A systematic analysis of failures in protecting personal health data: A scoping review

被引:44
作者
Pool, Javad [1 ,2 ]
Akhlaghpour, Saeed [3 ]
Fatehi, Farhad [4 ,5 ]
Burton-Jones, Andrew [3 ]
机构
[1] Univ Queensland, ARC Ind Transformat Training Ctr Informat Resilien, Brisbane, Australia
[2] Univ Queensland, Sch Elect Engn & Comp Sci, Brisbane, Australia
[3] Univ Queensland, Business Sch, Brisbane, Australia
[4] Univ Queensland, Fac Med, Ctr Hlth Serv Res, Brisbane, Australia
[5] Monash Univ, Sch Psychol Sci, Melbourne, Australia
关键词
Data privacy; Cybersecurity; Personal health data; Data breach; Data protection; Digital health; INFORMATION SECURITY POLICY; MEDICAL DATA BREACHES; CARE DATA BREACHES; PRIVACY CONCERNS; REPRESENTATION-THEORY; PATIENT DATA; CONTEXT; AWARENESS; TECHNOLOGY; MANAGEMENT;
D O I
10.1016/j.ijinfomgt.2023.102719
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Personal health data breaches pose significant challenges to healthcare providers and clients. This study systematically analyzes 5470 records and reviews 120 articles on this theoretically and practically important topic. It summarizes the existing literature and develops an integrative model with eleven propositions explaining the multifaceted nature of health data breaches, their facilitators, and their impacts. We report on the gaps in the current literature and discuss six promising avenues of future research, including specific suggestions for multilevel analysis, use of novel methods, contributions to information systems theory, stakeholder analysis, underexplored themes, and boundary-breaching opportunities. Beyond these findings, our study offers implications for key stakeholders in healthcare settings. This study equips practitioners and researchers with a valuable model for evidence-based data breach risk management and offers guidance for future investigations, enhancing our collective understanding of personal health data breaches within healthcare.
引用
收藏
页数:29
相关论文
共 253 条
[1]   Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers [J].
Agaku, Israel T. ;
Adisa, Akinyele O. ;
Ayo-Yusuf, Olalekan A. ;
Connolly, Gregory N. .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2014, 21 (02) :374-378
[2]   The Digital Transformation of Healthcare: Current Status and the Road Ahead [J].
Agarwal, Ritu ;
Gao, Guodong ;
DesRoches, Catherine ;
Jha, Ashish K. .
INFORMATION SYSTEMS RESEARCH, 2010, 21 (04) :796-809
[3]   Public Disclosure on Social Media of Identifiable Patient Information by Health Professionals: Content Analysis of Twitter Data [J].
Ahmed, Wasim ;
Jagsi, Reshma ;
Gutheil, Thomas G. ;
Katz, Matthew S. .
JOURNAL OF MEDICAL INTERNET RESEARCH, 2020, 22 (09)
[4]   Learning from Enforcement Cases to Manage GDPR Risks [J].
Akhlaghpour, Saeed ;
Hassandoust, Farkhondeh ;
Fatehi, Farhad ;
Burton-Jones, Andrew ;
Hynd, Andrew .
MIS QUARTERLY EXECUTIVE, 2021, 20 (03) :199-218
[5]   Factors influencing adoption of mobile banking by Jordanian bank customers: Extending UTAUT2 with trust [J].
Alalwan, Ali Abdallah ;
Dwivedi, Yogesh K. ;
Rana, Nripendra P. .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2017, 37 (03) :99-110
[6]  
Albarrak AI, 2012, HEALTHMED, V6, P2349
[7]  
Alder S., 2023, HIPAA Journal
[8]   Analyzing the Implications of Healthcare Data Breaches through Computational Technique [J].
Almulihi, Ahmed H. ;
Alassery, Fawaz ;
Khan, Asif Irshad ;
Shukla, Sarita ;
Gupta, Bineet Kumar ;
Kumar, Rajeev .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (03) :1763-1779
[9]   Estimating Security Risk of Healthcare Web Applications: A Design Perspective [J].
Alzahrani, Fahad A. .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (01) :187-209
[10]   An integrated framework for securing semi-structured health records [J].
Amato, Flora ;
De Pietro, Giuseppe ;
Esposito, Massimo ;
Mazzocca, Nicola .
KNOWLEDGE-BASED SYSTEMS, 2015, 79 :99-117