Open Access
Subscription Access
Privacy Risks and Security Threat Strategy to Optimize the Vulnerability in Health Information System (HIS)
Health information systems (HIS) generally access, process, or maintain large volumes of sensitive data corresponding to the patient, health service provider (HSP), clinicians, and other stakeholders. Hence, ensuring health data security is a primary concern to improve patient outcomes, inform research, and influence policy-making. Many countries across the world practice data protection and privacy preservation laws against numerous threats related to health data and its communication between the computer networks. Hence, resolving the health information security flaws by designing a potential threat model is always given significant importance. The main objective of this study is to emphasize the concerns related to privacy risks and security threats with the use of HIS.
Keywords
Exchange, Health, Information, Privacy, Vulnerability.
User
Font Size
Information
- Lin, J., Amini, S., Hong, J. I., Sadeh, N., Lindqvist, J., & Zhang, J. (2012, September). Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (pp. 501-510). ACM.
- Lederer, S., Mankoff, J., & Dey, A. K. (2003, April). Who wants to know what when? privacy preference determinants in ubiquitous computing. In CHI'03 extended abstracts on Human factors in computing systems (pp. 724-725). ACM.
- Emmnauel, U., & Mohammed, T. (2017). Cyber security, threat intelligence: Defending the digital platform. Journal of International Technology and Information Management, 26(1), 138-160.
- AlHamad, A. Omari, F., & AlHamad, A. (2014). Recommendation for Managing Patients’ Privacy in an Integrated Health Information Network, Journal of IT and Economic Development, 5(1), 47-52.
- Rebolj, D., Menzel K.,(2004).Mobile computing in construction, ITCon 9, 281–283.
- Akter, S., & Ray, P. (2010). mHealth-an ultimate platform to serve the unserved. Yearb Med Inform, 2010, 94-100.
- Kay, M., Santos, J., & Takane, M. (2011). mHealth: New horizons for health through mobile technologies. World Health Organization, 64(7), 66-71.
- Shklovski, I., Mainwaring, S. D., Skúladóttir, H. H., & Borgthorsson, H. (2014, April). Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems (pp. 2347-2356). ACM.
- Cho, H., Rivera-Sánchez, M., & Lim, S. S. (2009). A multinational study on online privacy: Global concerns and local responses. New Media & Society, 11(3), 395-416. http://dx.doi.org/10.1177/1461444808101618
- Zorotheos, A., & Kafeza, E. (2009). Users‟ perceptions on privacy and their intention to transact online: A study on Greek internet users. Direct Marketing: An International Journal, 3(2), 139-153. http://dx.doi.org/10.1108/17505930910964795
- Lee, C. H., Eze, U. C., & Ndubisi, N. (2011). Analyzing key determinants of online repurchase intentions. Asia Pacific Journal of Marketing and Logistics, 23(2), 200-221. http://dx.doi.org/10.1108/13555851111120498
- Faruque, M., Mia, M.B., Chowdhury, M.H., Sarker, F., Mamun, K.A. (2019). Feasibility of Digital Health Services for Educating the Community People Regarding Lifestyle Modification Combating Noncommunicable Diseases. In: Streitz, N., Konomi, S. (eds) Distributed, Ambient and Pervasive Interactions. HCII 2019. Lecture Notes in Computer Science, vol 11587. Springer, Cham. https://doi.org/10.1007/978-3-030-21935-2_25
- He, D., Naveed, M., Gunter, C. A., & Nahrstedt, K. (2014). Security concerns in Android mHealth apps. In AMIA Annual Symposium Proceedings (Vol. 2014, p. 645). American Medical Informatics Association.
- Web Ref. Definitions of Privacy and Security: https://www.cdc.gov/nchs/data/ncvhs/ncvhs06-08.pdf Accessed 20th September 2017
- Sunyaev, A., Dehling, T., Taylor, P. L., & Mandl, K. D. (2014). Availability and quality of mobile health app privacy policies. Journal of the American Medical Informatics Association, 22(e1), e28-e33.
