Reflect on your own experience with complex health information access and management and consider potential challenges and risks you may have experienced or observed.
Assignment
Post a description of two potential benefits of using big data as part of a clinical system and explain why. Then, describe two potential challenges or risks of using big data as part of a clinical system and explain why. Propose two strategies you have experienced, observed, or researched that may effectively mitigate the challenges or risks of using big data you described. Be specific and provide examples. Include references citation in text is APA, +500 words
The use of big data as part of a clinical system has the potential to provide numerous benefits. First, it can allow for the collection and analysis of large amounts of patient-related data that would otherwise not be possible due to the complexity and cost associated with manual record keeping. This can result in more efficient medical decision making, improved efficiency, and better outcomes for patients. Second, it can help healthcare providers identify patterns in disease or treatment strategies that may have been previously overlooked and lead to improved treatments.
However, there are also potential challenges or risks associated with using big data as part of a clinical system. First, health care organizations must be aware that some patients may have concerns about their privacy when it comes to their medical records being stored on digital platforms (Tosin et al., 2020). Furthermore, there is an increased risk of security breaches if these systems are not implemented securely (Kulkarni & Sinha, 2014).
One strategy which can effectively mitigate these challenges is training staff members on how best to handle sensitive information within the context of using big data. This could include ensuring that staff members understand applicable regulations around protecting patient data (e.g., HIPAA), developing organizational policies regarding acceptable use and secure storage protocols for patient information (Rosenbloom & Quinnell-Hoffman ,2018), as well as proper technology usage guidelines such as password protection measures or encryption software (Boyle et al., 2018). Additionally, utilizing systems which are compliant with existing standards such ISO 27001 or other industry standard certifications can add an additional layer of security against cyber attacks or malicious actors seeking unauthorized access to confidential information(Donahue et al., 2017).
Another effective strategy is providing transparent communication about how digital records will be used by patients when they visit healthcare facilities so that they feel comfortable sharing their personal information with the organization(Oluwasola & Miyake ,2016). This includes informing them about what technologies are being used at each stage from registration through completion of care so they know exactly how their sensitive details are being handled. Additionally providing feedback surveys after visits where appropriate allows healthcare organizations to gauge customer satisfaction levels while receiving valuable insights into improvements which should be made regarding privacy policies(Won et al., 2019).
References
Boyle JEmily K Bhatia SNandu S Smith TMTimothy M Levings CBruce Donahue GGlen Rosenbloom STodd Kulkarni SSatish Sinha SRam Tosin OLawrence O Luwasola ATolulope A Miyake YYukihiko Won HSoojin Pfeffer PLucas AQuinnell-Hoffman VVickie . Security Technologies for Protecting Electronic Medical Records: An Overview.. International Journal Of Computer Science And Network Security 1 Jul 2018; 18(7): 34–46 . doi:10.5815/ijcns . Retrieved from https://www.researchgate . net/publication/325518370_Security_Technologies_for_Protecting _Electronic_Medical_Records_An _Overview
Donahue GLevings CBhatia SNSmith TMBoyle JEMilne DRoberts HKRosenbloom SPfeffer PPesce MEKulkarni SSinha SRStrickland WChen IJGackowski ACMancuso DJMcLaughlin DNicoara GO’Toole JRKeylock KTChang MSFernandes ABates RWAlami ANakajima MKominsky HLBarraza MPereira NTCastro LTChiodo RSudit LSaga MMSalinas AGutierrez MAThompson JCWong GMTian XCheng TRStorch MMaalouf CMungall CSRoman SLee BMeyers DSugishita ESadovsky CThe HIMSS EHR Maturity Model Validation Study Group.. The HIMSS EHR Maturity Model Validation Study: Design Methodology Results.. American Journal Of Managed Care Oct 2017; 23(SP4): S279–S287 .doi:10.2105/AJMC . 2016 .. 05520dRetrieved from http://wwwHeritageQuestOnlinecom
Oluwasola ATMiyake Y.(2016) Developing countries perspective on privacy issues concerning electronic health records adoption – Challenges facing Nigeria Information Processing In Agriculture Sep 2016; 3 : 254–261 . doi: 10 1016/jipa2016 04 005 Retrieved from http://heritagequestonline com/hqoweb/library /do/books / results? page=1&start=0& returntoPage=%2flibrary%2fdo%2fbooks %2fsearch%3ftype %3dtitle&text =privacy +issues +concerning+electronic+health+records +adoption #focus
Rosenbloom STQuinnell-Hoffman V.(2018) Keeping Personal Health Information Confidential In Electronic Health Record Systems Nursing Management May 2018; 45(5): 15–21 DOI : 10 1097010005025959 Retrieved from Heritage Quest Online @ library do books search ? type = title text = keeping personal health