Abstract
To address rapidly growing data breach incidents effectively, healthcare providers need to identify various insider and outsider threats, analyze the vulnerabilities of their internal security systems, and develop more appropriate data security measures against the threats. While there have been studies on trends of data breach incidents, there is a lack of research on the analysis of descriptive contents posted on the data breach reporting website of the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR). Hence, this study develops a novel approach to the analysis of descriptive data breach information with the use of text mining and visualization. Insider threats, vulnerabilities, breach incidents, impacts, and responses to the breaches are analyzed for three data breach types.
Reference59 articles.
1. Vora, J., Italiya, P., Tanwar, S., Tyagi, S., Kumar, N., Obaidat, M.S., and Hsiao, K.F. (2018, January 11–13). Ensuring Privacy and Security in E-Health Records. Proceedings of the 2018 International Conference on Computer, Information and Telecommunication Systems (CITS), Colmar, France.
2. A beginner’s guide to avoiding Protected Health Information (PHI) issues in clinical research—With how-to’s in REDCap Data Management Software;Bowman;J. Biomed. Inform.,2018
3. Hospital Risk of Data Breaches;Bai;JAMA Intern. Med.,2017
4. Information security: Listening to the perspective of organisational insiders;Choi;J. Inf. Sci.,2018
5. (2022, January 24). In Healthcare, Breach Dangers Come from inside the House. Modern Healthcare, 9 April 2018. Available online: https://www.modernhealthcare.com/article/20180410/NEWS/180419999/in-healthcare-breach-dangers-come-from-inside-the-house.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献