Data security challenges in medical records: A comparative analysis of digital and paper systems
Keywords:
Electronic health record, documentation, electronic systems, paper based systems, leakage of health information, securityAbstract
Background: This has become very important since health care is moving from paper-based systems to electronic systems. Each of them is exposed to various risks such as cyberrisks and physical losses which makes the issue of data security rather acute. Aim: The purpose of this work is to define the major issues related to the protection of the patient records and discover the differences in the risks associated with the digital and paper record management in healthcare organizations. Methods: A literature review and was done to compare the risks of using digital and paper medical record systems, with emphasis on data breaches, regulation, and security measures in the case studies. Results: The major drawbacks of the paperless systems include attacks on the digital records and system Compromised data on the other hand has high risks of being stolen, ripped, lost among other catastrophes. Both systems fail in compliance matters, as well as in sharing data securely. Conclusion: Medical facility data safeguarding is about both the paper and digital sides that are addressed by encryption, compliance with the law, or staff education. Continual adaptation has been regarded as a key to successful protection of patient data.
Downloads
References
Teno, J. M., Price, R. A., & Makaroun, L. K. (2017). Challenges of measuring quality of community-based programs for seriously ill individuals and their families. Health Affairs, 36(7), 1227–1233. https://doi.org/10.1377/hlthaff.2017.0161 DOI: https://doi.org/10.1377/hlthaff.2017.0161
Thwin, T. T., & Vasupongayya, S. (2018). Blockchain-based secret-data sharing model for personal health record system. In 2018 5th International Conference on Advanced Informatics: Concepts, Theory and Applications (ICAICTA) (pp. 196–201). IEEE. DOI: https://doi.org/10.1109/ICAICTA.2018.8541296
Urkude, S. V., Sharma, H., Kumar, S. U., & Urkude, V. R. (2021). Anatomy of blockchain: Implementation in healthcare. In Blockchain Technology: Applications and Challenges (pp. 51–76). Springer. DOI: https://doi.org/10.1007/978-3-030-69395-4_4
Venkateswaran, N., & Prabaharan, S. P. (2022). An efficient neuro deep learning intrusion detection system for mobile ad hoc networks. EAI Endorsed Transactions on Scalable Information Systems, 9(6), e27.
Wylde, V., Rawindaran, N., Lawrence, J., Balasubramanian, R., Prakash, E., Jayal, A., Khan, I., Hewage, C., & Platts, J. (2022). Cybersecurity, data privacy, and blockchain: A review. SN Computer Science, 3(2), 1–12. DOI: https://doi.org/10.1007/s42979-022-01020-4
Yin, J., Tang, M., Cao, J., You, M., Wang, H., & Alazab, M. (2022). Knowledge-driven cybersecurity intelligence: Software vulnerability coexploitation behavior discovery. IEEE Transactions on Industrial Informatics, 19(4), 5593–5601. DOI: https://doi.org/10.1109/TII.2022.3192027
Zhang, L., Xu, J., Vijayakumar, P., Sharma, P. K., & Ghosh, U. (2022). Homomorphic encryption-based privacy-preserving federated learning in IoT-enabled healthcare systems. IEEE Transactions on Network Science and Engineering. DOI: https://doi.org/10.1109/TNSE.2022.3185327
Zhang, X., & Poslad, S. (2018). Blockchain support for flexible queries with granular access control to electronic medical records (EMR). In 2018 IEEE International Conference on Communications (ICC) (pp. 1–6). IEEE. DOI: https://doi.org/10.1109/ICC.2018.8422883
Kumar Panda, S., Jena, A. K., Swain, S. K., & Satapathy, S. C. (2021). Blockchain technology applications and challenges. Springer. DOI: https://doi.org/10.1007/978-3-030-69395-4
Patil, D. R., & Pattewar, T. M. (2022). Majority voting and feature selection-based network intrusion detection system. EAI Endorsed Transactions on Scalable Information Systems, 9(&), eеб-еб.
Peloquin, D., DiMain, M., Bierer, B., & Barnes, M. (2020). Disruptive and avoidable: GDPR challenges to secondary research uses of data. European Journal of Human Genetics, 28(6), 697–705. DOI: https://doi.org/10.1038/s41431-020-0596-x
Pountoukidou, A., Potamiti-Komi, M., Sarri, V., Papapanou, M., Routsi, E., Tsiatsiani, A. M., Vlahos, N., & Siristatidis, C. (2021). Management and prevention of COVID-19 in pregnancy and pandemic obstetric care: A review of current practices. Healthcare, 9(467). DOI: https://doi.org/10.3390/healthcare9040467
Rezaribagha, F., Mu, Y., Susilo, W., & Win, K. T. (2017). Multi-authority security framework for scalable EHR systems. International Journal of Medical Engineering and Informatics, 8(4), 390–408. DOI: https://doi.org/10.1504/IJMEI.2016.079368
Shahmoradi, L., Darrudi, A., Arji, G., & Farzaneh Nejad, A. (2017). Electronic health record implementation: A SWOT analysis. Acta Medica Iranica, 55(6), 642–649.
