Literature DB >> 24683293

Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering.

Aditya Krishna Menon1, Xiaoqian Jiang1, Jihoon Kim1, Jaideep Vaidya2, Lucila Ohno-Machado1.   

Abstract

Many healthcare facilities enforce security on their electronic health records (EHRs) through a corrective mechanism: some staff nominally have almost unrestricted access to the records, but there is a strict ex post facto audit process for inappropriate accesses, i.e., accesses that violate the facility's security and privacy policies. This process is inefficient, as each suspicious access has to be reviewed by a security expert, and is purely retrospective, as it occurs after damage may have been incurred. This motivates automated approaches based on machine learning using historical data. Previous attempts at such a system have successfully applied supervised learning models to this end, such as SVMs and logistic regression. While providing benefits over manual auditing, these approaches ignore the identity of the users and patients involved in a record access. Therefore, they cannot exploit the fact that a patient whose record was previously involved in a violation has an increased risk of being involved in a future violation. Motivated by this, in this paper, we propose a collaborative filtering inspired approach to predicting inappropriate accesses. Our solution integrates both explicit and latent features for staff and patients, the latter acting as a personalized "finger-print" based on historical access patterns. The proposed method, when applied to real EHR access data from two tertiary hospitals and a file-access dataset from Amazon, shows not only significantly improved performance compared to existing methods, but also provides insights as to what indicates an inappropriate access.

Entities:  

Keywords:  access violation; collaborative filtering; electronic health records; privacy breach detection

Year:  2014        PMID: 24683293      PMCID: PMC3967851          DOI: 10.1007/s10994-013-5376-1

Source DB:  PubMed          Journal:  Mach Learn        ISSN: 0885-6125            Impact factor:   2.940


  6 in total

1.  Learning relational policies from electronic health record access logs.

Authors:  Bradley Malin; Steve Nyemba; John Paulett
Journal:  J Biomed Inform       Date:  2011-01-26       Impact factor: 6.317

2.  Role prediction using Electronic Medical Record system audits.

Authors:  Wen Zhang; Carl A Gunter; David Liebovitz; Jian Tian; Bradley Malin
Journal:  AMIA Annu Symp Proc       Date:  2011-10-22

3.  Anomaly and signature filtering improve classifier performance for detection of suspicious access to EHRs.

Authors:  Jihoon Kim; Janice M Grillo; Aziz A Boxwala; Xiaoqian Jiang; Rose B Mandelbaum; Bhakti A Patel; Debra Mikels; Staal A Vinterbo; Lucila Ohno-Machado
Journal:  AMIA Annu Symp Proc       Date:  2011-10-22

4.  Detection of Anomalous Insiders in Collaborative Environments via Relational Analysis of Access Logs.

Authors:  You Chen; Bradley Malin
Journal:  CODASPY       Date:  2011

5.  Physician attitudes toward health information exchange: results of a statewide survey.

Authors:  Adam Wright; Christine Soran; Chelsea A Jenter; Lynn A Volk; David W Bates; Steven R Simon
Journal:  J Am Med Inform Assoc       Date:  2010 Jan-Feb       Impact factor: 4.497

6.  Using statistical and machine learning to help institutions detect suspicious access to electronic health records.

Authors:  Aziz A Boxwala; Jihoon Kim; Janice M Grillo; Lucila Ohno-Machado
Journal:  J Am Med Inform Assoc       Date:  2011 Jul-Aug       Impact factor: 4.497

  6 in total
  3 in total

1.  Using electronic health record audit logs to study clinical activity: a systematic review of aims, measures, and methods.

Authors:  Adam Rule; Michael F Chiang; Michelle R Hribar
Journal:  J Am Med Inform Assoc       Date:  2020-03-01       Impact factor: 4.497

2.  Use of Electronic Health Record Access and Audit Logs to Identify Physician Actions Following Noninterruptive Alert Opening: Descriptive Study.

Authors:  Azraa Amroze; Terry S Field; Hassan Fouayzi; Devi Sundaresan; Laura Burns; Lawrence Garber; Rajani S Sadasivam; Kathleen M Mazor; Jerry H Gurwitz; Sarah L Cutrona
Journal:  JMIR Med Inform       Date:  2019-02-07

Review 3.  Artificial Intelligence-Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study.

Authors:  Prosper Kandabongee Yeng; Livinus Obiora Nweke; Bian Yang; Muhammad Ali Fauzi; Einar Arthur Snekkenes
Journal:  JMIR Med Inform       Date:  2021-12-22
  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.