Exploring and Mitigating Cybersecurity Challenges in Electronic Health Records

William J. Triplett

Abstract


This study explores the complexities of cybersecurity challenges in electronic health record (EHR) systems and provides comprehensive solutions to enhance security. Furthermore, it analyzes existing research on EHR cybersecurity, considers relevant frameworks, and presents a well-designed research approach. Extensive research has examined the cybersecurity landscape of electronic health records (EHRs). Furthermore, it identifies the inherent flaws, challenges, and threats prevalent in existing systems and firmly emphasizes the need for robust security solutions to safeguard sensitive patient information. This study highlights the significance of addressing EHR cybersecurity concerns, enhancing existing knowledge on vulnerabilities, and providing a comprehensive understanding of this field. The study emphasizes the need for proactive and multifaceted security measures that can adapt to the ever-evolving landscape of cyber threats. Future research must continue to explore innovative tools and methodologies to safeguard EHRs against the increasing complexity and sophistication of cyber threats.


Keywords


Cybersecurity; Digital; Electronic Health Records; Encryption; Security Breaches

Full Text:

PDF

References


Alharam, A.K., El-Madany, W.: The effects of cyber-security on healthcare industry 9th IEEE-GCC Conf. Exhib. GCCCE, vol. 2017. (2018). doi:10.1109/IEEEGCC.2017.8448206

Bai, G., Jiang, J.X., Flasher, R.: Hospital risk of data breaches. JAMA Intern. Med. 177, 878–880 (2017). doi:10.1001/JAMAINTERNMED.2017.0336

Burke, W., Oseni, T., Jolfaei, A., Gondal, I.: Cybersecurity indexes for ehealth. ACM Int. Conf. Proceeding Ser., 1–8 (2019). doi:10.1145/3290688.3290721

Chen, Q., Lambright, J., Abdelwahed, S.: Towards autonomic security management of healthcare information systems First Int. Conf. Connect. Heal. Appl. Syst. Eng. Technol., pp. 113–118 (2016). doi:10.1109/CHASE.2016.58

Clarke, M., Martin, K.: Managing cybersecurity risk in healthcare settings. Healthc. Manage. Forum, 8404704231195804 (2023). doi.org/10.1177/08404704231195804

Coventry, L., Branley, D.: Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas 113, 48–52 (2018). doi:10.1016/J.MATURITAS.2018.04.008

Cuenca, J.V., A.: Capstone, CYBERSECURITY CHALLENGES IN HEALTHCARE INDUSTRIES (2017)

Daraghmeh, R., Brown, R., Big Data, A. Conf. Inf. Technol., pp. 826–833 (2021). doi:10.1109/ICIT52682.2021.9491781

Ferreira, D.J., Mateus-Coelho, N.: Cybersecurity risks in health data and measures to take. Https://Services. Igi-Global.com/Resolvedoi/Resolve.Aspx?Doi=10.4018/978-1-6684-8422-7.Ch001 1AD, 1–18 (2023). doi:10.4018/978-1-6684-8422-7.CH001

Ghafur, S., Grass, E., Jennings, N.R., Darzi, A.: The challenges of cybersecurity in health care: The UK National Health Service as a case study. Lancet Digit. Health 1, e10–e12 (2019). doi:10.1016/S2589-7500(19)30005-6

How effective is your cybersecurity audit?, https://www.isaca.org/resources/isaca-journal/issues/2022/volume-3/how-effective-is-your-cybersecurity-audit (Accessed October 16, 2023) (n.d.)

Huang, C., Koppel, R., McGreevey, J.D., Craven, C.K., Schreiber, R.: Transitions from one electronic health record to another: Challenges, pitfalls, and recommendations. Appl. Clin. Inform. 11, 742–754 (2020). doi:10.1055/S-0040-1718535

Kandasamy, K., Srinivas, S., Achuthan, K., Rangan, V.P.: IoT cyber risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP J. Inf. Secur. 2020, 1–18 (2020). doi:10.1186/S13635-020-00111-0/TABLES/8

Keshta, I., Odeh, A.: Security and privacy of electronic health records: Concerns and challenges. Egypt. Inform. J. 22, 177–183 (2021). doi:10.1016/J.EIJ.2020.07.003

