Exploring and Mitigating Cybersecurity Challenges in Electronic Health Records
Abstract
This study explores the complexities of cybersecurity challenges in electronic health record (EHR) systems and provides comprehensive solutions to enhance security. Furthermore, it analyzes existing research on EHR cybersecurity, considers relevant frameworks, and presents a well-designed research approach. Extensive research has examined the cybersecurity landscape of electronic health records (EHRs). Furthermore, it identifies the inherent flaws, challenges, and threats prevalent in existing systems and firmly emphasizes the need for robust security solutions to safeguard sensitive patient information. This study highlights the significance of addressing EHR cybersecurity concerns, enhancing existing knowledge on vulnerabilities, and providing a comprehensive understanding of this field. The study emphasizes the need for proactive and multifaceted security measures that can adapt to the ever-evolving landscape of cyber threats. Future research must continue to explore innovative tools and methodologies to safeguard EHRs against the increasing complexity and sophistication of cyber threats.
Keywords
Full Text:
PDFReferences
Alharam, A.K., El-Madany, W.: The effects of cyber-security on healthcare industry 9th IEEE-GCC Conf. Exhib. GCCCE, vol. 2017. (2018). doi:10.1109/IEEEGCC.2017.8448206
Bai, G., Jiang, J.X., Flasher, R.: Hospital risk of data breaches. JAMA Intern. Med. 177, 878–880 (2017). doi:10.1001/JAMAINTERNMED.2017.0336
Burke, W., Oseni, T., Jolfaei, A., Gondal, I.: Cybersecurity indexes for ehealth. ACM Int. Conf. Proceeding Ser., 1–8 (2019). doi:10.1145/3290688.3290721
Chen, Q., Lambright, J., Abdelwahed, S.: Towards autonomic security management of healthcare information systems First Int. Conf. Connect. Heal. Appl. Syst. Eng. Technol., pp. 113–118 (2016). doi:10.1109/CHASE.2016.58
Clarke, M., Martin, K.: Managing cybersecurity risk in healthcare settings. Healthc. Manage. Forum, 8404704231195804 (2023). doi.org/10.1177/08404704231195804
Coventry, L., Branley, D.: Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas 113, 48–52 (2018). doi:10.1016/J.MATURITAS.2018.04.008
Cuenca, J.V., A.: Capstone, CYBERSECURITY CHALLENGES IN HEALTHCARE INDUSTRIES (2017)
Daraghmeh, R., Brown, R., Big Data, A. Conf. Inf. Technol., pp. 826–833 (2021). doi:10.1109/ICIT52682.2021.9491781
Ferreira, D.J., Mateus-Coelho, N.: Cybersecurity risks in health data and measures to take. Https://Services. Igi-Global.com/Resolvedoi/Resolve.Aspx?Doi=10.4018/978-1-6684-8422-7.Ch001 1AD, 1–18 (2023). doi:10.4018/978-1-6684-8422-7.CH001
Ghafur, S., Grass, E., Jennings, N.R., Darzi, A.: The challenges of cybersecurity in health care: The UK National Health Service as a case study. Lancet Digit. Health 1, e10–e12 (2019). doi:10.1016/S2589-7500(19)30005-6
How effective is your cybersecurity audit?, https://www.isaca.org/resources/isaca-journal/issues/2022/volume-3/how-effective-is-your-cybersecurity-audit (Accessed October 16, 2023) (n.d.)
