P- There are many incidences of cybercrimes threatening the Electronic Health Systems in healthcare services; I involving the relevant stakeholders to come up with the solutions on the matter; C- installation of firewalls and security software in the EHS, enabling them with strong passwords and restricting people and information to be accessed; O collective contribution in healthcare cyber security and reducing incidences of cybercrimes in healthcare services (McNeal, 2014).
The organizational resources needed to implement and maintain the change plan.
The resources that are required in the implementation of the cyber security plan in healthcare facilities include:
Stakeholders
Technologies
Funding
Educational materials and research base literature.
The stakeholders needed to support the implementation of the proposed plan
The stakeholders include:
Government
As a stakeholder, the government has a vital role to play, through funding of the development of a secure firewalls and security software, also through the investigation bureau such as the FBI. The healthcare facilities can partner with them to provide intelligence report regarding the people who are the threat to the cyber security (McNeal, 2014).
Cybersecurity technicians
Additionally, the cyber professionals are the core individuals towards the implementation of the cybersecurity plan. Their role is important since they are the ones who will develop and test for a suitable security software and firewall that will prevent the healthcare data from being breached (He & Johnson, 2012, October).
The impact this change plan will have on the organization and its stakeholders.
After the implementation of the project, there will be a significant difference in the health sector which will be felt by the interested stakeholder. In this aspect, the government role will be ease since the threat of cyber security will be reduced as well as the instances of identification fraud which promote other kinds of crimes. While on the other hand, the Cybersecurity technicians will develop financially since the security software and the firewalls that they will manufacture will not only bring income after being sold, but also through its installation in the government electronic devices vision (Kumar, P., & Lee, 2011).
The steps of implementation.
The steps of application are according to, The 8-Step Process for Leading Change - Kotter International.
Step 1: Creating a sense of urgency
Creating awareness to both the government and the public on the increasing cases of the cyber-treats on the healthcare facilities, also debating on the need of implementing the cyber-security plan that will safeguard the patients information.
Step 2: Converging the interested parties
Assembling of the relevant stakeholders, the government together with the concerned public who will come up to formulate the strategy that will steer up the implementation process.
Step 3: Formulation of the strategic innovation and vision
At this stage, the implementation plan will be unveiled to the interested parties, whereby there will be the development of the strategic initiative in achieving the vision of developing an effective cyber security in the healthcare fields (McNeal, 2014).
Step 4:
This level involves identification of the significant number of individuals who are in the capable and willing to drive the implementation plan.
Step 5: Remove barriers
Elimination of the obstacles that will affect the implementation plan.
Step 6: Develop short-term achievements
The break-down of the performances will be divided to keep constant tracks on the progress of the implementation process, and this will also evaluation of the performance at every stage of the implementation process continues.
Step 7: Maintain acceleration
The hastening of the implementation plan will involve the changing the policies and cultures that failed to bring into line with the vision of the plan. Therefore, if the need arises, there will be hiring, and developing of the parties who are capable of implementing the vision (Kumar, P., & Lee, 2011).
Step 8: Institute Change
This final stage involves relating to the new behavior and the organizational success and creating the means that will facilitate the leadership growth and success (McNeal, 2014).
Identify potential barriers affecting the implementation of the change plan. Discuss steps for overcoming the potential obstacles.
The potential barriers to the implementation of the change plan on the cyber security in the healthcare system include:
Limited resources
Insufficient funds
Lack of cooperation by some health facilities
Limited time
Step 1: Creating a sense of urgency
Communicate to the stakeholders and other interested individuals on the progress of the implementation plan, together with the barriers that threaten fully implementation of the plan (Vockley, 2012).
Step 2: Converging the interested parties
Assembling the stakeholders and identify with them different challenges that they have faced during the implementation of the plan.
Step 3: Developing the strategic innovation and vision
After identifying the barriers facing the implementation plan, then the strategy of handling the barrier has to be discussed.
For instance, the insufficient funding mitigation involves seeking of grants and loans from willing lending groups. Lack of cooperation by some health facilities can be handled by seeking government assistance in applying sanctions to those who are guilty of such behavior (Papoutsi, et al.,2015).
Step 4:
Identification of potential institutions and individuals who will promote the mitigation against the mentioned barriers.
Step 6: Creating short-term achievements
The short-term success will assist in knowing whether the obstacles are well managed, and if not, it will be easy to develop further actions.
Step 7: Maintaining acceleration
If the methods to eliminate the barriers have worked effectively, then the methods ought to be further enhanced.
Step 8: Institute change
Compare the organizational change between the past and the current one.
References
Better Care Victoria. (2017). Www2.health.vic.gov.au. Retrieved 11 January 2017, from https://www2.health.vic.gov.au/hospitals-and-health-services/quality-safety-service/better-care-victoriaBurns, A. J., & Johnson, M. E. (2015). Securing health information. IT Professional, 17(1), 23-29.
Cabrera, E. (2016). Health Care: Cyberattacks and How to Fight Back. Choice Reviews Online, 18 4, (4), 27-30. http://dx.doi.org/10.5860/choice.44-3390He, Y., & Johnson, C. W. (2012, October). Generic security cases for information system security in healthcare systems. In System Safety, incorporating the Cyber Security Conference 2012, 7th IET International Conference on (pp. 1-6). IET.
Henriksen, E., Burkow, T. M., Johnsen, E., & Vognild, L. K. (2013). Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education. BMC medical informatics and decision making, 13(1), 1.
International, K. & International, K. (2017). The 8-Step Process for Leading Change - Kotter International. Kotter International. Retrieved 9 January 2017, from http://www.kotterinternational.com/the-8-step-process-for-leading-change/Kumar, P., & Lee, H. J. (2011). Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, 12(1), 55-91.
McNeal, M. (2014). Hacking health care. Marketing health services, 34(3), 16-21.
Papoutsi, C., Reed, J. E., Marston, C., Lewis, R., Majeed, A., & Bell, D. (2015). Patient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: results from a mixed methods study. BMC medical informatics and decision making, 15(1), 1.
Vockley, M. (2012). Safe and secure? healthcare in the cyberworld. Biomedical Instrumentation & Technology, 46(3), 164-173.
Cite this page
Implementation of the Cyber Security Plan in the Electronic Health Systems. (2021, May 27). Retrieved from https://midtermguru.com/essays/implementation-of-the-cyber-security-plan-in-the-electronic-health-systems
If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:
- Haraways Cyborg Theory and Digital Communication Technologies
- Digitalization in Business - Essay Example
- Electronic Fund Transfers - Paper Example
- Research Paper on Key Issues in Cyber Policy
- The Awareness of Password in Organization for Security Purpose: Research Proposal
- Information Security Domains: Access Control and Administration - Essay Sample
- The Innovators: A Standard History of the Digital Revolution - Essay Sample