Suppr超能文献

是什么导致了违规行为?对信息技术使用和健康数据泄露的调查。

What caused the breach? An examination of use of information technology and health data breaches.

作者信息

Wikina Suanu Bliss

机构信息

Suanu Bliss Wikina, PhD, is an adjunct professor of information systems at Strayer University and Grantham University.

出版信息

Perspect Health Inf Manag. 2014 Oct 1;11(Fall):1h. eCollection 2014.

Abstract

Data breaches arising from theft, loss, unauthorized access/disclosure, improper disclosure, or hacking incidents involving personal health information continue to increase every year. As of September 2013, reported breaches affecting individuals reached close to 27 million since 2009, when compilation of records on breaches began. These breaches, which involved 674 covered entities and 153 business associates, involved computer systems and networks, desktop computers, laptops, paper, e-mail, electronic health records, and removable/portable devices (CDs, USBs, x-ray films, backup tapes, etc.). Even with the increased use of health information technology by health institutions and allied businesses, theft and loss (not hacking) constitute the major types of data breaches encountered. Removable/portable devices, desktop computers, and laptops were the top sources or locations of the breached information, while the top six states-Virginia, Illinois, California, Florida, New York, and Tennessee-in terms of the number of reported breaches accounted for nearly 75 percent of the total individual breaches, 33 percent of breaches in covered entities, and about 30 percent of the total breaches involving business associates.

摘要

因盗窃、丢失、未经授权的访问/披露、不当披露或涉及个人健康信息的黑客攻击事件导致的数据泄露每年都在持续增加。截至2013年9月,自2009年开始汇编违规记录以来,报告的影响个人的违规事件已接近2700万起。这些违规事件涉及674个受监管实体和153个业务合作伙伴,涉及计算机系统和网络、台式电脑、笔记本电脑、纸张、电子邮件、电子健康记录以及可移动/便携式设备(光盘、U盘、X光片、备份磁带等)。即使医疗机构和相关企业对健康信息技术的使用有所增加,但盗窃和丢失(而非黑客攻击)仍是所遇到的数据泄露的主要类型。可移动/便携式设备、台式电脑和笔记本电脑是违规信息的主要来源或位置,而就报告的违规事件数量而言,排名前六位的州——弗吉尼亚州、伊利诺伊州、加利福尼亚州、佛罗里达州、纽约州和田纳西州——占个人违规总数的近75%,占受监管实体违规事件的33%,以及涉及业务合作伙伴的违规事件总数的约30%。

相似文献

1
What caused the breach? An examination of use of information technology and health data breaches.
Perspect Health Inf Manag. 2014 Oct 1;11(Fall):1h. eCollection 2014.
2
Trends and characteristics of protected health information breaches in the United States.
AMIA Annu Symp Proc. 2020 Mar 4;2019:1081-1090. eCollection 2019.
3
Cyberthreats: A primer for healthcare professionals.
Am J Emerg Med. 2023 Jun;68:179-185. doi: 10.1016/j.ajem.2023.04.001. Epub 2023 Apr 5.
5
Which information locations in covered entities under HIPAA must be secured first? A multi-criteria decision-making approach.
J Healthc Risk Manag. 2023 Oct;43(2):27-36. doi: 10.1002/jhrm.21555. Epub 2023 Aug 24.
6
For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations.
Health Inf Manag. 2024 Sep;53(3):198-205. doi: 10.1177/18333583231158886. Epub 2023 Feb 24.
8
Evaluation of Causes of Protected Health Information Breaches.
JAMA Intern Med. 2019 Feb 1;179(2):265-267. doi: 10.1001/jamainternmed.2018.5295.
9
Cyber-Analytics: Identifying Discriminants of Data Breaches.
Perspect Health Inf Manag. 2019 Jul 1;16(Summer):1a. eCollection 2019 Summer.
10
Physical security, HIPPA, and the HHS wall of shame.
J Healthc Prot Manage. 2014;30(1):85-90.

引用本文的文献

1
Achieving sustainable medical tourism: unpacking privacy concerns through a tripartite game theoretic lens.
Front Public Health. 2024 Apr 9;12:1347231. doi: 10.3389/fpubh.2024.1347231. eCollection 2024.
2
Blockchain Technology for Electronic Health Records.
Int J Environ Res Public Health. 2022 Nov 24;19(23):15577. doi: 10.3390/ijerph192315577.
3
Health Records Database and Inherent Security Concerns: A Review of the Literature.
Cureus. 2022 Oct 11;14(10):e30168. doi: 10.7759/cureus.30168. eCollection 2022 Oct.
4
Cyberincivility Experience of Korean Clinical Nurses in the Workplace: A Qualitative Content Analysis.
Int J Environ Res Public Health. 2020 Dec 4;17(23):9052. doi: 10.3390/ijerph17239052.
5
Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology.
BMC Med Inform Decis Mak. 2020 Oct 7;20(1):256. doi: 10.1186/s12911-020-01275-y.
6
Healthcare Data Breaches: Insights and Implications.
Healthcare (Basel). 2020 May 13;8(2):133. doi: 10.3390/healthcare8020133.
7
Cyber-Analytics: Identifying Discriminants of Data Breaches.
Perspect Health Inf Manag. 2019 Jul 1;16(Summer):1a. eCollection 2019 Summer.
8
Security Techniques for the Electronic Health Records.
J Med Syst. 2017 Aug;41(8):127. doi: 10.1007/s10916-017-0778-4. Epub 2017 Jul 21.

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验