Literature DB >> 25593574

What caused the breach? An examination of use of information technology and health data breaches.

Suanu Bliss Wikina1.   

Abstract

Data breaches arising from theft, loss, unauthorized access/disclosure, improper disclosure, or hacking incidents involving personal health information continue to increase every year. As of September 2013, reported breaches affecting individuals reached close to 27 million since 2009, when compilation of records on breaches began. These breaches, which involved 674 covered entities and 153 business associates, involved computer systems and networks, desktop computers, laptops, paper, e-mail, electronic health records, and removable/portable devices (CDs, USBs, x-ray films, backup tapes, etc.). Even with the increased use of health information technology by health institutions and allied businesses, theft and loss (not hacking) constitute the major types of data breaches encountered. Removable/portable devices, desktop computers, and laptops were the top sources or locations of the breached information, while the top six states-Virginia, Illinois, California, Florida, New York, and Tennessee-in terms of the number of reported breaches accounted for nearly 75 percent of the total individual breaches, 33 percent of breaches in covered entities, and about 30 percent of the total breaches involving business associates.

Keywords:  health data breaches; health information technology; personal health information; privacy, health information

Mesh:

Year:  2014        PMID: 25593574      PMCID: PMC4272442     

Source DB:  PubMed          Journal:  Perspect Health Inf Manag        ISSN: 1559-4122


  4 in total

1.  Cyber-Analytics: Identifying Discriminants of Data Breaches.

Authors:  Diane Dolezel; Alexander McLeod
Journal:  Perspect Health Inf Manag       Date:  2019-07-01

Review 2.  Security Techniques for the Electronic Health Records.

Authors:  Clemens Scott Kruse; Brenna Smith; Hannah Vanderlinden; Alexandra Nealand
Journal:  J Med Syst       Date:  2017-07-21       Impact factor: 4.460

3.  Cyberincivility Experience of Korean Clinical Nurses in the Workplace: A Qualitative Content Analysis.

Authors:  Sang Suk Kim; Ho Jeong Song; Jung Jae Lee
Journal:  Int J Environ Res Public Health       Date:  2020-12-04       Impact factor: 3.390

4.  Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology.

Authors:  Maliha Sultana; Afrida Hossain; Fabiha Laila; Kazi Abu Taher; Muhammad Nazrul Islam
Journal:  BMC Med Inform Decis Mak       Date:  2020-10-07       Impact factor: 2.796

  4 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.