Literature DB >> 27313481

Information security risk management for computerized health information systems in hospitals: a case study of Iran.

Javad Zarei1, Farahnaz Sadoughi2.   

Abstract

BACKGROUND: In recent years, hospitals in Iran - similar to those in other countries - have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran.
MATERIALS AND METHODS: This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts' opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health.
RESULTS: Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals.
CONCLUSION: Information security risk management is not followed by Iran's hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran's Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran.

Entities:  

Keywords:  health information systems; hospital; information security; risk management

Year:  2016        PMID: 27313481      PMCID: PMC4890691          DOI: 10.2147/RMHP.S99908

Source DB:  PubMed          Journal:  Risk Manag Healthc Policy        ISSN: 1179-1594


Background

In recent years, rapid growth of information and communication technologies and increasing pressures for reducing health care costs, improving health care quality, ensuring patient safety, and reducing medical mistakes have led to increasing use of computerized health information systems (CHISs) in health care organizations.1–3 Currently, use of CHIS is a basic requirement for any health care organization such as hospitals.4 CHIS refers to any computer system capturing, storing, managing, and transmitting personal or organizational health information in health care sectors.5 One of the major challenges of CHIS use is information security.6–8 Patients’ personal health information contained in the CHIS is considered the most confidential personal information that should be protected.9 Electronic health information recording increases the risk of unauthorized access and disclosure of information. In case of unauthorized disclosure of information, patients, practitioners, and hospitals run into serious problems.10 Computerized information systems of organizations are faced with a variety of internal and external threats, which can cause different types of damages.11 They can have adverse effects on organizational operations, information assets, individuals, organizations, and national areas of studies.12 Therefore, information security is crucial for organizational survival, minimization of threats endangering organizational operations, and protection of confidentiality, integrity, and availability of information.13,14 The main objective of “information security” is implementing appropriate control measures for eliminating or minimizing the impacts of different organizational security-related threats and organizational vulnerabilities.15 The main question is how information security can be effectively and economically implemented in organizations. The answer is Information Security Risk Management (ISRM).16 ISRM is a structured and continuous process with the purpose of identifying, evaluating, and minimizing some types of risks, as well as achieving appropriate acceptability.17 ISRM is very important for organizational successful information security programs for the following reasons.18 First, information security risks are not constant over time and vary depending on the conditions of the organizations, development and changes in the information system, new users, and so on.19 ISRM is one of the ways to reduce the negative impact of risks on the organization.20 Second, through risk management, organizations can concentrate on resources of high-risk areas and can manage them by using appropriate and measurable ways while limiting risks reasonably.21 Third, one of the characteristics of a successful security program is cost–benefit analysis of the implementation of information security controls. This accurate analysis is performed by the risk management process.16,19 In Iran, a hospital is the main health care organization.22 Thus, one of the major pieces of health information is recorded at hospitals. In the past decade, CHIS has been increasingly used by Iran’s hospitals. Accordingly, clinical, financial, and administrative activities of hospitals are increasingly dependent on the performance of the CHIS, as compared with the past.23 Therefore, ensuring information security in these systems is of crucial importance for the hospitals. However, in recent years, CHIS security at Iran’s hospitals has faced greater challenges. In 2014, for the purpose of reducing public costs of health care, a health reform plan was implemented as one of the major policies of the new government.24 Accordingly, hospitals are required to connect their hospital information system programs to the Iranian system of electronic health records (SEPAS system) through the Internet. Connection through public Internet network considerably increases the risks of unauthorized access to information; meanwhile, some findings reveal lack of specified rules on confidentiality of patient information in electronic health systems of hospitals.25 Moreover, in recent years, due to the disputes concerning Iran’s nuclear program and Iran’s disagreements with Western countries and some of the Middle East countries, Iran’s computer information system has been exposed to cyber threats, such as the Internet viruses Stuxnet and Flame.26–28 These viruses, according to many information security experts in the world, are very complex and cannot easily be confronted.27,29 In 2014, the information security firms Kaspersky Lab and Symantec reported an advanced espionage malware (Regin), one of whose target countries was Iran.30,31 Considering the information security risks at Iran’s hospitals and importance of ISRM in reducing and minimizing adverse effects of information security risks, as well as the effectiveness of the information security programs in hospitals, this study investigates the ISRM status at hospitals of Iran. Findings of this study can provide a comprehensive view of the ISRM situation and its place in health information security policies of hospitals and can help researchers and policy makers interested in ISRM in health care.

