Topic
Protecting Patients’ Data using Smartphone Application
Instructions
First Iteration: Planning and Formulation of Research Execution Framework
Answer preview
This phase involves the devising of a framework of executing the research on how to use mobile application to protect patients’ data through logical authentication, authorization and encryption of healthcare network systems. Therefore, the researcher starts by holding a brainstorming meeting with the facility teams comprised of physicians, network administrators and patient representatives to determine the appropriate procedure of detecting issues of data privacy and protection. The first session will be guided by the insights from literary sources on the common vulnerability points of an organization’s network. The guiding framework will seek to address the existing data management policy and its impact of data security and confidentiality.
Word count: 1390