Next Article in Journal
The Prevalence of Metabolic Syndrome and Health-Related Behavior Changes: The Korea National Health Examination Survey
Next Article in Special Issue
Enhancing Privacy and Data Security across Healthcare Applications Using Blockchain and Distributed Ledger Concepts
Previous Article in Journal
Age-Standardized Breast Cancer Detection Rates of Breast Cancer Screening Program by Age Group in Korea; Comparison with Age-Standardized Incidence Rates from the Korea Central Cancer Registry
Review

Healthcare Data Breaches: Insights and Implications

1
Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow 226025, India
2
College of Computer & Information Sciences, Prince Sultan University, Riyadh 12435, Saudi Arabia
3
System Manager, Sanjay Gandhi Post Graduate Institute of Medical Sciences, Lucknow 226014, India
*
Author to whom correspondence should be addressed.
Healthcare 2020, 8(2), 133; https://doi.org/10.3390/healthcare8020133
Received: 25 March 2020 / Revised: 24 April 2020 / Accepted: 1 May 2020 / Published: 13 May 2020
(This article belongs to the Special Issue Cyber Security and Data Privacy for Healthcare Industry)
The Internet of Medical Things, Smart Devices, Information Systems, and Cloud Services have led to a digital transformation of the healthcare industry. Digital healthcare services have paved the way for easier and more accessible treatment, thus making our lives far more comfortable. However, the present day healthcare industry has also become the main victim of external as well as internal attacks. Data breaches are not just a concern and complication for security experts; they also affect clients, stakeholders, organizations, and businesses. Though the data breaches are of different types, their impact is almost always the same. This study provides insights into the various categories of data breaches faced by different organizations. The main objective is to do an in-depth analysis of healthcare data breaches and draw inferences from them, thereby using the findings to improve healthcare data confidentiality. The study found that hacking/IT incidents are the most prevalent forms of attack behind healthcare data breaches, followed by unauthorized internal disclosures. The frequency of healthcare data breaches, magnitude of exposed records, and financial losses due to breached records are increasing rapidly. Data from the healthcare industry is regarded as being highly valuable. This has become a major lure for the misappropriation and pilferage of healthcare data. Addressing this anomaly, the present study employs the simple moving average method and the simple exponential soothing method of time series analysis to examine the trend of healthcare data breaches and their cost. Of the two methods, the simple moving average method provided more reliable forecasting results. View Full-Text
Keywords: healthcare data breaches; data confidentiality; data security; cost effectiveness; data analysis; time series analysis; data breach forecasting; cost forecasting healthcare data breaches; data confidentiality; data security; cost effectiveness; data analysis; time series analysis; data breach forecasting; cost forecasting
Show Figures

Figure 1

MDPI and ACS Style

Seh, A.H.; Zarour, M.; Alenezi, M.; Sarkar, A.K.; Agrawal, A.; Kumar, R.; Ahmad Khan, R. Healthcare Data Breaches: Insights and Implications. Healthcare 2020, 8, 133. https://doi.org/10.3390/healthcare8020133

AMA Style

Seh AH, Zarour M, Alenezi M, Sarkar AK, Agrawal A, Kumar R, Ahmad Khan R. Healthcare Data Breaches: Insights and Implications. Healthcare. 2020; 8(2):133. https://doi.org/10.3390/healthcare8020133

Chicago/Turabian Style

Seh, Adil H., Mohammad Zarour, Mamdouh Alenezi, Amal K. Sarkar, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan. 2020. "Healthcare Data Breaches: Insights and Implications" Healthcare 8, no. 2: 133. https://doi.org/10.3390/healthcare8020133

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop