Question Details

[solution] »

How would you create a voice over PowerPoint presentation using the attached information and summ


Brief item decscription

Answer Download


Item details:

How would you create a voice over PowerPoint presentation using the attached information and summarize the main points


Running head: DATA INSECURITY AND HEALTH INSURANCE COMPANIES Data Insecurity and Health Insurance Companies

 

Tashia S. Davis

 

North Carolina A&T State University: BUED 444.05A? Data Communications and Networks

 

November 9, 2016 Submitted to:

 

Dr. Ewuuk Lomo-David

 

College of Business and Economics

 

North Carolina A&T State University

 

Greensboro, NC 27411 2 Data Insecurity and Health Insurance Companies Table of Contents

 

Executive summary 3 Data Insecurity and Health Insurance Companies

 

Data insecurity 4 4 Sources of the data insecurity? 5 Adverse effects of Data Insecurity to Health Insurance Companies 6

 

Client's intimidation

 

Loss of trust 6

 

6 Destruction of client information

 

Embarrassment 6-7 7 Loss 7

 

Legal costs??????????????????????????????????????????????.7

 

Boost to the Competitors' Market Advantage

 

Conclusion 8 Reference 9 8 3 Data Insecurity and Health Insurance Companies

 

Executive summary

 

Of late federal policies support the action of introduction of adoption of health information

 

exchange in an attempt to improve healthcare through consolidation of the scattered individual

 

health information and health insurance companies are a beneficially to this move this is

 

according to the book.[Ves10]However, barriers in support of his advanced technological approach have existed for the last decades. The rapid development in incorporation and availability of

 

digital technology in all fields and aspect of our daily life has brought with it extraordinary

 

opportunities as well as unique challenges. The digital healthcare system has raised the alarm to

 

the researchers on the security and privacy of the individual information.

 

The solution to these challenges seems complicated and straightforward at the same time. But

 

cyber situational awareness needs to become a fundamental aspect of a step to combating the

 

organized adversaries on the internet and ensuring proactive steps are taken to avoid

 

confidential health information from insurance companies landing into the illegal arms.

 

There is, therefore, an advanced responsibility directed at the health researchers responsible for

 

controlling patients' data; they need new cyber literacy to understand and handle the insecurity

 

threat brought by the digital health system this is as provided by [Ves10].This project aims at

 

describing the issues of data insecurity brought by digital healthcare systems to the insurance

 

companies and how a possible leak of the information will affect the companies. 4 Data Insecurity and Health Insurance Companies

 

Data Insecurity and Health Insurance Companies

 

It's good to note that individual health data has not been fully utilized to its fullness due to

 

fragmentation in different pharmacies, hospitals, physician practices and laboratories. The

 

changes in insurance covers, increase in specialty care and over-reliance on multiple providers

 

are among the things though good but leads to information fragmentation, according to [Eri12].

 

However, there is a need for change to the chaotic situation since we are on a constant move to

 

different locations, there is a need for our vital medical information being available with ease

 

from any given destination. The rise of many chronic diseases conditions like diabetes has

 

brought the need to have a reliable data management.

 

Data security is defined as the extent to which individual information access can be restricted to

 

only the authorized person, these are findings by [Eri12]. Unauthorized share and transfer of

 

crucial health data can lead to discrimination and unfair attacks on the affected individuals. This

 

is because some organizations like the governments and employers could have access to

 

medical information but finally ends up leaking it to the wrong hands or even ends up misusing

 

it. Privacy will also be bleached by the unavoidable systemic identifications that may take effect

 

through the new electronic data systems, and insurance companies will not be spared either.

 

Data insecurity

 

Data uncertainty is the illegal, unauthorized access to computer websites and database. Data

 

change can occur because of lack of proper means of ensuring digital privacy measures are put

 

into place. 5 Data Insecurity and Health Insurance Companies

 

Sources of the data insecurity

 

Mobile devices; the mobile devices used by insurance management persons can fall into the

 

wrong hands. This is because the mobile devices are not always in the hands of one

 

administrator. They are in the hands of the different individual thus a risk of being lost or stolen.

 

If that happens the insurance clients, persons are put at a risk of their data disclosure. Their

 

medical information may fall into the wrong hands and will be prone to misuse. Most of the

 

smartphones are not adequately protected and all thus a source of leakage of valuable medical

 

information.

 

Application installations; sometimes the insurance companies have applications that they advise

 

their customers to have. However, the individuals may not know what the application is all

 

about. The individual not knowing what the application contains may end up sharing it with

 

other people thus leaking his or her medical information to a third party. Some other

 

applications that are included in the smartphones may also share the information without the

 

knowledge of the individual. Such information may end up being misused.

 

System hacking insurance company?s information sometimes may fall under siege from hackers.

 

The online criminals may depend on some company workers to have the initial logins then

 

destroy or expose the clients' data, this information was brought to right by (Harth, Hose, &

 

Schenkel, n.d.). They may also use the health information to intimidate and harm the customers

 

of the health insurance company. 6 Data Insecurity and Health Insurance Companies

 

Adverse effects of Data Insecurity to Health Insurance Companies.

