Interprofessional Organizational and Systems Leadership
Competing needs arise within any organization as employees seek to meet their targets, and leaders seek to meet company goals. As a leader, successful management of these goals requires establishing priorities and allocating resources accordingly.
Within a healthcare setting, the needs of the workforce, resources, and patients are often in conflict. Mandatory overtime, implementation of staffing ratios, use of unlicensed assisting personnel, and employer reductions of education benefits are examples of practices that might lead to conflicting needs in practice.
Leaders can contribute to both the problem and the solution through policies, action, and inaction. In this Assignment, you will further develop the white paper you began work on in Module 1 by addressing competing needs within your organization.
To Prepare:
Review the national healthcare issue/stressor (cybersecurity) you examined in your Assignment for Module 1, and review the analysis of the healthcare issue/stressor you selected (cybersecurity).
Identify and review two evidence-based scholarly resources that focus on proposed policies/practices to apply to your selected healthcare issue/stressor (cybersecurity).
Reflect on the feedback you received from your colleagues on your Homework help – Discussion post regarding competing needs.
The Assignment (4-5 pages):
Developing Organizational Policies and Practices
Add a section to the paper you submitted in Module 1. The new section should address the following:
Identify and describe at least two competing needs impacting your selected healthcare issue/stressor.
Describe a relevant policy or practice in your organization that may influence your selected healthcare issue/stressor (cybersecurity).
Critique the policy for ethical considerations, and explain the policy’s strengths and challenges in promoting ethics.
Recommend one or more policy or practice changes designed to balance the competing needs of resources, workers, and patients, while addressing any ethical shortcomings of the existing policies. Be specific and provide examples.
Cite evidence that informs the healthcare issue/stressor (cybersecurity) and/or the policies, and provide two scholarly resources in support of your policy or practice recommendations.

Attached is Assignment in module 1 on cybersecurity references need doi or http site not less than five years old.

