Question Details

[solution] »

How would you create a voice over PowerPoint presentation using the attached information and summ

Brief item decscription

Answer Download

Item details:

How would you create a voice over PowerPoint presentation using the attached information and summarize the main points

Running head: DATA INSECURITY AND HEALTH INSURANCE COMPANIES Data Insecurity and Health Insurance Companies


Tashia S. Davis


North Carolina A&T State University: BUED 444.05A? Data Communications and Networks


November 9, 2016 Submitted to:


Dr. Ewuuk Lomo-David


College of Business and Economics


North Carolina A&T State University


Greensboro, NC 27411 2 Data Insecurity and Health Insurance Companies Table of Contents


Executive summary 3 Data Insecurity and Health Insurance Companies


Data insecurity 4 4 Sources of the data insecurity? 5 Adverse effects of Data Insecurity to Health Insurance Companies 6


Client's intimidation


Loss of trust 6


6 Destruction of client information


Embarrassment 6-7 7 Loss 7


Legal costs??????????????????????????????????????????????.7


Boost to the Competitors' Market Advantage


Conclusion 8 Reference 9 8 3 Data Insecurity and Health Insurance Companies


Executive summary


Of late federal policies support the action of introduction of adoption of health information


exchange in an attempt to improve healthcare through consolidation of the scattered individual


health information and health insurance companies are a beneficially to this move this is


according to the book.[Ves10]However, barriers in support of his advanced technological approach have existed for the last decades. The rapid development in incorporation and availability of


digital technology in all fields and aspect of our daily life has brought with it extraordinary


opportunities as well as unique challenges. The digital healthcare system has raised the alarm to


the researchers on the security and privacy of the individual information.


The solution to these challenges seems complicated and straightforward at the same time. But


cyber situational awareness needs to become a fundamental aspect of a step to combating the


organized adversaries on the internet and ensuring proactive steps are taken to avoid


confidential health information from insurance companies landing into the illegal arms.


There is, therefore, an advanced responsibility directed at the health researchers responsible for


controlling patients' data; they need new cyber literacy to understand and handle the insecurity


threat brought by the digital health system this is as provided by [Ves10].This project aims at


describing the issues of data insecurity brought by digital healthcare systems to the insurance


companies and how a possible leak of the information will affect the companies. 4 Data Insecurity and Health Insurance Companies


Data Insecurity and Health Insurance Companies


It's good to note that individual health data has not been fully utilized to its fullness due to


fragmentation in different pharmacies, hospitals, physician practices and laboratories. The


changes in insurance covers, increase in specialty care and over-reliance on multiple providers


are among the things though good but leads to information fragmentation, according to [Eri12].


However, there is a need for change to the chaotic situation since we are on a constant move to


different locations, there is a need for our vital medical information being available with ease


from any given destination. The rise of many chronic diseases conditions like diabetes has


brought the need to have a reliable data management.


Data security is defined as the extent to which individual information access can be restricted to


only the authorized person, these are findings by [Eri12]. Unauthorized share and transfer of


crucial health data can lead to discrimination and unfair attacks on the affected individuals. This


is because some organizations like the governments and employers could have access to


medical information but finally ends up leaking it to the wrong hands or even ends up misusing


it. Privacy will also be bleached by the unavoidable systemic identifications that may take effect


through the new electronic data systems, and insurance companies will not be spared either.


Data insecurity


Data uncertainty is the illegal, unauthorized access to computer websites and database. Data


change can occur because of lack of proper means of ensuring digital privacy measures are put


into place. 5 Data Insecurity and Health Insurance Companies


Sources of the data insecurity


Mobile devices; the mobile devices used by insurance management persons can fall into the


wrong hands. This is because the mobile devices are not always in the hands of one


administrator. They are in the hands of the different individual thus a risk of being lost or stolen.


If that happens the insurance clients, persons are put at a risk of their data disclosure. Their


medical information may fall into the wrong hands and will be prone to misuse. Most of the


smartphones are not adequately protected and all thus a source of leakage of valuable medical




Application installations; sometimes the insurance companies have applications that they advise


their customers to have. However, the individuals may not know what the application is all


about. The individual not knowing what the application contains may end up sharing it with


other people thus leaking his or her medical information to a third party. Some other


applications that are included in the smartphones may also share the information without the


knowledge of the individual. Such information may end up being misused.


System hacking insurance company?s information sometimes may fall under siege from hackers.


