Analyzing the Implications of Healthcare Data Breaches through Computational Technique

被引:47
作者
Almulihi, Ahmed H. [1 ]
Alassery, Fawaz [2 ]
Khan, Asif Irshad [3 ]
Shukla, Sarita [4 ]
Gupta, Bineet Kumar [4 ]
Kumar, Rajeev [4 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, At Taif, Saudi Arabia
[2] Taif Univ, Coll Comp & Informat Technol, Dept Comp Engn, At Taif, Saudi Arabia
[3] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah 21589, Saudi Arabia
[4] Shri Ramswaroop Mem Univ, Dept Comp Applicat, Barabanki 225003, Uttar Pradesh, India
关键词
Big data security; healthcare big data breaches; cost effectiveness; big data analysis; IMPACT;
D O I
10.32604/iasc.2022.023460
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The contributions of the Internet of Medical Things (IoMT), cloud services, information systems, and smart devices are useful for the healthcare industry. With the help of digital healthcare, our lives have been made much more secure and effortless and provide more convenient and accessible treatment. In current, the modern healthcare sector has become more significant and convenient for the purpose of both external and internal threats. Big data breaches affect clients, stakeholders, organisations, and businesses, and they are a source of concern and complication for security professionals. This research examines the many types and categories of big data breaches that companies face. In addition, the study's main purpose is to investigate and draw conclusions from healthcare big data breaches, with the goal of improving healthcare big data confidentiality. From the beginning of 2020-21, both years, practically our entire world moved online due to the COVID-19 pandemic. The coronavirus pandemic dramatically increased the extent of use of technology. Hacking/IT incidents, followed by unauthorised internal disclosures, are the most typical attacks behind healthcare data breaches, according to the report. This has become a main enticement for healthcare data theft and misuse. The number of healthcare big data breaches, the number of records exposed, and the resulting significant commercial losses are increasing. In the report, they analyze and investigate the number of healthcare big data breaches, the number of records exposed during the COVID-19 pandemic. Also, the study assesses the correctness of the datasets in order to achieve a dynamic digital healthcare data breaches environment using fuzzy based computational technique.
引用
收藏
页码:1763 / 1779
页数:17
相关论文
共 18 条
[1]   Impact of Tools and Techniques for Securing Consultancy Services [J].
Alosaimi, Wael ;
Alharbi, Abdullah ;
Alyami, Hashem ;
Ahmad, Masood ;
Pandey, Abhishek Kumar ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (03) :347-360
[2]   Device Security Assessment of Internet of Healthcare Things [J].
Attaallah, Abdulaziz ;
Ahmad, Masood ;
Ansari, Md Tarique Jamal ;
Pandey, Abhishek Kumar ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 27 (02) :593-603
[3]   Mechanisms for increasing the usability of grid security [J].
Beckles, B ;
Welch, V ;
Basney, J .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) :74-101
[4]   Healthcare Data Breaches: Implications for Digital Forensic Readiness [J].
Chernyshev, Maxim ;
Zeadally, Sherali ;
Baig, Zubair .
JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (01)
[5]  
Collins JD, 2011, INT J CYBER CRIMINOL, V5, P794
[6]   Human and Organizational Factors of Healthcare Data Breaches: The Swiss Cheese Model of Data Breach Causation And Prevention [J].
Kamoun, Faouzi ;
Nicho, Mathew .
INTERNATIONAL JOURNAL OF HEALTHCARE INFORMATION SYSTEMS AND INFORMATICS, 2014, 9 (01) :42-60
[7]   Evaluating Performance of Software Durability through an Integrated Fuzzy-Based Symmetrical Method of ANP and TOPSIS [J].
Khan, Suhel Ahmad ;
Alenezi, Mamdouh ;
Agrawal, Alka ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
SYMMETRY-BASEL, 2020, 12 (04)
[8]   Analytical network process for software security: a design perspective [J].
Rajeev Kumar ;
Suhel Ahmad Khan ;
Raees Ahmad Khan .
CSI Transactions on ICT, 2016, 4 (2-4) :255-258
[9]   Measuring Security Durability of Software through Fuzzy-Based Decision-Making Process [J].
Kumar, Rajeev ;
Zarour, Mohammad ;
Alenezi, Mamdouh ;
Agrawal, Alka ;
Khan, Raees Ahmad .
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2019, 12 (02) :627-642
[10]   Data Breaches of Protected Health Information in the United States [J].
Liu, Vincent ;
Musen, Mark A. ;
Chou, Timothy .
JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 2015, 313 (14) :1471-1473