Search for:

Posted on April 24th, 2014, by

Summary I

The dissertation work Are you my Mentor? Identifying Mentors and their Roles in LIS Doctoral Education by Cassidy R. Sugimoto discusses the dissertation process and the role of mentors in it. The author examines the presence and support of multiple mentors in the process of doctoral education. It is found that the primary mentor is the adviser, and the secondary mentors are the members of the dissertation committee. Cassidy R. Sugimoto provides literature review on academic mentoring and discusses the value of mentoring, negative impacts of mentoring, mentoring constellations, peer mentoring, etc. In his research, the author uses such methods as interviews and questionnaires.  In addition, the study includes information on substance of mentoring: psychosocial elements of mentoring, topics of conversation, and the elements of pedagogical preparation.  The results of the study suggest that the career function may weigh more heavily in the doctoral mentoring relationship than the psychosocial function (Sugimoto, 2012, p.16). The major examples of mentoring include research and career advice. Topics of conversation are closely connected with the respondents’ personal lives ranking and experience.

Summary II

The article HIPAA Privacy Rule: Maintaining the Confidentiality of Medical Records. Part 2 by an experienced health care professional Sarah S. Mir discusses HIPAA privacy rule paying special attention to medical records requirements, some regulation concerns and common misunderstandings and ambiguities. The author analyzes the benefits of electronic medical records, and states that the handling and storage of medical records is the first step to protect patient confidentiality (Mir, 2011, para.38). Moreover, she provides a literature review on the impact of the HIPAA privacy rule on the confidentiality of medical records.  In addition, the author argues that it is very important to maintain a reasonable balance between the rights of the patients and medical record confidentiality, and to provide an authorized access to medical records.

Summary III

The Article Insuring Health Care Compliance: Reducing REC Audit and HIPAA Breach Risk Exposure by D.Scott Jones and Richard E. Moses discusses insuring certain aspects of health care compliance. The authors prove the fact that both the compliance officers and health care administrators should be aware of the major intersection of health care reform, quality of care, and medical necessity audit recovery faced by health care organizations (Jones & Moses, 2012, p.36). In addition, the authors discuss such issues as patient health information loss, insuring RAC audit response, etc.

Summary IV

In the article HIPAA’s Role in E-Mail Communications between Doctors and Patients: Privacy, Security and Implications of the Bill, the authors James S. Stephens and Anthony V. Parrillo discuss the importance of confidentiality of patient information through e-mails. The major goal of the HIPAA is to provide privacy and security of medical records and other types of health care information. In the article, the authors investigate the rules and regulations of the HIPAA, define privacy and security standards, analyze security risks for e-mail communication, and the significant role of encryption for e-mail communications. They also define some possible implications of HIPAA for e-mail and e-mail security concerns. It is found that technology security is of great importance in health care as covered entities use their electronic systems to comply with HIPAA regulations (Stephens & Parrillo, 2011, p.37).

Posted in Term paper writing | Tagged | Leave a comment

Leave a comment

Your email address will not be published. Required fields are marked *





0 Comments