UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 10 Issue 7
July-2023
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2307A09


Registration ID:
537289

Page Number

k68-k73

Share This Article


Jetir RMS

Title

CYBERSECURITY PROTOCOLS FOR ELECTRONIC HEALTH RECORDS (EHRS): BEST PRACTICES FOR PROTECTING SENSITIVE PATIENT DATA IN EHRS FROM CYBER ATTACKS

Abstract

The aim of this paper is to explore the various opportunities to create affordable, efficient, and effective security protocols for electronic health records (EHRs). The increased adoption of EHR systems offers many advantages for health organizations and patients. These potential benefits are tempered by anxiety over various security and privacy issues. The privacy of sensitive health information is a key issue for patients and their willingness to adopt EHRs [1]. The very future of EHR success may depend on the public's sense of security. There are many standards and best practice documents available for EHR security guidelines, but many organizations have found them to be too numerous, too complex, and not directly actionable. Our goal is to address a security protocol in terms of an ontology of directly actionable security processes that will protect the most sensitive EHR information. These processes would be used to automatically monitor the flow of patient information and detect any violations of privacy policies. This detection will immediately trigger a corrective action to resolve the policy violation [1,2]. The need for directly actionable security processes signifies that we will use EHR system data as a basis to force changes in behaviors that directly affect the security of patient information. We will avoid creating security policies that are broad, too abstract, or not directly enforceable within an EHR system. Primarily, our work targets the security of patient information that is mental health or behavior related; implication of released information could be detrimental for future employment or insurance opportunities. This area of security has received little attention in comparison to the security of general patient information.

Key Words

E-health, electronic health record, health informatics, health services, computer security, data protection, information security, confidentiality, privacy, computer crime, data security policies, security management, medical records system, user authentication, cryptography, firewall, intrusion detection, antivirus agents, security evaluation, ISO, standards, legislation, regulation, Health Insurance Portability and Accountability Act, General Medical Council, Caldicott guardians, patients.

Cite This Article

"CYBERSECURITY PROTOCOLS FOR ELECTRONIC HEALTH RECORDS (EHRS): BEST PRACTICES FOR PROTECTING SENSITIVE PATIENT DATA IN EHRS FROM CYBER ATTACKS", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.10, Issue 7, page no.k68-k73, July-2023, Available :http://www.jetir.org/papers/JETIR2307A09.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"CYBERSECURITY PROTOCOLS FOR ELECTRONIC HEALTH RECORDS (EHRS): BEST PRACTICES FOR PROTECTING SENSITIVE PATIENT DATA IN EHRS FROM CYBER ATTACKS", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.10, Issue 7, page no. ppk68-k73, July-2023, Available at : http://www.jetir.org/papers/JETIR2307A09.pdf

Publication Details

Published Paper ID: JETIR2307A09
Registration ID: 537289
Published In: Volume 10 | Issue 7 | Year July-2023
DOI (Digital Object Identifier):
Page No: k68-k73
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00021

Print This Page

Current Call For Paper

Jetir RMS