Tuesday, February 7, 2017

Attachment Disorder and Crime

 

Abstract

Attachment disorders arise when children experience prolonged and persistent abuse and neglect.  They are unable to form attachments and respond to the world with anger, defiance, and aggression.  They resist authority figures and defy social rules.  Without early intervention, these children are at high risk for delinquency, criminality, and the commission of violent crimes.
 
Attachment Disorder and Crime

       Criminologists recognize that antisocial behaviors, which are more common in males, can lead to an increase in criminality and violent crime (Siegel, 2012).  Much of their research has been based on John Bowlby’s attachment theory.

       Psychoanalyst John Bowlby studied Lorenz’s research on imprinting.  He concluded that “children come into the world biologically pre-programmed to form attachments with others, because this will help them to survive” (McLeod, 2007).  Failure to make secure attachments can lead to “affectionless psychopathy” later in life (McLeod, 2007).

       “Attachment is an enduring affective bond characterized by a tendency to seek and maintain proximity to a specific person, particularly when under stress” (Levy, 2000).  This bond is created between mother and child during the nine months of pregnancy and the first two years of life (Levy, 2000).  The mother-child bond is unique and forms through social releasers — behaviors that ensure a reciprocal response between mother and child (McLeod, 2007).  Smiling, eye contact, holding, rocking, touching, and feeding are cues which create a “mutual regulatory system” (Levy, 2000).

       When the mother-child bond fails to develop, infants can suffer from severe colic and feeding difficulties, fail to gain weight and reach important developmental milestones, remain detached and unresponsive, refuse to be comforted, and respond too readily to strangers (Attachment Disorders, 2014).

       Children need a “secure base” to learn trust and reciprocity, qualities which lay the foundation for all future relationships (Levy, 2000).  They must be able to explore their environment without fear and anxiety so they can attain full cognitive and social development (Levy, 2000).  A strong, secure attachment between mother (or other primary caregiver) and child helps the child to learn self-regulation (self-management of impulses and emotions) (Levy, 2000).  The child has the opportunity to form a strong self-identity, competence, and self-worth and to create balance between dependence on the mother and his own autonomy (Levy, 2000).  A secure base allows the child to learn empathy and compassion and to develop a conscience (Levy, 2000). A well-established core belief system helps the child to evaluate himself, his caregiver, and the world around him (Levy, 2000).  He learns resourcefulness and the resilience to cope with stress and adverse events (Levy, 2000).

       Even adopted infants can “develop healthy attachment relationships” in the first year of life if raised in a safe and secure environment by a caregiver who is consistently responsive to their needs (Reebye, 2007).  Children with Down Syndrome tend to develop attachments later, during the 12-24 month period (Reebye, 2007).

       Secure attachment allows children to develop positive patterns of cognition, behavior, and interaction which help them to survive successfully within the family and society at large (Levy, 2000).  They internalize altruism, empathy, compassion, kindness, and morality, qualities which lead to proper social behavior and social cohesion.  They learn to view themselves, the caregiver, life, and the world as essentially good, safe, and worthwhile.

       Children who do not develop secure attachments experience just the opposite.  They learn to view themselves, the caregiver, life, and the world as hostile, dangerous, and worthless (Levy, 2000).  By age four, these children exhibit symptoms of chronic aggression — “rage, bullying, defiance, and controlling interactions with others” (Levy, 2000).  These are the children who overwhelm the child welfare and juvenile justice systems and carry diagnoses of conduct disorder, oppositional defiant disorder, and antisocial personality disorder.  Children with severe attachment disorder typically engage in cruelty to animals, bed-wetting, fire-setting, pathological lying, and self-gratification at the expense of others.  They are predatory and vindictive, controlling and manipulative.  They lack empathy, remorse, and a moral conscience.  They are unable to form close relationships with others because they never experienced it themselves.

