IDEAS home Printed from https://ideas.repec.org/a/dbk/medicw/v3y2024ip519id519.html
   My bibliography  Save this article

Security Risks and Solutions in Medical Information Science for Protecting Patient Data Integrity

Author

Listed:
  • Jamuna K.V
  • Zuleika Homavazir
  • Asish Malla
  • Kasturi Pohini
  • Madhur Grover
  • Tarang Bhatnagar
  • Ajit Kumar Lenka

Abstract

The rapid advancement of medical computer technology has made it much simpler to offer healthcare and maintain track of patients. However, this increase raises significant security concerns, putting patient data at danger. This abstract examines the major security issues associated with medical information systems and proposes comprehensive solutions to keep private patient data secure. If the security protocols are insufficient, someone else may be able to get access without authorisation. This might result in data breaches and put sensitive health information at risk. Another significant issue is data interception while in transit. This often occurs when communication paths are not private. Furthermore, depending more and more on third-party organisations for data storage and analytics opens up security vulnerabilities that hackers may exploit. To address these concerns, this article proposes a variety of approaches for improving security in medical information systems. First, it emphasises the need of robust security measures, such as physical verification and two-factor authentication, to ensure that admission is strictly controlled and monitored. Second, it allows encrypting data both during transmission and storage, employing modern encryption standards to prevent unauthorised users from seeing or changing data. Setting up tight data privacy standards and conducting frequent inspections may help increase security by ensuring that regulations are followed and identifying security flaws. Using blockchain technology is a novel concept since it enables a decentralised and open approach to manage patient data, reducing the likelihood of it being modified or tampered with without authorisation. Machine learning methods may also be used to detect and respond in real time to unusual access patterns and potential threats. This improves the system's ability to detect threats and prevent data harm.

Suggested Citation

Handle: RePEc:dbk:medicw:v:3:y:2024:i::p:519:id:519
DOI: 10.56294/mw2024519
as

Download full text from publisher

To our knowledge, this item is not available for download. To find whether it is available, there are three options:
1. Check below whether another version of this item is available online.
2. Check on the provider's web page whether it is in fact available.
3. Perform a
for a similarly titled item that would be available.

More about this item

Statistics

Access and download statistics

Corrections

All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:dbk:medicw:v:3:y:2024:i::p:519:id:519. See general information about how to correct material in RePEc.

If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

We have no bibliographic references for this item. You can help adding them by using this form .

If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Javier Gonzalez-Argote (email available below). General contact details of provider: https://mw.ageditor.ar/ .

Please note that corrections may take a couple of weeks to filter through the various RePEc services.

IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.