| Literature DB >> 35576981 |
Nehama Lewis1, Yaron Connelly2,3, Gil Henkin4, Max Leibovich4, Adi Akavia4.
Abstract
OBJECTIVES: Healthcare organizations that maintain and process Electronic Medical Records are at risk of cyber-attacks, which can lead to breaches of confidentiality, financial harm, and possible interference with medical care. State-of-the-art methods in cryptography have the potential to offer improved security of medical records; nonetheless, healthcare providers may be reluctant to adopt and implement them. The objectives of this study were to assess current data management and security procedures; to identify attitudes, knowledge, perceived norms, and self-efficacy regarding the adoption of advanced cryptographic techniques; and to offer guidelines that could help policy-makers and data security professionals work together to ensure that patient data are both secure and accessible.Entities:
Keywords: Computer Security; Data Protection; Information Science; Interview; Medical Records
Year: 2022 PMID: 35576981 PMCID: PMC9117802 DOI: 10.4258/hir.2022.28.2.132
Source DB: PubMed Journal: Healthc Inform Res ISSN: 2093-3681
Participants’ information (n = 12)
| Specialty | Position | Type of organization | |
|---|---|---|---|
| 1 | Information systems | Head of division/department | Research center/institute |
| 2 | Information systems | IT administrator | Research center/institute |
| 3 | Information systems | CIO | Public hospital (number of beds >1,000) |
| 4 | Information systems | CIO | Public hospital (number of beds >1,000) |
| 5 | Information systems | CIO | Public hospital (number of beds <1,000) |
| 6 | Information systems | CIO | HMO hospital (number of beds <1,000) |
| 7 | Cybersecurity | Head of division/department | HMO (national provider) |
| 8 | Cybersecurity | Head of division/department | HMO hospital (number of beds <1,000) |
| 9 | Cybersecurity | Head of division/department | Public hospital (number of beds >1,000) |
| 10 | Cybersecurity | Infrastructure manager | Public hospital (number of beds >1,000) |
| 11 | Technology / Innovation | CTO | Public hospital (number of beds <1,000) |
| 12 | Technology / Innovation | Head of division | Public hospital (number of beds <1,000) |
The study included 12 participants (10 men and 2 women) and most participants were aged between 40 and 55. CIO: chief information officer, HMO: health maintenance organization, CTO: chief technology officer.
Figure 1Qualitative study flow.
Theme mapping
| Factor | Theme code | Description |
|---|---|---|
| Factors associated with regulators | 1 | Data security regulations are not aligned with the reality of data security in healthcare. |
| Vague standards | 1.1 | Drafts are issued and then remain at the draft level for two or more years. |
| Lack of regulation | 1.2 | If there is no explicit requirement that data security must be implemented, it is unlikely to be adopted voluntarily by management. |
| Unrealistic regulations | 1.3 | Regulations that are imposed without necessary resources are not effective and will not be implemented. |
|
| ||
| Factors associated with healthcare providers | 2 | Healthcare institutions require balancing a commitment to patient data protection alongside organizational demands for efficient patient care and service. |
| Low capacity | 2.1 | There is a need to balance continually increasing costs of cybersecurity in a context of limited resources. |
| Business priorities | 2.2 | Patient data security is not seen as a high priority within the organizations |
| An uninterrupted workflow | 2.3 | There are concerns that excessive security might hinder the optimal workflow of the professional staff. |
| A responsive approach | 2.4 | Most participants adopted a responsive approach toward decision making with regard to cyber-threats, rather than a preventative approach. |
|
| ||
| Factors associated with vendors | 3 | Participants discussed the cyber-defense systems they use on a daily basis as products that are expected to provide them added value. |
| Unclear return on investment (ROI)/necessity | 3.1 | Participants expressed skepticism about the claim that cryptographic methods of cybersecurity would provide significant added value relative to the current infrastructures. |