       Adults with these traits are often labeled psychopaths and may become serial killers and mass murderers (Levy, 2000).  The motivations for their crimes are manipulation, dominance, and control.  They feel powerless and inferior, committing horrific crimes against others as a way to release their frustrations and hostilities (Levy, 2000).

       But why do some children fail to develop a secure attachment to their mother or other primary caregiver?  Researchers have determined several common factors — “abuse and neglect, single-parent homes, stressed caregivers, parents with criminal records” (Levy, 2000).  Other factors include parental mental illness, substance abuse, and a history of maltreatment.

       Within the family, persistent conflict and violence lead to childhood anxiety, fear, and insecurity.  Children learn that violence is an acceptable way of dealing with life (Levy, 2000).

       Poverty, living in an unstable community rife with violence, access to weapons, and graphic depictions of violence on TV and in the movies desensitizes children.  They learn to “express feelings, solve problems, boost self-image, and attain power” through aggression and violence (Levy, 2000). 
       Prenatal drug and alcohol abuse, maternal stress,  birth complications, prematurity, nutritional deprivation, and genetics can lead to inherited personality traits and brain damage that interfere with learning, attention spans, and impulse control.  Compound this with a firmly-established attachment disorder, and a child is likely to be difficult to control, impulsive, hyperactive, defiant, aggressive, indifferent to learning, and angry (Levy, 2000).

       Children who are maltreated are often found in foster care, kinship care, adoptive care, and orphanages (Chaffin, 2006).  This includes children adopted from other countries.  They grow up in unstable environments, without the consistent affection and nurturing required to develop secure attachments (Chaffin, 2006).  They may grow up with suppressed anger that causes them to “seek control, resist authority, engage in power struggles and antisocial behavior” (Chaffin, 2006).  They become self-centered, resist close attachments, and eventually fall into delinquency and criminality (Chaffin, 2006).

       Teenagers still need a “secure base” as they wrestle with independence versus security (Mathew, 1995).  If a teenager has developed a secure attachment to his mother or other primary caregiver, he will weather the storms of adolescence with more resilience and adaptive abilities to cope with stress and change.  A strong, loving family environment teaches teenagers social competence and self-confidence.

       Adolescents who grow up in unstable, inconsistent homes torn apart by conflict and violence develop “psychopathology resulting from the inability to function competently in social situations” (Mathew, 1995).  “Delinquency, addiction, and depression” grow out of “inadequate problem-solving” (Mathew, 1995).  The teenager suffering from attachment disorder is incapable
of interpreting and responding to social cues in appropriate ways (Mathew, 1995).  They view the world as a hostile place, attribute hostile intentions to other people, and respond aggressively.

       Decades of research have found clear links between early childhood abuse and neglect, attachment disorder, and delinquency and violence later in life.  It is not surprising, then, that children under age twelve have committed some of the cruelest crimes or that adolescent males are three times more likely to commit violent crimes than their female counterparts (Levy, 2000).

Method

Process

       Research was conducted online through EBSCO and Google Scholar using the keywords “attachment disorder,” “John Bowlby,” and “attachment disorder and crime.”

Results

       Attachment theory has been around for a long time.  It has been studied and expanded on by others.  A lot of research is available concerning attachment theory, maternal deprivation hypothesis, reactive attachment disorder (RAD), disinhibited social engagement disorder (DSED), secure base distortion, rage theory, disordered attachment, disorganized attachment, disoriented attachment, and insecure attachment.  These are all variations on the same theme — early childhood abuse and neglect lead ultimately to emotional detachment, dysfunction, anger, defiance, and aggression.

Discussion

       Traditional psychotherapeutic tools are ineffective on children suffering from attachment disorder because these children are unable to trust others and form the therapeutic bond
necessary to engage in treatment (Levy, 2000).  Without early intervention, however, these children are at high risk for risky behaviors, criminality, and incarceration.

