Title: Security & Privacy of Electronic Health Records

Authors: Sultan O. ‏Aladwani, Mohammed A. Almotairi

 DOI: https://dx.doi.org/10.18535/jmscr/v11i6.17

Abstract

Healthcare facilities like hospitals and clinics are adopting new technology at a dizzying pace. However, confidentiality concerns are frequently neglected, placing healthcare institutions at risk of cyber security problems, fines, reputational harm, and even catastrophic patient implications. Clinical documentation, patient profiles, lab findings, imaging findings, and diagnostic procedures make up Electronic Health Record (EHR) systems. EHRs are getting more and more complex with time, necessitating more and more data storage. In order to secure healthcare-based technologies and networks, new protection and security techniques are being explored with the growth of the IoT, Software as a service, and City Development platforms.

References

  1. A. links open overlay panel Arnab Ray, Arnab Ray, and Abstract The purpose of this chapter is twofold. First, “Basic cyber security concepts,” Cyber security for Connected Medical Devices, 12-Nov-2021. [Online]. Available: https://www.sciencedirect.com/science/article/pii/B9780128182628000085. [Accessed: 07-Jan-2023].
  2. Author links open overlay panel Muzammil Hussaina Ahmed Al-Haiqia O.A. Zaidanab Person Envelope B.B. Zaidana M.L.M. Kiaha Nor Badrul Anuara Mohamed Abdulnabia, Muzammil Hussain, a, Ahmed Al-Haiqia, A.A. Zaidanab Person Envelope, b, B.B. Zaidana, M.L.M. Kiaha, N. Badrul Anuar, Mohamed Abdulnabi al, Highlights• Mapping the research landscape of smartphone medical apps into a coherent taxonomy.•Figure out the motivation of using smartphone apps in medicine & healthcare.•Highlight the open challenges that hinder the utility of medical apps.• Recommendation, and Abstract Objective T o survey researchers’ efforts in response to the new and disruptive technology of smartphone medical apps, “The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations,'' Computer Methods and Programs in Biomedicine, 03-Sep-2015. [Online]. Available: https://www.sciencedirect.com/science/article/abs/pii/S0169260715002254. [Accessed: 07-Jan-2023].
  3. D. F. Sittig and H. Singh, “A new socio-technical model for studying health information technology in complex Adaptive Healthcare Systems,” Springer Link, 01-Jan-1970. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-319-17272-9_4. [Accessed: 07-Jan-2023].
  4. H. O. Alanazi, A. A. Zaidan, B. B. Zaidan, M. L. M. Kiah, and S. H. Al-Bakri, “Meeting the security requirements of electronic medical records in the era of high-speed computing - journal of medical systems,” Springer Link, 07-Dec-2014. [Online]. Available: https://link.springer.com/article/10.1007/s10916-014-0165-3. [Accessed: 07-Jan-2023].
  5. M. D. Vincent Liu, “Data breaches of Protected Health Information,” JAMA, 14-Apr-2015. [Online]. Available: https://jamanetwork.com/journals/jama/article-abstract/2247135. [Accessed: 07-Jan-2023].
  6. M. L. M. Kiah, B. B. Zaidan, A. A. Zaidan, M. Nabi, and R. Ibraheem, “MIRASS: Medical Informatics Research Activity Support System USING INFORMATION MASHUP Network - Journal of Medical Systems,” Springer Link, 04-Apr-2014. [Online]. Available: https://link.springer.com/article/10.1007/s10916-014-0037-x. [Accessed: 07-Jan-2023].
  7. M. Whetstone and R. Goldsmith, “Factors influencing intention to use personal health records,” International Journal of Pharmaceutical and Healthcare Marketing, 03-Apr-2009. [Online]. Available: https://www.emerald.com/insight/content/doi/10.1108/17506120910948485/full/html. [Accessed: 07-Jan-2023].
  8. O. Dorgham, B. Al-Rahamneh, A. Almomani, M. Al-Hadidi, and K. F. Khatatneh, “Enhancing the security of exchanging and storing DICOM medical images on the cloud,” International Journal of Cloud Applications and Computing (IJCAC), 01-Jan-2018. [Online]. Available: https://www.igi-global.com/article/enhancing-the-security-of-exchanging-and-storing-dicom-medical-images-on-the-cloud/196196. [Accessed: 07-Jan-2023].
  9. Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the internet of things: Perspectives and challenges - wireless networks,” SpringerLink, 17-Jun-2014. [Online]. Available: https://link.springer.com/article/10.1007/s11276-014-0761-7. [Accessed: 07-Jan-2023].
  10. S. B. Wikina, “What caused the breach? an examination of use of information technology and health data breaches,” Perspectives in health information management, 01-Oct-2014. [Online]. Available: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4272442/. [Accessed: 07-Jan-2023].
  11. T. Dehling and A. Sunyaev, “Secure provision of patient-centred health information technology services in public networks-leveraging security and privacy features provided by the German nationwide health information technology infrastructure - electronic markets,” SpringerLink, 08-Feb-2014. [Online]. Available: https://link.springer.com/article/10.1007/s12525-013-0150-6. [Accessed: 07-Jan-2023].
  12. E. K. Achampong, “Electronic health record (EHR) and cloud security: The current issues,” UCC IR Home, 01-Dec-2013. [Online]. Available: https://ir.ucc.edu.gh/xmlui/handle/123456789/5272. [Accessed: 07-Jan-2023].
  13. O. S. Albahri, A. S. Albahri, K. I. Mohammed, A. A. Zaidan, B. B. Zaidan, M. Hashim, and O. H. Salman, “Systematic review of real-time remote health monitoring system in triage and priority-based sensor technology: Taxonomy, open challenges, motivation and recommendations - Journal of Medical Systems,” SpringerLink, 22-Mar-2018. [Online]. Available: https://link.springer.com/article/10.1007/s10916-018-0943-4?utm_source=getftr&utm_medium=getftr&utm_campaign=getftr_pilot. [Accessed: 07-Jan-2023].
  14. T. A. I. N. R. I. A. Paris-Rocquencourt, T. Allard, I. N. R. I. A. Paris-Rocquencourt, N. A. I. N. R. I. A. Paris-Rocquencourt, N. Anciaux, L. B. I. N. R. I. A. Paris-Rocquencourt, L. Bouganim, Y. G. I. N. R. I. A. Paris-Rocquencourt, Y. Guo, L. L. F. I. N. R. I. A. Paris-Rocquencourt, L. L. Folgoc, B. N. I. N. R. I. A. Paris-Rocquencourt, B. Nguyen, P. P. I. N. R. I. A. Paris-Rocquencourt, P. Pucheral, I. R. C. S. University, I. Ray, C. S. University, I. R. C. S. University, I. Ray, S. Y. I. N. R. I. A. Paris-Rocquencourt, S. Yin, and O. M. V. A. Metrics, “Secure Personal Data Servers: A Vision Paper: Proceedings of the VLDB endowment: Vol 3, no 1-2,” Proceedings of the VLDB Endowment, 01-Sep-2010. [Online]. Available: https://dl.acm.org/doi/10.14778/1920841.1920850. [Accessed: 07-Jan-2023].

Corresponding Author

Sultan O. ‏Aladwani

Specialist-Health Administration