Materials and methods

This applied research is a descriptive cross-sectional study conducted in 2015. All active hospitals in Iran (until August 2014) were studied. In the first step, the research instrument for the assessment of ISRM situation in the hospitals of Iran was designed. To design the instrument, key processes of ISRM were identified by using the literature review in related information sources. The gathered data included guidelines, frameworks, standards, and methodologies for information security risk assessment and risk management, previous studies on ISRM in the hospitals, and other documents related to ISRM. Several search engines and databases such as Google Scholar, Institute of Electrical and Electronics Engineers Digital Library, Association for Computing Machinery Digital Library, and PubMed were searched to find the relevant documents. Documents were identified by the following keywords: “Information security risk management” and “Information security risk assessment”, combined with the terms “Standard”, “Method”, “Model”, “Framework”, “Guideline”, and “Best practice” or “Hospital”, and “Health” in English language. We confined our search to documents published from 2000 to 2014. Inclusion criteria for selecting resources included the following: 1) availability of documents in English language and 2) free access to full-text documents. Non-full-text articles and documents were excluded. Literature was reviewed to data saturation level. When at least a risk assessment and management process principle appears in five retrieved sources, including articles, books, standards, guidelines, and methodologies, it was considered data saturation level. The data saturation level was determined based on three experts’ judgment (specialist in information security risk management). Sampling was not performed, and all the relevant literature, retrieved based on inclusion criteria, were evaluated. A checklist was used to extract content from retrieved documents. In total, the specific guidelines, standards, and methodologies for information security risk assessment and risk management were as follows: International Standard Organization/International Electrotechnical Commission (ISO/IEC) 27005,32 National Institute of Standards and Technology Special Publication 800-30 (NIST SP 800-30),12 Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) allegro,33 Method for Harmonized Analysis of Risk (MEHARI),34,35 Metodologia de Analisis y Gestion de Riesgos de los Sistemas de Informacion (MAGRIT),36 information technology (IT)-Grundschutz,37 Information Technology Security Guidance- IT security risk management: a lifecycle approach-33 (ITSG-33),38 Security Officers Management & Analysis Project (SOMAP),39 Threat Agent Risk Assessment (TARA),40 CORAS,41 Threat Vulnerability and Risk Analysis (TVRA),42 Factor Analysis of Information Risk (FAIR) Analysis (O-RA),43 and Expression des Besoins et Identification des Objectifs de Sécurité (EBIOS)44; and international standards of information security management (ISM), including ISO/IEC 1779945 and ISO 27799,46 were identified and surveyed. Moreover, eight studies related to information security risk assessment and risk management in hospital,47–54 one report,55 and one book56 were retrieved and reviewed. In the second step, key processes of ISRM were extracted from the retrieved literatures. Figure 1 shows these stages.
Figure 1

Key process of information security risk management.

In the third step, based on results of the previous stage, health information management and computer experts’ opinions, and observations of the five selected hospitals, a comprehensive form was designed to assess the status of ISRM for computerized health information systems, including four distinct parts encompassing general information about hospitals, specifications of computerized health information systems, information security incidences, and self-assessment checklist of ISRM. Its content validity was confirmed by 12 experts of health information management, medical informatics, information technology (IT), and computer engineering (three professionals per area of study). These scholars were selected on the basis of their previous work experience in the hospital’s IT departments or their familiarity with the structure of the IT department in the hospitals of Iran. For data collection, this questionnaire and its guideline were sent to all 908 active hospitals in Iran by the Ministry of Health of Iran. To remove any possible ambiguity, an instruction sheet was attached to this questionnaire, explaining all sections. The hospitals were selected with regard to their CHIS application, such as hospital information system, Electronic Medical Record, Patient’s Admission and Discharge Systems, and so on. Hospitals that did not use CHIS at the time of this research were excluded. To facilitate and expedite the collection of data, this form was placed electronically in the official Web site (portal) of the Ministry of Health of Iran and hospitals were asked to register the relevant information in the aforementioned Web site. After data collection, primary analysis was conducted in order to fix the defects and correct the information. Then, hospitals were asked through a second formal letter to take action to correct the defect. The collected data were analyzed by using descriptive statistics (frequency) in Excel 2003 software.