       Several treatment modalities have been developed to help children overcome their attachment difficulties.  Most focus on learning how to trust and feel secure.  One of the more controversial, Holding Nurturing Process (HNP), involves forcibly holding the child and maintaining eye contact, which is supposed to promote secure attachment and self-regulation (Chaffin, 2006).  HNP has been associated with the death of several children, however, and criminal charges have been filed against some attachment therapists and parents (Chaffin, 2006).

       The most effective attachment therapies allow the child to gradually build up trust with a committed therapist who then works with the child to re-program patterns of negative thinking and behaving (Levy, 2000).  Therapy is based on the individual needs of the child and involves family, school, and community.  The child learns positive coping skills that help him to function successfully within the family and society.

       Parents and other primary caregivers can undergo Corrective Attachment Therapy in order to enhance their parenting skills and learn specific tools for dealing with a difficult child (Levy, 2000).  Parent and child must go through therapy simultaneously so that they both learn mutual caring and respect; open up to feelings of affection; set up limits, rules, and boundaries; share empathy and compassion; and learn how to be in tune with one another (Levy, 2000).

       If high risk families can be identified early in the process, families can be enrolled in special programs and children can receive the treatment they need to overcome the damage already done.   
 
References




Attachment disorders. (2014, January). American Academy of Child & Adolescent

       Psychiatry. Retrieved from http://www.aacap.org/AACAP/Families_and_youth/Facts_

       For_Families/FFF-Guide/Attachment-Disorders-085.aspx.

Chaffin, M., Hanson, R., Saunders, B., Nichols, T., Barnett, D., Zeanah, C., Berliner, L.,

       . . . Miller-Perrin, C. (2006). Report of the apsac task force on attachment therapy, reactive

       attachment disorder, and attachment problems. Child Maltreatment, 11(1), 76-89. doi:

       10.1177/1077559505283699.

Levy, Terry M. & Orlans, M. (2000). Attachment disorder as an antecedent to violence and

       antisocial patterns in children. In Levy, Terry M., Editor, Handbook of attachment inter-

       ventions (pp. 1-26). San Diego, CA: Academic Press.

Mathew, S., Rutemiller, L., Sheldon-Keller, A., Sheras, P., Canterbury, R. (1995). Attachment  

       and social problem solving in juvenile delinquents (Report No. 143). Washington, D.C.:

       Educational Resources Information Center.

McLeod, S. (2007). Bowlby’s attachment theory. Simply Psychology. Retrieved from


Reebye, P. & Kope, T. (2007). Attachment disorders. BC Medical Journal, 49(4), 189-193.

Siegel, Larry J. (2012). Criminology. Belmont, CA: Wadsworth.
(The references did not all format correctly.)
Dawn Pisturino
Mohave Community College
Criminology 225
November 29, 2016
Copyright 2016-2017 Dawn Pisturino. All Rights Reserved.

      

 

 

Thursday, November 3, 2016

Rape Prevention in Arizona

 
 
Rape Prevention in Arizona
 
by Dawn Pisturino



Abstract

Social services in Arizona are concentrated mainly in the Phoenix area.  Outlying areas may or may not have sufficient services.  In Mohave County, for example, domestic and sexual violence services are geared largely toward families and domestic violence.  Few services exist specific to rape prevention.  In fact, the nearest actual rape center is located in Flagstaff (Coconino County), which is two hours away.  Arizona does have a comprehensive Sexual Violence Prevention & Education Program aimed at prevention of sexual and domestic violence, but most state-funded organizations are located in southern Arizona.  National organizations like RAINN provide general guidelines and state-by-state information.

