100% (1)
Pages:
4 pages/≈1100 words
Sources:
-1
Style:
APA
Subject:
Health, Medicine, Nursing
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 17.28
Topic:

Literature Review of Cybersecurity in Healthcare

Essay Instructions:

Perform a literature review on a health care barrier or issue (cybersecurity) using the GCU Library. Present 8-10 peer-reviewed primary research articles. These articles should be either qualitative or quantitative.

***Please use this link to access the GCU Library: http://library(dot)gcu(dot)edu/ - click "find journal articles" - check the "peer reviewed" box - scroll down to the "browse by subject" drop down and select "nursing & health sciences" - click the "CINAHL Complete" hyperlink and begin searching for articles. (logins will be provided, ask support)

You may use either health care or nursing peer-reviewed journals; however, at least half of the primary articles must come from peer-reviewed nursing journals. The peer-reviewed articles must consist of research published within the last 5 years.

Use the "HLT-494 - Literature Evaluation Table" template to document your detailed assessment of each primary study. This document helps break down the components of each article to ensure the article meets the requirements for a professional nursing paper. Ensure that each of your articles provides information that meets each criterion listed. Assess the research and provide a detailed and clear explanation how each article supports your capstone project and evidence-based practice (between five and six sentences).

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

While APA style is not required for the body of this assignment, solid academic writing is expected, and in-text citations and references should be presented using APA documentation guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

Essay Sample Content Preview:
HLT-494 - Literature Evaluation Table
Student Name:
Summary of health care administration issue (200-250 words):
Criteria

Article 1

Article 2

Article 3

APA-Formatted Article Citation With Permalink

Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology & Health Care, 25(1), 1–10. https://doi-org.lopes.idm.oclc.org/10.3233/THC-161263

Bhuyan, S.S., Kabir, U., Escareno, J.M. , et al. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations. J Med Syst 44, 98 (2020). https://doi.org/10.1007/s10916-019-1507-y

Coventry L, Branley D. Cybersecurity in healthcare: A narrative review of trends, threats, and ways forward. Maturitas. 2018 Jul;113:48-52. DOI: 10.1016/j.maturitas.2018.04.008. Epub 2018 Apr 22. PMID: 29903648.

How Does the Article Relate to the Health Care Barrier?

The article discusses the current threats in healthcare while also showcasing the trends in cybersecuritycybersecurity trends, including topics like ransomware.

It seeks to discuss the various ways cybersecurity in healthcare could be enhanced, especialmainly through preventive strategies.

This article discusses the trends in cybersecuritycybersecurity trends, the threats to cybersecurity in the healthcare sector and offers recommendations for how to proceed.

Quantitative, Qualitative (How do you know?)

Qualitative – considers the results of the studies and offers interpretations of the same.

Qualitative – it does not test any hypothesis but explores ways in whichhow cybersecurity could be transformed in depth.

Qualitative – considers results of studies and makes interpretations and conclusions based on these.

Purpose Statement

To identify cybersecurity trends, including recent threats in regards toregarding ransomware and its relationship to the healthcare industry through academic literature.

Discusses emerging threats posed by cyberattacks in healthcare and the key players in cybersecurity.

The article does not have a clearly defined purpose statement, but it seeks a progressive review of how healthcare organizations can respond to cybersecurity threats.

Research Question

Does not have a defined research question.

There is no defined or specific research question.

Why is healthcare vulnerable?
Why is healthcare targeted?
What threats and consequences is healthcare currently experiencing?
What is the role of legislation and standards?
How can the healthcare sector move forward?

Outcome

There is a need to enhance the security of healthcare systems.

There is a need for a strong cybersecurity foundation to avoid threats.

Healthcare organizations need to react strategically to curtail current and future threats.

Setting (Where did the study take place?)

Online.

Online.

Online.

Sample

31 research studies.

No sample was used.

1249 articles.

Method

Searching the CINAHL, PubMed (Medline), and the Nursing and Allied Health Source vie ProQuest databases.

A review of different sources and peer-reviewed material online.

Used the PubMed database to search for the articles.

Key Findings of the Study

Cybersecurity lags behind for healthcare.
There is a need to define the specific duty of cybersecurity and to establish clear procedures for handling a data breach.
Training of users is needed.

The majorsignificant types of cybersecurity issues in healthcare organizations include DoS attacks, cryptographic attacks, privilege escalation, man-in-the-middle attacks, malicious software, phishing, and structured query language injections exploit.
The study also lists these as major players in cybersecuritycybersecurity players, including cyber-attackers, cyber defenders, end-users, and developers.

Interconnected technology is a majorsignificant impediment to security in healthcare organizations.
Healthcare organizations are big repositories, thus big targets.
Hacking is a majorsignificant threat to healthcare.

Recommendations of the Researcher

There is a need to adapt to the ever-changing cybersecurity trends and threats.

Policymakers to identify targets prone to cyberattacks.
Healthcare organizations to develop strategies to deal with cyberattacks instead of the case by -by-case approach.

A cyber resilience that offers a holistic view of cyber risk for healthcare organizations is needed.
There is a need to invest more money and effort to ensure the security of healthcare technologies.

Criteria

Article 4

Article 5

Article 6

APA-Formatted Article Citation with Permalink

Zeadally, S., Siddiqui, F., Baig, Z., & Ibrahim, A. (2019). Challenges and Potential Solutions Using Internet of Things (IoT) and Big Data Analytics. PSU Research Review, 4(2), 149-168. https://doi.org/10.1108/PRR-08-2019-0027

Liu, H., Crespo, R. G., & Martínez, O. S. (2020). Enhancing Privacy and Data Security across Healthcare Applications Using Blockchain and Distributed Ledger Concepts. Healthcare, 8(3), 243. doi:10.3390/healthcare8030243

Jalali MS, Kaiser JPCybersecurity in Hospitals: A Systematic, Organization...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Sign In
Not register? Register Now!