skip to main content

Improving Healthcare Patient Data Security: An Integrated Framework Model For Electronic Health Records From A Legal Perspective

*Ahdiana Yuni Lestari orcid scopus  -  Faculty of Law, Universitas Muhammadiyah Yogyakarta, Indonesia
Misran Misran orcid scopus  -  Faculty of Social and Political Sciences, Universitas Gadjah Mada, Indonesia
Trisno Raharjo orcid scopus  -  Postgraduate, Universitas Muhammadiyah Yogyakarta, Indonesia
Muhammad Annas scopus  -  Department of Law, Universidad Carlos III de Madrid, Spain
Dinda Riskanita orcid  -  Faculty of Business and Human Sciences, Universitas Siber Muhammadiyah, Indonesia
Adya Paramita Prabandari scopus  -  Faculty of Law, Universitas Diponegoro, Indonesia
Open Access Copyright 2024 LAW REFORM under http://creativecommons.org/licenses/by-sa/4.0.

Citation Format:
Abstract

This study aims to critically examine the legal responsibilities of healthcare facilities in Indonesia regarding the protection of patient data within Electronic Medical Records (EMR). The research employs a mixed-method approach, combining normative legal analysis with empirical data collection from healthcare facilities to assess the implementation of data protection regulations. The findings reveal significant gaps in the enforcement of Minister of Health Regulation Number 24 of 2022 and Law Number 27 of 2022 concerning Personal Data Protection, particularly in smaller clinics and independent practices. These facilities often lack the technical infrastructure and resources required to meet regulatory standards, resulting in inconsistencies in data protection and a higher incidence of data breaches. The study introduces the Integrated Security and Usability Framework for Electronic Medical Records (ISU-EMR), which combines the principles of the Confidentiality, Integrity, and Availability (CIA) Triad with Human-Computer Interaction (HCI) Theory. This framework addresses both the technical and human factors contributing to data breaches, offering a balanced solution for enhancing data protection while maintaining usability in EMR systems. The implications of this research extend to both theory and practice, providing a new model for data protection in healthcare that can be adapted to various settings.

Fulltext View|Download
Keywords: Electronic Medical Records; Data Protection; Healthcare Facilities; CIA Triad; Human-Computer Interaction; Indonesia

Article Metrics:

  1. Abhishek., Tripathy, Hrudara Kumar., & Mishra, Sushruta. (2022). A Succinct Analytical Study of the Usability of Encryption Methods in Healthcare Data Security. Studies in Computational Intelligence, Vol. 1039,pp.105–120. https://doi.org/10.1007/978-981-19-2416-3_7
  2. Adamu, Jibril., Hamzah, Raseeda., & Rosli, Marshima Mohd. (2020). Security issues and framework of electronic medical record: A review. Bulletin of Electrical Engineering and Informatics, Vol.9, No.2), pp.565–572. https://doi.org/10.11591/eei.v9i2.2064
  3. Almuwail, Khalil Ibrahim., Albarrak, Abdulaziz Saad., Bhutta, Muhammad Nasir Mumtaz., & Wahsheh, Heider A. M. (2023). Examining the Factors for Non-Compliance of Saudi Health Organizations for E-Health Security and Privacy. Journal of Theoretical and Applied Information Technology, Vol.101,(No.2),pp.435–447. https://www.jatit.org/volumes/Vol101No2/5Vol101No2.pdf
  4. Assan, Joseph K., Assan, Samuel K., Assan, Nicole., & Smith, Lauren. (2009). Health inequality in resource poor environments and the pursuit of the MDGs: Traditional versus modern healthcare in rural Indonesia. Journal of Health Management, Vol.11,(No.1),pp.93–108. https://doi.org/ 10.1177/097206340901100107
  5. Avila-Barrientos, Eder. (2020). Analysis of the principles for the description of research data by datacite metadata schema. Anales de Documentacion,Vol.23,(No.1),pp.1–14. https://doi.org/10.6018/analesdoc.400341
