How might ethics apply to informatics, e-health records, the importance of passwords, and security?
Order Instructions
ETHICS, CYBER ETHICS, AND SECURITY
In recent years, hackers have targeted medical records, from hospitals and other healthcare institutions, across the country. These records contain personal information, contact information, and most importantly, for the hackers, information that may prove useful in stealing an identity. Thus, healthcare organizations have made it a priority to protect patient records and privacy. However, with the influx of technological advancements and hacker determination, there is no perfect way to ensure that all records are secure and safe.
In addition to medical records, privacy concerns are relevant to any patient chart in any setting. For example, a chart left open on a computer monitor in a patient room, employee passwords and log-in information, and new employee access and screening all represent other ways in which ethics and security merge in healthcare and nursing practice.
For this Discussion, you will consider the importance of ethics as it relates to security. You will also reflect on how these topics might affect clinical practice and the connection to nursing informatics.
Be sure to review the Learning Resources before completing this activity.
Click the weekly resources link to access the resources.
WEEKLY RESOURCES
Required Readings
• American Nurses Association. (2015). Nursing informaticsLinks to an external site.: Scope and standards of practice (2nd ed.).
o “Ethics in Nursing Informatics” (pp. 49–52)
o “Standard 6: “Evaluation” (p. 78)
o “Standard 7: “Ethics” (pp. 79–80)
o “Standard 11: “Communication” (p. 86)
o “Standard 12: “Leadership” (pp. 87–88)
• Beckmann, M., Dittmer, K., Jaschke, J., Karbach, U., Köberlein-Neu, J., Nocon, M., Rusniok, C., Wurster, F., & Pfaff, H. (2021). Electronic patient record and its effects on social aspects of interprofessional collaboration and clinical workflows in hospitals (eCoCo): A mixed methods study protocolLinks to an external site.. BMC Health Services Research, 21(377). https://doi.org/10.1186/s12913-021-06377-5
• Martin, K., Shilton, K., & Smith, J. (2019). Business and the ethical implications of technology: Introduction to the symposiumLinks to an external site.. Journal of Business Ethics,160, 307–317. https://doi.org/10.1007/s10551-019-04213-9
• Nahm, E.-S., Poe, S., Lacey, D., Lardner, M., Van De Castle, B., & Powell, K. (2019). Cybersecurity essentials for nursing informaticistsLinks to an external site.. Computers, Informatics, Nursing, 37(8), 389–393. doi:10.1097/CIN.0000000000000570
• Odeh, A., Keshta, I., & Abdeifattah, E. (2021). Machine learning techniques for detection of website phishing: A review for promises and challenges. IEEE 11th Annual Computing and Communication Workshop and ConferenceLinks to an external site. (CCWC), 813–818. doi:10.1109/CCWC51732.2021.9375997
• Susser, D., Roessler, B., & Nissenbaum, H. (2019). Online manipulation: Hidden influences in a digital world. Georgetown Law Technology ReviewLinks to an external site., 4(1), 1–45. https://ssrn.com/abstract=3306006
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.