Kioskli, K., Fotis, T., Mouratidis, H.: The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations. ACM Int. Conf. Proceeding Ser., 1–9 (2021). doi:10.1145/3465481.3470033

Kruse, C.S., Smith, B., Vanderlinden, H., Nealand, A.: Security techniques for the electronic health records. J. Med. Syst. 41, 127 (2017). doi:10.1007/S10916-017-0778-4

Luh, F., Yen, Y.: Cybersecurity in science and medicine: Threats and challenges. Trends Biotechnol. 38, 825–828 (2020). doi:10.1016/J.TIBTECH.2020.02.010

Majkowski, G.O.: Healthcare Cybersecurity: Building a Cyber Vulnerability Profile for US Hospitals. The University of Alabama at Birmingham (2019)

McDermott, D.S., Kamerer, J.L., Birk, A.T.: Electronic health records. Int. J. Cyber Res. Educ. 1, 42–49 (2019). doi:10.4018/IJCRE.2019070104

Medhekar, A., My Health Record and Emerging Cybersecurity Challenges in the Australian Digital Environment, Res. Anthol. Secur. Med. Syst. Rec. 428–447 (2022). doi:10.4018/978-1-6684-6311-6.CH021

Mohammed, D.: U.S. healthcare industry: Cybersecurity regulatory and compliance issues, J. Res. J. Bus. Econ. Manag. (2017), www.scitecresearch.com/journals/index.php/jrbem. (Accessed October 16, 2023)

Ofe, M., Schmitt, A.: A Qualitative Study Exploring Security Practices Healthcare Providers Need to Reduce the Risk of Successful Ransomware Attacks on Electronic Health Record Systems Committee Members (2023)

Puri, M., Gochhait, S.: Data security in healthcare: Enhancing the safety of data with CyberSecurity: Proc. 8th Int. Conf. Commun. Syst. ICCES 2023, pp. 1779–1783 (2023). doi:10.1109/ICCES57224.2023.10192596

Sendelj, R., Ognjanovic, I.: Cybersecurity challenges in healthcare. In: Achievements, Milestones and Challenges in Biomedical and Health Informatics, pp. 190–202 (2022). doi: 10.3233/SHTI220951

Shah, S.M., Khan, R.A.: Secondary use of electronic health record: Opportunities and challenges. IEEE Access 8, 136947–136965 (2020). doi:10.1109/ACCESS.2020.3011099

Sempeles, S.: Concerns continue to rise regarding device cyber security. J. Clin. Eng. 39, 100–101 (2014). doi:10.1097/JCE.0000000000000044

Sitaru, S., Bramm, G., Zink, A., Hiller, M.: Cybersecurity in digital healthcare—Challenges and potential solutions, Dermatologie 74, 213–217 (2023). doi:10.1007/S00105-023-05117-6/METRICS

Slotwiner, D.J., Deering, T.F., Fu, K., Russo, A.M., Walsh, M.N., Van Hare, G.F.: Cybersecurity vulnerabilities of cardiac implantable electronic devices: Communication strategies for clinicians—Proceedings of the Heart Rhythm Society’s Leadership Summit, Hear. Rhythm. 15, e61–e67 (2018). doi:10.1016/J.HRTHM.2018.05.001

Thompson, E.C.: Designing a HIPAA-Compliant Security Operations Center: A guide to detecting and responding to healthcare breaches and events, Des. A HIPAA-Compliant Secur. Oper. Cent. Guid. Detect. Responding Healthc. Breaches Events, 1–231 (2020). doi:10.1007/978-1-4842-5608-4

Waddell, M.: Human factors in cybersecurity: Designing an effective cybersecurity education program for healthcare staff. Healthc. Manage. Forum, 8404704231196137 (2023). doi.org/10.1177/08404704231196137

Yeo, L.H., Banfield, J.: Human factors in electronic health records cybersecurity breach: An exploratory analysis. Perspect. Heal. Inf. Manag. 19, 1i (2022). /pmc/articles/PMC9123525/ (accessed October 16, 2023)




DOI: https://doi.org/10.53889/citj.v2i1.344

Article Metrics

Abstract view : 609 times
PDF - 709 times

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Cybersecurity and Innovative Technology Journal

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.