Questions 64 & 65
Linked is a video of my Presentation on Questions 64 & 65. I know it is a tad late but I did not see any date for the assignment on Blackboard so I apologize for my tardiness.
Linked is a video of my Presentation on Questions 64 & 65. I know it is a tad late but I did not see any date for the assignment on Blackboard so I apologize for my tardiness.
Subject Search: Medical Informatics Database Used: Library, Information Science & Technology Abstracts Source: Abraham, J., Meng, A., Tripathy, S., Kitsiou, S., & Kannampallil, T. (2022). Effect of health information technology (HIT)-based discharge transition interventions on patient readmissions and emergency room visits: a systematic review. Journal of the American Medical Informatics Association, 29(4), 735–748. https://doi-org.ezproxy.fhsu.edu/10.1093/jamia/ocac013 Results: 86 … Continue reading More about Health Information Technology
I am looking for information on Data Protection and how cybersecurity impacts the security of peoples’ data in an age where companies collect more data on their customers than ever before. This week’s search has provided me with additional information that will no doubt prove useful in examining this topic. Subject Search Database: GALE OneFile … Continue reading Data Protection – Subject Search and Citation Traces
Subject Search: I picked the Nursing subject and afterward the Nursing Research Guide. Inside the Nursing Research Guide, I picked the Nursing and Allied Health Database (Pro-quest). I led my pursuit utilizing the terms AI, healthcare and medical services. The inquiry returned 4,692 outcomes with both “Full Text” and “Companion Reviewed” chose. I additionally limited … Continue reading AI in Healthcare – Subject Searching and Citation Tracing
Citation: I am looking at using many different resources in my research about Cyber Security. Mostly with how we can prevent it, avoid it and be safe. Frank, M. L., Grenier, J. H., & Pyzoha, J. S. (2019). How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance. Journal … Continue reading Diving Deep into Cyber Research
To begin my Week 12 research I chose to use a database that I did not utilize much in previous weeks because it had seemed to have less results. I decided to go with this database this week to see what these new searches would result in. I started with the subject of … Continue reading The (Citation and Subject) Search Continues…