How would you create a voice over PowerPoint presentation using the attached information and summ
How would you create a voice over PowerPoint presentation using the attached information and summarize the main points
Running head: DATA INSECURITY AND HEALTH INSURANCE COMPANIES Data Insecurity and Health Insurance Companies
Tashia S. Davis
North Carolina A&T State University: BUED 444.05A? Data Communications and Networks
November 9, 2016 Submitted to:
Dr. Ewuuk Lomo-David
College of Business and Economics
North Carolina A&T State University
Greensboro, NC 27411 2 Data Insecurity and Health Insurance Companies Table of Contents
Executive summary 3 Data Insecurity and Health Insurance Companies
Data insecurity 4 4 Sources of the data insecurity? 5 Adverse effects of Data Insecurity to Health Insurance Companies 6
Loss of trust 6
6 Destruction of client information
Embarrassment 6-7 7 Loss 7
Boost to the Competitors' Market Advantage
Conclusion 8 Reference 9 8 3 Data Insecurity and Health Insurance Companies
Of late federal policies support the action of introduction of adoption of health information
exchange in an attempt to improve healthcare through consolidation of the scattered individual
health information and health insurance companies are a beneficially to this move this is
according to the book.[Ves10]However, barriers in support of his advanced technological approach have existed for the last decades. The rapid development in incorporation and availability of
digital technology in all fields and aspect of our daily life has brought with it extraordinary
opportunities as well as unique challenges. The digital healthcare system has raised the alarm to
the researchers on the security and privacy of the individual information.
The solution to these challenges seems complicated and straightforward at the same time. But
cyber situational awareness needs to become a fundamental aspect of a step to combating the
organized adversaries on the internet and ensuring proactive steps are taken to avoid
confidential health information from insurance companies landing into the illegal arms.
There is, therefore, an advanced responsibility directed at the health researchers responsible for
controlling patients' data; they need new cyber literacy to understand and handle the insecurity
threat brought by the digital health system this is as provided by [Ves10].This project aims at
describing the issues of data insecurity brought by digital healthcare systems to the insurance
companies and how a possible leak of the information will affect the companies. 4 Data Insecurity and Health Insurance Companies
Data Insecurity and Health Insurance Companies
It's good to note that individual health data has not been fully utilized to its fullness due to
fragmentation in different pharmacies, hospitals, physician practices and laboratories. The
changes in insurance covers, increase in specialty care and over-reliance on multiple providers
are among the things though good but leads to information fragmentation, according to [Eri12].
However, there is a need for change to the chaotic situation since we are on a constant move to
different locations, there is a need for our vital medical information being available with ease
from any given destination. The rise of many chronic diseases conditions like diabetes has
brought the need to have a reliable data management.
Data security is defined as the extent to which individual information access can be restricted to
only the authorized person, these are findings by [Eri12]. Unauthorized share and transfer of
crucial health data can lead to discrimination and unfair attacks on the affected individuals. This
is because some organizations like the governments and employers could have access to
medical information but finally ends up leaking it to the wrong hands or even ends up misusing
it. Privacy will also be bleached by the unavoidable systemic identifications that may take effect
through the new electronic data systems, and insurance companies will not be spared either.
Data uncertainty is the illegal, unauthorized access to computer websites and database. Data
change can occur because of lack of proper means of ensuring digital privacy measures are put
into place. 5 Data Insecurity and Health Insurance Companies
Sources of the data insecurity
Mobile devices; the mobile devices used by insurance management persons can fall into the
wrong hands. This is because the mobile devices are not always in the hands of one
administrator. They are in the hands of the different individual thus a risk of being lost or stolen.
If that happens the insurance clients, persons are put at a risk of their data disclosure. Their
medical information may fall into the wrong hands and will be prone to misuse. Most of the
smartphones are not adequately protected and all thus a source of leakage of valuable medical
Application installations; sometimes the insurance companies have applications that they advise
their customers to have. However, the individuals may not know what the application is all
about. The individual not knowing what the application contains may end up sharing it with
other people thus leaking his or her medical information to a third party. Some other
applications that are included in the smartphones may also share the information without the
knowledge of the individual. Such information may end up being misused.
System hacking insurance company?s information sometimes may fall under siege from hackers.
