100% (1)
page:
5 pages/≈1375 words
Sources:
10
Style:
APA
Subject:
Technology
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 32.4
Topic:

How the healthcare industry copes with computer hacking in their technological systems a case of US?

Research Paper Instructions:
There is one (1) research paper due during this course that is due by the end of Unit 10 (no later than March 26, 2013). You will submit the topic for your paper to the professor in Unit 2 (via email) and it will be approved/disapproved by the professor by the conclusion of Unit 3. Topics should be relevant to the field of information security (cybercrime, recent attack vectors, emerging trends in information security, security management, regulatory compliance, etc.) and you should demonstrate your comprehension of the selected topic through your analysis. Don't just tell me about something...explain the relevance in terms of business impact. You will select at least 10 references on the topic from ABI/ProQuest. You will need library access to access this library database. Select full papers and academic quality reference materials. If you use Internet references these are above and beyond the 10 required from ABI/ProQuest. The research paper should be at least 5 double-spaced pages (excluding cover, TOC, and reference list), have a cover sheet, table of contents, executive summary, introduction to the research topic, current literature discussion (based on the 10 references using APA citation), conclusion and implication of your research, reference list (APA format). Note: The reference page should be in full detail so I can go to your reference and find the paper you are citing. Grading will be based on content, grammar, spelling, APA format correctness, completeness and overall quality of the research. Place the completed research paper in the drop box in a Microsoft Word format. No .pdf file formats will be accepted. Now this is my narrowed topic: "How the Health Care Industry Copes with Computer Hacking in Their Technological System: A case of US".
Research Paper Sample Content Preview:
HOW THE HEALTHCARE INDUSTRY COPES WITH COMPUTER HACKING IN THEIR TECHNOLOGICAL SYSTEMS: A CASE OF US
Name:
Institution:
Course Title:
Course Code:
Instructor’s Name:
Date Due:

Table of Contents
 TOC \o "1-3" \h \z \u  HYPERLINK \l "_Toc346661030" Executive Summary  PAGEREF _Toc346661030 \h 3
 HYPERLINK \l "_Toc346661031" Introduction  PAGEREF _Toc346661031 \h 4
 HYPERLINK \l "_Toc346661032" Literature Review  PAGEREF _Toc346661032 \h 5
 HYPERLINK \l "_Toc346661033" Conclusion  PAGEREF _Toc346661033 \h 7
 HYPERLINK \l "_Toc346661034" Reference  PAGEREF _Toc346661034 \h 7


Executive Summary
In recent years, the cyber crime rate, computer hacking as well as virus attacks has been consistently on the rise globally. Persistent security breaches have ended up causing damages to the organizations IS (Ogut, 2006). Many of these Organizations have in turn tended to use different security technologies such as intrusion detection system, firewalls, biometric, encryption and other authentication system to deter these problems. However, studies reveal that it is not an easy task to eliminate or prevent these breaches from happening. This has led to many organizations using other tools such as insurance to cater for the losses emanating from the security breaches. Although these technological instruments are poised to reduce vulnerabilities and losses, how many firms manage their IT security risks is not yet clear to many.
The last decade has seen the IT sector evolve from one stage to another. These information systems have enhanced the operations of many organizations and the connection between them and their clients. The IT has enabled many of these businesses to thrive in various aspects and even become major operators in the global economy. The closeness of the organizations with their customers has unfortunately made them to be vulnerable with regard to unprecedented technology risks. Whitman, (2004) observes that, the evolution of security technology systems have not been able to keep up with the increasing computing systems in particular. These has resulted into security technology issues such as computer hacking, spywares, cyber attacks, viruses, as well as other security breaches on a daily basis. Numerous studies have grouped these types of security breaches as the common threats to information security.
Though studies on IT aspect have been extensive, clear information on how the health industry manages their Information Technology related risks is lacking. Most studies with regard to IT management system have been recent and limited. Earlier studies in this perspective were centered on framework development in IT security management, or organization’s practices with regard to IT security management (Claffin 2001, Karofsky 2001). There is some range of literature related to risk management and insurance, but these also fail to tackle the inherent features of IT security. This study aims to examine how the health industry copes with computer hacking in USA perspective.
Introduction
Security management in IT has become in recent times, one of the important issues in many organizations. This is so due to the number of increased security breaches as well as financial losses experienced by these firms (Power 2002). By recognizing and quantifying IT security risks, both public and private organizations do not necessarily aim to eliminate these occurrences but reduce the risks to a level that is acceptable. For instance, in alleviating these risks, health institutions have tended to increase their financial budgets towards incorporating security technologies such as intrusion detection systems to prevent hacking and other breaches. These include but not limited to, firewalls, biometric, encryption and other authentication systems. As Straub, (1990) observes, many other organization have also incorporated policies that are aimed at limiting security risks in their IT departments.
The healthcare industry has until recently been a target for hackers. The incentive behind these actions in most cases varies, ranging from financial gains to simply acquiring sensitive, personal and institutional information. American healthcare industry may be one of the well protected with regard to its information systems, interestingly; incidences of hacking in these institutions still abound almost on a daily basis.
Literature Review
Wendy et al, (1998) observes that majority of the players in the health sector in USA have until recently, not put enough emphasis in dealing with computer hacking menace experienced in their systems. It is interesting that not many of these health organizations recognize the dangers this phenomena poses to the institution and the patient’s security. In addition, many such organizations as the researchers noted, have not identified the need in formulating proper strategies nor cooperating with other government agencies to solve this issue. Therefore, one of the main obstacles identified by these researchers as hindering effective prevention in computer hacking is lack of proper policies and coordination.
Studies by various scholars (Lemos, 2003; Niccolai, 2000, Gordon et al. , 2004; Cavusoglu et al, ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!