ETHICS, CYBER ETHICS, AND SECURITY
In recent years, hackers have targeted medical records, from hospitals and other healthcare institutions, across the country. These records contain personal information, contact information, and most importantly, for the hackers, information that may prove useful in stealing an identity. Thus, healthcare organizations have made it a priority to protect patient records and privacy. However, with the influx of technological advancements and hacker determination, there is no perfect way to ensure that all records are secure and safe.
In addition to medical records, privacy concerns are relevant with any patient chart in any setting. For example, a chart left open on a computer monitor in a patient room, employee passwords and log-in information, and new employee access and screening all represent other ways in which ethics and security merge in healthcare and nursing practice.
For this Discussion, you will consider the importance of ethics as it relates to security. You will also reflect on how these topics might affect clinical practice and the connection to nursing informatics.
RESOURCES
Be sure to review the Learning Resources before completing this activity.
Click the weekly resources link to access the resources.
TO PREPARE
- Review the Learning Resources associated with the topics of ethics, cyber ethics, and security.
- Consider the role of each of these topics for clinical practice, as well as the importance of understanding each of these topics.
- Reflect on how COVID-19 might have impacted each of these topics, which reviewing the article, “The COVID-19 Pandemic Highlights Shortcomings in US Health Care Informatics Infrastructure: A Call to Action.”
BY DAY 3 OF WEEK 9
Post a cohesive response that addresses the following for each of the topics of ethics, cyber ethics, and security:
- Explain how each of the topics might impact clinical practice. Describe why it is important to understand how ethics applies to clinical practice. Be specific and provide examples.
- How might ethics apply to informatics, e-health records, importance of passwords and security?
- After reviewing the article, “The COVID-19 Pandemic Highlights Shortcomings in US Health Care Informatics Infrastructure: A Call to Action,” describe potential impacts of the pandemic on ethics and security as it applies to clinical practice. Be specific and provide examples.
BY DAY 5 OF WEEK 9
Read a selection of your colleagues’ responses and respond to at least two of your colleagues on two different days by expanding upon their responses or sharing additional or alternative perspectives.
Required Readings
- Sipes, C. (2020). Project management for the advanced practice nurse (2nd ed.). Springer Publishing.
- Chapter 6, “Monitoring and Controlling: Project Management—Phase 4” (pp.
147–168) - Chapter 7, “Closing the Project: Project Management—Phase 5” (pp. 169–186)
- Chapter 6, “Monitoring and Controlling: Project Management—Phase 4” (pp.
- American Nurses Association. (2015). Nursing informaticsLinks to an external site.: Scope and standards of practice (2nd ed.).
- “Ethics in Nursing Informatics” (pp. 49–52)
- “Standard 6: “Evaluation” (p. 78)
- “Standard 7: “Ethics” (pp. 79–80)
- “Standard 11: “Communication” (p. 86)
- “Standard 12: “Leadership” (pp. 87–88)
- Beckmann, M., Dittmer, K., Jaschke, J., Karbach, U., Köberlein-Neu, J., Nocon, M., Rusniok, C., Wurster, F., & Pfaff, H. (2021). Electronic patient record and its effects on social aspects of interprofessional collaboration and clinical workflows in hospitals (eCoCo): A mixed methods study protocolLinks to an external site.. BMC Health Services Research, 21(377). https://doi.org/10.1186/
s12913-021-06377-5 - Martin, K., Shilton, K., & Smith, J. (2019). Business and the ethical implications of technology: Introduction to the symposiumLinks to an external site.. Journal of Business Ethics,160, 307–317. https://doi.org/10.1007/
s10551-019-04213-9 - Nahm, E.-S., Poe, S., Lacey, D., Lardner, M., Van De Castle, B., & Powell, K. (2019). Cybersecurity essentials for nursing informaticistsLinks to an external site.. Computers, Informatics, Nursing, 37(8), 389–393. doi:10.1097/CIN.
0000000000000570 - Odeh, A., Keshta, I., & Abdeifattah, E. (2021). Machine learning techniques for detection of website phishing: A review for promises and challenges. IEEE 11th Annual Computing and Communication Workshop and ConferenceLinks to an external site. (CCWC), 813–818. doi:10.1109/CCWC51732.2021.
9375997 - O’Reilly-Shah, V. N., Gentry, K. R., Van Cleve, W., Kendale, S. M., Jabaley, C. S., & Long, D. R. (2020). The COVID-19 pandemic highlights shortcomings in US health care informatics infrastructure: A call to actionLinks to an external site.. Anesthesia and Analgesia, 131(2), 340–344. https://doi.org/10.1213/ANE.
0000000000004945 - Susser, D., Roessler, B., & Nissenbaum, H. (2019). Online manipulation: Hidden influences in a digital world. Georgetown Law Technology ReviewLinks to an external site., 4(1), 1–45. https://ssrn.com/abstract=
3306006
Are you overwhelmed by your class schedule and need help completing this assignment? You deserve the best professional and plagiarism-free writing services. Allow us to take the weight off your shoulders by clicking this button.
Get help