Ethical issues

The study was approved by the Deputy of Research and Technology of the Iran University of Medical Sciences, Tehran, Iran.

Results

Information related to the studied hospitals

Out of 908 active hospitals in Iran, 551 hospitals (60.7%) participated in the study. Two hospitals were setting up CHIS at the time of this research. Therefore, they were excluded from the study and 549 hospitals (60.5%) were studied. The highest percentage of participation in the study was related to the hospitals affiliated to the Medical Sciences Universities (Table 1).
Table 1

Distribution of hospitals in Iran that participated in the study

Type of ownershipActive hospitals in IranHospitals participating in the studyParticipation percentage

Teaching hospitalNonteaching hospitalTotalTeaching hospitalNonteaching hospitalTotal
Universities of Medical24132456518422040472.2
Sciences
Private21401421666746.5
Military6455126815.7
Charity129300121240.0
Others201001209495848.3
Total27063890819635354960.5

IT personnel in the studied hospitals

Most of the hospitals (540 instances, 98.5%) had IT personnel. Conversely, they had Chief Information Security Officers (CISOs). On average, one IT personnel existed per 77 computer systems and also per 84 bed counts in the hospital.

Information security policies and procedures in hospitals

There were some policies and procedures for information security in 379 hospitals (69%). Only in eight hospitals (1.4%), these policies and procedures were provided based on specific information security standards such as ISO/IEC 27001. Additionally, all of these hospitals had a framework for ISM. Other hospitals pursued Iranian Hospitals Accreditation Standards. Only eight hospitals had a framework for ISRM, of which seven hospitals implemented security policies and procedures of specific information security standards. None of the hospitals had a systematic approach for ISRM (Table 2).
Table 2

Policies and procedures for information security in hospitals

Type of ownershipPolicies and procedures for information securityFramework for information security managementFramework for information security RA/RMNumber of hospitals

Based on Iranian Hospital Accreditation StandardPolicy and procedures based on information security standardsDefining framework for ISMUsing a systematic approach to defining framework for ISMDefining framework for information security RA/RMUsing a systematic approach to defining framework for information security RA/RM

FrequencyFrequencyFrequencyFrequencyFrequencyFrequency
Universities of Medical Sciences245342Missing: 230404
Private652303067
Military411Missing: 10Missing: 11Missing: 10Missing: 18
Charity110000012
Other organizations542211058
Total379810Missing: 13Missing: 38Missing: 10Missing: 2549

Abbreviations: ISM, information security management; RA/RM, risk assessment/risk management.

Process of information security risk identification at hospitals

Among the main activities of information security risk identification, only identification of assets, identification of threats, and control analysis were performed systematically in a few hospitals; these hospitals took ISM into consideration. At some hospitals, there was no sequence among the subactivities related to information security risk identification, ie, the activities were performed unrelated to their previous and subsequent activities. Altogether, the obtained findings indicated the lack of a systematic approach for risk identification. Among the subactivities related to information security risk identification, the highest frequency was related to information assets identification (415 instances; Table 3).
Table 3

Information security risk identification in hospitals

Type of ownershipAsset identificationThreat identificationVulnerability identificationControl analysisLikelihood determinationImpact analysisNumber of hospitals