Cybersecurity
Cybersecurity is the protection of computerized or internet-connected systems, including software and hardware and data. The security provided to prevent cyber-attacks. Healthcare facilities are required to provide cybersecurity to restrain a breach of data or unauthorized access of their Electronic Health Records (Perakslis & Stanley, 2016). Patients expect the assurance that unauthorized people do not access their medical profile. Statistics indicate that 4.5 billion data records were compromised in 2018. In the healthcare sector, common breaches of data occur on laptops, Electronic Health Records, computer systems, desktops, emails, and servers. The cyber attacks also occur when malicious people access computers or other systems that bear the information (Zhang, Qiu, Tsai, Hassan & Alamri, 2015). The condition can be solved in various ways, including installing updated spyware, antivirus systems on all computers. It is also important to keep back up of all files in case of a data breach. This paper discusses the cybersecurity menace and the impact on healthcare settings.
Impact on Organizations
Health organizations collect a vast amount of information on personal health record and contacts. Therefore, they remain a pivotal target to the cybercrime. The crisis affects health organizations since it lowers the trust of the patients (Jalali, Razak, Gordon, Perakslis & Madnick, 2019). Various health organizations have recorded poor performance after they were hacked. The reason is that patients expect that their personal information will not be disclosed.
Additionally, a hospital can attract lawsuits from patients whose data has been leaked. The lawsuit will damage the reputation of the organization and lead to the loss of funds in court cases. Healthcare organizations can also be attacked, leading to the loss of moral authority in the sector. Therefore, it will not attract the best talents in the market. Healthcare cyberattack can thus lead to multiple problems that will affect an organization negatively (Kruse, Frederick, Jacobson & Monticone, 2017). It is consequently vital to ensure the systems are secured from all attacks. If the data is lost, and people do not trust the organization, the organization may end up making losses. It might also take time before restoring the trust.
The healthcare facility that has online portals can record reduced levels of patients who book an appointment online. The reason is due to the fear that the information may be hacked and used by hackers to access personal information such as bank accounts (Coventry & Branley, 2018). When systems are cut, it means the healthcare professionals cannot easily share their notes or prescription information. It will thus disrupt operations since the personal data of the patient is unavailable. Statistics indicate that in the last five years, hacking has affected over 80 million people. In 2015 cyber crime led to the loss of 78.8 million health records (Coventry & Branley, 2018). The breach compromised the data and led to the loss of critical information, including names, dates of birth, home address, social security numbers, and emails. Local organizations are also prone to such a loss if they do not take the necessary precaution.
Article Summary
Jalali, Razak, Gordon, Perakslis, and Madnick (2019), carried out a study on the intersection between healthcare delivery and cybersecurity. The article was developed due to the rise of dependency on information technology by healthcare providers. The objective is to make computerized healthcare systems safe, reliable, and effective in delivering healthcare services. The task involves a search for articles on PubMed and Web of Science. The study found 472 articles dealing with cybersecurity. The report concluded that there is an overall increase in cybersecurity research. It also identified various gaps that should be fixed by future research studies.
Kruse, Frederick, Jacobson, and Monticone (2017) published an article on healthcare cybersecurity issues, including threats and trends. The report indicated that ransomware was a possible kind of attack and recommended various solutions from academic literature. The study focused on 31 articles and suggested that the healthcare sector was lagging in implementing reliable and safe computerized systems. The report recommends that it is time for the healthcare sector to invest in reliable and safe systems. The recommended solutions to invest in software to prevent cyber attacks, train personnel on how to avoid it, and use prevention strategies.
Cybersecurity in Other Organizations
Healthcare organizations have realized that they are under the cybercrime threat. They have taken various measures to prevent or address the cyberattacks. One of the measures is to identify the various forms of threats. Once the threats are identified, the company seals all the loopholes to avoid possible attacks (Coventry & Branley, 2018). Additionally, they update their spyware prevention systems. The reason for updating is to ensure the enemies will always find it hard to penetrate the security walls. The healthcare organizations have also trained their employees on the best ways to prevent the attacks. One of them is to ensure the computer network connection is always protected before browsing. The companies have also ensure they restrict physical access to the authorized employees (Zhang, Qiu, Tsai, Hassan & Alamri, 2015). The safety issues are thus addressed since they minimize the people who can access the passwords or try to hack into the systems. Companies have adopted a two-step authentication process to prevent people from interfering with the system. The various methods are used to ensure the systems are safe.
Organizations have made attempts to reduce their impact through various strategies. One of the strategies is implementing a strong sign-off policy. The employees have been encouraged to sign-off from their computers before going out or going home (Zhang, Qiu, Tsai, Hassan & Alamri, 2015). The sign-off ensure that people who had passwords or little information cannot access the sites. Additionally, they have protected their passwords by not indexing them online. The passwords are designed in a complex manner to prevent any hacking. Organizations have also reduced the impact by making copies of crucial information and putting it as a backup. Therefore, in case of any hacking, they are in a position to restore the websites or the systems immediately (Kruse, Frederick, Jacobson & Monticone, 2017). The instant restoration will prevent inefficiency or shock on the customers. Therefore, organizations are employing various strategies to ensure the organizations remain safe, and they also have strategies to overcome hacking in case it occurs.
Impact on the Organization
The strategies used by different companies are effective, and thus, they can have a positive impact on our organization. The reason is that the strategies have proved to be effective, and thus they can be adopted by any company with a vision of protecting its systems (Kruse, Frederick, Jacobson & Monticone, 2017). Besides the positive impact, the installation of the security systems may affect the company negatively since it will cost hundreds of dollars. The huge investment will affect the annual budget. Additionally, the healthcare facility will be required to employ more personnel who can be on guard to secure the systems and monitor their effectiveness (Coventry & Branley, 2018). However, the benefits, in the end, are more than the negative impact.

Conclusion
Additionally, all of the diverse stakeholders in the healthcare worth sequence need to be capitalized in safeguarding the prospect of associated healthcare. Meanwhile, this is an extensive effort within the healthcare environment, and manufacturing leaders should progress strategies and values to appraise whether products and plans meet cybersecurity principles. The healthcare business is an essential objective for medical material theft as it delays overdue other primary companies in safeguarding vital data. It is critical that time and funding is capitalized in preserving and guaranteeing the defense of healthcare technology and the confidentially of patient material from unapproved admission.

References
Coventry, L., & Branley, D., (2018). Cybersecurity in healthcare: A narrative review of trends, threats, and ways forward. Maturitas, 113, 48-52. doi: 10.1016/jmaturitas.2018.04.008
Jalali, M. S., Razak, S., Gordon, W., Perakslis, E., & Madnick, S. (2019). Health Care and Cybersecurity: Bibliometric Analysis of the Literature. Journal of medical Internet research, 21(2), e12644. Retrieved from https://www.jmir.org/2019/2/e12644/
Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1-10. doi: 10.3233/THC-161263
Perakslis, E. D., & Stanley, M. (2016). A cybersecurity primer for translational research. Science translational medicine, 8(322), 322ps2-322ps2. doi:10.1126/scitranslmed.aaa4493
Zhang, Y., Qiu, M., Tsai, C. W., Hassan, M. M., & Alamri, A. (2015). Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Systems Journal, 11(1), 88-95. doi:10.1109/JSYST.2015.2460747

Published by
Thesis
View all posts