  6. Bastani, Peivand., Javanbakht, Mahnaz., & Ravangard, Ramin. (2019). Predicting the Potential Patients’ Intention to Select Healthcare Service Providers: Application of Structural Equation Modeling Based on the Theory of Planned Behavior. Open Public Health Journal, Vol.12, (No.1), pp.472–481. https://doi.org/10.2174/ 18749 44501912010472
  7. Bhardwaj, Aashish., & Kumar, Vikas. (2021). Electronic healthcare records: Indian vs. International perspective on standards and privacy. International Journal of Service Science, Management, Engineering, and Technology,Vol.12,(No.2),pp.44–58. https://doi.org/10.4018/IJSSMET.2021030103
  8. Cairo, Vladimir Rodriguez., Olivares, Percy Antonio Vilchez., & Peralta, Ena Cecilia Obando. (2024). Systematic review of scientific literature applied to legal research. Revista Pedagogia Universitaria y Didactica del Derecho, Vol.11, (No.1), pp.63–91. https://doi.org/10.5354/0719-5885.2024. 70653
  9. Chakraborty, Chinmay., & Rathi, Megha. (2021). Chapter 2-Smart healthcare systems using big data. Demystifying Big Data, Machine Learning, and Deep Learning for Healthcare Analytics, pp.17–32. https://doi.org/10.1016/B978-0-12-821633-0.00009-X
  10. Cheng, Vivying S. Y., & Hung, Patrick C. K. (2006). Health Insurance Portability and Accountability Act (HIPPA) Compliant Access Control Model for Web Services. International Journal of Healthcare Information Systems and Informatics (IJHISI),Vol.1,(No.1),p.18. https://doi.org/10.4018/jhisi.2006010102
  11. Cole, Alexander P., Friedlander, David F., & Trinh, Quoc-Dien. (2018). Secondary data sources for health services research in urologic oncology. Urologic Oncology: Seminars and Original Investigations, Vol.36,(No.4)pp.165–173. https://doi.org/ 10.1016/j.urolonc.2017.08.008
  12. Dhamanti, Inge., Rachman, Taufik., Ardian CL, Muhammad., Ramadhan, Nanda Aulya., Zairina, Elida., & Fauziningtyas, Rista. (2021). Development of a patient safety-training program for health workers in Indonesia: Perspectives of health workers and hospital stakeholders. Malaysian Journal of Medicine and Health Sciences, Vol.17,(No.2),pp.183-188. https://medic.upm.edu.my/upload/dokumen/2021040613142925_MJMHS_0694.pdf–188
  13. Diana, Aly., Hollingworth, Samantha A., & Marks, Geofrey C. (2015). Effects of decentralisation and health system reform on health workforce and quality-of-care in Indonesia, 1993-2007. International Journal of Health Planning and Management, Vol.30,(No.1),pp.16–30. https://doi.org/10.1002/hpm.2255
  14. Essefi, Inthidar., Rahmouni, Hanene Boussi., & Ladeb, Mohamed Fethi. (2021). Integrated privacy decision in BPMN clinical care pathways models using DMN. Procedia Computer Science, Vol. 196, pp. 509–516. https://doi.org/10.1016/j.procs.2021.12.043
  15. Foth, M. (2016). Factors influencing the intention to comply with data protection regulations in hospitals: Based on gender differences in behaviour and deterrence. European Journal of Information Systems, Vol.25, (No.2),pp.91–109. https://doi.org/10.1057/ejis.2015.9
  16. Georgiou, Dimitra., & Lambrinoudakis, Costas. (2021). Data Protection Impact Assessment (DPIA) for Cloud-Based Health Organizations. Future Internet, Vol.13,(No.3),p.66. https://doi.org/10.3390/fi13030066
  17. Hamzani, Achmad Irwan., Widyastuti, Tiyas Vika., Khasanah, Nur., & Rusli, Mohd Hazmi Mohd. (2024). Implementation approach in legal research. International Journal of Advances in Applied Sciences, Vol.13, (No.2),pp.380–388. https://doi.org/10. 11591/ijaas.v13.i2.pp380-388
  18. Helou, Samar., Abou-Khalil, Victoria., Yamamoto, Goshiro., Kondoh, Eiji., Tamura, Hirosi., Hiragi, Shusuke., Sugiyama, Osamu., Okamoto, Kazuya., Nambu, Masayuki., & Kuroda, Tomohiro. (2019). Prioritizing features to redesign in an EMR system. Studies in Health Technology and Informatics,Vol.264,pp.1213–1217. https://doi.org/10.3233/SHTI190419
