Respond to your colleagues, offering additional/alternative ideas regarding opportunities and risks related to the observations shared.At least 2 references in each peer responses!
In 2009, Congress passed the Health Information Technology for Economic and Clinical Health Act (HITECH), part of the American Reinvestment and Recovery Act, so healthcare facilities will adopt and incorporate meaningful use of health information technology (IT). At first only a small number of hospitals had any kind of electronic health records (EHR), but RAND Corporation studies showed success, which motivated other companies to follow (Reider, 2018). However, RAND studies were not accurate predictors of widespread success due to unintended consequences, safety, and efficiency concerns (Reider, 2018).
Hackers come from all across the globe. In fact, the Pentagon is a very common target for hackers because it is the Defense Department. Not long ago 30,000 plus Pentagon employees’ personal information was exposed due to contractor breach (Martindale, 2018). Naturally Pentagon officials downplayed the event, and it makes one wonder how much national security information was exposed to foreign powers due to data leaks (Martindale, 2018).
Hospitals are also common targets due to multitudes of clients containing personal information that can be sold on the Dark Web to hackers around the world, and antiquated software making them vulnerable (Garrity, 2019). In fact, where I work, Winter Haven Hospital is still using Windows 7 as an operating system, which is not even supported by Microsoft anymore.
With these issues in mind, imagine the potential if hackers had to access prescriber accounts, and prescriptions, especially narcotics. I do not think many hackers have thought of this, because they are more apt to steal from bank accounts and credit cards. Considering the opioid epidemic and the street value of narcotics, it surprises me this sort of hacking is not more commonplace. This indicates to me that most hackers are not sophisticated and lack creativity. However, be assured they are out there, only not as common; the sophisticated hacker is more attracted to infrastructure manipulation instead due to varients of Stuxnet malware. Stuxnet would be too difficult to discuss here, but it illustrates how powerful computer hacking can be when it can take down electrical grids. Computer technology, indeed, released a Pandora’s box.
Approximate price: $22
We value our customers and so we ensure that what we do is 100% original..
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential.You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.The Product ordered is guaranteed to be original. Orders are checked by the most advanced anti-plagiarism software in the market to assure that the Product is 100% original. The Company has a zero tolerance policy for plagiarism.The Free Revision policy is a courtesy service that the Company provides to help ensure Customer’s total satisfaction with the completed Order. To receive free revision the Company requires that the Customer provide the request within fourteen (14) days from the first completion date and within a period of thirty (30) days for dissertations.The Company is committed to protect the privacy of the Customer and it will never resell or share any of Customer’s personal information, including credit card data, with any third party. All the online transactions are processed through the secure and reliable online payment systems.By placing an order with us, you agree to the service we provide. We will endear to do all that it takes to deliver a comprehensive paper as per your requirements. We also count on your cooperation to ensure that we deliver on this mandate.
RESPONSE #1
Never use plagiarized sources. Get Your Original Essay on
RESPONSE #1
Hire Professionals Just from $11/Page