- Ackerman, L. (2013). Mobile health and fitness applications and information privacy. Privacy Rights Clearinghouse, San Diego, CA.
- Ranchordas, S., & Kaplan, B. (2016). MHealth for Alzheimer's Disease: Regulation, Consent, and Privacy Concerns.
- Faudree, B., & Ford, M. (2013). Security and Privacy in Mobile Health. CIO Journal.
- HealthCareBusinessTech. 2014. "Mobile Health Apps Create Privacy Risk, Study Says." Retrieved 27 September - 2017, from http://www.healthcarebusinesstech.com/mobile-health-apps-privacy/
- Bhuyan, S. S., Kim, H., Isehunwa, O. O., Kumar, N., Bhatt, J., Wyant, D. K., & Dasgupta, D. (2017). Privacy and security issues in mobile health: Current research and future directions. Health policy and technology, 6(2), 188-191.
- Farzandipour, M., Sadoughi, F., Ahmadi, M., & Karimi, I. (2010). Security requirements and solutions in electronic health records: lessons learned from a comparative study. Journal of medical systems, 34(4), 629-642.
- Olmstead, K. (2014, April 29). Mobile apps collect information about users, with wide range of permissions. Retrieved from http://www.pewresearch.org/fact-tank/2014/04/29/mobile-apps-collect-information-about-users-with-wide-range-of-permissions/
- McCarthy, M. (2013) Experts warn on data security in health and fitness apps. British Medical Journal (f5600), http://www.bmj.com/content/347/bmj.f5600 (accessed 25 February 2017).
- Arora, S., Yttri, J., & Nilsen, W. (2014). Privacy and security in mobile health (mHealth) research. Alcohol research: current reviews, 36(1), 143. MEASURES TO AVOID THE PRIVACY AND SECURITY RISKS WHILE USING MHEALTH APPS
- PRC, 2016 : https://www.privacyrights.org/printpdf/67502 Accessed 31st march,2018
- Jain, A. K., & Shanbhag, D. (2012). Addressing security and privacy risks in mobile applications. IT Professional, 14(5), 28-33.
- Adhikari, R., Richards, D., & Scott, K. (2014). Security and privacy issues related to the use of mobile health apps. ACIS.
- Addonizio, G. (2017). "The Privacy Risks Surrounding Consumer Health and Fitness Apps, Associated Wearable Devices, and HIPAA’s Limitations"
- Figg, W.C., Ph.D, and Kam, H.J., M.S. 2011. "Medical Information Security," International journal of Security (IJS) (5:1).
- Haque, AKM Bahalul and Pranto, Tahmid Hasan. “Health Data Security: A Privacy-Preserving Proposed Strategy for Bangladesh Health Data Security: A Privacy-Preserving Proposed Strategy for Bangladesh”, International Journal of Emerging Technologies in Engineering Research (IJETER), Volume 8, Issue 7, July(2020).
- Sampat, Brinda Hansraj, and Bala Prabhakar. "Privacy risks and security threats in mHealth apps." Journal of International Technology and Information Management 26.4 (2017): 126-153.
- OLOYEDE A.O., YEKINI N.A., AKINWOLE A.K., OJO O (2021). Firewall Approach to Computer Network Security: Functional Viewpoint. In Int. J. Advanced Networking and Applications. Volume: 13 Issue: 03 Pages: 4993-5000(2021) ISSN: 0975-0290.
- Mohammed Suliman, Bandar Alluhaybi (2022). Protecting Mobile Agent against Man-In-The-Middle Attack: The Dummy Agent Model. In Int. J. Advanced Networking and Applications. Volume: 13 Issue: 04 Pages: 5024-5028(2022) ISSN: 0975-0290.
Abstract Views: 188
PDF Views: 0