Identification of assetsEvaluation and prioritization of assetsUsing systematic approach to asset identificationIdentification of threats: sourcesIdentification of threats: eventsUsing systematic approach to threat identificationIdentification of vulnerabilityUsing systematic approach to vulnerability identificationContinuous analysis of control measuresUsing systematic approach to control analysisLikelihood determinationUsing systematic approach to likelihood determinationThreat consequences determinationUsing systematic approach to impact analysis

FrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequency
Universities of Medical Sciences294140Missing: 22Missing: 11981862Missing: 110101051750Missing: 11160404
Private552623825221021019023067
Military751530404030408
Charity9507302020104012
Other501823227221032119020058
organizations Total415194Missing: 272802446Missing: 1149016421170Missing: 11670549

Process of information security risk analysis and evaluation at hospitals

None of the subactivities related to the process of information security risk analysis and evaluation was performed systematically at the selected hospitals. Although risk evaluation was not carried out in hospitals, 124 hospitals attempted to prioritize the information security risks (Table 4).
Table 4

Information security risk analysis and evaluation in hospitals

Type of ownershipRisk analysisRisk evaluationNumber of hospitals

Assessment of incidence scenariosUsing systematic approach to assessment of incidence scenariosImpact estimationUsing systematic approach to impact estimationDetermination of the level of riskUsing systematic approach to determination of the level of riskRisk evaluationUsing systematic approach to risk evaluationPrioritization of risksUsing systematic approach to prioritization of risks

FrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequency
Universities of Medical Sciences00403030810404
Private0010101018067
Military00000000408
Charity000000002012
Other organizations0020404018058
Total008000801240549

Processes of information security risk treatment and risk acceptance at hospitals

No comprehensive plan was conducted for reducing information security risks. The main approach of hospitals to risk treatment was risk reduction, along with implementation of basic information security safeguards. None of the subactivities related to the processes of information security risk treatment and acceptance in hospitals was performed systematically (Table 5).
Table 5

Information security risk treatment and risk acceptance in hospitals

Type of ownershipDefine criteria for risk treatment and risk acceptanceRisk treatmentResidual risk Identification and acceptanceNumber of hospitals

Define criteria for risk treatment option and action planDefine criteria for residual risk acceptanceRisk reduction by using comprehensive risk treatment action planRisk reduction by implementation of basic security control measuresUsing systematic approach to risk treatmentIdentification of residual risksResidual risk acceptance and remedyUsing systematic approach to residual risk Identification and acceptance

FrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequency
Universities of Medical Sciences0Missing: 20389Missing: 20430404
Private00065020067
Military000802008
Charity0007000012
Other organizations10051043058
Total1Missing: 200520Missing: 201360549
Residual risk acceptance and mitigation occurred only in six hospitals, which established ISM policies and procedures based on specific information security standards.

Communicating and sharing risk management results at hospitals

Communicating and sharing of risk management results were not observed in any of the hospitals.

ISRM monitoring and reviewing at hospitals

Information security policies and procedures, as well as implementation of control measures, were continuously monitored and reviewed at 146 hospitals and 142 hospitals, respectively, though it was not done systematically (Table 6).
Table 6

Continuous monitoring and reviewing of ISRM in hospitals

Type of ownershipInformation security policy and procedureISRM policy and procedureRisk factorsRisk management processImplementation of security control measuresResidual risksUsing systematic approach to ISRM monitor and reviewNumber of hospitals

FrequencyFrequencyFrequencyFrequencyFrequencyFrequencyFrequency
Universities of Medical Sciences91Missing: 22028920404
Private18101170067
Military50005008
Charity500050012
Other organizations27101263058
Total146Missing: 240314250549

Abbreviation: ISRM, Information Security Risk Management.

