Conţinutul numărului revistei |
Articolul precedent |
Articolul urmator |
![]() |
![]() ![]() |
Ultima descărcare din IBN: 2023-03-25 10:02 |
Căutarea după subiecte similare conform CZU |
[004.78+004.89]:61 (1) |
Computer communication. Computer networks (365) |
Artificial intelligence (213) |
Medical sciences (9388) |
![]() KHAN, ShahidulIslam; HOQUE, AbuSayedMd.Latiful. Digital Health Data: A Comprehensive Review
of Privacy and Security Risks and Some
Recommendations. In: Computer Science Journal of Moldova. 2016, nr. 2(71), pp. 273-292. ISSN 1561-4042. |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
Computer Science Journal of Moldova | |||||
Numărul 2(71) / 2016 / ISSN 1561-4042 | |||||
|
|||||
CZU: [004.78+004.89]:61 | |||||
Pag. 273-292 | |||||
|
|||||
![]() |
|||||
Rezumat | |||||
In todays world, health data are being produced in everincreasing amounts due to extensive use of medical devices generating data in digital form. These data are stored in diverse formats at different health information systems. Medical practitioners and researchers can be benefited significantly if these massive heterogeneous data could be integrated and made accessible through a common platform. On the other hand, digital health data containing protected health information (PHI) are the main target of the cybercriminals. In this paper, we have provided a state of the art review of the security threats in the integrated healthcare information systems. According to our analysis, healthcare data servers are leading target of the hackers because of monetary value. At present, attacks on healthcare organizations’ data are 1.25 times higher compared to five years ago. We have provided some important recommendations to minimize the risk of attacks and to reduce the chance of compromising patients’ privacy after any successful attack. |
|||||
Cuvinte-cheie Health Data, Data Breach, PHI, Privacy, Security |
|||||
|
Cerif XML Export
<?xml version='1.0' encoding='utf-8'?> <CERIF xmlns='urn:xmlns:org:eurocris:cerif-1.5-1' xsi:schemaLocation='urn:xmlns:org:eurocris:cerif-1.5-1 http://www.eurocris.org/Uploads/Web%20pages/CERIF-1.5/CERIF_1.5_1.xsd' xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' release='1.5' date='2012-10-07' sourceDatabase='Output Profile'> <cfResPubl> <cfResPublId>ibn-ResPubl-46521</cfResPublId> <cfResPublDate>2016-08-25</cfResPublDate> <cfVol>71</cfVol> <cfIssue>2</cfIssue> <cfStartPage>273</cfStartPage> <cfISSN>1561-4042</cfISSN> <cfURI>https://ibn.idsi.md/ro/vizualizare_articol/46521</cfURI> <cfTitle cfLangCode='EN' cfTrans='o'>Digital Health Data: A Comprehensive Review of Privacy and Security Risks and Some Recommendations</cfTitle> <cfKeyw cfLangCode='EN' cfTrans='o'>Health Data; Privacy; Security; Data Breach; PHI</cfKeyw> <cfAbstr cfLangCode='EN' cfTrans='o'>In todays world, health data are being produced in everincreasing amounts due to extensive use of medical devices generating data in digital form. These data are stored in diverse formats at different health information systems. Medical practitioners and researchers can be benefited significantly if these massive heterogeneous data could be integrated and made accessible through a common platform. On the other hand, digital health data containing protected health information (PHI) are the main target of the cybercriminals. In this paper, we have provided a state of the art review of the security threats in the integrated healthcare information systems. According to our analysis, healthcare data servers are leading target of the hackers because of monetary value. At present, attacks on healthcare organizations’ data are 1.25 times higher compared to five years ago. We have provided some important recommendations to minimize the risk of attacks and to reduce the chance of compromising patients’ privacy after any successful attack. </cfAbstr> <cfResPubl_Class> <cfClassId>eda2d9e9-34c5-11e1-b86c-0800200c9a66</cfClassId> <cfClassSchemeId>759af938-34ae-11e1-b86c-0800200c9a66</cfClassSchemeId> <cfStartDate>2016-08-25T24:00:00</cfStartDate> </cfResPubl_Class> <cfResPubl_Class> <cfClassId>e601872f-4b7e-4d88-929f-7df027b226c9</cfClassId> <cfClassSchemeId>40e90e2f-446d-460a-98e5-5dce57550c48</cfClassSchemeId> <cfStartDate>2016-08-25T24:00:00</cfStartDate> </cfResPubl_Class> <cfPers_ResPubl> <cfPersId>ibn-person-47591</cfPersId> <cfClassId>49815870-1cfe-11e1-8bc2-0800200c9a66</cfClassId> <cfClassSchemeId>b7135ad0-1d00-11e1-8bc2-0800200c9a66</cfClassSchemeId> <cfStartDate>2016-08-25T24:00:00</cfStartDate> </cfPers_ResPubl> <cfPers_ResPubl> <cfPersId>ibn-person-47592</cfPersId> <cfClassId>49815870-1cfe-11e1-8bc2-0800200c9a66</cfClassId> <cfClassSchemeId>b7135ad0-1d00-11e1-8bc2-0800200c9a66</cfClassSchemeId> <cfStartDate>2016-08-25T24:00:00</cfStartDate> </cfPers_ResPubl> </cfResPubl> <cfPers> <cfPersId>ibn-Pers-47591</cfPersId> <cfPersName_Pers> <cfPersNameId>ibn-PersName-47591-3</cfPersNameId> <cfClassId>55f90543-d631-42eb-8d47-d8d9266cbb26</cfClassId> <cfClassSchemeId>7375609d-cfa6-45ce-a803-75de69abe21f</cfClassSchemeId> <cfStartDate>2016-08-25T24:00:00</cfStartDate> <cfFamilyNames>Khan</cfFamilyNames> <cfFirstNames>ShahidulIslam</cfFirstNames> </cfPersName_Pers> </cfPers> <cfPers> <cfPersId>ibn-Pers-47592</cfPersId> <cfPersName_Pers> <cfPersNameId>ibn-PersName-47592-3</cfPersNameId> <cfClassId>55f90543-d631-42eb-8d47-d8d9266cbb26</cfClassId> <cfClassSchemeId>7375609d-cfa6-45ce-a803-75de69abe21f</cfClassSchemeId> <cfStartDate>2016-08-25T24:00:00</cfStartDate> <cfFamilyNames>Hoque</cfFamilyNames> <cfFirstNames>AbuSayedMd.Latiful</cfFirstNames> </cfPersName_Pers> </cfPers> </CERIF>