High-quality interaction is beneficial to provide better customer service to patients.

High-quality interaction is beneficial to provide better customer service to patients.
Please provide two response for the below posts. A substantive post will do at least two of the following:
Ask an interesting, thoughtful question pertaining to the topic
Answer a question (in detail) posted by another student or the instructor
Provide extensive additional information on the topic
Explain, define, or analyze the topic in detail
Share an applicable personal experience
Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
Make an argument concerning the topic.
Post 1 :
Cloud computing could apply in many industries, such as financial, wholesale, etc. Today, I want to talk the cloud computing applied in the healthcare industry and the related risk. Cloud computing provides a connection and collaborative environment for patients and clinicians (Fabian et al., 2020). The patient information could account for large local hard disk memory; cloud computing is an easy way to store data.
In addition, cloud computing makes patients receiving medical care remotely possible (Prokosch et al.,2015). Especially during the covid pandemic, going to the hospital is very dangerous. The real-time regular communication benefits of cloud computing in healthcare are beneficial for a patient to get instruction from a health professional, especially after surgery.
Moreover, cloud computing could improve the interaction between patients and doctors. High-quality interaction is beneficial to provide better customer service to patients. The doctor could access the tests and analysis results online and update the patient in real time. For example, when my old brother felt headaches for a while, he did the test in the hospital and worried about the result all the time, but he only can know the result next time in the hospital. If real-time interaction were possible, he would get the result the first time and arrange a meeting with a doctor as soon as possible; he would feel better and never waste time on treatment.
Cloud computing applied in healthcare also has a data breach risk. Storing data in cloud computing makes specialists from different companies upload and download the data in the meantime. The accuracy of diagnosis could improve, but the patient information is more accessible to third parties. In this situation, all companies that have access to the dataset need to improve the information governance and ensure data leaks will not happen on their end.
Reference:
Ermakova, Fabian, B., Kornacka, M., Thiebes, S., & Sunyaev, A. (2020). Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective. ACM Transactions on Management Information Systems, 11(2), 1–29. https://doi.org/10.1145/3386160
Griebel, Prokosch, H.-U., Köpcke, F., Toddenroth, D., Christoph, J., Leb, I., Engel, I., & Sedlmayr, M. (2015). A scoping review of cloud computing in healthcare. BMC Medical Informatics and Decision Making, 15(1), 17–17. https://doi.org/10.1186/s12911-015-0145-7
Post 2 :
Organizations that do not adequately monitor their data assets in the cloud are vulnerable to cyber attacks and breaches. These attacks, which often involve the theft of credit card and debit card numbers, undermine the trust of customers in a firm’s security protocols and can affect its revenue. As a result, there is a growing number of critics of cloud services keen to highlight the lack of proper security measures. To address these concerns, organizations should consider implementing authentication systems to protect their data assets.
Organizations should also take precautions against insider threats. As cloud infrastructures are accessible to the public, they are vulnerable to attacks by malicious insiders. This is particularly concerning given that most cloud platforms do not require users to enter their passwords.
Another concern for organizations is the possibility of data leakage. Since the cloud is a multi-user environment with an unknown third-party provider, data can be mishandled and compromised. This concern is often compounded by human nature, which doubts the capability of a third-party provider to protect data. In addition to internal threats, there is also the potential for external threats such as malicious hacking of the cloud provider.
Availability is a significant concern for organizations storing their data in the cloud. Cloud services are notorious for their inconsistency and can go down without warning. Data loss can affect business processes and negatively impact customers. Additionally, data loss can affect users’ lives. As a result, organizations should make sure that their data is protected with strong encryption keys(Al Nafea et al.,2021)
.
In addition to security concerns, organizations that are using public cloud services should ensure that they have adequate confidentiality and data access policies in place. Many companies will sign contracts with cloud service providers that restrict access to data, which means that they cannot share information. Additionally, breaches of confidentiality agreements can result in data leakage, which can lead to legal action.
Security concerns are a common concern for cloud users. While cloud infrastructure is designed to make data accessible to a wide range of users, cloud security can be difficult to control. Misconfigurations of cloud infrastructure can lead to serious issues that negatively affect day-to-day operations. In addition, cloud administrators must ensure that their cloud services are protected by secure password policies and encryption measures. This is especially important as cybercriminals are continually practicing their skills and the cloud is increasingly becoming a prime target(Sriram et al.,2022).
As with any cloud service, data stored on a cloud server is vulnerable to loss. Whether a service provider is compromised by a malicious attack or a natural disaster wipes data from their servers, losing critical information can cripple a business. For example, Google and Amazon both permanently lost customer information after a lightning strike in 2011 – a case where a data wipeout ruined the cloud’s data for the rest of the world. Therefore, organizations should consider their provider’s backup procedures before moving sensitive data into the cloud.