The online criminals may depend on some company workers to have the initial logins then


destroy or expose the clients' data, this information was brought to right by (Harth, Hose, &


Schenkel, n.d.). They may also use the health information to intimidate and harm the customers


of the health insurance company. 6 Data Insecurity and Health Insurance Companies


Adverse effects of Data Insecurity to Health Insurance Companies.


Client's intimidation


Sometimes the individuals' health information may fall into the hands of employers who will


always use it to exploit the poor health condition of their employee. In this case, the employee


may feel uncomfortable working with a person who knows his or her health problems.


Loss of trust


When health information belonging to clients falls in the illegal arms, and it gets misused the


individuals may lose confidence in the insurance company. The people feel betrayed, and their


faith in the business is eroded forever. Such people may even withdraw from the firm


subscriptions and demand for compensation. Insurance companies are always faced with the


challenge of individuals claiming compensation when their private data falls at the wrong


persons. When that happens, they have no otherwise but to pay for the damages caused.


Destruction of client information


When the insurance companies get, their systems hacked, the information falls at a risk of being


distorted and probably destroyed. This may happen when the hackers' demands are not met as


they require thus destroying all the information according to (Harth, Hose, & Schenkel, n.d.).


Some health insurance companies do not have their systems fully protected thus making them


vulnerable to aggression from criminals. Some criminals may have even the skills to open the


protected information thus every company may become a potential target. 7 Data Insecurity and Health Insurance Companies




Sometimes when the client's data leaks, the company may be forced to fire the employee who


leaked the information. This results in distress and sometimes prosecution.




An insurance company may end up making a loss when its secrets get leaked to competitors.


The other company may learn about the new product that wants to be manufactured and


counter the opponent. This may not only lead to loss of market but also the capital that was


used to make and research on the product.


Legal costs


A company will get sued for leaking information belonging to its clients to the wrong individuals.


According to (Harth, Hose, & Schenkel, n.d.) this will cost the company heavily when the laws


concerning the breach of contract and agreements are put into place.


Damage to a company reputation


A company that leaks its clients' health information will lose trust among many potential


customers. Customers will not wish to be associated with an organization that hardly protects


their information from manipulation and illegal access. This may cost the company heavily


financially. 8 Data Insecurity and Health Insurance Companies


Boost to the Competitors' Market Advantage


When an insurance company mp3 or videos containing important market strategic plans and


new ideas fall into the hands of a competitor it will boost the opponent and weaken the


company whose information is leaked this is per (Baldoni, 2006) findings.




Data leakage is real; it may start with the inside or external factors. Sometimes the companies


waste a lot of time building a shield against possible outside hack and forget that the threat may


sometimes originate from within the enterprise. According to (Baldoni, 2006) efforts must be


put to ensure data is secure from external or internal leakages the companies should look for


both straightforward and complex solutions to the threat of data leakages. Employees must be


sensitized about the dangers of sharing client's information since the results are devastating


cyber- situational awareness should be encouraged to help combat the organized internet


challenges this is because future privacy threats may be more than imagined. 9 Data Insecurity and Health Insurance Companies




Baldoni, R. (2006). Global data management. Amsterdam: IOS Press.


Gilmer, E. (2012). Privacy and security of patient data in the cloud. IBM Developer


Works: Harth, A., Hose, K., & Schenkel, R. (Eds.) (2014). Linked Data Management. C R C Press LLC


Vest, J. R., & Gamm, L. D. (2010). Health information exchange: persistent challenges and new


strategies. Journal of the American Medical Informatics Association: JAMIA, 17(3), 288?294.


Notice: Undefined index: payment_status in /home/aceyourh/ on line 248

About this question:

This question was answered on: Oct 14, 2020

PRICE: $20 (18.37 KB)

Buy this answer for only: $20

This attachment is locked

We have a ready expert answer for this paper which you can use for in-depth understanding, research editing or paraphrasing. You can buy it or order for a fresh, original and plagiarism-free copy (Deadline assured. Flexible pricing. TurnItIn Report provided)

Pay using PayPal (No PayPal account Required) or your credit card. All your purchases are securely protected by PayPal.

Notice: Undefined variable: ip_country in /home/aceyourh/ on line 456

Need a similar solution fast, written anew from scratch? Place your own custom order

We have top-notch tutors who can help you with your essay at a reasonable cost and then you can simply use that essay as a template to build your own arguments. This we believe is a better way of understanding a problem and makes use of the efficiency of time of the student. New solution orders are original solutions and precise to your writing instruction requirements. Place a New Order using the button below.

Order Now