  19. Howard, Heidi., Alder, Fritz., Ashton, Edward., Chamayou, Amaury., Clebsch, Sylvan., Costa, Manuel., Delignat-Lavaud, Antonie., Fournet, Cedric., Jeffery, Andrew., Kerner, Matthew., Kounelis, Fotios., Kuppe, Markus A., Maffre, Julien., Russinovich, Mark., & Wintersteiger, Christop M. (2023). Proceedings of the VLDB Endowment, Vol.17,Issue2,pp.225–240. https://doi.org/10.14778/3626292.3626304
  20. Hwang, Hsin-Gwinn., & Lin, Yun. (2020). Evaluating people’s concern about their health information privacy based on power-responsibility equilibrium model: A case of Taiwan. Journal of Medical Systems, Vol.44,(No.6). https://doi.org/10.1007/s10916-020-01579-6
  21. Januarita, Ratna., Alamsyah, Indra Fajar., & Perdana, Arif. (2024). Guardians of data: TruMe Life’s continuous quest for data protection. Journal of Information Technology Teaching Cases. https://doi. org/10.1177/20438869241242141
  22. Jose, Nandu S. (2023). Information and Communication Technologies and the Right to Informational Privacy in Health Care: A Comprehensive Analysis. Brawijaya Law Journal,Vol.10,(No.1),pp.34-58. DOI: 10.21776/ub.blj.2023.010.01.03
  23. Kang, James Jin., Fahd, Kiran., & Venkatraman, Sitalakhsmi. (2018). Trusted time-based verification model for automatic man-in-the-middle attack detection in cybersecurity. Cryptography,Vol.2,(No.4),pp.1–20. https://doi.org/10.3390/cryptography2040038
  24. Keshta, Ismail., & Odeh, Ammar. (2021). Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal, Vol.22,(No.2),pp.177–183. https://doi.org/10.1016/j.eij.2020.07.003
  25. Kharisma, Dona Budi., & Diakanza, Alvalerie. (2024). Patient personal data protection: comparing the health-care regulations in Indonesia, Singapore and the European Union. International Journal of Human Rights in Healthcare,Vol.17,(No.2),pp.157–169. https://doi.org/10.1108/IJHRH-04-2022-0035
  26. Kristanto, Asa P. (2023). Perlindungan Terhadap Data Pribadi Dalam Aplikasi Digital Sebagai Bentuk Perlindungan Hak Asasi Manusia. Unes Law Review, Vol.5,(No.3), pp.952–960. https://review-unes.com/ index.php/law/article/view/367
  27. Kuiper, Malouke Esra., Chambon, Monique., de Bruijn, Anne Leonore., Folmer, Chris Reinders., Olthuis, Elke Hindia., Brownlee, Megan., Kooistra, Emmeke Barbara., Fine, Adam., van Harreveld, Frenk., Lunansky, Gabriela., & van Rooij, Benjamin. (2023). A Network Approach to Compliance: A Complexity Science Understanding of How Rules Shape Behavior. Journal of Business Ethics,Vol.184,(No.2),pp.479–504. https:// doi.org /10.1007/s10551-022-05128-8
  28. Kumar, Rajeev., Baz, Abdullah., Alhakami, Hosam., Alhakami, Wajdi., Baz, Mohammed., Agrawal, Alka., & Khan, Raaes Ahmad. (2020). A Hybrid Model of Hesitant Fuzzy Decision-Making Analysis for Estimating Usable-Security of Software. IEEE Access, Vol.8. https://doi.org/10. 1109/ACCESS.2020.2987941
  29. Larson, Lislie., & Alexander, Susan. (2021). The Role of a Nurse Practitioner in a “Big Bang” Electronic Medical Record Implementation. CIN - Computers Informatics Nursing, Vol.39,(No.3),pp.113–119. https://doi.org/ 10.1097/CIN.0000000000000729
  30. Lawelai, Herman., Iswanto., & Raharja, Nia Maharani. (2023). Use of Artificial Intelligence in Public Services: A Bibliometric Analysis and Visualization. TEM Journal, Vol.12,(No.2), pp.798–807. https://doi.org/10.18421/TEM122-24
  31. Mahfuth, Amjad., Dhillon, Jaspaljeet Singh., & Drus, Sulfeeza Mohd. (2016). A systematic review on data security and patient privacy issues in electronic medical records. Journal of Theoretical and Applied Information Technology, Vol.90, (No.2), pp.106–115. https://www.jatit.org/ volumes/ Vol90No2/12Vol90No2.pdf
  32. Marotta, Angelica., & Madnick, Stuart. (2022). Cybersecurity as a unifying factor for privacy, compliance and trust: The Haga Hospital case. Issues in Information Systems,Vol.23,(No.1),pp.102–116. https://doi.org/10.48009/1_iis_2022_108
