Implementing Google Cloud API for Enhanced IT Healthcare Management

Verified

Added on  2023/04/25

|15
|3746
|323
Report
AI Summary
This report provides a comprehensive overview of managing IT in healthcare using Google Cloud API. It discusses the functionalities and benefits of Google Cloud Healthcare API, including its role in bridging the gap between existing healthcare systems and cloud-hosted applications. The report explores use cases from patient and provider perspectives, detailing how patients can access their data and providers can improve data management, security, and scalability. It outlines a strategy for implementing Google Cloud Healthcare API, emphasizing FHIR standards and necessary hardware and software requirements. The report also addresses security gaps in healthcare IT, focusing on HIPAA compliance, email encryption, BYOD protection, and compliant storage and hosting solutions. Furthermore, it examines the improvements achieved in managing patient data through advanced electronic healthcare management, highlighting increased data availability and security. The document concludes by identifying challenges and risks associated with IT healthcare, such as data manipulation and ransomware attacks, and proposes technical solutions to data breaches. This resource is available on Desklib, offering students access to a wealth of solved assignments and study tools.
Document Page
Running head: MANAGING THE IT HEALTHCARE
MANAGING THE IT HEALTHCARE
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
MANAGING THE IT HEALTHCARE
Table of Contents
Assignment 1..............................................................................................................................2
Answer to the question no 1:..................................................................................................2
Answer to the question no 2:..................................................................................................2
Answer to the question no 3:..................................................................................................3
Strategy for the implementation of Google Cloud Health Care API in Health Care
Informatics course:.................................................................................................................3
Assignment 2:.............................................................................................................................3
Answer to the question no 1:..................................................................................................3
Answer to the question no 2:..................................................................................................5
Answer to question no 3:........................................................................................................7
Answer to the question no 4:..................................................................................................7
Answer to question no 5:........................................................................................................8
Answer to the question no 6:..................................................................................................9
Answer to the question no 7:..................................................................................................9
Answer to question no 8:......................................................................................................10
References................................................................................................................................12
Document Page
2
MANAGING THE IT HEALTHCARE
Assignment 1
Answer to the question no 1:
Google Cloud Health Care and its use:
Cloud Health care API provides a manageable platform for the accessing and storing
the data in Google Cloud Platform. It can be said that this API merges the gap between the
existing medical health care system and applications hosted on Google Cloud. Google Cloud
API supports standard driven data formats and existing protocols in the healthcare
technologies. Google cloud capabilities includes processing of data through Cloud Dataproc
(Cloud.Google.com, 2019). The analysis part is done through BigQuery and machine
learning is done through Cloud ML Engine. The main objective of the Google Health care
system is to transform the health care system through digitization.
Use of Google Cloud Health Care:
Google cloud health care manages the gap between the existing health care system
and the applications those are hosted in Google Cloud. The use of those application in the
will help to enhance the flexibility of the overall health care system.
Answer to the question no 2:
Use cases from perspective of patient, provider and course:
Patient perspective:
The information and the data of the patient can be accessed by the respective patient
from the Google cloud (Joshi, Yesha & Finin, 2016). Apart from that , in case if the hospital
or health care clinic can store the medical report in the cloud based storage, the patient can
view the repost at any time of the day. This will help to enhance the flexibility of the overall
system.
Document Page
3
MANAGING THE IT HEALTHCARE
Perspective from the provider:
The health care provider will able to manage the data in a proper way. Apart from that
the scalability and the transparency of the data can be increased. Moreover, the health care
provider can manage the security of the data and information of the clinic as well as the
patients (Slayton, 2018). Apart from that the use of the Google cloud API will help to
mitigate the overhead cost of the organization as the major tasks on the data can be done
through the application hosted on the cloud server of Google.
Answer to the question no 3:
Strategy for the implementation of Google Cloud Health Care API in Health Care Informatics
course:
FHIR (Fast Health Care Interoperability Resources) is a health care standard which is
responsible for transmission and exchange of the medical information electronically (Joshi,
Yesha & Finin, 2016). Before the implementation of health care API, the endpoint of Health
care API is needed to be selected (Craig, 2017). Along with that the name of the FHIR store
is needed to be mentioned in this implementation. Before the implementation of the FHIR,
the specification of the project is needed to be done.
Maintaining the required hardware and software requirements are needed to be
analysed before the implementation of FHIR through Google Cloud API. Apart from that the
data models and software those are supported by FHIR are needed to be selected in a proper
way.
Assignment 2:
Answer to the question no 1:
Mitigate the security gaps in health care and health care IT:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
MANAGING THE IT HEALTHCARE
There is a chance that the security of data stored in the Google Cloud API can be
violated. The breaching of the data is not desirable for the health care organizations and the
patients. However, there are certain security measures for the protection of the data (Joshi,
Yesha & Finin, 2016). For managing the security of the medical information and maintaining
the confidentiality of the medical data HIPAA (Health Insurance Portability and
Accountability Act of 1996) is developed.
