PICOT question – Please see 3 documents attached 

By Day 3 of Week 4

Post a brief description of your clinical issue of interest (one page 4 APA style PP with clinical issue of interest included) . This clinical issue will remain the same for the entire course and will be the basis for the development of your PICOT question. Then, post your PICO(T) question, the search terms used, and the names of at least two databases used for your PICO(T) question. Describe your search results in terms of the number of articles returned on original research and how this changed as you added search terms using your Boolean operators. Finally, explain strategies you might make to increase the rigor and effectiveness of a database search on your PICO(T) question. Be specific and provide examples.

· Review the Resources and identify a clinical issue of interest that can form the basis of a clinical inquiry.

· Review the materials offering guidance on using databases, performing keyword searches, and developing PICO(T) questions provided in the Resources.

· Based on the clinical issue of interest and using keywords related to the clinical issue of interest, search at least two different databases in the Walden Library to identify at least four relevant peer-reviewed articles related to your clinical issue of interest. You should not be using systematic reviews for this assignment, select original research articles.

· Review the Resources for guidance and develop a PICO(T) question of interest to you for further study. It is suggested that an Intervention-type PICOT question be developed as these seem to work best for this course.



Part 2: Identifying Research Methodologies

Student’s Name

Institutional Affiliation

Research Methodologies Matrix

of selected article

Article 1

Article 2

Article 3

Article 4

McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, Science Direct. 108, 57-68.

Pathak, P. R., & Chou, A. (2019). Confidential care for adolescents in the US Health Care System. Journal of patient-centered research and reviews, 6(1), 46.

Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Ahmad Khan, R. (2020, June). Healthcare data breaches: Insights and implications. In Healthcare (Vol. 8, No. 2, p. 133). Multidisciplinary Digital Publishing Institute.

Walker-Roberts, S., Hammoudeh, M., & Dehghantanha, A. (2018). A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access, 6, 25167-25177.

Reason for choosing the research article and how it relates to the issue of confidentiality in healthcare industry.

I selected this piece as it discourses the influences of data breaches and information confidentiality in the healthcare organizations.

I picked this piece of research as it offers the relevant information that can be used in caring for the youth in the mental health care facility by protecting their sensitive information. According to the researchers, the confidentiality of patient information is considered to be a human right and an evidence-based element of delivering quality care. Unluckily, there are complexities in the American healthcare and legal systems that develop a setting that presents confidential care to all patients especially the adolescents.

I selected this study as I can meaningfully use it in my research about confidentiality breach.

Innovative healthcare services have cleared a way for the development of simpler and easier access to healthcare services and quality treatment that make life healthy. I am interested in this article as it discusses the fact that the healthcare system in the present day is highly exposed to the external threats to information security breach. Therefore, this top

Part 1: Clinical Inquiry Presentation

Student’s Name

Institutional Affiliation

The Identified Clinical Issue of Interest

The identified clinical issue is the breaches to confidentiality of patient information confidentiality breaches encompass the security issues that harm the integrity of organizational information.

Data breach occurs anytime malicious people access information without legal permission.

The biggest confidentiality threat is hacking.

Respect for confidentiality of patient information is paramount for healthcare organizations. Confidentiality breaches are greatly observed in healthcare organizations across the world. It can be caused by various incidences including insider threats, stealing of malware, and disclosure of patient information among others.


How to Use Keywords to Search the Published Literature on the Clinical Issues

Identify the main concepts of the research topic.

Use similar terms to the research topic.

Combine the search items using and, and or.

Use phrase searching, truncation, parentheses, and wildcards.

First, using the main concepts in the research topic to search for the keywords will help the researchers to identify a wide array of information that can be useful in the final research. Second, similar terms can be used to represent the concept in a dynamic way. Third, combining phrases with and, and or can help the researchers to find extensive information as the keyword for the research topic. Fourth, making use of wildcards and truncations can improve the search process.


Research Databases for Conducting Your Search for the Peer-Reviewed Articles

Web of Science.


IEEE Xplore.

The Web of Science can be used to provide access to scholarly articles related to the identified clinical issue. PubMed also provides a wide range of academic resources that can be used for literature review for the identified topic. IEEE Xplore can similarly be used to search for journal articles and conference papers that talk about the identified research topic.





Google Scholar.

ScienceDirect is a great gateway to finding millions of peer-reviewed and evidence-based research articles on any possible topic one could search. JSTOR is another great way of searching for online research papers that can be used to find an article that relates to the identified clinical issue. Finally, Google Scholar can be used for the