Technology keeps advancing at a faster rate than anything else. The advancements in technology have both positive and negative impact on patients. Breach of patient confidential information has been made easier with advancement in technology.
Picot Question
Introduction
-
- Technology keeps advancing at a faster rate than anything else.
- The advancements in technology have both positive and negative impact on patients.
- Breach of patient confidential information has been made easier with advancement in technology.
(Pathak, 2019).
- Advancement in technology has led to an increase in data breach especially in healthcare facilities like hospitals.
*
Clinical Issue
- Patient information includes medical records which are private.
- Breach of patient confidential information happens when their private information is disclosed to a third party.
- The biggest confidentiality threat is hacking.
- Patients are always leaving the personal information at the hospital.
(Hammouchi, 2019)
(McLeod, 2018).
- The patient usually disclose their private information whenever they visit healthcare facilities.
- This information is private and should be protected.
- The clinical issue is breach to the confidentiality of patient information.
*
Cont’
-
- The medical profession involves trust between the professionals and the patients.
- The professionals should maintain the trust by protecting the patient’s confidentiality.
(Yeng, 2021).
Doctors and other healthcare professionals have a role in protecting the personal information of the patient.
*
Picot Question
- Patients between the ages of 45-70 years who have signed up for the hospital’s portal are likely to lose their private information for lack of understanding of the portal compared to patients between 16-40 years of age.
Patients between the ages of 45-70 years who have signed up for the hospital’s portal are likely to lose their private information for lack of understanding of the portal compared to patients between 16-40 years of age.
*
Cont’
- The focus was on confidentiality of patient information.
- The patient’s do not fully comprehend how they can use the portal.
- The lack of understanding makes them vulnerable to hackers.
- They do not follow security protocols while using the portal.
- The PICOT question was developed with focus on the older generation which is not technology savvy.
- They lack an understanding on how to use the portal.
*
Cont’
- Population (P): Patients between 45-70 years.
- Intervention (I): understand the usage of the portal.
- Comparison (C): Patients between 16-40 years of age.
- Outcome (O): Losing private information for lack of understanding of the portal.
The population is patients between the ages of 45-70
Intervention is understand the usage of the portal.
Comparison (C): Patients between 16-40 years of age.
Outcome (O): Losing private information for lack of understanding of the portal.
*
Research Databases
- Search databases included Google Scholar, JSTOR, and Walden University Library.
- Walden University has two databases Computer Science Database and the Ovid Nursing Books Database.
- Search databases included Google Scholar, JSTOR, and Walden University Library.
*
Level of Evidence
- The level of evidence is IV and V
- The study will be a descriptive study that will answer how, what, when, and where.
- The evidence is collected from Patients between 45-70 years.
- The evidence is collected from and compared with patients with 14 and 40 years of age.
- The level of evidence I IV
- This is because the study is descriptive.
- Evidence is collected from Patients between 45-70 years.
*
| Peer-review article | Level of Evidence | Strengths |
| McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, Science Direct. 108, 57-68. | Level IV- cohort study | Presents tangible results that show exposure levels, organizational factors, security factors, and healthcare data breaches. |
| Pathak, P. R., & Chou, A. (2019). Confidential care for adolescents in the US Health Care System. Journal of patient-centered research and reviews, 6(1), 46. | Level IV- Qualitative study | Shows how the best practices should be implemented in the protection of patient data. |
| Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Ahmad Khan, R. (2020, June). Healthcare data breaches: Insights and implications. In Healthcare (Vol. 8, No. 2, p. 133). Multidisciplinary Digital Publishing Institute. | Level IV- cohort study | The article shows how healthcare systems are highly exposed to the external threats to information security breach |
| Walker-Roberts, S., Hammoudeh, M., & Dehghantanha, A. (2018). A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access, 6, 25167-25177. | Level V- Evidence gathered from Systematic review of qualitative study. | The results show how a reactive approach may not be the best methods for protecting the patients’ private records. |
References
- Hammouchi, H., Cherqi, O., Mezzour, G., Ghogho, M., & El Koutbi, M. (2019). Digging deeper into data breaches: An exploratory data analysis of hacking breaches over time. Procedia Computer Science, 151, 1004-1009.
- McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, Science Direct. 108, 57-68.
- Pathak, P. R., & Chou, A. (2019). Confidential care for adolescents in the US Health Care System. Journal of patient-centered research and reviews, 6(1), 46.
- Yeng, P. K., Szekeres, A., Yang, B., & Snekkenes, E. A. (2021). Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study. JMIR Human Factors, 8(2), e17604.


For any questions, feedback, or comments, we have an ethical customer support team that is always waiting on the line for your inquiries.