Sometimes it becomes necessary for the medical record managing applications to
exchange the medical data and information through email. In this situation, the encryption is
used in the email. In this situation Pretty Good Privacy encryption is used in the email
(Talukder et al.,2018). Apart from that security of the web pages can be developed in HIPAA
through the implementation of Secure Sockets Layer and Transport Layer Security. The link
between the web server and the browser can be achieved through these standard security
technologies.
Apart from the Virtual Private Network can be used for protecting the security of the
stored information. However, VPN is a paid service which is responsible for creating a
secured and encrypted connection between the device and the network (Fatima & Colomo-
Palacios,2018). The use of VPN adds another layer of protection which allows the
transmission of the secured traffics between multiple business sites. However, the selection of
the VPN is needed to be done on the basis of certain factors (Talukder et al.,2018). While
selecting the VPN, free VPN service is needed to be avoided. The information of keeping the
session data by VPN is needed to be evaluated in a proper way. For the security purpose the
high grade encryption is needed to be adopted.
Document Page
5
MANAGING THE IT HEALTHCARE
Apart from that health care IT is needed to implement security policy that will
indicate the choice of the security service adopted by the organization along with the
Standard Operating Procedures and authentication method.
Answer to the question no 2:
Improvement of the patient data by applying the advanced electronic health care
management:
With the help of advanced technology managing of the patient data can be easy. The
flexibility of the whole system can be improved through the implementation of the electronic
medical record keeping system (Joshi, Yesha & Finin, 2016). The data are stored in the cloud
architecture. In this context, the information and data can be accessed at any time of the day
by the patients (Alexandrou & Chen, 2016). Apart from that the data and information can be
shared among the doctors and health care clinics. Moreover, the human error can be mitigated
through the implementation of the electronic health record system.
The security of the data can be increased through the health care management. The
implementation of the security can be done through the encryption of the email in the process
and indulging virtual private network in the organization system (Furstenberg & Levy, 2018).
The implementation of the virtual private network will help to restrict unnecessary flow of
internet traffic into the organization network (Alexandrou & Chen, 2016). Moreover, the
authentication for operating the electronic health care record can help the information to be
accessed by the authorized person.
There are number of tools and techniques those can be used for maintaining the security
of HIPAA. HIPAA focuses on the 5 tools for the protection of the patient information. These
5 tools are-
Encryption of email
Document Page
6
MANAGING THE IT HEALTHCARE
BYOD protection for the mobile phone.
HIPAA compliant storage
HIPAA compliant hosting
Compliance tracking solutions.
Need for the Email Encryption: In case, if the unencrypted data or files hop from one
point to another point through the router, the data is open for scrutiny (Page, 2017). In this
situation, the data can be breached and the content of the data can be manipulated by the
intruders (Gordon et al.,2015). When the email is encrypted through security protocol the
data can be transferred from sender to receiver in a secured way (Furstenberg & Levy, 2018).
The content of the email cannot be changed or manipulated by the intruders.
BYOD protection for mobile phone:
Bring Your Own Device is the trend where the employees are needed to bring their
own deice for the implementation or the using of the system. In this context, securing the
access of the HIPAA portal from the personal devices of the employees are users is needed to
be secured (Fatima & Colomo-Palacios, 2018). One of the techniques for the mitigation of
the security risks in the mobile device is “cloud pass-thru”.
HIPAA Compliant storage: One of the example of HIPAA compliant storage is
Dropbox. The use of these kind of service is that this can help synchronize files across
multiple devices and offices (Furstenberg & Levy,2018). Apart from that sharing information
with the other organization in a secured way can be done through this technique.
HIPAA Compliant hosting: HIPAA is concerned about managing the security of the
data and information stored in the electronic system. It is necessary to protect the privacy and
the confidentiality of the data in related to the health care organization and patients (Chen &
Benusa, 2017). Keeping the data in the data centre can help to mitigate the risks for carrying
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
MANAGING THE IT HEALTHCARE
data in portable devices. Apart from that for the security purpose the patient data must be
available at point-of-care (Hipaajournal.com, 2019). The hosting provider enables the health
care organization to manage and maintain the data without paying the cost for maintaining
the infrastructure (Alexandrou & Chen, 2016).
Compliance tracking solutions: The main focus of HIPAA compliance software is on-
Analysis of Gap
Business associate management
Creation of the policy and procedures
Incident management
Remediation management.