  33. Mbonihankuye, Scholas., Nkunzimana, Athanase., Ndagijimana, Ange., & García-Magariño, Ivan. (2019). Healthcare Data Security Technology: HIPAA Compliance. Wireless Communications and Mobile Computing. https://doi.org/10.1155/2019/1927495
  34. Naqvi, Bilal., Clarke, Nathan., & Porras, Jari. (2020). Incorporating The Human Facet of Security In Developing Systems And Services. Information and Computer Security,Vol.29,(No.1),pp.49–72. https://doi.org/10.1108/ICS-11-2019-0130
  35. Natamiharja, Rudi., & Setiawan, Ikhsan. (2024). Guarding Privacy in the Digital Age: A Comparative Analysis of Data Protection Strategies in Indonesia and France. Jambe Law Journal, Vol.7, (No.1), pp.233–251. https://doi.org/10.22437/home.v7i1.349
  36. Njotini, Mzukisi N. (2018). Preserving the Integrity of Medical-Related Information – How “Informed” is Consent? Potchefstroom Electronic Law Journal, Vol.21, pp.1–20. https://doi.org/10.17159/1727-3781/ 2018/ v21i0a3400
  37. Patel, Hiral., Patel, Meghna., & Parikh, Satyen. (2020). Fundamentals of health-care system and general rules for security and privacy. Security and Privacy of Electronic Healthcare Records (pp.43–60). https://doi.org/10.1049/PBHE020E_ch3
  38. Peat, Daniel., Fikfak, Veronika., & Van Der Zee, Eva. (2022). Behavioural Compliance Theory. Journal of International Dispute Settlement,Vol.13,(No.2),pp.167–178. https://doi.org/10.1093/jnlids/idab033
  39. Price, Morgan., Weber, Jens H., Davies, Iryna., & Bellwood, Paule. (2015). Lead User Design: Medication Management in Electronic Medical Records. Studies in Health Technology and Informatics, Vol.216,pp.237–241. https://doi.org/10.32 33/978-1-61499-564-7-237
  40. Schulman, R. (2006). HIPAA privacy and security implications for field triage. Prehospital Emergency Care, Vol.10, (No.3), pp.340–342. https://doi.org/10.1080/10903120600728771
  41. Sher, Ming-Ling., Talley, Paul C., Cheng, Tain Jun., & Kuo, Kuang-Ming. (2017). How can hospitals better protect the privacy of electronic medical records? Perspectives from staff members of health information management departments. Health Information Management Journal, Vol.46,(No.2),pp.87–95. https://doi.org/10.1177/1833358316671264
  42. Solehudin, Herlan., & Ruhaeni, Neni. (2022). Perlindungan Hukum Atas Kebocoran Data Pribadi Ditinjau dari Undang Undang Nomor 19 Tahun 2019 tentang Informasi dan Transaksi Elektronik dan Implementasinya terhadap Kebocoran Data Pengguna Electronic Healcth Alert Card. Bandung Conference Series: Law Studies,Vol.2,(No.2),pp.981–988. https://doi.org/10.29313/bcsls.v2i2.2520
  43. Solihin, Firdaus., Budi, Indra., Aji, Rizal Fathoni., & Makarim, Edmon. (2021). Advancement of information extraction use in legal documents. International Review of Law, Computers and Technology, Vol.35, (No.3), pp.322–351. https://doi.org/10.1080/13600 869.2021.1964225
  44. Stark, Benjamin., Gewald, Heiko., Lautenbacher, Heinrich., Haase, Ulrich., & Ruff, Seigmar. (2021). Misuse of ‘Break-the-Glass’ Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data. Research Anthology on Privatizing and Securing Data, p.26. https://doi.org/10.4018/978-1-7998-8954-0.ch058
  45. Sudarwanto, Al Sentot., & Kharisma, Dona Budi Budi. (2022). Comparative study of personal data protection regulations in Indonesia, Hong Kong and Malaysia. Journal of Financial Crime, Vol.29, (No.4), pp.1443–1457. https://doi.org/10.1108/JFC-09-2021-0193
  46. Suwantika, Auliya A., Zakiyah, Neily., Abdulah, Rizky., & Diantini, Ajeng. (2023). Assessment of childhood immunization services at private healthcare facilities in Indonesia: a case study in a highly-populated city. Frontiers in Public Health, Vol.11. https://doi.org/10.3389/fpubh.2023.1093387
