Security and Privacy Challenges for Healthcare

Permanent URI for this collection


Recent Submissions

Now showing 1 - 3 of 3
  • Item
    The Travel of Privacy Standards and Regulations in Healthcare
    ( 2021-01-05) Anderson, Chad ; Baskerville, Richard ; Kaul, Mala
    Increasing technology dependence by individuals and organizations has resulted in a profusion of information privacy standards and regulations created to protect personal information. There are expectations of universality in the scope of standards and regulations but also, in most cases, some degree of flexibility that allows for adaptation and compliance with local requirements and influences. Our research into the privacy policy development at a health information exchange (HIE) finds that in practice, standards and regulations are subject to multiple translations that can result in policies and practices which inhibit the HIE’s goal of facilitating data exchange. Translation must therefore be appropriately managed by the HIE to ensure data exchange is not constrained. This has important theoretical and practical implications for health information privacy in an increasingly technology pervasive world, by contrasting the global view with the local view of information privacy, through an application of healthcare standards setting and execution.
  • Item
    Medical Internet of Things: A Survey of the Current Threat and Vulnerability Landscape
    ( 2021-01-05) Mcgowan, Aleise ; Sittig, Scott ; Andel, Todd
    The Internet of things (IoT) is a system that utilizes the Internet to facilitate communication between sensors and devices. Given the ubiquitous nature of IoT devices, it is seemingly inevitable that IoT would be used as a conduit to transform healthcare. One such medical IoT (mIoT) device that is revolutionizing healthcare is the medical implant device. These mIoT implant devices which control insulin pumps, cardioverter defibrillators and bone growth stimulators have redefined the way patient data is accessed, and healthcare is delivered. These implant devices are a double-edged sword. While they allow for the effective and efficient noninvasive treatment of patients, this external communication makes the medical implants vulnerable to cyberattacks synonymous with IoT devices. As a result, privacy and security vulnerabilities have surfaced as pronounced challenges for mIoT devices. This work summarizes and synthesizes the inherent vulnerabilities associated with mIoT devices and the implications regarding patient safety.
  • Item