Answer to question no 3:
Improvements achieved to manage the patient data through the application of tools and
techniques:
The improvement if managing the patient data has achieved in a significant way
through the application of tools and techniques (Martin, Imboden & Green, 2015). The
availability of the data has increased (Chen & Benusa, 2017). This implies that the health
care organizations and users can access the respective medial data from anywhere at any time
of the day. Apart from that the security of the data has increased significantly
(Hipaajournal.com, 2019). The encryption techniques and use of virtual private network has
increased the privacy of the network as well as trusted transformation of the data has been
achieved through this system (Abbas et al.,2017). As for example, use of SRA tool has
supported the health care providers to conduct the risk assessments and support better
security (Farhadi, Haddad & Shahriar,2019).
Document Page
8
MANAGING THE IT HEALTHCARE
Answer to the question no 4:
There are different challenges and risks associated in the IT health care. One of the
security challenges is-
Manipulation of data during the digitization: The digitization of the medical
information is done through number of steps. It has been seen that the medical data are more
likely to be lost during the digitization process.
Health care ransom ware: It has been seen that while operating the whole system, the
employees in the organization can access the malicious link (Abbas et al.,2017). This will
make the external entities to intrude into the system. Apart from that the loss of the data can
occur due to the sudden attacks.
Shadow attacks: The second challenge regarding the IT health care is shadow IT.
This is the way where the employees in the organization influence the other employees in the
organization doe indulge in unethical practice (Siwicki, 2019). There may or may not be a
negative motive of doing these practices (Joshi, Yesha & Finin, 2016). As for example, due
to finish the some work in deadline, the employees can store the data and information in
public cloud. The breaching of the data can be done through this public cloud.
Answer to question no 5:
Technical solution to the data breaches:
There are significant factors responsible for the breaching of patient information from
HIPAA. The data can be manipulated sue to sudden attacks in the system
(HIPAAcompilance,2019). Apart from that internal damage can cause the manipulation and
the loss of data.
The initial stage for protecting the confidential medical information is maintaining the
backup of the data and information of the electronic health record (Siwicki, 2019). Apart
Document Page
9
MANAGING THE IT HEALTHCARE
from that use of SRA tool will help the organization in the risk assessment on the different
types of healthcare data like HL7, FHIR and DICOM.
Another solution to mitigate the possible security threat is assigning the authentication
and authorization for the accessing of the electronic health care record keeping system.
Individual patients are needed to be assigned with proper username and password for the
accessing of the personal health record information (LUXSCI.com, 2019). On the other hand,
the health care officials are needed to have the proper username and password to get the
access of the admin side of the portal (Roberts, 2017). This authorization will help to restrict
the unauthorized use of the electronic health record.
Answer to the question no 6:
Similar attempt for the prevention of the challenge:
In many cases, the organizations has taken some of the security measures to prevent
the sudden attacks in the network of the system. There are some issues regarding the security
of email encryption in HIPAA environment (LUXSCI.com, 2019). On this case, some of the
security measures are taken by the organizations. The implementation pretty good privacy
encryption is implemented for the protection of the data and information transferred through
the email.
Apart from that the security in the mobile device is implemented as it has been seen
that 80% of heath care professionals are using the mobile device to access the health record
(HIPAAcompilance,2019). Apart from that secured messaging is enabled so that the security
of the transmitted patient health care information system between two devices can be
maintained.
Answer to the question no 7:
Potential advantages and disadvantages of the solution:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
MANAGING THE IT HEALTHCARE
Advantages of the solution:
There are certain advantages of the email encryption and maintaining the security
protocol for the transmission of the patient health information (Fatima & Colomo-
Palacios,2018). The message can be encrypted so that the information can be accessed by the
authorized health care officials and respective patients only (Chin, 2019). Apart from that use
of the encryption in the email will help the data to be protected against the possible threats of
the attackers (Furstenberg & Levy, 2018). This mitigate the chance of the data manipulation
and the loss of data. Apart from that the security measures also includes taking backup of the
information that prevents the loss of the data.
Disadvantage of the solution:
One of the issues related to the encryption of the email in HIPAA is that HIPAA
encryption technique is vague and open to interpretation (Chin, 2019). The security rules
imposed for this encryption techniques are not updated thus making the content of the email
vulnerable to the threats.
Answer to question no 8:
Measure of success:
The overall success of the electronic health record system depends on the
performance of the system. In case, if the performance of the health record meets all the
requirements of the clients, it can be said that the implementation of the system is successful.
The main objective of the health care management system is to manage the patient data in a
proper way (Fatima & Colomo-Palacios,2018). The managing of the data includes storing of
the data, edit and deleting of the data in the health record system (Alexandrou & Chen, 2016).
Apart from that the online storage of the health record system will help the patient and the
health care organizations to access the data simultaneously (Furstenberg & Levy, 2018). It is
Document Page
11
MANAGING THE IT HEALTHCARE
one of the main concern of the electronic health care record to maintain the security of the
data and the information (Roberts, 2017). It can be said that the implemented health care
record keeping system is successful if the requirements are served in a proper way and data
security is maintained in a proper way.
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]