ETHICS, CYBER ETHICS, AND SECURITY

In recent years, hackers have targeted medical records, from hospitals and other healthcare

institutions, across the country. These records contain personal information, contact information,

and most importantly, for the hackers, information that may prove useful in stealing an identity.

Thus, healthcare organizations have made it a priority to protect patient records and privacy.

However, with the influx of technological advancements and hacker determination, there is no

perfect way to ensure that all records are secure and safe.

In addition to medical records, privacy concerns are relevant with any patient chart in any

setting. For example, a chart left open on a computer monitor in a patient room, employee

passwords and log-in information, and new employee access and screening all represent other

ways in which ethics and security merge in healthcare and nursing practice.

For this Discussion, you will consider the importance of ethics as it relates to security. You will

also reflect on how these topics might affect clinical practice and the connection to nursing

informatics.

TO PREPARE

 Review the Learning Resources associated with the topics of ethics, cyber ethics, and

security.

 Consider the role of each of these topics for clinical practice, as well as the

importance of understanding each of these topics.

 Reflect on how COVID-19 might have impacted each of these topics, which

reviewing the article, “The COVID-19 Pandemic Highlights Shortcomings in US

Health Care Informatics Infrastructure: A Call to Action.”

BY DAY 3 OF WEEK 9

Post a cohesive response that addresses the following for each of the topics of ethics, cyber

ethics, and security:

 Explain how each of the topics might impact clinical practice. Describe why it is

important to understand how ethics applies to clinical practice. Be specific and

provide examples.

 How might ethics apply to informatics, e-health records, importance of

passwords and security?

 After reviewing the article, “The COVID-19 Pandemic Highlights Shortcomings

in US Health Care Informatics Infrastructure: A Call to Action,” describe

potential impacts of the pandemic on ethics and security as it applies to clinical

practice. Be specific and provide examples.

 

Resources

 Sipes, C. (2020). Project management for the advanced practice nurse (2nd ed.).

Springer Publishing.

o Chapter 6, “Monitoring and Controlling: Project

Management—Phase 4” (pp.

147–168)

o Chapter 7, “Closing the Project: Project Management—Phase 5” (pp.

169–186)

 

 American Nurses Association. (2015). Nursing informaticsLinks to an external

site.: Scope and standards of practice (2nd ed.).

o “Ethics in Nursing Informatics” (pp. 49–52)

o “Standard 6: “Evaluation” (p. 78)

o “Standard 7: “Ethics” (pp. 79–80)

o “Standard 11: “Communication” (p. 86)

o “Standard 12: “Leadership” (pp. 87–88)

 

 Beckmann, M., Dittmer, K., Jaschke, J., Karbach, U., Köberlein-Neu, J., Nocon,

M., Rusniok, C., Wurster, F., & Pfaff, H. (2021). Electronic patient record and its

effects on social aspects of interprofessional collaboration and clinical

workflows in hospitals (eCoCo): A mixed methods study protocolLinks to an

external site.. BMC Health Services Research, 21(377).

https://doi.org/10.1186/s12913-021-06377-5

 Martin, K., Shilton, K., & Smith, J. (2019). Business and the ethical implications

of technology: Introduction to the symposiumLinks to an external site.. Journal

of Business Ethics,160, 307–317. https://doi.org/10.1007/s10551-019-04213-9

 Nahm, E.-S., Poe, S., Lacey, D., Lardner, M., Van De Castle, B., & Powell, K.

(2019). Cybersecurity essentials for nursing informaticistsLinks to an external

site.. Computers, Informatics, Nursing, 37(8), 389–393.

doi:10.1097/CIN.0000000000000570

 Odeh, A., Keshta, I., & Abdeifattah, E. (2021). Machine learning techniques for

detection of website phishing: A review for promises and challenges. IEEE 11th

Annual Computing and Communication Workshop and ConferenceLinks to an

external site. (CCWC), 813–818. doi:10.1109/CCWC51732.2021.9375997

 O'Reilly-Shah, V. N., Gentry, K. R., Van Cleve, W., Kendale, S. M., Jabaley, C. S., &

Long, D. R. (2020). The COVID-19 pandemic highlights shortcomings in US

health care informatics infrastructure: A call to actionLinks to an external

site.. Anesthesia and Analgesia, 131(2), 340–344.

https://doi.org/10.1213/ANE.0000000000004945

 Susser, D., Roessler, B., & Nissenbaum, H. (2019). Online manipulation: Hidden

influences in a digital world. Georgetown Law Technology ReviewLinks to an

external site., 4(1), 1–45. https://ssrn.com/abstract=3306006

 

Required Media

 Coursera. (n.d.). Informatics and ethicsLinks to an external site. [Video].

 

https://www.coursera.org/lecture/health-informatics-

professional/informatics-and-ethics-Pi1wm

 Data Science Show. (2018, September 9). Ethical applications in health

informaticsLinks to an external site. [Video]. YouTube.

 Simplilearn. (2020, June 10). Cyber security in 7 minutes | What is cyber security:

How it works? | Cyber security | SimplilearnLinks to an external site.

[Video]. YouTube. https://www.youtube.com/watch?v=inWWhr5tnEA

 

Other Resources

 Sulmasy, L. S., López, A. M., Horwitch, C. A., & American College of Physicians,

Professionalism and Human Rights Committee. (2017). Ethical implications of

the electronic health record: In the service of the patient. Journal of General

Internal MedicineLinks to an external site., 32. 935–939.

https://doi.org/10.1007/s11606-017-4030-1


Leave a Reply

Your email address will not be published. Required fields are marked *