NAVIGATING DATA PRIVACY AND CYBERSECURITY CHALLENGES IN HEALTH INFORMATION TECHNOLOGY
Keywords:
Health Information Technology (HIT), cybersecurity, data privacy, ransomware, phishing, encryption, AI-driven cybersecurity, HIPAA, GDPR, healthcare data breaches, insider threatsAbstract
The rapid adoption of Health Information Technology (HIT) has significantly transformed healthcare by improving efficiency, accuracy, and accessibility in patient care. However, this digital shift has also introduced substantial data privacy and cybersecurity challenges. This paper explores the key threats to HIT, including ransomware, phishing, and insider breaches, and discusses the regulatory frameworks, such as HIPAA and GDPR, that aim to protect patient data. It also examines the critical strategies, such as encryption, access control, and AI-driven solutions, to enhance cybersecurity while addressing the financial, operational, and interoperability challenges healthcare organizations face. The findings underscore the importance of balancing security with usability and the need for continued investment in innovative technologies to safeguard sensitive healthcare information.
References
Baker, A., Durbin, M., & Benson, T. (2020). Phishing attacks in healthcare: A rising threat. Journal of Cybersecurity, 6(1), 103-120.
Coveware. (2022). Ransomware Attacks on Healthcare: 2021 Report. Coveware Industry Report. Retrieved from https://www.coveware.com/reports
De Hert, P., & Papakonstantinou, V. (2019). The GDPR and the forgotten purpose of data protection: Safeguarding privacy and public interest. Computer Law & Security Review, 35(2), 123-135.
Bayyapu, S. (2023). How data analysts can help healthcare organizations comply with HIPAA and other data privacy regulations. International Journal For Advanced Research in Science & Technology, 13(12), 669-674.
Greene, S. M., Tuttle, D., & Dehmer, J. (2019). Insider threats in healthcare: Analysis and recommendations. Healthcare Security Review, 44(1), 78-92.
Kaul, D. (2022). AI-Driven Decentralized Authentication System Using Homomorphic Encryption. International Journal of Advanced Research in Engineering and Technology (IJARET), 13(3), 74–84.
Lam, H. P., & Wong, C. M. (2020). Comparative study of privacy legislation: HIPAA, GDPR, and CCPA. International Journal of Healthcare Management, 12(3), 412-420.
Menendez, S., & Huesman, M. (2020). HIPAA compliance in the digital age: Challenges and opportunities. Health Information Journal, 26(4), 234-245.
Bayyapu, S. (2024). Enhancing administrative efficiency with HIT in federal healthcare. Caribbean Journal of Science and Technology, 11(2), 16-20.
Panch, T., Mattie, H., & Celi, L. A. (2021). The "inconvenient truth" about AI in healthcare. The Lancet Digital Health, 3(2), e70-e75.
Ponemon Institute & IBM Security. (2021). Cost of a Data Breach Report 2021. IBM Security. Retrieved from https://www.ibm.com/security/data-breach
Smith, A., Nolan, R., & Peterson, M. (2020). Balancing cybersecurity and usability in healthcare IT systems. Health Informatics Journal, 26(3), 145-157.
Snell, E. (2022). HIPAA compliance challenges in 2022: Emerging trends. Healthcare IT News. Retrieved from https://www.healthcareitnews.com/news/hipaa-compliance-challenges
Verizon. (2021). 2021 Data Breach Investigations Report. Verizon Communications. Retrieved from https://www.verizon.com/business/resources/reports/dbir/
Voigt, P., & Von dem Bussche, A. (2021). The EU General Data Protection Regulation (GDPR): A Practical Guide. Springer International Publishing.
Wickramasinghe, N., & Fadlalla, A. M. (2022). Phishing susceptibility in healthcare: A critical review. Health Informatics Journal, 28(1), 89-102.
Nivedhaa, N. (2024). The Role of Deep Learning in Cyber Deception Techniques for Network Defense. Global Journal of Cyber Security, 1(1), 1-10.
Alotaibi, Y. K., & Federico, F. (2017). The impact of Health Information Technology on patient safety. Saudi Medical Journal, 38(12), 1173-1180. https://doi.org/10.15537/smj.2017.12.20631
Bayyapu, S. (2023). Impact of the Internet of Medical Things (IoMT) on healthcare cybersecurity. International Journal for Innovative Engineering and Management Research, 12(12), 146-153.
Bayyapu, S. (2022). Optimizing IT sourcing in healthcare: Balancing control, cost, and innovation. International Journal of Computer Applications, 3(1), 14-20.
Aliyu, S., & Tasmin, R. (2019). An overview of cybersecurity issues in electronic health records: The way forward. Healthcare Informatics Research, 25(1), 3-10. https://doi.org/10.4258/hir.2019.25.1.3
Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1-10. https://doi.org/10.3233/THC-161263
McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems, 108, 57-68. https://doi.org/10.1016/j.dss.2018.02.007
Bayyapu, S. (2021). Bridging the gap: Overcoming data, technological, and human roadblocks to AI-driven healthcare transformation. Journal of Management (JOM), 8(1), 7-14.
Kaul, D. (2021). AI-Driven Dynamic Upsell in Hotel Reservation Systems Based on Cybersecurity Risk Scores. International Journal of Computer Engineering and Technology (IJCET), 12(3), 114–125.
Martin, G., Martin, P., Hankin, C., Darzi, A., & Kinross, J. (2017). Cybersecurity and healthcare: How safe are we? BMJ, 358, j3179. https://doi.org/10.1136/bmj.j3179
Roman, R., Najera, P., & Lopez, J. (2018). Securing the Internet of Things. Computer, 44(9), 51-58. https://doi.org/10.1109/MC.2018.2651094
Bayyapu, S. (2020). Blockchain healthcare: Redefining data ownership and trust in the medical ecosystem. International Journal of Advanced Research in Engineering and Technology (IJARET), 11(11), 2748-2755.
Ross, C. K., & Saitta, A. (2019). Healthcare information privacy in the age of big data: Regulatory frameworks for HIT. Journal of Information Privacy and Security, 15(3), 123-140. https://doi.org/10.1080/15536548.2019.1673434