Change Management and Cybersecurity in Healthcare: Mitigating Human Factors and Risks

Change Management and Cybersecurity in Healthcare: Mitigating Human Factors and Risks

DOI: 10.4018/979-8-3693-1634-4.ch025
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Two central problems in change management are the lack of attention to human factors (e.g., fatigue, human error, communication breakdowns, staffing issues, workload and stress, ergonomics, organizational factors, compliance and procedures, teamwork and collaboration, and inadequate training) and cybersecurity issues. Data shows that 62.7% of adverse effects affected patients, and healthcare professionals contributed 71.7% of the effects, with communication and protocol issues being related to the damage caused. A literature review and content analysis show the overall findings of prioritizing human factors engineering and cybersecurity concerns in their change management processes to mitigate risks and ensure patient safety. Overall, this research contributes to the fields of cybersecurity leadership and healthcare by raising awareness of the critical issues that must be addressed in change management and highlighting the need for healthcare organizations to prioritize human factors engineering and cybersecurity in their change management processes.
Chapter Preview
Top

Background

In contemporary health service delivery, the capacity to adapt and embrace change is vital (Figueroa, 2019). Healthcare organizations should evaluate the expertise of their change management professionals and leaders and ensure they are well-versed in evolving methods, buy-in, and the necessary implementation plans for effective change management (Nilsen, 2020). The change management plan has to include the human factors engineering that could affect the change.

Key Terms in this Chapter

Risk Mitigation: Risk mitigation is a method for preparing for and mitigating the consequences of hazards that a firm may encounter. Risk mitigation, like risk reduction, takes actions to mitigate the negative consequences of risks and catastrophes on business continuity.

Data Breach: A data breach occurs when information is stolen or removed from a system without the owner's knowledge or authority.

Cybersecurity: Cybersecurity refers to the practice of protecting computers, servers, networks, electronic systems, and data from unauthorized access, damage, theft, disruption, or other forms of cyber threats. It involves a range of measures, technologies, policies, and practices designed to ensure the confidentiality, integrity, and availability of digital information and resources.

Human Factors Engineering: The study of how people interact with systems, goods, and environments with the goal of enhancing performance, safety, and well-being is referred to as human factors engineering.

Change Management: The process of planning, executing, and managing changes to an organization's processes, systems, policies, or structure is referred to as change management. It entails taking a methodical approach to moving an organization from its present state to a desired future state while minimizing disturbance and ensuring that the changes are appropriately integrated and embraced by the company's stakeholders.

Technology adoption: The process of absorbing, integrating, and using new technology in society is referred to as technology adoption. The process is divided into many phases, which are commonly classified by the categories of individuals who utilize the technology.

Technology Acceptance Model: The technology acceptance model (TAM) is a theory of information systems that describes how people learn to accept and utilize technology. According to the concept, two criteria influence whether a computer system is adopted by its prospective users: (1) perceived utility and (2) perceived ease of use.

Complete Chapter List

Search this Book:
Reset