Donna S. McDermott, Jessica L. Kamerer, Andrew T. Birk
{"title":"Electronic Health Records","authors":"Donna S. McDermott, Jessica L. Kamerer, Andrew T. Birk","doi":"10.4018/IJCRE.2019070104","DOIUrl":null,"url":null,"abstract":"Electronic health records (EHRs) pose unique concerns for administrators and information technology professionals with regard to cybersecurity. Due to the sensitive nature and increasing value of personal health information, cyber risks and information protection should be a high priority. A literature review was conducted to identify potential threat categories and best practices in protecting EHR information. Potential threats were identified and categorized into five areas; physical, portable devices, insider use, technical, and administrative. Government policies have created administrative, physical, and technical safeguards to keep EHR information safe. Despite these efforts, EHRs are being targeted by cyber-criminals due to flaws in personal and organizational management of protected healthcare information. This paper aims to educate, inform, and advocate for the proper handling of EHRs to alleviate the burden caused by compromised electronic documents.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Research and Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/IJCRE.2019070104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
Electronic health records (EHRs) pose unique concerns for administrators and information technology professionals with regard to cybersecurity. Due to the sensitive nature and increasing value of personal health information, cyber risks and information protection should be a high priority. A literature review was conducted to identify potential threat categories and best practices in protecting EHR information. Potential threats were identified and categorized into five areas; physical, portable devices, insider use, technical, and administrative. Government policies have created administrative, physical, and technical safeguards to keep EHR information safe. Despite these efforts, EHRs are being targeted by cyber-criminals due to flaws in personal and organizational management of protected healthcare information. This paper aims to educate, inform, and advocate for the proper handling of EHRs to alleviate the burden caused by compromised electronic documents.