In this assignment you will examine IT systems applied to health information management (HIM), potential vulnerabilities of these systems, and protocols to mitigate the risk of data and security breaches that are due to these vulnerabilities. IT systems are used for health information and data management in many areas, including patient electronic medical records (EMR), hospital operations management, and health care policy decisions. The System Development Life Cycle (SDLC) is a project management framework used to assess IT systems and associated organizational needs to identify and implement improvements to the system. You will write a paper to examine how the SDLC framework can be used to assess an IT system applied to HIM and evaluate risk mitigation protocols that reduce system risk and improve patient quality of care.
Write a 5–6 page paper in which you:
Picked system
REFERENCES
https://www.healthit.gov/faq/what-electronic-health-record-ehr
https://digital.ahrq.gov/electronic-medical-record-systems
https://www.cms.gov/Medicare/E-Health/EHealthRecords
https://journals.lww.com/nursingcriticalcare/fulltext/2017/01000/benefits_of_using_an_electronic_health_record.3.aspx
https://webmedy.com/blog/why-ehr-is-important/
https://www.softwaretestinghelp.com/software-development-life-cycle-sdlc/
https://www.selecthub.com/medical-software/ehr/emr-ehr-software-features-requirements-checklist/
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6291988/#:~:text=EHRS%20must%20support%20data%2C%20information,an%20appropriate%20and%20usable%20form.
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5522514/
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5522514/#:~:text=The%20three%20pillars%20to%20securing,and%20technical%20safeguards%20%5B4%5D.
https://journalofethics.ama-assn.org/article/electronic-health-records-privacy-confidentiality-and-security/2012-09
Top 5 Cybersecurity Threats to Electronic Health Records and Electronic Medical Records
https://erbis.com/blog/top-5-cyber-threats-to-ehr-systems-and-how-to-deal-with-them/