Rape Prevention in Arizona

       The Sexual Violence Prevention & Education Program in Arizona originated at the state level, conforms to CDC guidelines, and depends on funding from the CDC and other sources.
       In 2004, the Governor’s Office for Children, Youth, and Families formulated a state plan that would “increase capacity . . . to provide services, promote prevention, conduct trainings, and create public awareness activities statewide” in the area of sexual assault.  The primary goal was to “increase victim access to comprehensive crisis services” (Governor’s Office for Children, Youth, and Families, 2004).
       A statewide eight year plan was implemented through the Arizona Department of Health Services in 2010 that would “stop first time perpetration” through standardized educational curriculum in the schools, colleges, and universities; faith-based organizations; widespread media campaigns; and businesses that serve alcohol.  The mission was to achieve “the vision of a culture that supports healthy, respectful relationships through primary prevention efforts and zero tolerance of sexual violence in Arizona communities” (Arizona Department of Health Services, 2010).
       Sexual assault is a public health threat that requires preventative education and counseling before an assault occurs; interventions immediately after an incident; and long-term follow-up care, if necessary, with therapy and empowerment tools (University of Arizona, 2012).  Programs are now teaching bystander intervention skills to people who want to serve as role models and intervene when they witness a potential or actual sexual assault occurring.  The University of Arizona routinely screens students for past and recent sexual assaults and abuse so they can receive the therapy they need.  Male students learn how to evaluate their own attitudes and beliefs about male dominance and entitlement in order to gain new respect for their partners and develop more effective communication skills (University of Arizona, 2012).
       The Sexual Violence Prevention & Education Program implemented in 2012 on the campus of the University of Arizona in Tucson is also available to other campuses, organizations, and businesses through their community outreach program.  According to their research, alcohol is implicated in 50-70% of all sexual assaults.  Drug and alcohol screenings are now done on campus to screen students for substance use problems.  Students receive information about consent and the ability/inability to consent for sexual activity while intoxicated.  Freshmen are required to take an online course in sexual assault (University of Arizona, 2012).
       Research conducted at the University of Arizona supports new laws and public policies.  Researchers have found that community-based programs are most effective.  Their public awareness programs have been so effective, Governor Douglas Ducey proclaimed April 2016 Sexual Assault Awareness Month (Governor’s Office, 2016).
       According to the National Center for Injury Prevention and Control (2016), 1 in 5 women and 1 in 15 men experience rape or attempted rape.  By the age of eighteen, 40% of women have suffered some sort of sexual abuse or assault.  The long-term physical and psychological trauma can be devastating.  Family Advocacy Centers have been established in some areas of Arizona to provide post-sexual assault services, including forensic evidence collection, expert witness testimony, and legal representation.  Arizona state law allows victims to receive a forensic examination by a trained examiner within 120 hours (5 days), whether or not they plan to report the incident to police (Governor’s Office for Children, Youth, and Families, 2004).  Forensic biological evidence will be kept indefinitely in unsolved felony sexual offense cases (Arizona Revised Statute 13-4221).  There are no statutes of limitations in felony sexual offense cases (Arizona Revised Statute 13-107).  The definition of rape has been expanded in order to increase the number of convictions.  Sexual assault is a class 2 felony, but if a date rape drug was used, the sentence will be increased by three years (Arizona Revised Statutes 13-1406).  The minimum sentence for a first conviction under ARS 13-1406 is 5.25 years, but a life sentence may be imposed if intentional serious physical harm was inflicted.
       Cultural competence remains an important issue when dealing with victims of sexual assault since the United States has such a diverse population “with differing ideas about domestic violence and sexual assault” (Warrier, 2005).  Trained interpreters and bilingual educational materials must be available.  Professionals must be able to understand victims’ experiences of violence within the context of their own culture.  This is particularly crucial among the Native American population.
       Kathryn Patricelli, MA (2005), educates women on what to do after an assault or rape.  First off, they should not bathe or cleanse themselves.  Secondly, they should call the police and report what happened. Third, women should go the emergency room and ask to be examined.  A forensic examination should be performed.  If a date rape drug was used, they should have a urine toxicology screen done.  Fourth, they should go stay in a safe place or have someone stay with them.  Fifth, victims should get help from a counselor to ease the shock, pain, and guilt.  If symptoms do not ease in a reasonable amount of time, the victim should get ongoing therapy for post-traumatic stress disorder.