Huang, C., Koppel, R., McGreevey, J.D., Craven, C.K., Schreiber, R.: Transitions from one electronic health record to another: Challenges, pitfalls, and recommendations. Appl. Clin. Inform. 11, 742–754 (2020). doi:10.1055/S-0040-1718535
Kandasamy, K., Srinivas, S., Achuthan, K., Rangan, V.P.: IoT cyber risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP J. Inf. Secur. 2020, 1–18 (2020). doi:10.1186/S13635-020-00111-0/TABLES/8
Keshta, I., Odeh, A.: Security and privacy of electronic health records: Concerns and challenges. Egypt. Inform. J. 22, 177–183 (2021). doi:10.1016/J.EIJ.2020.07.003
Kioskli, K., Fotis, T., Mouratidis, H.: The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations. ACM Int. Conf. Proceeding Ser., 1–9 (2021). doi:10.1145/3465481.3470033
Kruse, C.S., Smith, B., Vanderlinden, H., Nealand, A.: Security techniques for the electronic health records. J. Med. Syst. 41, 127 (2017). doi:10.1007/S10916-017-0778-4
Luh, F., Yen, Y.: Cybersecurity in science and medicine: Threats and challenges. Trends Biotechnol. 38, 825–828 (2020). doi:10.1016/J.TIBTECH.2020.02.010
Majkowski, G.O.: Healthcare Cybersecurity: Building a Cyber Vulnerability Profile for US Hospitals. The University of Alabama at Birmingham (2019)
McDermott, D.S., Kamerer, J.L., Birk, A.T.: Electronic health records. Int. J. Cyber Res. Educ. 1, 42–49 (2019). doi:10.4018/IJCRE.2019070104
Medhekar, A., My Health Record and Emerging Cybersecurity Challenges in the Australian Digital Environment, Res. Anthol. Secur. Med. Syst. Rec. 428–447 (2022). doi:10.4018/978-1-6684-6311-6.CH021
Mohammed, D.: U.S. healthcare industry: Cybersecurity regulatory and compliance issues, J. Res. J. Bus. Econ. Manag. (2017), www.scitecresearch.com/journals/index.php/jrbem. (Accessed October 16, 2023)
Ofe, M., Schmitt, A.: A Qualitative Study Exploring Security Practices Healthcare Providers Need to Reduce the Risk of Successful Ransomware Attacks on Electronic Health Record Systems Committee Members (2023)
Puri, M., Gochhait, S.: Data security in healthcare: Enhancing the safety of data with CyberSecurity: Proc. 8th Int. Conf. Commun. Syst. ICCES 2023, pp. 1779–1783 (2023). doi:10.1109/ICCES57224.2023.10192596
Sendelj, R., Ognjanovic, I.: Cybersecurity challenges in healthcare. In: Achievements, Milestones and Challenges in Biomedical and Health Informatics, pp. 190–202 (2022). doi: 10.3233/SHTI220951
Shah, S.M., Khan, R.A.: Secondary use of electronic health record: Opportunities and challenges. IEEE Access 8, 136947–136965 (2020). doi:10.1109/ACCESS.2020.3011099
Sempeles, S.: Concerns continue to rise regarding device cyber security. J. Clin. Eng. 39, 100–101 (2014). doi:10.1097/JCE.0000000000000044
Sitaru, S., Bramm, G., Zink, A., Hiller, M.: Cybersecurity in digital healthcare—Challenges and potential solutions, Dermatologie 74, 213–217 (2023). doi:10.1007/S00105-023-05117-6/METRICS
Slotwiner, D.J., Deering, T.F., Fu, K., Russo, A.M., Walsh, M.N., Van Hare, G.F.: Cybersecurity vulnerabilities of cardiac implantable electronic devices: Communication strategies for clinicians—Proceedings of the Heart Rhythm Society’s Leadership Summit, Hear. Rhythm. 15, e61–e67 (2018). doi:10.1016/J.HRTHM.2018.05.001
Thompson, E.C.: Designing a HIPAA-Compliant Security Operations Center: A guide to detecting and responding to healthcare breaches and events, Des. A HIPAA-Compliant Secur. Oper. Cent. Guid. Detect. Responding Healthc. Breaches Events, 1–231 (2020). doi:10.1007/978-1-4842-5608-4
Waddell, M.: Human factors in cybersecurity: Designing an effective cybersecurity education program for healthcare staff. Healthc. Manage. Forum, 8404704231196137 (2023). doi.org/10.1177/08404704231196137
Yeo, L.H., Banfield, J.: Human factors in electronic health records cybersecurity breach: An exploratory analysis. Perspect. Heal. Inf. Manag. 19, 1i (2022). /pmc/articles/PMC9123525/ (accessed October 16, 2023)
DOI: https://doi.org/10.53889/citj.v2i1.344
Article Metrics
Abstract view : 609 timesPDF - 709 times
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Cybersecurity and Innovative Technology Journal

This work is licensed under a Creative Commons Attribution 4.0 International License.