CFP last date
20 August 2025
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2025

Submit your paper
Know more
Random Articles
Reseach Article

Healthcare Data Protection: Emerging Concerns

by Pavan Subhash Chandrabose Nara, Suhair Amer
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 26
Year of Publication: 2025
Authors: Pavan Subhash Chandrabose Nara, Suhair Amer
10.5120/ijca2025925457

Pavan Subhash Chandrabose Nara, Suhair Amer . Healthcare Data Protection: Emerging Concerns. International Journal of Computer Applications. 187, 26 ( Jul 2025), 38-42. DOI=10.5120/ijca2025925457

@article{ 10.5120/ijca2025925457,
author = { Pavan Subhash Chandrabose Nara, Suhair Amer },
title = { Healthcare Data Protection: Emerging Concerns },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2025 },
volume = { 187 },
number = { 26 },
month = { Jul },
year = { 2025 },
issn = { 0975-8887 },
pages = { 38-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number26/healthcare-data-protection-emerging-concerns/ },
doi = { 10.5120/ijca2025925457 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-07-31T02:40:11.775572+05:30
%A Pavan Subhash Chandrabose Nara
%A Suhair Amer
%T Healthcare Data Protection: Emerging Concerns
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 26
%P 38-42
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The digitization of healthcare information presents both opportunities and challenges. While electronic health in- formation systems enhance efficiency and accessibility, they also introduce significant cybersecurity risks. This paper examines the cybersecurity dimensions of protecting electronic health information, analyzing the causes and impact of data breaches, exploring the legal and ethical landscape, and evaluating security standards and techniques. The paper discusses the critical importance of robust legal frameworks, ethical practices, and effective security measures to safeguard patient data and maintain trust in the digital healthcare ecosystem.

References
  1. T. Cooper, J. Collmann, and H. Neidermeier, “Organizational repertoires and rites in health information security,” Cambridge Quarterly of Health- care Ethics, vol. 17, no. 4, pp. 441–452, 2008.
  2. R. Collier, “Us health information breaches up 137%,” Canadian Med- ical Association Journal, vol. 186, no. 6, p. 412, 2014.
  3. U.S. Department of Health and Human Services, “Hitech act enforcement: Interim final rule,” 2025, accessed: 2025-04-01. [On- line]. Available: https://www.hhs.gov/hipaa/for-professionals/special- topics/hitech-act-enforcement-interim-final-rule/index.html
  4. A. E. Solomonides and T. K. Mackey, “Emerging ethical issues in digital health information,” Cambridge Quarterly of Healthcare Ethics, vol. 24, no. 3, pp. 311–322, 2015.
  5. “New standards adopted to protect patient privacy,” Ophthalmology Times, vol. 28, no. 7, p. 4, Apr 2003.
  6. “Summary of the hipaa security rule,” July 2013. [Online]. Available: https://www.hhs.gov/hipaa/for-professionals/security/laws- regulations/index.html
  7. M. Farzandipour, F. Sadoughi, M. Ahmadi, and I. Karimi, “Security requirements and solutions in electronic health records: Lessons learned from a comparative study,” Journal of Medical Systems, vol. 34, no. 4, pp. 629–642, April 2010.
  8. C. S. Kruse et al., “Security techniques for the electronic health records, ”Journal of Medical Systems, vol. 41, no. 8, 2017.
  9. M. Levy and M. B. Royne, “Up for sale: Consumer medical information,” The Journal of Consumer Marketing, vol. 26, no. 7, pp. 465–467, 2009.
  10. J. Myers, T. R. Frieden, K. M. Bherwani, and K. J. Henning, “Privacy and public health at risk: Public health confidentiality in the digital age,” American Journal of Public Health, vol. 98, no. 5, pp. 793–801, 2008.
  11. “Hitech act enforcement interim final rule,” June 2017. [Online]. Avail- able: https://www.hhs.gov/hipaa/for-professionals/special-topics/hitech- act-enforcement-interim-final-rule/index.html
  12. L. Dimitropoulos and S. Rizk, “A state-based approach to privacy and security for interoperable health information exchange,” Health Affairs, vol. 28, no. 2, pp. 428–434, Mar/Apr 2009.
  13. D. F. Sittig and H. Singh, “Legal, ethical, and financial dilemmas in electronic health record adoption and use,” Pediatrics, vol. 127, no. 4, pp. e1042–e1047, 2011.
  14. T. Kind and T. J. Silber, “Ethical issues in pediatric e-health,” Clinical Pediatrics, vol. 43, no. 7, pp. 593–599, Sept 2004
Index Terms

Computer Science
Information Sciences

Keywords

Cybersecurity Electronic Health Information Data Breach HIPAA HITECH Act Data Security Patient Privacy Healthcare Security Standards