The implementation plan will be evaluated by determining the extend of its effectiveness. The cyber security implementation plan in the healthcare system is meant to protect the patients confidential information. Therefore, by analyzing the occurrence of cyber-crimes we will be able to determine the effectiveness of the plan (Vockley, 2012).
Furthermore, the resources required for the evaluation of the implementation plan are such as: the FBI, National Cybersecurity and Communications Integration Center (NCCIC), Cyber Security and Technology Crime Bureau (CSTCB) who take the responsibility for conducting cyber-security investigation (Henriksen, et al., (2013).
Similarly, the firewalls and cyber-security software have the capability of storying data of the attempted threat and it will also indicate the prevented treats (Cabrera, 2016).
Discuss the evaluation process in relationship to the projected outcomes.
The implementation plan can be further be evaluated according to the project outcome. This will involve conducting of the survey, whereby the general public and the healthcare facilities will provide their feedback regarding the newly implemented security reforms. The survey will require the users to articulate their confidence towards the changes made and the adjustment that they feel are necessary needed to adopted (Papoutsi, et al., 2015).
Dissemination plan
With respect to the dissemination plan, this project plan can be used in the financial institution which are more vulnerable to the cyber-related threats. The threats target the financial information of the individuals which are used in money fraud. Where: The plan needs to be implemented on the devices in the financial institutions which are vulnerable to the hacking and they contain the more confidential information (Burns, & Johnson, 2015). How: the cyber-security implementation plan will prevent hacking of the banking information. This will protect information that might be used un fraud, the banking information will them be encrypted against unauthorized access. When: the plan will need to be implemented immediately since there are increased incidences of hacking (Kumar & Lee, 2011).
References
Better Care Victoria. (2017). Www2.health.vic.gov.au. Retrieved 11 January 2017, from https://www2.health.vic.gov.au/hospitals-and-health-services/quality-safety-service/better-care-victoria
Burns, A. J., & Johnson, M. E. (2015). Securing health information. IT Professional, 17(1), 23-29.
Cabrera, E. (2016). Health Care: Cyberattacks and How to Fight Back. Choice Reviews Online, 18 4, (4), 27-30. http://dx.doi.org/10.5860/choice.44-3390Henriksen, E., Burkow, T. M., Johnsen, E., & Vognild, L. K. (2013). Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education. BMC medical informatics and decision making, 13(1), 1.
Kumar, P., & Lee, H. J. (2011). Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, 12(1), 55-91.
McNeal, M. (2014). Hacking health care. Marketing health services, 34(3), 16-21.
Papoutsi, C., Reed, J. E., Marston, C., Lewis, R., Majeed, A., & Bell, D. (2015). Patient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: results from a mixed methods study. BMC medical informatics and decision making, 15(1), 1.
Vockley, M. (2012). Safe and secure? healthcare in the cyberworld. Biomedical Instrumentation & Technology, 46(3), 164-173.
Cite this page
The Cyber Security Implementation Plan in the Healthcare System. (2021, May 27). Retrieved from https://midtermguru.com/essays/the-cyber-security-implementation-plan-in-the-healthcare-system
If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:
- Assessment of WAN for Generic Manufacturing Company Paper Sample
- Implementation of Traditional Filing and Records Keeping System by Organization - Paper Example
- Pros and Cons of Stratified Sampling - Paper Example
- Paper Example on Information Technology (IT) and Security
- Software Requirements Specification - Essay Sample
- C vs JavaScript: Thread Control & Multi-Tasking - Research Paper
- SMS Phishing: Deceitful Attack on Your Mobile Devices - Research Paper