Analyzing the Implications of Healthcare Data Breaches through Computational Technique

被引:40
|
作者
Almulihi, Ahmed H. [1 ]
Alassery, Fawaz [2 ]
Khan, Asif Irshad [3 ]
Shukla, Sarita [4 ]
Gupta, Bineet Kumar [4 ]
Kumar, Rajeev [4 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, At Taif, Saudi Arabia
[2] Taif Univ, Coll Comp & Informat Technol, Dept Comp Engn, At Taif, Saudi Arabia
[3] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah 21589, Saudi Arabia
[4] Shri Ramswaroop Mem Univ, Dept Comp Applicat, Barabanki 225003, Uttar Pradesh, India
来源
关键词
Big data security; healthcare big data breaches; cost effectiveness; big data analysis; IMPACT;
D O I
10.32604/iasc.2022.023460
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The contributions of the Internet of Medical Things (IoMT), cloud services, information systems, and smart devices are useful for the healthcare industry. With the help of digital healthcare, our lives have been made much more secure and effortless and provide more convenient and accessible treatment. In current, the modern healthcare sector has become more significant and convenient for the purpose of both external and internal threats. Big data breaches affect clients, stakeholders, organisations, and businesses, and they are a source of concern and complication for security professionals. This research examines the many types and categories of big data breaches that companies face. In addition, the study's main purpose is to investigate and draw conclusions from healthcare big data breaches, with the goal of improving healthcare big data confidentiality. From the beginning of 2020-21, both years, practically our entire world moved online due to the COVID-19 pandemic. The coronavirus pandemic dramatically increased the extent of use of technology. Hacking/IT incidents, followed by unauthorised internal disclosures, are the most typical attacks behind healthcare data breaches, according to the report. This has become a main enticement for healthcare data theft and misuse. The number of healthcare big data breaches, the number of records exposed, and the resulting significant commercial losses are increasing. In the report, they analyze and investigate the number of healthcare big data breaches, the number of records exposed during the COVID-19 pandemic. Also, the study assesses the correctness of the datasets in order to achieve a dynamic digital healthcare data breaches environment using fuzzy based computational technique.
引用
收藏
页码:1763 / 1779
页数:17
相关论文
共 50 条
  • [21] Analyzing Healthcare Provider Centric Networks through secondary use of health claims data
    Sauter, Simone Katja
    Neuhofer, Lisa Maria
    Endel, Gottfried
    Klimek, Peter
    Duftschmid, Georg
    2014 IEEE-EMBS INTERNATIONAL CONFERENCE ON BIOMEDICAL AND HEALTH INFORMATICS (BHI), 2014, : 522 - 525
  • [22] Modeling, analyzing and simulating the Measles transmission dynamics through efficient computational optimal control technique
    Ahmad, W.
    Butt, A. I. K.
    Rafiq, M.
    Asif, Z.
    Ismaeel, T.
    Ahmad, N.
    EUROPEAN PHYSICAL JOURNAL PLUS, 2024, 139 (07):
  • [23] Ethical Implications of AI in Healthcare Data: A Case Study Using Healthcare Data Breaches from the US Department of Health and Human Services Breach Portal between 2009-2021
    Ugwu, Augustina O.
    Gao, Xianghua
    Ugwu, Johnson O.
    Chang, Victor
    2022 INTERNATIONAL CONFERENCE ON INDUSTRIAL IOT, BIG DATA AND SUPPLY CHAIN, IIOTBDSC, 2022, : 343 - 349
  • [24] Privacy-enhanced data deduplication computational intelligence technique for secure healthcare applications
    Kim, Jinsu
    Ryu, Sungwook
    Park, Namje
    Computers, Materials and Continua, 2022, 70 (02): : 4169 - 4184
  • [25] Privacy-Enhanced Data Deduplication Computational Intelligence Technique for Secure Healthcare Applications
    Kim, Jinsu
    Ryu, Sungwook
    Park, Namje
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 4169 - 4184
  • [26] Analyzing the Implications of COVID-19 Pandemic through an Intelligent-Computing Technique
    Pandey, Abhishek Kumar
    Al-Amri, Jehad F.
    Subahi, Ahmad F.
    Kumar, Rajeev
    Khan, Raees Ahmad
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (03): : 959 - 974
  • [27] Mitigating the consequences of electronic health record data breaches for patients and healthcare workers
    Looi, Jeffrey C. L.
    Allison, Stephen
    Bastiampillai, Tarun
    Maguire, Paul A.
    Kisely, Steve
    Looi, Richard C. H.
    AUSTRALIAN HEALTH REVIEW, 2024, 48 (01) : 4 - 7
  • [28] Mapping of data breaches in companies listed on the NYSE and NASDAQ: Insights and implications
    Rodrigues, Gabriel Arquelau Pimenta
    Serrano, Andre Luiz Marques
    Albuquerque, Robson de Oliveira
    Saiki, Gabriela Mayumi
    Ribeiro, Sara Santedicola
    Orozco, Ana Lucila Sandoval
    Villalba, Luis Javier Garcia
    RESULTS IN ENGINEERING, 2024, 21
  • [29] Review of: A Practical Approach to Analyzing Healthcare Data
    Smith, LaShunda
    INTERNET JOURNAL OF ALLIED HEALTH SCIENCES AND PRACTICE, 2010, 8 (03):
  • [30] A framework for analyzing publicly available healthcare data
    Rao, A. Ravishankar
    Chhabra, Atul
    Das, Rajarshi
    Ruhil, Vikash
    2015 17TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATION & SERVICES (HEALTHCOM), 2015, : 653 - 656