Method

Process
       Research was conducted online through EBSCO and Google Scholar using the keywords “rape prevention,” “rape prevention in Mohave County,” and “rape prevention in Arizona.”  Other research was done in person and by telephone.

Results

       The best online results were found in Arizona government websites and publications.  Kingman Aid to Abused People/Sarah’s House did not answer their door or telephone.  Their primary focus is on family abuse and domestic violence.  Calling the Mohave Victim Witness Program phone number connected me to a pager.  There was no local rape prevention literature available at the Mohave County Library in Kingman; their resource list was out-of-date; and the librarian could only find two young adult books in the system related to teen dating safety and sexual harassment.

Discussion

       Local programs funded by the state of Arizona must provide “education on sexual harassment, definitions of rape, teen dating violence, assertive communication, and strategies to increase reporting and awareness of sexual violence” (Arizona Department of Health Services, 2016).  Some organizations also explain consent and Arizona law.
       Most programs and organizations in Mohave County provide post-incident crisis intervention, shelter, and hotlines for victims of domestic violence and sexual assault.  Mohave Community College has policies dealing with campus safety and sexual harassment and assault.  Mohave Mental Health and Southwest Behavioral provide long-term therapy services for depression, anxiety, and PTSD.  Local hospitals have trained forensic examiners, social workers, and counselors available for immediate care after a sexual assault.  The Mohave County Health Department performs confidential testing for STDs/HIV.
       Charles P. Nemeth (2012) defines rape as sexual intercourse with another person through the use of force, without consent, and with intent.  His guidelines for dealing with an attack include trying to dissuade the attacker from completing the act; pretending to have an STD or AIDS; acting insane; yelling; struggling and fighting back; using self-defense skills; using pepper spray or mace; avoiding resistance in order to survive (Nemeth, 2012).
       The Governor’s Office for Children, Youth, and Families (2004) describes rape “as a crime of power and control . . . motivated by aggression and hatred, not sex.”  The state of Arizona has implemented a statewide plan to address the problem through standardized educational programs, increased availability of services to victims, and expanded tools for prosecutors and police to increase the number of convictions for sexual assault.  But most comprehensive services are concentrated in the Phoenix/Tucson metropolitan areas.  More needs to be done for less populated counties like Mohave County.

References
Arizona Department of Health Services. (2016). Sexual violence prevention and education

       program. Retrieved from http://www.azrapeprevention.org.

Arizona Department of Health Services, The Bureau of Women’s and Children’s Health.
       (2010). Arizona sexual violence primary prevention and education eight year program plan.

       Phoenix, AZ: State of Arizona.

Arizona Legislature. (2016). Arizona revised statutes. Retrieved from http://www.azleg.gov.

Centers for Disease Control, National Center for Injury Prevention and Control, Division of

       Violence Prevention. (2016). Stop SV: A technical package to prevent sexual violence.

       Atlanta, GA: Centers for Disease Control.

Governor’s Office. (2016). State of arizona proclamation. Phoenix, AZ: State of Arizona.

Governor’s Office for Children, Youth, and Families, Division for Women. (2004). The state

       plan on domestic & sexual violence: A guide for safety & injustice in arizona. Phoenix,

       AZ: State of Arizona.

Nemeth, C.P. (2012). Criminal law. Boca Raton, FL: Taylor & Francis.

Patricelli, K., MA. (2005, December 15). Abuse – If you have been assaulted or raped.
       Retrieved from http://www.mentalhelp.net.

RAINN. (2016). State-by-state definitions. Retrieved from http://rainn.org.

University of Arizona, Mel and Enid Zuckerman College of Public Health. (2012). Sexual

       violence prevention & education program orientation manual & annual summary. Tucson,

       AZ: University of Arizona.
Warrier, S. (2005). Culture handbook. San Francisco, CA: Family Violence Prevention Fund.       

