Blockchain: Advantages And Disadquences Of Computer Security And Security

Great Essays
Blockchain is a shared, distributed ledger that facilitates the process of recording transactions and tracking assets in a business network [1]. It is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but can be applied to everything of value. Once the information is entered in Blockchain it cannot be erased, modified or tampered with. Everyone in the network will be able to write data/perform transactions but cannot modify the data.

Traditional systems follow either Centralized or Decentralized model – Examples are Banks having single point of control (Centralized) and in some cases Decentralized model – with finite points of control. Blockchain works on the principle
…show more content…
2.5. ADVANTAGES OF BLOCKCHAIN TECHNOLOGY

No Middlemen: Blockchain technology allows everyone in the network to perform transactions and does not require a central authority (Administrator) to approve the transaction. Instead, the other blocks in the chain validate the transaction.

Security: Compromising a blockchain transaction and modifying is impossible as the change has to be done in all the distributed copies which would require huge computational power which is impossible. Security is the first and foremost factor where distributed ledger technology of blockchain scores over traditional systems for transacting.

Empowered Users: Users are in control of all their data and transactions. Faster Transactions: Transactions done in traditional way like bank transactions, claim adjudication takes more time whereas when implemented using blockchain technology, the same transactions are done faster without compromising the security and underlying business process.

Lower Transaction Costs: By eliminating the intermediaries and third party approvers, blockchain can greatly reduce transaction
…show more content…
Provider Data – Segment wise and their nature

Provider data changes multiple times in a year and the changes needs to be reflected correctly in the Payer’s systems – example – online directory or Claims Processing System. Any issues/errors in ingesting this data by Payer will trickle down to the end systems used by the customers and the cost of fixing incorrect claim/data is very high.

Below is the workflow of the Provider data ingestion in current Healthcare world either during Provider addition to Payer’s network or during Provider data

Related Documents

  • Improved Essays

    What different people will use the system for 5. Recourses needed Everything is done by hand and there is a poor filing system, therefore there is a great likelihood that important documents will end up accidently misplaced, disregarded or out of date. Basic tasks take much longer than they should and customers have to wait in long queues. A lot of money gets thrown away unnecessarily, for example, on paper and printer ink.…

    • 577 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Zillow Case Study Essay

    • 1460 Words
    • 6 Pages

    Introduction In this case study, the business of Zillow.com in providing real estate information to all users to its website is explored, and the use of business intelligence by Zillow.com in its offering to customer, and the way it uses a data mart to market its new product, are discussed. In addition, this case study includes a discussion of various characteristics of information quality as seen from Zillow’s perspective, and how Zillow is using a data-driven website. Analysis Background of Zillow.com Zillow.com is an online web-based real estate site helping homeonwers, buyers to find and share information about real estate and mortgages. It allows users to access information anonoyoumously and free of charge, using the kinds of tools…

    • 1460 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    The company that I choose was PNC bank. I think that the database that would be most beneficial would be a transactional database. A transactional database is a database management system (DBMS) that has the ability to roll back or undo a database transaction or operation if it is not completed appropriately.…

    • 208 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Health Information exchange (HIE) allow providers which includes doctors, nurses, pharmacist and patients to have access to patient healthcare information. The health information exchange is a secure and safe electronic data, as well as helps facilitate coordinated patient care, reduce duplicative treatments and avoid costly mistakes. Working in the healthcare industry, I do see the benefit of government mandate that all electronic based healthcare system exchange information. It allows physicians, nurses and other providers to avoid readmissions, medication error, improve diagnoses, and decrease duplicate testing. I have come across numerous mistakes when, information is missing from the patients charts, and the doctor don’t see what other…

    • 362 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Core Credit Union Case

    • 1381 Words
    • 6 Pages

    Secured & Enhanced Delivery Handing the services to a proficient service provider enhances the delivery of required services rather than putting own nose in an unknown area of operation. Pricing In a competitive market, the prices differ of different service providers so you have the leverage to choose among the list whose services is compatible to your organization with reasonable and affordable pricing. Software Updation Acquisition of third party services puts you off from the concern of network management and software updates.…

    • 1381 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Cryptocurrency theft is a real thing, and might even get worse as technology gets more popular. Furthermore, it’s a widely known fact that Bitcoin is the preferred payment of Dark Web users, ransomware criminals, and other ill-intentioned people. Lastly, while many praise the technology for its anonymous capabilities, that also means illegal transactions are nearly impossible to trace. BLOCKCHAIN COULD MAKE TRANSACTION COSTS RISE Wait… Isn’t this technology supposed to make transactions quicker and cheaper?…

    • 626 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    1. The message I would have received as a hospital administrator from this video would have been: The importance of keeping my organization's information secure from anyone else not permitted to have my knowledge, and more specifically the knowledge of my patient's care as well as their demographic information. It is my responsibility as a hospital administrator to keep my data secure, and whether that means hiring a IT security company or maintaining a high security software is my responsibility in order to stay within HIPPA guidelines. 2.…

    • 477 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The CIA Triad

    • 611 Words
    • 3 Pages

    While most people tend to think of the spy agency when it comes to the CIA, the CIA triad is actually well known amongst those who work with information systems. (Sometimes the triad is actually referenced as the AIC triad so as to avoid confusion with the Central Intelligence Agency) (Brook, 2015). The CIA triad focuses on the characteristics necessary to have secure information.…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The first one is that It is easy to use. The internet is everywhere and almost everyone can access it. Not only can it reach people in certain regions like in-store, but it can reach world wide. With just at the click of a mouse costumers can buy and/or sell a product. Most importantly online marketing is available online three hundred sixty-five days a week twenty-four seven.…

    • 2098 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    However, there are some solutions that could be integrated in order to solve these problems. To solve the problem of intermediation, fully accredited institutions based on legislature need to be established. Once consumers see that a regulated financial intermediary is created, they will feel more confident in investing their time and money towards cryptocurrency, knowing that if something happened to funds, they would be protected. To reduce volatility, if more larger, well-known companies integrated Bitcoin as a method of payment, it would appeal to the general public and prompt them to invest and use cryptocurrencies. The day larger corporations, such as Amazon or Starbucks, begin accepting Bitcoin as a valid method of payment, the general public will be convinced that Bitcoin is “sellable” and holds value, considering that there large businesses are the pillars of commercial structure in today’s…

    • 819 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Cryptography is a science or art that protects data and information from unwanted intruders through transforming the information to a format that is unreadable. The people with the required authentication are the only ones can read or return the data to original form. It is a system dependant mainly on the usage of a key and the main basic principle of network security. Cryptography involves plain text, which is the text that someone will type in a form that is understandable to the human.…

    • 1877 Words
    • 8 Pages
    Great Essays