Shi, X., & Wu, X. (2017). An overview of human genetic privacy. Annals of the New York Academy of Sciences, 1387(1), 61–72. DOI: https://doi.org/10.1111/nyas.13211
Shore, A., Reddy, A., & Klein, C. (2022). A student-centered privacy model for responsible technology use. In Higher education implications for teaching and learning during COVID-19 (pp. 81). DOI: https://doi.org/10.5771/9781793649799-81
Solove, D. J., & Hartzog, W. (2022). Unifying privacy and data security.
Souza, J., Pimenta, D., Caballero, I., & Freitas, A. (2020). Measuring data credibility and medical coding: A case study using a nationwide Portuguese inpatient database. Software Quality Journal, 28(3), 1043–1061. DOI: https://doi.org/10.1007/s11219-020-09504-3
Sravani, M. M., & Durai, S. A. (2021). Attacks on cryptosystems implemented via VLSI: A review. Journal of Information Security and Applications, 60, 102861. DOI: https://doi.org/10.1016/j.jisa.2021.102861
Tanwar, S., Parekh, K., & Evans, R. (2020). Blockchain-based electronic healthcare record system for healthcare 4.0 applications. Journal of Information Security and Applications, 50, 102407. DOI: https://doi.org/10.1016/j.jisa.2019.102407
Kahetri, N. (2017). Blockchain's roles in strengthening cybersecurity and protecting privacy. *Telecommunications Policy, 41(10), 1027–1038. DOI: https://doi.org/10.1016/j.telpol.2017.09.003
Lahti, A. C., Wang, D., Pei, H., Baker, S., & Narayan, V. A. (2021). Clinical utility of wearable sensors and patient-reported surveys in patients with schizophrenia: Noninterventional, observational study. *JMIR Mental Health, 8*(8), e26234. DOI: https://doi.org/10.2196/26234
Lettieri, G. K., Tai, A. H., Hütter, A. R., Raszl, A. L. T., Moura, M., & Cintra, R. B. (2022). Medical confidentiality in the digital era: An analysis of physician-patient relations. Revista Bioetica, 29*, 814–824. DOI: https://doi.org/10.1590/1983-80422021294515
Li, T., Wang, H., He, D., & Yu, J. (2022). Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE Internet of Things Journal. DOI: https://doi.org/10.1109/JIOT.2022.3147925
Ma, Y., Zhou, G., & Wang, S. (2019). WiFi sensing with channel state information: A survey. ACM Computing Surveys (CSUR), 52(3), 1–36. DOI: https://doi.org/10.1145/3310194
Makhdoom, I., Abolhasan, M., Abbas, H., & Ni, W. (2019). Blockchain's adoption in IoT: The challenges, and a way forward. Journal of Network and Computer Applications, 125, 251–279. DOI: https://doi.org/10.1016/j.jnca.2018.10.019
Mayer, A. H., Costa, C. A., & Righi, R. R. (2020). Electronic health records in a Blockchain: A systematic review. Health Informatics Journal, 26(2), 1273–1288. DOI: https://doi.org/10.1177/1460458219866350
McIntosh, T., Kayes, A. S. M., Chen, Y.-P. P., Ng, A., & Watters, P. (2021). Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions. ACM Computing Surveys (CSUR), 54(9), 1–36. DOI: https://doi.org/10.1145/3479393
Mesquita, R. C., & de Edwarda, I. (2020). Systematic literature review of My Health Record system. Asia Pacific Journal of Health Management, 15, 14–25. DOI: https://doi.org/10.24083/apjhm.v15i1.311
MHMD. (2017). Initial list of main requirements, Deliverable 1.1. Retrieved from http://www.myhealthmydata.eu/wp-content/themes/Parallax-One/deliverables/D1.1_InitialList-of-Main-Requirements.pdf
MHMD. (2018). Shaping our future, Newsletter 01. Retrieved from http://www.myhealthmydata.eu/wp-content/uploads/2017/10/MHMD_newsletter_01DEF_WEB_pag doppie_110718.pdf
Mohammadi, M., Larijani, B., Razavi, S. H. E., Fotouhi, A., Ghaderi, A., Madani, S. J., & Shafiei, M. N. (2018). Do patients know that physicians should be confidential? Study on patients' awareness of privacy and confidentiality. Journal of Medical Ethics and History of Medicine, 11.
Olla, P., Tan, J., Elliott, L., & Abuneeiz, M. (2022). Security and privacy issues. Digital Health Care: Perspectives, Applications, and Cases*, 105.