Dawn Pisturino
Administration of Justice 109, Mohave Community College,
Kingman, Arizona
Copyright 2016 Dawn Pisturino. All Rights Reserved.                                                  
(The references would not format properly.)
 

 

 

       

 

 

 

 

 

 

Wednesday, October 26, 2016

Health Information Technology Security

 
 
Health Information Technology Security
 
by Dawn Pisturino
 

Abstract

       Due to threats of cybercrime and malware infestations, healthcare organizations all across the world are now forced to upgrade and monitor their cybersecurity systems on a constant basis for the sake of protected patient health information, financial stability, and uninterrupted operations.  Money that would normally be spent on patient care is being diverted to IT professionals, who are hired to keep cybersecurity systems intact.
 
Health Information Technology Security

       Protecting patient health information, as mandated by law, has become a priority for healthcare facilities all around the world.  From doctors’ offices to medical devices to ransomware, the healthcare industry is under attack by cyber threats that compromise the health, safety, and privacy of patients everywhere.

       Nurses are at the forefront in efforts to secure patient and employee information, promote responsible use of computer technology, and report possible threats and violations in a timely manner.

Cybersecurity is Crucial

       Almost every day, a news story comes out that a corporation, nonprofit organization, or government agency has been hacked.  The healthcare industry is no different, and the attacks are becoming more frequent and more serious.  This is such an important issue at the hospital where I work, it seemed pertinent to write a paper on it.  Our IT department frequently makes us aware of e-mail threats, blocks blog sites, mandates automatic logoffs and timed reboots, requires frequent password changes, and regularly reminds us to turn off our computers, log off when finished, and to not share passwords.  Cybersecurity is crucial to protecting patient health information and network systems.

All Healthcare Organizations are at Risk

       Smaller healthcare clinics and doctors’ offices must follow the same mandates as larger organizations when it comes to protecting patient health information.  Healthcare personnel divulging protected information to unauthorized people and hackers using stolen information in identity theft scams are huge concerns that must be addressed (Taitsman, Grimm, & Agrawal, 2013).  Not only must these smaller organizations take appropriate measures to secure patient health information, but personnel must strictly follow policies and protocols.  Simple safeguards, such as screening phone calls, logging off computers, shredding documents, background checks for employees, automatic logouts, and activity audits, protect and safeguard patients and organizations alike (Taitsman, Grimm, & Agrawal, 2013).  Insurance companies, too, must safeguard patients against fraudulent claims.  Consumers must be educated in ways to protect their own healthcare information (Taitsman, Grimm, & Agrawal, 2013).

       Nurses all across the healthcare spectrum are increasingly required to use computer technology, and they must honor patient privacy, confidentiality, and consent while doing so.  Use of the Internet opens the doorway to viruses, worms, adware, spyware, and other forms of malware (Damrongsak & Brown, 2008).  Something as simple as using a shared address book can infect an entire system.  Logging off the computer when the nurse has finished and frequently backing up data can prevent unauthorized intrusions and corrupted data (Damrongsak & Brown, 2008).  Most medical facilities use an intranet, or closed system, in addition to the Internet, that restricts data to a smaller group of people.  Firewalls, encryption, and the use of virtual private networks provide additional security (Damrongsak & Brown, 2008).

       Large government agencies, such as the Veterans Administration, have increased efforts to stave off cyber-attacks, which compromise patient health information and medical devices.  IT specialists have removed medical devices from the VA hospital’s main network systems and connected them to virtual-local area networks (VLANs) (Rhea, 2010).  Without access to the Internet, these devices can be used without fear of attack.  In the past, the main focus has been on identity theft.  But with the rise of international terrorism, there is a growing fear that medical devices may be hacked and used to intentionally harm patients (Rhea, 2010).  Healthcare IT systems have already been crippled by hackers looking to profit from cybercrime.  In 2009, healthcare facilities around the world found medical devices infected with the Conficker virus (Rhea, 2010).  Downtime caused by malware is expensive and inconvenient.  Hospitals are forced to spend money on security that normally would have gone to patient care (Rhea, 2010).  FDA regulations are also a hindrance to quick development of security patches (Rhea, 2010).