 

Client's intimidation

 

Sometimes the individuals' health information may fall into the hands of employers who will

 

always use it to exploit the poor health condition of their employee. In this case, the employee

 

may feel uncomfortable working with a person who knows his or her health problems.

 

Loss of trust

 

When health information belonging to clients falls in the illegal arms, and it gets misused the

 

individuals may lose confidence in the insurance company. The people feel betrayed, and their

 

faith in the business is eroded forever. Such people may even withdraw from the firm

 

subscriptions and demand for compensation. Insurance companies are always faced with the

 

challenge of individuals claiming compensation when their private data falls at the wrong

 

persons. When that happens, they have no otherwise but to pay for the damages caused.

 

Destruction of client information

 

When the insurance companies get, their systems hacked, the information falls at a risk of being

 

distorted and probably destroyed. This may happen when the hackers' demands are not met as

 

they require thus destroying all the information according to (Harth, Hose, & Schenkel, n.d.).

 

Some health insurance companies do not have their systems fully protected thus making them

 

vulnerable to aggression from criminals. Some criminals may have even the skills to open the

 

protected information thus every company may become a potential target. 7 Data Insecurity and Health Insurance Companies

 

Embarrassment

 

Sometimes when the client's data leaks, the company may be forced to fire the employee who

 

leaked the information. This results in distress and sometimes prosecution.

 

Loss

 

An insurance company may end up making a loss when its secrets get leaked to competitors.

 

The other company may learn about the new product that wants to be manufactured and

 

counter the opponent. This may not only lead to loss of market but also the capital that was

 

used to make and research on the product.

 

Legal costs

 

A company will get sued for leaking information belonging to its clients to the wrong individuals.

 

According to (Harth, Hose, & Schenkel, n.d.) this will cost the company heavily when the laws

 

concerning the breach of contract and agreements are put into place.

 

Damage to a company reputation

 

A company that leaks its clients' health information will lose trust among many potential

 

customers. Customers will not wish to be associated with an organization that hardly protects

 

their information from manipulation and illegal access. This may cost the company heavily

 

financially. 8 Data Insecurity and Health Insurance Companies

 

Boost to the Competitors' Market Advantage

 

When an insurance company mp3 or videos containing important market strategic plans and

 

new ideas fall into the hands of a competitor it will boost the opponent and weaken the

 

company whose information is leaked this is per (Baldoni, 2006) findings.

 

Conclusion

 

Data leakage is real; it may start with the inside or external factors. Sometimes the companies

 

waste a lot of time building a shield against possible outside hack and forget that the threat may

 

sometimes originate from within the enterprise. According to (Baldoni, 2006) efforts must be

 

put to ensure data is secure from external or internal leakages the companies should look for

 

both straightforward and complex solutions to the threat of data leakages. Employees must be

 

sensitized about the dangers of sharing client's information since the results are devastating

 

cyber- situational awareness should be encouraged to help combat the organized internet

 

challenges this is because future privacy threats may be more than imagined. 9 Data Insecurity and Health Insurance Companies

 

References

 

Baldoni, R. (2006). Global data management. Amsterdam: IOS Press.

 

Gilmer, E. (2012). Privacy and security of patient data in the cloud. IBM Developer

 

Works: http://www.ibm.com/developerworks/aboutdw/ Harth, A., Hose, K., & Schenkel, R. (Eds.) (2014). Linked Data Management. C R C Press LLC

 

Vest, J. R., & Gamm, L. D. (2010). Health information exchange: persistent challenges and new

 

strategies. Journal of the American Medical Informatics Association: JAMIA, 17(3), 288?294.

 

http://doi.org/10.1136/jamia.2010.003673

 


Notice: Undefined index: payment_status in /home/aceyourh/studycourse.fun/wp-content/themes/premier/page-templates/paper-detail.php on line 248






About this question:
STATUS
Answered
QUALITY
Approved
ANSWER RATING

This question was answered on: Oct 14, 2020

PRICE: $20

Solution~000176066.zip (18.37 KB)

Buy this answer for only: $20

This attachment is locked

We have a ready expert answer for this paper which you can use for in-depth understanding, research editing or paraphrasing. You can buy it or order for a fresh, original and plagiarism-free copy (Deadline assured. Flexible pricing. TurnItIn Report provided)

Pay using PayPal (No PayPal account Required) or your credit card. All your purchases are securely protected by PayPal.
SiteLock

Notice: Undefined variable: ip_country in /home/aceyourh/studycourse.fun/wp-content/themes/premier/page-templates/paper-detail.php on line 456

Need a similar solution fast, written anew from scratch? Place your own custom order

We have top-notch tutors who can help you with your essay at a reasonable cost and then you can simply use that essay as a template to build your own arguments. This we believe is a better way of understanding a problem and makes use of the efficiency of time of the student. New solution orders are original solutions and precise to your writing instruction requirements. Place a New Order using the button below.

Order Now