Enaizan, O., Zaidan, A. A., Alwi, N. H. M., Zaidan, B. B., & Alsalem, M. A. (2020). Electronic medical record systems: Decision support examination framework for individual, security, and privacy concerns using multi-perspective analysis. Health and Technology, 10(4), 795–822. https://doi.org/10.1007/s12553-019-00406-x DOI: https://doi.org/10.1007/s12553-018-0278-7
Keshta, I., & Odeh, A. (2021). Security and privacy of electronic health records: Concerns and challenges. *Egyptian Informatics Journal, 22*(2), 177–183. https://doi.org/10.1016/j.eij.2020.07.003 DOI: https://doi.org/10.1016/j.eij.2020.07.003
Thapa, C., & Camtepe, S. (2021). Precision health data: Requirements, challenges, and existing techniques for data security and privacy. Computers in Biology and Medicine, 129, 104130. https://doi.org/10.1016/j.compbiomed.2020.104130 DOI: https://doi.org/10.1016/j.compbiomed.2020.104130
Zaabar, B., Cheikhrouhou, O., Jamil, F., Ammi, M., & Abid, M. (2021). HealthBlock: A secure blockchain-based healthcare data management system. Computer Networks, 200, 108500. https://doi.org/10.1016/j.comnet.2021.108500 DOI: https://doi.org/10.1016/j.comnet.2021.108500
Shi, S., He, D., Li, L., Kumar, N., Khan, M. K., & Kim-Kwang. (2020). Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey. Computers & Security, 97, 101966. https://doi.org/10.1016/j.cose.2020.101966 DOI: https://doi.org/10.1016/j.cose.2020.101966
Shamshad, S., Mahmood, K., Kumari, S., & Chen, C.-M. (2020). A secure blockchain-based e-health records storage and sharing scheme. Journal of Information Security and Applications, 55, 102590. https://doi.org/10.1016/j.jisa.2020.102590 DOI: https://doi.org/10.1016/j.jisa.2020.102590
Mani, V., Manickam, P., Saleh Alghamdi, Y. A., & Ibrahim, O. (2021). Hyperledger healthchain: Patient-centric IPFS-based storage of health records. Electronics, 10*(23), 3003. https://doi.org/10.3390/electronics10233003 DOI: https://doi.org/10.3390/electronics10233003
Ali, O., Jaradat, A., Kulakli, A., & Abuhalimeh, A. (2021). A comparative study: Blockchain technology utilization benefits, challenges, and functionalities. IEEE Access, 9, 12730–12749. https://doi.org/10.1109/ACCESS.2021.3052024 DOI: https://doi.org/10.1109/ACCESS.2021.3050241
Albahri, O. S., et al. (2018). Systematic review of real-time remote health monitoring system in triage and priority-based sensor technology: Taxonomy, open challenges, motivation, and recommendations. Journal of Medical Systems, 42(5), 80. https://doi.org/10.1007/s10916-018-0959-5 DOI: https://doi.org/10.1007/s10916-018-0943-4
Al-Qaysi, Z. T., et al. (2018). A review of disability EEG-based wheelchair control system: Coherent taxonomy, open challenges, and recommendations. Computer Methods and Programs in Biomedicine, 164,221–237. https://doi.org/10.1016/j.cmpb.2018.07.011 DOI: https://doi.org/10.1016/j.cmpb.2018.06.012
Yas, Q. M., et al. (2018). A systematic review on smartphone skin cancer apps: Coherent taxonomy, motivations, open challenges and recommendations, and new research direction. Journal of Circuits, Systems, and Computers, 27(05), 1830003. https://doi.org/10.1142/S0218126618300037 DOI: https://doi.org/10.1142/S0218126618300039
Alsalem, M. A., et al. (2018). Systematic review of an automated multiclass detection and classification system for acute leukemia in terms of evaluation and benchmarking, open challenges, issues, and methodological aspects. Journal of Medical Systems, 42(11), 204. https://doi.org/10.1007/s10916-018-1055-6 DOI: https://doi.org/10.1007/s10916-018-1064-9
Alsalem, M. A., et al. (2018). A review of the automated detection and classification of acute leukemia: Coherent taxonomy, datasets, validation and performance measurements, motivation, open challenges, and recommendations. Computer Methods and Programs in Biomedicine, 158, 93–112. https://doi.org/10.1016/j.cmpb.2018.02.015 DOI: https://doi.org/10.1016/j.cmpb.2018.02.005
Hamada, M., et al. (2018). A systematic review for human EEG brain signals-based emotion classification, feature extraction, brain condition, group comparison. Journal of Medical Systems, 42(9), 162. https://doi.org/10.1007/s10916-018-1014-2 DOI: https://doi.org/10.1007/s10916-018-1020-8
Ali, A. H., et al. (2018). High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimedia Tools and Applications, 77(23), 31487–31516. https://doi.org/10.1007/s11042-018-6083-9 DOI: https://doi.org/10.1007/s11042-018-6213-0
Published
How to Cite
Issue
Section
Copyright (c) 2023 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.