Implementation of the Cyber Security Plan in the Electronic Health Systems

Paper Type:  Essay
Pages:  5
Wordcount:  1101 Words
Date:  2021-05-27
Categories: 

P- There are many incidences of cybercrimes threatening the Electronic Health Systems in healthcare services; I involving the relevant stakeholders to come up with the solutions on the matter; C- installation of firewalls and security software in the EHS, enabling them with strong passwords and restricting people and information to be accessed; O collective contribution in healthcare cyber security and reducing incidences of cybercrimes in healthcare services (McNeal, 2014).

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

The organizational resources needed to implement and maintain the change plan.

The resources that are required in the implementation of the cyber security plan in healthcare facilities include:

Stakeholders

Technologies

Funding

Educational materials and research base literature.

The stakeholders needed to support the implementation of the proposed plan

The stakeholders include:

Government

As a stakeholder, the government has a vital role to play, through funding of the development of a secure firewalls and security software, also through the investigation bureau such as the FBI. The healthcare facilities can partner with them to provide intelligence report regarding the people who are the threat to the cyber security (McNeal, 2014).

Cybersecurity technicians

Additionally, the cyber professionals are the core individuals towards the implementation of the cybersecurity plan. Their role is important since they are the ones who will develop and test for a suitable security software and firewall that will prevent the healthcare data from being breached (He & Johnson, 2012, October).

The impact this change plan will have on the organization and its stakeholders.

After the implementation of the project, there will be a significant difference in the health sector which will be felt by the interested stakeholder. In this aspect, the government role will be ease since the threat of cyber security will be reduced as well as the instances of identification fraud which promote other kinds of crimes. While on the other hand, the Cybersecurity technicians will develop financially since the security software and the firewalls that they will manufacture will not only bring income after being sold, but also through its installation in the government electronic devices vision (Kumar, P., & Lee, 2011).

The steps of implementation.

The steps of application are according to, The 8-Step Process for Leading Change - Kotter International.

Step 1: Creating a sense of urgency

Creating awareness to both the government and the public on the increasing cases of the cyber-treats on the healthcare facilities, also debating on the need of implementing the cyber-security plan that will safeguard the patients information.

Step 2: Converging the interested parties

Assembling of the relevant stakeholders, the government together with the concerned public who will come up to formulate the strategy that will steer up the implementation process.

Step 3: Formulation of the strategic innovation and vision

At this stage, the implementation plan will be unveiled to the interested parties, whereby there will be the development of the strategic initiative in achieving the vision of developing an effective cyber security in the healthcare fields (McNeal, 2014).

Step 4:

This level involves identification of the significant number of individuals who are in the capable and willing to drive the implementation plan.

Step 5: Remove barriers

Elimination of the obstacles that will affect the implementation plan.

Step 6: Develop short-term achievements

The break-down of the performances will be divided to keep constant tracks on the progress of the implementation process, and this will also evaluation of the performance at every stage of the implementation process continues.

Step 7: Maintain acceleration

The hastening of the implementation plan will involve the changing the policies and cultures that failed to bring into line with the vision of the plan. Therefore, if the need arises, there will be hiring, and developing of the parties who are capable of implementing the vision (Kumar, P., & Lee, 2011).

Step 8: Institute Change

This final stage involves relating to the new behavior and the organizational success and creating the means that will facilitate the leadership growth and success (McNeal, 2014).

Identify potential barriers affecting the implementation of the change plan. Discuss steps for overcoming the potential obstacles.

The potential barriers to the implementation of the change plan on the cyber security in the healthcare system include:

Limited resources

Insufficient funds

Lack of cooperation by some health facilities

Limited time

Step 1: Creating a sense of urgency

Communicate to the stakeholders and other interested individuals on the progress of the implementation plan, together with the barriers that threaten fully implementation of the plan (Vockley, 2012).

Step 2: Converging the interested parties

Assembling the stakeholders and identify with them different challenges that they have faced during the implementation of the plan.

Step 3: Developing the strategic innovation and vision

After identifying the barriers facing the implementation plan, then the strategy of handling the barrier has to be discussed.

For instance, the insufficient funding mitigation involves seeking of grants and loans from willing lending groups. Lack of cooperation by some health facilities can be handled by seeking government assistance in applying sanctions to those who are guilty of such behavior (Papoutsi, et al.,2015).

Step 4:

Identification of potential institutions and individuals who will promote the mitigation against the mentioned barriers.

Step 6: Creating short-term achievements

The short-term success will assist in knowing whether the obstacles are well managed, and if not, it will be easy to develop further actions.

Step 7: Maintaining acceleration

If the methods to eliminate the barriers have worked effectively, then the methods ought to be further enhanced.

Step 8: Institute change

Compare the organizational change between the past and the current one.

References

Better Care Victoria. (2017). Www2.health.vic.gov.au. Retrieved 11 January 2017, from https://www2.health.vic.gov.au/hospitals-and-health-services/quality-safety-service/better-care-victoriaBurns, A. J., & Johnson, M. E. (2015). Securing health information. IT Professional, 17(1), 23-29.

Cabrera, E. (2016). Health Care: Cyberattacks and How to Fight Back. Choice Reviews Online, 18 4, (4), 27-30. http://dx.doi.org/10.5860/choice.44-3390He, Y., & Johnson, C. W. (2012, October). Generic security cases for information system security in healthcare systems. In System Safety, incorporating the Cyber Security Conference 2012, 7th IET International Conference on (pp. 1-6). IET.

Henriksen, E., Burkow, T. M., Johnsen, E., & Vognild, L. K. (2013). Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education. BMC medical informatics and decision making, 13(1), 1.

International, K. & International, K. (2017). The 8-Step Process for Leading Change - Kotter International. Kotter International. Retrieved 9 January 2017, from http://www.kotterinternational.com/the-8-step-process-for-leading-change/Kumar, P., & Lee, H. J. (2011). Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, 12(1), 55-91.

McNeal, M. (2014). Hacking health care. Marketing health services, 34(3), 16-21.

Papoutsi, C., Reed, J. E., Marston, C., Lewis, R., Majeed, A., & Bell, D. (2015). Patient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: results from a mixed methods study. BMC medical informatics and decision making, 15(1), 1.

Vockley, M. (2012). Safe and secure? healthcare in the cyberworld. Biomedical Instrumentation & Technology, 46(3), 164-173.

Cite this page

Implementation of the Cyber Security Plan in the Electronic Health Systems. (2021, May 27). Retrieved from https://midtermguru.com/essays/implementation-of-the-cyber-security-plan-in-the-electronic-health-systems

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience!

24/7 online support

NO plagiarism