StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Internal and External Threats - Essay Example

Cite this document
Summary
The impact has been more towards the positive side with improved efficiency and increased output. One sector in the United States…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
Internal and External Threats
Read Text Preview

Extract of sample "Internal and External Threats"

EXTERNAL AND INTERNAL THREATS INSTITUTE EXTERNAL AND INTERNAL THREATS With the advancement in technology and the invention of computers, the working and functioning of organizations and industries has widely changed. The impact has been more towards the positive side with improved efficiency and increased output. One sector in the United States where the information technology and computers still need progress and lags in attaining the benefits of these inventions is the health division. The health sector is now attaining progress in the field of information technology and many health organizations have started implementing programs to improve efficacy and provide better health care to the patients.

The health information technology has been implemented in major health organizations in the country. Cedar Sinai which is one of the major health providers in the country did not have a very successful outcome from the implementation of this program. Health information technology has its benefits but it is a subject of concern for the health care executives. The healthcare executive should be concerned with the potential threats that may exist within the health organization. The proper implementation of the health care program is a task that needs to be undertaken with utmost care.

It requires proper supervision and implementation of the program in a health organization effectively so that it is brought into use and improves the working of the hospital rather than delaying the normal work of the physicians. This is because it is believed by some physicians that clinical records on the computer can serve to take longer hours than otherwise. Errors in handling the information technological systems can result in blunders with regard to patient health care and hence the health executive needs to be aware of such threats as well.

Hence, extensive training and investment is very important with regards to the implementation of such programs. External threats also need to be considered with regard to this implementation. Electronic Health Record is an essential component of the maintenance of the records of the patient electronically. There are differing ways which can be used to keep these records which include buying the software for the organization’s computers or another option is ASP which uses a different server which holds the electronic health record of the patient and the software is present on that server.

ASP is a more widely used option and it needs to be understood by the healthcare executive that information via this method is shared on a remote server which may be viewed by external sources when the software on the server gets updated. Private information and record of the patient which is provided to the hospitals can be infiltrated and misused. Also errors made during the storage of the electronic health record might prove to be a threat to the organization as the information is no longer only possessed by it but is also available to external sources.

Hence the integration of internal threats which include the lack of proper understanding of staff regarding information technology and external threats which include the usage of external servers for storing the information have a relationship with each other. To avoid untoward incidents and mishaps, it is essential that these threats should be understood and dealt with effectively. Legal issues and a stronger stand of the law with regard to securing the information of the patient have made it important that the security and privacy of essential health information should be protected and the healthcare executives should be aware of these threats and their effects on the health organization.

REFERENCESTop of FormHoyt, R. E., Sutton, M., & Yoshihashi, A. (2009).Medical informatics: Practical guide for the healthcare professional. Pensacola, Fla: University of West Florida, School of Allied Health and Life Sciences, Medical Informatics Program.Bottom of Form

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Internal and External Threats Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Internal and External Threats Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1569554-internal-and-external-threats
(Internal and External Threats Essay Example | Topics and Well Written Essays - 500 Words)
Internal and External Threats Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1569554-internal-and-external-threats.
“Internal and External Threats Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1569554-internal-and-external-threats.
  • Cited: 0 times

CHECK THESE SAMPLES OF Internal and External Threats

Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements

nbsp; Current considerations should be examined to further scrutinize the consequential effects of Internal and External Threats.... To combat Internal and External Threats and guard information systems, proposed actions include the following: enhancements to the hiring and promotion processes, implementing a contingency in job appointments, enhancing the sustainability of basic technology.... "Considering the threats and Vulnerabilities of Information Systems: A Plan for Improvements" paper purposes actions that include: enhancements to the hiring and promotion processes, implementing a contingency in job appointments, enhancing the sustainability of basic technology....
7 Pages (1750 words) Coursework

Security in an Organization

There can be both Internal and External Threats to any organization.... The growing number of threats has increased the importance of security in an organization.... Proper security measures are needed to tackle these threats.... The number of security threats has multiplied in recent years due to the development and growth of technology.... Hackers, internal spying, etc have become common in organizations....
2 Pages (500 words) Essay

20th Century Intelligence Gathering

No country seems to be free of Internal and External Threats.... In other words, intelligence gathering is necessary for countering both the Internal and External Threats, a country may face.... threats come not only from external sources.... external forces may establish ties with the internal forces in order to create problems in a country.... It can come from internal sources also....
7 Pages (1750 words) Research Paper

National Security Versus Civil Liberty

National securities are those actions taken by a country or nation so as to protect itself and its citizens from Internal and External Threats.... hellip; This paper looks at the issue of sacrificing a few freedoms to protect national security, both the internal and external security and to ensure the long term viability of civil rights.... National security includes internal and external security of a country.... Internal security involves protecting the United States citizens against internal threats like organized crimes....
6 Pages (1500 words) Coursework

Define a Remote Access Policy to Support Remote Health Care Clinics

For this reason, constant logging of user activity, monitoring internet, and email access are important ways of tracking breaches of both Internal and External Threats.... The security policy of organizations sets specific standards on how business information systems are protected from both external and internal threats.... Security policies must have the capacity to adapt to the constant changes within an organization Clark Remote access policy Remote access policy The security policy of organizations sets specific standards on how business informationsystems are protected from both external and internal threats....
2 Pages (500 words) Essay

Network monitoring and analysis

Globally Denial of Service makes up for one of LAN and other remotely established networks are prone to different kinds of Internal and External Threats.... addresses from external sources.... addresses from external sources.... Denial of Services (DoS) is one similar threat posed to the networking infrastructure....
1 Pages (250 words) Assignment

Continuity of Operations Planning

BCM is a framework that has been set up in order to identify both Internal and External Threats to an organization.... BCM also looks at the potential impacts that these threats may present to an organization.... With more and more people now using the internet, cyber security threat has become alive and the issue can no longer be overlooked....
1 Pages (250 words) Essay

Occurrence of Price Competition in the Retail Sector

faces certain Internal and External Threats.... Furthermore, Nike not only faces huge threat and competition from major sports brands but also faces threats from fake Nike goods.... A competition is increasing in occurrence for Nike since competitors are creating alternative brands which are aimed at taking away the market share of Nike Inc....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us