mrssharonkilgore
Respond to two or more of your colleagues’ postings in one or more…

Respond to two or more of your colleagues’ postings in one or more of the following ways:

Address the content of your colleague’s statement, as well as the integration of relevant resources.

Please note that, for each response, you must include a minimum of one appropriately cited scholarly reference.

 

POSTING 

Briefly describe key components of your chosen article: problem statement, purpose statement, conceptual framework, research question(s), and interview questions

Problem statement:  Hacking has made cybersecurity a priority in the healthcare industry (Ronquillo et al., 2018).

Purpose statement: This cross-sectional study will explore the leverages of federal data better to understand cybersecurity threats in the health information technology industry (Ronquillo et al., 2018).

Conceptual Framework: The study’s research design was a cross-sectional study of available reported data breaches in the United States between 2013 and 2017. Data for each reported breach covers entity, breach submission date, patient records, media, and data breach category (Ronquillo et al., 2018).

Research question(s)

RQ1: How often do data breaches occur in the healthcare industry?

RQ2: How have data breaches in the healthcare industry changed over time?

Interview Questions

The authors did not utilize interview questions. Instead, the study was based on data reports from other reported data breaches in the United States (Ronquillo et al., 2018).

The level of alignment between the problem and purpose statement provides a clear pathway to understanding the methodology used. The cross-sectional study of this article was to bring awareness about cybersecurity breaches of protected health information, a severe problem (Ronquillo et al., 2018). Moreover, hacking breaches that involve health information technology and ransomware are a growing matter (Ronquillo et al., 2018). The authors provided some solutions for reducing cybersecurity on many levels. For instance, physicians must follow good data and cyber hygiene, which includes updating and creating strong passwords and being mindful of email phishing (Ronquillo et al., 2018). For the overall organizational level, the IT resources must be sufficient and implement a user authentication system with data encryption software (Ronquillo et al., 2018).

A recommendation is adding an interview component to the study. Adding an interview component to the study will provide additional insight into why physicians and other healthcare staffers do not update passwords and to see what information technology systems are being used in the organization setting. However, confidentiality, privacy, and research findings will present a dilemma regarding how the information is retrieved (Saunders et al.,2019).

Reference:

Ronquillo, J. G., Erik Winterholler, J., Cwikla, K., Szymanski, R., & Levy, C. (2018). Health IT, hacking, and cybersecurity: National trends in data breaches of protected health information. JAMIA open, 1(1), 15-19. https://europepmc.org/backend/ptpmcrender.fcgi?accid=PMC6951874&blobtype=pdfLinks to an external site.

Saunders, M. N. K., Lewis, P., & Thornhill, A. (2019). Research methods for business students (8th ed.). Pearson Education Unlimited.