       According to author W.S. Chee (2007), a member of the Department of Diagnostic Imaging at K.K. Women’s and Children’s Hospital in Singapore, medical devices connected to a hospital’s network system can lead to critical threats and infestations of malware in these devices.  Hospitals need to act proactively to prevent intrusions and respond immediately if a system becomes infected (Chee, 2007).  Equipment vendors play a huge role because they supply the security measures which protect medical devices (Chee, 2007).  But they can be slow in providing updates and patches.  The FDA, furthermore, determines when and how changes can be made to biomedical equipment systems.  This places the burden on hospitals to protect themselves (Chee, 2007).

       Thomas Klein (2014), managing editor of Electronic Medical Device Technology, asserts that intentional sabotage of medical devices is only a matter of time.  According to researchers, vulnerabilities have been found in infusion pumps, x-ray machines, cardiac defibrillators, and other devices (Klein, 2014).  Since these devices are frequently connected to the Internet, they are vulnerable to malware.  If the network systems are not fully protected, the devices are subject to malicious attack.  The use of USB ports opens a doorway to security breaches and malware
(Klein, 2014).  The risk is so great the FDA became involved and now requires that manufacturers consider cybersecurity risks when developing new products (Klein, 2014).

       The expansion of healthcare information technology improves profitability while exposing healthcare facilities to greater risks (Elliot, 2005).  Facilities must create and enforce policies that secure patient health information across all forms of networks and technology.  One solution for managing remote devices is the use of on-demand security services that cease to work once the remote device is no longer in use (Elliot, 2005).  The problem, then, is security on the other end, where patient health information can be leaked or accessed by the user.  This is called post-delivery security (Elliot, 2005).  Solutions include user malware protection, restrictions on use of data, and audits on computer use.  Developing and enforcing security policies that protect patient health information, especially information transmitted to remote devices, is tantamount to avoiding security breaches and corrupted data (Elliot, 2005).

       The latest, and most serious, threat comes in the form of professional IT criminals who use ransomware to extort money from hospitals (Conn, 2016).  One such threat, Locky, acts through ordinary-looking e-mail (Conn, 2016).  When opened, a virus activates software that encrypts the hospital’s IT system.  Then, a window pops up with a ransom demand.  Samas, another threat, uploads encryption ransomware through a hospital’s Web server (Conn, 2016).  A more sophisticated ransomware, CryptoLocker, demands bitcoin as payment because it is nearly impossible to trace (Conn, 2016).  Once paid, the criminals unlock the data in an infected system.  But, should hospitals pay in the first place?  Cybersecurity has become a booming business, with medical facilities now being forced to employ their services.  There is a major concern that medical devices will be the next systems to be hit by cybercriminals (Conn, 2016).

Topic Availability

       This topic, as it relates to Nursing Informatics, is too important to ignore.  I used seven resources from scholarly and peer-reviewed publications for this paper.  I pulled my resources primarily from CINAHL and ProQuest.  I found enough materials to give me a broad overview of the topic, but I was disappointed that more current articles could not be found.  Technology changes so rapidly that even a few months can make a difference in security innovations.  I used both the basic and advanced search features and the key words “medical device malware security.”

Information Availability 

       This information is available in scholarly and peer-reviewed journals and other publications.  Although the information was geared toward professionals, some publications include short articles that educate the general public about cybersecurity and protecting patient health information.  Nurses benefit from all of these resources because many do not understand the extent of the threat.

