Privacy with Health Information Technologies: What Story Do Data Breaches in US Tell Us?

被引:0
作者
Uwizeyemungu, Sylvestre [1 ]
Poba-Nzaou, Placide [2 ]
机构
[1] Univ Quebec Trois Rivieres UQTR, Dept Sci Comptables, 3351 Boul Forges,CP 500, Trois Rivieres, PQ, Canada
[2] Univ Quebec Montreal UQAM, ESG, Dept Org & Ressources Humaines, 315 Ste Catherine Est, Montreal, PQ, Canada
来源
ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY | 2020年
关键词
Health Data Breach; Health Information Technology; Privacy; MEANINGFUL-USE; RECORD ADOPTION; HOSPITALS; CHALLENGES; INCENTIVES; SYSTEMS;
D O I
10.5220/0008977301310141
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over the last decades, health policy makers have encouraged healthcare organizations to leverage health information technology (HIT) for improving the accessibility, the quality, and the efficiency of health service delivery. The adoption of HIT has contributed to the digitization of health data, which has made these data vulnerable to information technology (IT) related security breaches. Based on data published by the US Department of Health and Human Services (DHHS), we analyze the portrait of health data breaches in the USA from 2009 to 2018 in order to figure out whether there are clear patterns of breach that stand out. In addition to descriptive statistics characterizing health data breaches, this study suggests three well-separated patterns of these breaches: (1) breaches mainly related to hacking / IT incident, (2) breaches due to unauthorized access / disclosure, and (3) breaches due to theft. All these patterns of breaches have different implications regarding priorities for health IT security and privacy professionals. However, further investigations with additional data are needed to fully comprehend the phenomenon of health data breaches and their implications in terms of IT security and privacy.
引用
收藏
页码:131 / 141
页数:11
相关论文
共 33 条
[1]  
Ablon L., 2018, The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data
[2]   Electronic health record adoption in US hospitals: the emergence of a digital "advanced use" divide [J].
Adler-Milstein, Julia ;
Holmgren, A. Jay ;
Kralovec, Peter ;
Worzala, Chantal ;
Searcy, Talisha ;
Patel, Vaishali .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2017, 24 (06) :1142-1148
[3]   HITECH Act Drove Large Gains In Hospital Electronic Health Record Adoption [J].
Adler-Milstein, Julia ;
Jha, Ashish K. .
HEALTH AFFAIRS, 2017, 36 (08) :1416-1422
[4]   Electronic Health Record Adoption In US Hospitals: Progress Continues, But Challenges Persist [J].
Adler-Milstein, Julia ;
DesRoches, Catherine M. ;
Kralovec, Peter ;
Foster, Gregory ;
Worzala, Chantal ;
Charles, Dustin ;
Searcy, Talisha ;
Jha, Ashish K. .
HEALTH AFFAIRS, 2015, 34 (12) :2174-2180
[5]   Electronic Health Systems Challenges Faced by Hospital-Based Providers [J].
Agno, Christina Farala ;
Guo, Kristina L. .
HEALTH CARE MANAGER, 2013, 32 (03) :246-252
[6]   Decision-making method using a visual approach for cluster analysis problems; indicative classification algorithms and grouping scope [J].
Bittmann, Ran M. ;
Gelbard, Roy M. .
EXPERT SYSTEMS, 2007, 24 (03) :171-187
[7]   Implementation of the Federal Health Information Technology Initiative [J].
Blumenthal, David .
NEW ENGLAND JOURNAL OF MEDICINE, 2011, 365 (25) :2426-2431
[8]   Stimulating the Adoption of Health Information Technology. [J].
Blumenthal, David .
NEW ENGLAND JOURNAL OF MEDICINE, 2009, 360 (15) :1477-1479
[9]   Healthcare Data Breaches: Implications for Digital Forensic Readiness [J].
Chernyshev, Maxim ;
Zeadally, Sherali ;
Baig, Zubair .
JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (01)
[10]   Effects of health information technology and health information exchanges on readmissions and length of stay [J].
Daniel, Onyinyechi U. .
HEALTH POLICY AND TECHNOLOGY, 2018, 7 (03) :281-286