Discussion

The results show lack of a systematic and comprehensive approach to ISRM at the studied hospitals. Although some activities are conducted for risk identification, risk evaluation, and risk treatment, they are not systematically structured, ie, the hospitals do not use the specialized methodologies or standards for ISRM. Therefore, there is no coherence between the activities related to ISRM at most hospitals. ISRM is a systematic, structured, and continuous process, through which various interdependent steps are taken, and the activities of each step are affected by the results of the previous stage.55 Without following a systematic and structured method, accurate risk assessment and management is not possible. Hence, various standards, methodologies, and tools are developed all over the world by public and private organizations, agencies, and different companies for information security risk assessment and management.55–57 Only a small number of hospitals pursue ISRM framework; yet, they are not systematically structured. Defining a framework for risk management is one of the initial steps of implementation of the ISRM process.55 The framework development specifies scopes of risk management activity, required resources, key stakeholders, and limitations and boundaries of the risk management process and also makes a contribution to the ISRM process.32 Lack of risk management framework at Iran’s hospitals indicates weakness of information security policies and procedures. Information security policies are developed in conformity with Iranian Hospitals Accreditation Standards. Accordingly, hospitals are obliged to formulate policies and procedures for key processes in each department.58 But these standards are very limited, vague, and incomplete, as compared with specific standards, rules, or guidelines for information security, and do not cover many of the important details and processes of information security. Only in a small number of hospitals, this policy was formulated based on special standards of information security, such as ISO/IEC 27001. All these hospitals had a framework for ISRM. Information security standards such as the ISO 2700X series provide an appropriate framework for organizational ISM.59 Using standard methods for ISM and ISRM is of great importance. Although Iran is a member of the ISO and ISO 2700X standards have been accepted as the national standards of Iran, hospitals do not use these standards due to the lack of specific national laws on health information security. One of the reasons for this problem is weakness of major policies and rules associated with the health information security of Iran. Some studies reveal that rules of health information in Iran have some defects.60 In many developed countries such as Australia61 and the US,62 there are national regulations, standards, and guidelines for health information security, especially in the electronic environment. These rules provide health care organizations and other stakeholders with a comprehensive and consistent point of view regarding information security. In addition, these rules act as a comprehensive guideline for implementing information security programs in health care organizations.48 In addition, IT governance and the IT department structure of Iran’s hospitals affect upon this problem. The research carried out by Shahi63 at ten hospitals of Iran demonstrates no framework for IT governance and IT department structure at the studied hospitals. Additionally, the findings reveal that there are problems with the IT department personnel, information security procedures, and IT policy making.63 IT governance has a great impact on the information security policies of the organization. The main advantage of existing information governance in an organization is creation of an organizational point of view toward information security.64 According to ISO 27799 standards, there should be an organizational point of view toward information security at hospitals. Information security needs to be an organizational activity with the participation of all employees. Information governance should be unified with clinical governance.46 In their risk analysis model for hospital, Sunyaev and Pflug65 also emphasize on the responsibility of the hospital management in the information security process. The main problem of the IT department structure at Iran’s hospitals is the IT personnel. In none of the hospitals is the title of CISO practically specified in the organizational structure of the IT department. CISO has a key role in ISM in an organization.66 Risk management, vulnerability assessment, and management of information security are all CISO skills.67 Furthermore, ISRM is a complex and specialized process and therefore, for applying the major information security risk assessment and management methodologies, specialized knowledge of the executive team, including the IT personnel, is required.55 Tavakoli et al68 reveal that the hospitals selected by them were not familiar with specific information security standards. The success of ISRM depends on identification of all risks and, most importantly, analysis and determination of each risk level. Depending on the risk model used, risks are identified by determining risk factors such as assets, threats, vulnerability, likelihood of occurrence, and consequences.52 This study shows that determining the likelihood of occurrence and analysis of impact are carried out in less than one-third of the hospitals. Moreover, risk analysis and evaluation are not actually carried out in the hospitals. Determining likelihood of occurrence and analysis of impact have an important role in constructing the scenario for risk incidence and risk determination.37 Risk analysis and evaluation form the basis for risk prioritizationas well as decision making about risk treatment.69 In addition, determining likelihood of occurrence, impact analysis, and risk analysis and evaluation require the use of precise quantitative or qualitative methods because it is more complicated, as compared with other stages of risk management. Accordingly, a variety of tools, examples, and methods are usually provided in risk assessment and management standards and methodologies for their accurate measurement.55 One reason for this weakness at the studied hospitals could be lack of specific methodologies and standards for risk assessment and management. Some other studies also indicate a weakness in ISRM in hospitals.54,70 The main approach of hospitals for risk reduction is implementation of basic control measures of information security, which includes a set of management, technical, and physical conservation for information security protection. Some of the studies also indicate the implementation of basic control measures of information security.68