  47. Syahputra, Alfin Reza., & Munandar, Adis Imam. (2021). The Hike in BPJS Kesehatan’s Premiums based on The principle of Justice in Service Regulation of Healthcare Insurance. Law Reform,Vol.17,(No.1),pp.1-12. https://doi.org/10.14710/lr.v17i1.37548
  48. Vimalachandran, Pasupathy., Wang, Hua., & Zhang, Yanchun. (2015). Securing electronic medical record and electronic health record systems through an improved access control. In International Conference on Health Information Science, Vol.9085, pp.17–30. https://doi.org/10.1007/978-3-319-19156-0_3
  49. Widianto, Sunu., Kautsar, Angga Prawira., Sriwidodo., Abdulah, Rizky., & Ramadhina, Rakhma. (2021). Pro-environmental behaviour of healthcare professionals: A study applying theory of planned behaviour. International Journal of Business and Globalisation, Vol.28, (No.3), pp.219–232. https://doi.org/10.1504/ijbg.2021.115562
  50. Williams, Colleen C. (2020). Discovering and Identifying Grey Literature in the Field of Law. Serials Librarian, Vol.79, issue 3–4, pp.245–251. https://doi.org/10.1080/0361 526X.2020.1847741
  51. Xiang, Xinying., Cao, Jin., & Fan, Weiguo. (2022). Decentralized authentication and access control protocol for blockchain-based e-health systems. Journal of Network and Computer Applications, Vol.207. https://doi.org/10.1016/j.jnca.2022.103512
  52. Yeng, Phosper Kandabongee., Szekeres, Adam., Yang, Bian., & Snekkenes, Einar Arthur. (2021). Mapping the psychosocialcultural aspects of healthcare professionals’ information security practices: Systematic mapping study. JMIR Human Factors, Vol.8,(No.2). https://doi.org/10.2196/17604
  53. Yeo, Liu Hua., & Banfield, James. (2022). Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis. Perspectives in Health Information Management, Vol.19. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9123525/
  54. Zhang, Jiaxin., & Luximon, Yan. (2021). Interaction design for security based on social context. International Journal of Human Computer Studies, Vol.154. https://doi.org/10.1016/j.ijhcs.2021.102675
  55. Zielińska-Tomczak, Łucja., Cerbin-Koczorowska, Magdalena., Przymuszała, Piotr., & Marciniak, Ryszard. (2021). How to effectively promote interprofessional collaboration? – a qualitative study on physicians’ and pharmacists’ perspectives driven by the theory of planned behavior. BMC Health Services Research, Vol.21, (No.1). https://doi.org/10.1186/s12913-021-06903-5
  56. Al-Far, Anas., Qusef, Abdallah., & Almajali, Sufyan. (2018). Measuring Impact Score on Confidentiality, Integrity, and Availability Using Code Metrics. In International Arab Conference on Infirmation Technology (ACIT) 2018. Lebanon: IEEE. https://doi.org/10.1109/ACIT.2018.8672678
  57. Al-Jawarneh, Loui., & Mohammed, Tareq Abed. (2022). Service Quality in eLearning. In International Conference on Engineering & MIS (ICEMIS 2022) Istanbul: IEEE. https://doi.org/10.1109/ICEMIS56295.2022.9914135
  58. Ardito, Carmelo., Bernhaupt, Regina., Palanque, Philippe., & Sauer, Stefan. (2019). Handling Security, Usability, User Experience and Reliability in User-Centered Development Processes. In IFIP WG 13.2 and WG 13.5 Workshop at INTERACT 2019 (pp. 759–762). Springer: Verlag. https://doi.org/10.1007/978-3-030-29390-1_76
  59. Azadi, Mojgan., Zare, Hossein., & Zare, Mohammad Jalal. (2018). Confidentiality, Integrity and Availability in Electronic Health Records: An Integrative Review. In Advances in Intelligent Systems and Computing (Conference Paper), Vol.738, pp.745–748). https://doi.org/10.1007/978-3-319-77028-4_97
  60. Costa, Antonio Pedro., Moresi, Eduardo Dutra., Pinho, Isabel., & Halaweh, Mohanad. (2023). Integrating Bibliometrics and Qualitative Content Analysis for Conducting a Literature Review. In 24th International Arab Conference on Information Technology (ACIT 2023). Ajman: IEEE. https://doi.org/10.1109/ACIT58888.2023.10453680