The online criminals may depend on some company workers to have the initial logins then
destroy or expose the clients' data, this information was brought to right by (Harth, Hose, &
Schenkel, n.d.). They may also use the health information to intimidate and harm the customers
of the health insurance company. 6 Data Insecurity and Health Insurance Companies
Adverse effects of Data Insecurity to Health Insurance Companies.
Sometimes the individuals' health information may fall into the hands of employers who will
always use it to exploit the poor health condition of their employee. In this case, the employee
may feel uncomfortable working with a person who knows his or her health problems.
Loss of trust
When health information belonging to clients falls in the illegal arms, and it gets misused the
individuals may lose confidence in the insurance company. The people feel betrayed, and their
faith in the business is eroded forever. Such people may even withdraw from the firm
subscriptions and demand for compensation. Insurance companies are always faced with the
challenge of individuals claiming compensation when their private data falls at the wrong
persons. When that happens, they have no otherwise but to pay for the damages caused.
Destruction of client information
When the insurance companies get, their systems hacked, the information falls at a risk of being
distorted and probably destroyed. This may happen when the hackers' demands are not met as
they require thus destroying all the information according to (Harth, Hose, & Schenkel, n.d.).
Some health insurance companies do not have their systems fully protected thus making them
vulnerable to aggression from criminals. Some criminals may have even the skills to open the
protected information thus every company may become a potential target. 7 Data Insecurity and Health Insurance Companies
Sometimes when the client's data leaks, the company may be forced to fire the employee who
leaked the information. This results in distress and sometimes prosecution.
An insurance company may end up making a loss when its secrets get leaked to competitors.
The other company may learn about the new product that wants to be manufactured and
counter the opponent. This may not only lead to loss of market but also the capital that was
used to make and research on the product.
A company will get sued for leaking information belonging to its clients to the wrong individuals.
According to (Harth, Hose, & Schenkel, n.d.) this will cost the company heavily when the laws
concerning the breach of contract and agreements are put into place.
Damage to a company reputation
A company that leaks its clients' health information will lose trust among many potential
customers. Customers will not wish to be associated with an organization that hardly protects
their information from manipulation and illegal access. This may cost the company heavily
financially. 8 Data Insecurity and Health Insurance Companies
Boost to the Competitors' Market Advantage
When an insurance company mp3 or videos containing important market strategic plans and
new ideas fall into the hands of a competitor it will boost the opponent and weaken the
company whose information is leaked this is per (Baldoni, 2006) findings.
Data leakage is real; it may start with the inside or external factors. Sometimes the companies
waste a lot of time building a shield against possible outside hack and forget that the threat may
sometimes originate from within the enterprise. According to (Baldoni, 2006) efforts must be
put to ensure data is secure from external or internal leakages the companies should look for
both straightforward and complex solutions to the threat of data leakages. Employees must be
sensitized about the dangers of sharing client's information since the results are devastating
cyber- situational awareness should be encouraged to help combat the organized internet
challenges this is because future privacy threats may be more than imagined. 9 Data Insecurity and Health Insurance Companies
Baldoni, R. (2006). Global data management. Amsterdam: IOS Press.
Gilmer, E. (2012). Privacy and security of patient data in the cloud. IBM Developer
Works: http://www.ibm.com/developerworks/aboutdw/ Harth, A., Hose, K., & Schenkel, R. (Eds.) (2014). Linked Data Management. C R C Press LLC
Vest, J. R., & Gamm, L. D. (2010). Health information exchange: persistent challenges and new
strategies. Journal of the American Medical Informatics Association: JAMIA, 17(3), 288?294.
Notice: Undefined index: payment_status in /home/aceyourh/studycourse.fun/wp-content/themes/premier/page-templates/paper-detail.php on line 248
This question was answered on: Oct 14, 2020
This attachment is locked
We have a ready expert answer for this paper which you can use for in-depth understanding, research editing or paraphrasing. You can buy it or order for a fresh, original and plagiarism-free copy (Deadline assured. Flexible pricing. TurnItIn Report provided)
Notice: Undefined variable: ip_country in /home/aceyourh/studycourse.fun/wp-content/themes/premier/page-templates/paper-detail.php on line 456
Need a similar solution fast, written anew from scratch? Place your own custom order
We have top-notch tutors who can help you with your essay at a reasonable cost and then you can simply use that essay as a template to build your own arguments. This we believe is a better way of understanding a problem and makes use of the efficiency of time of the student. New solution orders are original solutions and precise to your writing instruction requirements. Place a New Order using the button below.