Literature DB >> 29854153

Evaluating the Effectiveness of Auditing Rules for Electronic Health Record Systems.

Monica Hedda1, Bradley A Malin1, Chao Yan1, Daniel Fabbri1.   

Abstract

Healthcare organizations (HCOs) often deploy rule-based auditing systems to detect insider threats to sensitive patient health information in electronic health record (EHR) systems. These rule-based systems define behavior deemed to be high-risk a priori (e.g., family member, co-worker access). While such rules seem logical, there has been little scientific investigation into the effectiveness of these auditing rules in identifying inappropriate behavior. Thus, in this paper, we introduce an approach to evaluate the effectiveness of individual high-risk rules and rank them according to their potential risk. We investigate the rate of high-risk access patterns and minimum rate of high-risk accesses that can be explained with appropriate clinical reasons in a large EHR system. An analysis of 8M accesses from one-week of data shows that specific high-risk flags occur more frequently than theoretically expected and the rate at which accesses can be explained away with five simple reasons is 16 - 43%.

Entities:  

Mesh:

Year:  2018        PMID: 29854153      PMCID: PMC5977720     

Source DB:  PubMed          Journal:  AMIA Annu Symp Proc        ISSN: 1559-4076


  10 in total

1.  Effective audit trails--a taxonomy for determination of information requirements.

Authors:  P V Asaro; R L Herting; A C Roth; M R Barnes
Journal:  Proc AMIA Symp       Date:  1999

2.  Learning relational policies from electronic health record access logs.

Authors:  Bradley Malin; Steve Nyemba; John Paulett
Journal:  J Biomed Inform       Date:  2011-01-26       Impact factor: 6.317

3.  Authorisation and access control for electronic health record systems.

Authors:  Bernd Blobel
Journal:  Int J Med Inform       Date:  2004-03-31       Impact factor: 4.046

4.  The "meaningful use" regulation for electronic health records.

Authors:  David Blumenthal; Marilyn Tavenner
Journal:  N Engl J Med       Date:  2010-07-13       Impact factor: 91.245

Review 5.  Reviewing the benefits and costs of electronic health records and associated patient safety technologies.

Authors:  Nir Menachemi; Robert G Brooks
Journal:  J Med Syst       Date:  2006-06       Impact factor: 4.460

6.  Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification rules under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; other modifications to the HIPAA rules.

Authors: 
Journal:  Fed Regist       Date:  2013-01-25

7.  Using external data sources to improve audit trail analysis.

Authors:  R L Herting; P V Asaro; A C Roth; M R Barnes
Journal:  Proc AMIA Symp       Date:  1999

8.  Explaining accesses to electronic medical records using diagnosis information.

Authors:  Daniel Fabbri; Kristen Lefevre
Journal:  J Am Med Inform Assoc       Date:  2012-11-02       Impact factor: 4.497

Review 9.  Access control: how can it improve patients' healthcare?

Authors:  Ana Ferreira; Ricardo Cruz-Correia; Luís Antunes; David Chadwick
Journal:  Stud Health Technol Inform       Date:  2007

10.  Using statistical and machine learning to help institutions detect suspicious access to electronic health records.

Authors:  Aziz A Boxwala; Jihoon Kim; Janice M Grillo; Lucila Ohno-Machado
Journal:  J Am Med Inform Assoc       Date:  2011 Jul-Aug       Impact factor: 4.497

  10 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.