Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3358695.3361754acmotherconferencesArticle/Chapter ViewAbstractPublication PageswiConference Proceedingsconference-collections
short-paper

Where is the Risk? Analysis of Government Reported Patient Medical Data Breaches

Published: 14 October 2019 Publication History

Abstract

Managing healthcare organizational cybersecurity risk is complex. This work examines government reported patient health data breaches to learn more about trends in reported breaches to inform organizational risk budgeting, trends and focus areas. In many cases, organizations only have enough time to survive daily risk management activities. They all too often have little, if any, time for actual risk management research beyond third-party vendor threat intelligence. Our research fills this gap by analyzing the breach data reported to the United States (US) Health and Human Services (HHS) Office of Civil Rights (OCR) from May 1, 2018 until May 1, 2019. The analysis reports on trends from breach factors reported to the government to further inform cybersecurity patient health data risk management.

References

[1]
Aupetit, M., Fernandez-Luque, L., Singh, M., & Srivastava, J. (2017). Visualization of Wearable Data and Biometrics for Analysis and Recommendations in Childhood Obesity. 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS) (pp. 678-679). Thessaloniki: IEEE.
[2]
Catelani, M., Ciani, L., & Risaliti, C. (2014). Risk assessment in the use of medical devices: A proposal to evaluate the impact of the human factor. 2014 IEEE International Symposium on Medical Measurements and Applications (MeMeA) (pp. 1-6). Lisboa: IEEE.
[3]
Chen, S., Chen, S., Andrienko, N. V., Andrienko, G. L., Nguyen, P. H., Turkay, C., Yuan, X. (2018). User Behavior Map: Visual Exploration for Cyber Security Session Data. 2018 IEEE Symposium on Visualization for Cyber Security (VizSec) (pp. 1-4). Berlin, Germany: IEEE.
[4]
Europe Union. (2019, September 22). The EU General Data Protection Regulation (GDPR). Retrieved September 22, 2019, from GDPR Homepage: https://eugdpr.org/
[5]
HIPAA Journal. (2019, September 22). HIPAA and HITECH. Retrieved from HIPAA Journal: https://www.hipaajournal.com/hipaa-and-hitech/
[6]
Kammüller, F. (2019). Combining Secure System Design with Risk Assessment for IoT Healthcare Systems. 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (pp. 961-966). Kyoto, Japan: IEEE.
[7]
Koike, H., Ohno, K., & Koizumi, K. (2015). Visualizing cyber attacks using IP matrix. IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05) (pp. 91-98). Minneapolis, MN, USA: IEEE.
[8]
Mckenna, S., Staheli, D., & Meyer, M. (2015). Unlocking user-centered design methods for building cyber security visualizations. 2015 IEEE Symposium on Visualization for Cyber Security (VizSec) (pp. 1-8). Chicago, IL: IEEE.
[9]
Schmeelk, S. (2019, May). Identity Theft: Anatomy of a Data Breach. Retrieved from Parson's The New School for Design Data Visualization MS Thesis: http://parsons.nyc/thesis-2019/#15
[10]
Stephens, S. H. (2015). Interactive data visualization for risk assessment: can there be too much user agency? In Proceedings of the 33rd Annual International Conference on the Design of Communication (SIGDOC '15). (p. 2). New York, New York: ACM.
[11]
U.S. Government. (2019, September 22). Office of Civil Rights Hompage. Retrieved September 22, 2019, from U.S. Government. 2019. Office of Civil Rights. Retrieved from: https://www.hhs.gov/ocr/index.html

Cited By

View all
  • (2024)Ranking the states most at risk of healthcare data breaches: an application of integrated multicriteria framework for prioritization in risk managementOrganizational Cybersecurity Journal: Practice, Process and People10.1108/OCJ-01-2023-0001Online publication date: 6-Aug-2024
  • (2023)Which information locations in covered entities under HIPAA must be secured first? A multi‐criteria decision‐making approachJournal of Healthcare Risk Management10.1002/jhrm.2155543:2(27-36)Online publication date: 24-Aug-2023
  • (2022)Risk in Healthcare Information Technology: Creating a Standardized Risk Assessment FrameworkComputer-Mediated Communication10.5772/intechopen.96456Online publication date: 7-Jan-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
WI '19 Companion: IEEE/WIC/ACM International Conference on Web Intelligence - Companion Volume
October 2019
326 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 October 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Data Breach
  2. HIPAA
  3. HITECH
  4. Identity Theft
  5. Medical Privacy/Security
  6. Patient Health Information
  7. Personally Identifying Information (PII)
  8. United States Health and Human Services (HHS)
  9. United States Office of Civil Rights (OCR)

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

WI '19

Acceptance Rates

Overall Acceptance Rate 118 of 178 submissions, 66%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)4
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Ranking the states most at risk of healthcare data breaches: an application of integrated multicriteria framework for prioritization in risk managementOrganizational Cybersecurity Journal: Practice, Process and People10.1108/OCJ-01-2023-0001Online publication date: 6-Aug-2024
  • (2023)Which information locations in covered entities under HIPAA must be secured first? A multi‐criteria decision‐making approachJournal of Healthcare Risk Management10.1002/jhrm.2155543:2(27-36)Online publication date: 24-Aug-2023
  • (2022)Risk in Healthcare Information Technology: Creating a Standardized Risk Assessment FrameworkComputer-Mediated Communication10.5772/intechopen.96456Online publication date: 7-Jan-2022
  • (2021)Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic ReviewSensors10.3390/s2115511921:15(5119)Online publication date: 28-Jul-2021
  • (2021)Top Reported Data Security Risks in the Age of COVID-192021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)10.1109/UEMCON53757.2021.9666573(0204-0208)Online publication date: 1-Dec-2021
  • (2021)SOK: Evaluating Privacy and Security Vulnerabilities of Patients’ Data in HealthcareSocio-Technical Aspects in Security10.1007/978-3-031-10183-0_8(153-181)Online publication date: 8-Oct-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media