Examine the potential consequences of data breaches and security incidents on patient trust, regulatory compliance, and financial implications for health insurers and providers.
In this section, you
should reiterate your study purpose and discuss your research
design, as well as the secondary
sources you use to gather information and conduct your research.
About research
design: this indicates how you’d conduct
your research. Section “Conceptual Framework for Assessing the Effects of
Value-Based
Purchasing Programs” on
pages 6-7 in the Sample Research (69-page report) offers an example of research design.
About
information sources: The sample research
used three approaches (two types of secondary sources and one type of primary
source).
For our research, you are
required to use two approaches:
1.
Review of
published journal articles. You should clearly indicate how many studies published
in what journals/databases during what time frame that you reviewed that are
relevant to your research question(s).
2.
Review of
information from other types of secondary sources. You should clearly state
what sources you reviewed (such as public documents, industry reports,
government reports, company-specific information, legal cases, news reports,
documentaries, blogs, etc.).
*** Sample Research (69-page report) attached *****
2. Summary of Findings
In this section, you should
present and discuss findings from your two secondary sources. The findings could be quantitative information
presented in tables, charts, and graphs, and/or qualitative description of your
findings. You should also explain how the results help address your research
question.
3. Recommendations
You should make at least two (2) recommendations about a course of action, a |