A review of the technology trend paper, on the topic of Health Information Security, reveals that the author has an in-depth understanding of the impacts that technology may have on the health care industry. The paper is insightful, as it provides readers with information on all the key aspects associated with the area of study thereby promoting overall validity and reliability of the paper. The author ensures that the paper is easy to follow through the usage of subheadings to cover all areas of study for the research paper. That acts as a guarantee that readers would have a basic platform allowing them to shift their attention when evaluating different sections of the paper. In addition, the paper is also logical and understandable, as the author provides readers with an in-depth analysis of the technology in question as part of enhanced understanding for individual readers.
While reviewing the examples presented by the author, it is evident that they aim to improve the readers understanding. The author uses the example of wireless insulin pumps, which could be tricked into delivering a lethal dose of insulin in the event that a patient would gain understanding on how to hack their pain medication infusions to increase the dosage (Middaugh, 2016). From that example, it is evident that the author does not only focus on highlighting the positive aspects associated with implementation or usage of technology. The example also provides insight on what health facilities would expect as part of the utilization of technology. Instead, the author uses the example highlighted to ensure that readers understand the negative impacts that technology may have on matters associated with the delivery of positive health outcomes to patients. The examples also help towards creating value, as they help in maintaining that avenue for effectiveness in the information delivered.
When trying to determine the author’s effectiveness at tying the healthcare trend to current healthcare topics, it is important to evaluate the topic selected from a professional point of view. The topic is relevant to the current health care sector attributed to the increasing demand for technological advancements within this particular sector. However, the majority of the health facilities intending to move towards technological development do not understand the negative and positive impacts that such technologies may bring about. That creates the need for the author to undertake that review of the topic using health information security as a standpoint for the article. The author supports his arguments on matters associated with health care technology with relevant literature to guarantee that the points and arguments presented remain reliable based on the expectations of his audience.
One key aspect that I learned from this paper relates to the need to create secure servers and wireless networks that would help in creating encryptions towards protecting the privacy of patient information. To help in reducing instances of vulnerability, health information systems must employ restrictions with regard to the installation of foreign software. The limitations would reduce instances where the systems remain vulnerable to hackers and malware (Hall & McGraw, 2014). That is one example of what I was able to learn from the article in my study of the information published within the article. I believe that the author would be in a position to improve this paper by having to create a new section that would highlight specific limitations. It is important to highlight limits as it helps readers evaluate the basic information presented with the article as part of their analysis of validity and reliability based on the presentation abilities from the author.
References
Hall, J., & McGraw, D. (2014). For telehealth to succeed, privacy and security risks must be identified and addressed. Health Affairs, 33(2), 216-221.
Middaugh, D. (2016). Nursing Management. Do security flaws put your patients' health at risk? MEDSURG Nursing, 25(2), 131-132.