustworthy healthcare. It is due to this reason that the security expert David Kennedy claimed healthcare to be the ââ¬Å"most breached industry in 2011â⬠(Brenner, 2011). If this challenge is effectively handled, HIT can be satisfactorily secured. In THP, cloud systems will be used to protect patient information. Research suggests that majority of cloud services employed in healthcare run medium to high security risk. Skyhigh Networks is a popular cloud security vendor and recently, it made a statement that ââ¬Å"more than 13% of cloud services used in healthcare are highââ¬âriskâ⬠(Munro, 2014). However, the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.