For this assignment, please note three attachments: First is the rubric - a guide to how the paper is to be written. The second and third attachments are two peer reviews of the original paper. This assignment is to revise the paper based on the two peer reviews. Details: In this assignment, you will rewrite your Literature Review Draft, which includes the utilization of the feedback from the peer review process, if needed. Your paper will consist of 1,500-2,000 words that utilize the research process, incorporate three articles, and include the following: An introduction to topic. An explanation of how the literature review is used in research. A discussion of the ethical considerations for data collection. An explanation of what the data reveals in terms of statistical analysis. An evaluation of whether there is enough information to make a decision on the effectiveness of the specific study. A summary of the conclusions from the literature review. Provide a copy of each peer review of your paper with your final submission. Prepare this assignment according to the guidelines found in the APA Style Guide, An abstract is required. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Using Technology and Protecting Patient Information and Confidentiality Evelyn Booker Grand Canyon University Communication and Application of Research Practice October 20, 2016 Using Technology and Protecting Patient Information and Confidentiality Health care is changing due to new technologies, paper –based patient records have been transformed to electronic records for easier access. Remote patient monitoring is becoming feasible due to technological improvement. Adopting new technology is ideal to improve quality health care. However, privacy and security concerns need to be addressed. Hacking is a common occurrence that has necessitated the development of highly secured information reservoirs. According to the American College of Healthcare Executives (ACHE) (2012), healthcare delivery requires personal access to patient’s information, meaning that health care facilities are among the most information-rich institutions that exist today. When one seeks care, the expectation is that they will divulge most of their personal information to strangers with the hope that it will be kept a secret and offered the protection and confidentiality that it deserves (Health Information Technology, 2015). As the risk of compromising patient confidentiality increases, state laws, and national standards are not adequate to address the growing concern. Therefore, health care system needs to ensure that patient’s records are secure minimizing any violation of ...