Conclusion

There is a great distance between activities carried out in Iran for ISRM and the common and standard activities of ISRM in practice. There is no appropriate and standard approach to ISRM at Iran’s hospitals. This study suggests using specific information security standards such as ISO 2700x series as an effective method in the case of ISRM implementation. Considering the lack of specific national laws for health information protection in Iran, ISRM should be addressed comprehensively in a review of Iranian Hospitals Accreditation Standards. For a better performance of these cases, they should comply as much as possible with the standards of ISO 2700x series such as ISO 27799. To help in risk calculation, based on the methodologies and specialized tools of information security risk assessment and risk management, a computer program should be designed by the Ministry of Health of Iran to calculate the risk and this should be made available to the hospitals. Moreover, hospitals should be asked to plan their ISM based on professional standards of information security such as ISO 2700x series.
  8 in total

1.  Final HIPAA security regulations: a review.

Authors:  John C Garner
Journal:  Manag Care Q       Date:  2003

Review 2.  Security and privacy in electronic health records: a systematic literature review.

Authors:  José Luis Fernández-Alemán; Inmaculada Carrión Señor; Pedro Ángel Oliver Lozoya; Ambrosio Toval
Journal:  J Biomed Inform       Date:  2013-01-08       Impact factor: 6.317

Review 3.  eHealth: extending, enhancing, and evolving health care.

Authors:  Carlos A Meier; Maria C Fitzgerald; Joseph M Smith
Journal:  Annu Rev Biomed Eng       Date:  2013-05-13       Impact factor: 9.590

4.  Reasons for deficiencies in health information laws in Iran.

Authors:  Hamid Moghaddasi; Azamol-sadat Hosseini; Samad Sajjadi; Maryam Nikookalam
Journal:  Perspect Health Inf Manag       Date:  2014-04-01

5.  Anticipating and addressing the unintended consequences of health IT and policy: a report from the AMIA 2009 Health Policy Meeting.

Authors:  Meryl Bloomrosen; Justin Starren; Nancy M Lorenzi; Joan S Ash; Vimla L Patel; Edward H Shortliffe
Journal:  J Am Med Inform Assoc       Date:  2011 Jan-Feb       Impact factor: 4.497

6.  Security requirements and solutions in electronic health records: lessons learned from a comparative study.

Authors:  Mehrdad Farzandipour; Farahnaz Sadoughi; Maryam Ahmadi; Iraj Karimi
Journal:  J Med Syst       Date:  2009-04-01       Impact factor: 4.460

7.  Security and privacy issues with health care information technology.

Authors:  Marci Meingast; Tanya Roosta; Shankar Sastry
Journal:  Conf Proc IEEE Eng Med Biol Soc       Date:  2006

8.  Assessing and comparing information security in swiss hospitals.

Authors:  Sarah Landolt; Jürg Hirschel; Thomas Schlienger; Walter Businger; Alex M Zbinden
Journal:  Interact J Med Res       Date:  2012-11-07
  8 in total
  3 in total

1.  Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities.

Authors:  Dari Alhuwail; Eiman Al-Jafar; Yousef Abdulsalam; Shaikha AlDuaij
Journal:  Appl Clin Inform       Date:  2021-09-29       Impact factor: 2.762

2.  Cybersecurity in Hospitals: A Systematic, Organizational Perspective.

Authors:  Mohammad S Jalali; Jessica P Kaiser
Journal:  J Med Internet Res       Date:  2018-05-28       Impact factor: 5.428

3.  Information Security Risk Assessment in Hospitals.

Authors:  Haleh Ayatollahi; Ghazal Shagerdi
Journal:  Open Med Inform J       Date:  2017-09-14
  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.