Personal Views 

       The information I read shocked me (cyberterrorism), confirmed what I see our IT specialists changing at my hospital, and disturbed me (ransomware cybercrime.)  The general public does not seem to be aware of these threats.  As a nurse who uses computer technology every day, I was not aware of the seriousness of this problem.  It never occurred to me that a glucometer or infusion pump could be infected with a virus or that an unscrupulous person would deliberately sabotage somebody’s pacemaker.  When I mention this to other nurses, they are equally dismayed by the possibilities.  They always ask, “Why would somebody maliciously hack into a medical device?”  For people who devote their lives to saving people, the idea is unthinkable.

       The changing landscape in healthcare makes it crucial that ALL medical personnel understand the seriousness of the threats.  As technology becomes more sophisticated, so do the means by which cybercriminals hack into and infect network systems.  Information is compromised, and patient health and well-being are put at risk.

Conclusion

       In conclusion, whether it’s a small private practice or a large healthcare system, the increased use of technology poses significant threats to protected patient health information,medical devices, and cybersecurity systems.  Users all across the healthcare spectrum have a duty to behave responsibly when accessing patient records, divulging information, searching the Internet, managing e-mail and faxes, and interacting with colleagues.  Nurses should provide feedback and input about vulnerabilities in security policies and protocols for the protection of themselves and their patients.  They must educate themselves about current threats so they can adapt their practice to avoid unintentional security breaches.  Nurses can also educate their patients in the use of computer technology, accessing patient portals, and protecting patient health information. 

       Technology will continue to be a driving force in healthcare.  Along with the downside comes the possibility of lower costs to facilities and patients, improved outcomes, more accurate measurements, increased research, and greater opportunities for nurses to expand their involvement and role in improving healthcare and healthcare informatics.  Requiring nursing students to study nursing informatics increases their awareness of the problems and benefits of  technology.  Hopefully, our physicians and administrators are being trained in this area, as well.  Health information technology specialists are enjoying a surge in employment opportunities as
healthcare systems realize the importance of their specialty.  Technology is expensive, but the threats of cybercrime and cyber-attacks are more damaging. 

 
References

Chee, W.S. A. (2007). IT security in biomedical imaging informatics: The hidden

        vulnerability. Journal of Mechanics in Medicine and Biology, 7(1), 101-106.

Conn, J. (2016, April). Ransomware scare: Will hospitals pay for protection. Modern    

        Healthcare, 46(15), 8-8.

Damrongsak, M., & Brown, K.C. (2008). Data security in occupational health. AAOHN

        Journal, 56(10), 417-421. Retrieved from http://search.proquest.com.resources.njstatelib.

        org/docview/219399232?accountid=63787.

Elliot, M. (2005, September). Securing the healthcare border. Health Management Technology,

        26(9), 32-35.

Klein, T. (2014, September). How to protect medical devices against malware.

        Operating Theatre Journal, 14-14.

Rhea, S. (2010, December). Cyberbattle: Providers work to protect devices, patients. Modern

        Healthcare, 40(50), 33-34.

Taitsman, J. K., Grimm, C. M., Agrawal, S. (2013, March). Protecting

        Patient privacy and data security. The New England Journal of Medicine, 368, 977-979.

        doi: 10.1056/NEJMp1215258. Retrieved from http://www.NEJM.org.

Dawn Pisturino
Nursing 340, Thomas Edison State University, New Jersey
Copyright 2016 Dawn Pisturino. All Rights Reserved.
(The references would not format properly.)
 

 

 

 

Tuesday, June 7, 2016

2016 Best of Kingman - Healthcare Award



I'm pleased to announce that COSMIC HEALTH BLOG has received the 2016 Best of Kingman - Healthcare Award. This is the second year in a row. We're so happy!

Thank you!

Dawn Pisturino, RN

Copyright 2016 Dawn Pisturino. All Rights Reserved.

Saturday, February 20, 2016

Buddhist Metta Prayer

 
 
 
 
May all beings be peaceful.
 
May all beings be happy.
 
May all beings be safe.
 
May all beings awaken to the light of their true nature.
 
May all beings be free.