  61. Cybenko, George., & Hughes, Jeff. (2014). No free lunch in cyber security. Proceedings of the ACM Conference on Computer and Communications Security (pp.1–12). https://doi.org/10.1145/2663474.2663475
  62. Firmansyah, Warmanto., Mantoro, Teddy., & Persadha, Pratama Dahlian. (2022). Regulatory Support to Prevent Health Data Breaches. 2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED 2022), pp.1–4. https://doi.org/10.1109/ICCED56140.2022.10010539
  63. Fischer-Hübner, Simon., Pettersson, John Soren., & Angulo, Julio. (2015). HCI requirements for transparency and accountability tools for cloud service chains. In Summer School on Accountanbility and Security in The Cloud (Conference Paper), Vol.8937, pp.81–113. https://doi.org/10. 1007/978-3-319-17199-9_4
  64. Fuad, Anis., Putri, Siti Setyawati Mulyono., Sitaresmi, Mei Neni., & Puspandari, Diah Ayu. (2019). Financial Sources Options for Telemedicine Program within Universal Health Coverage (UHC) Era in Indonesia. In 1st International Conference on Bioinformatics, Biotechnology, and Biomedical Engineering (BioMIC 2018). Yogyakarta: IEEE. https://doi.org/10.1109/ BIOMIC.2018.8610595
  65. Gamundani, Attlee M. (2023). Unmasking the Potential of Usable Security and Privacy Technologies in Empowering African Digital Landscapes. In Proceedings of the 4th African Human Computer Interaction Conference (pp.201-207). https://doi.org/ 10.1145/3628096.3629057
  66. Gunawan, Ali., Richard, Given Name., Susanto, Gabriele Aurellia., Saputra, Aldo., & Rizal, Arthea Callista. (2023). Understanding the Use of Blockchain in Medical Data Security: A Systematic Literature Review. In ICBTA '22: Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications (pp.170-174). DOI: 10.1145/3581971.3581995
  67. Hausawi, Yasser M., & Allen, William H. (2015). Usable-Security Evaluation. In International Conference on Human Aspects of Information Security, Privacy, and Trust, Vol.9190,pp.335–346. https://doi.org/10. 1007/978-3-319-20376-8_30
  68. Horcher, Ann Marie., & Tejay, Gurvirender. (2013). The Convergence of Security And Usability: Defining A Framework For Mobile Design. In International Conference on Human-Computer Interaction, pp.119–123. https://doi.org/10.1007/978-3-642-39473-7_25
  69. Humaidi, Norshima., Balakrishnan, Vimala., & Shahrom, Mellisa. (2014). Exploring user’s compliance behavior towards Health Information System security policies based on extended Health Belief Model. In IEEE Conference on e-Learning, e-Management and e-Services (IC3e), pp.30–35. https://doi.org/10.1109/IC3e.2014.7081237
  70. Jones, C. (2022). Bioinformatics, Medical Informatics and the European General Data Protection Regulation. In Bioinformatics, Medical Informatics and the Law (pp. 248–268). Edward Elgar Publishing. https://doi.org/10.4337/9781839105951.00022
  71. Kapila, Aarus., & Pillai, Samaya. (2023). Healthcare Information Privacy: Growing Need for Security Techniques in Healthcare Systems. In AIP Conference Proceedings, Vol. 2523, Issue 1. https://doi.org/10.1063/5.0110487
  72. Lawelai, H. (2023). Understanding Digital Governance in Smart Cities: In-Depth Study Utilizing VOSviewer and CiteSpace. In International Conference on Environment and Smart Society (ICEnSO 2023),Vol.440. https://doi.org/10.1051/e3sconf/202344007003
  73. Mahajan, Navita., Garg, Seema., Pandita, Shreyas., & Sehgal, Geetansh. (2022). Smart healthcare and digitalization: Technological and cybersecurity challenges. In Cross-Industry Applications of Cyber Security Frameworks (pp.124–147). https://doi.org/10.4018/978-1-6684-3448-2.ch007
  74. Mukhachev, Igor V., Gondarenko, Alexander S., & Gryaznov, Denis G. (2022). The Importance of Non-structural Elements in Normative Regulation in Constitutional Law. In Advances in Science, Technology and Innovation (pp. 1069–1073). Springer Nature. https://doi.org/10.1007/978-3-030-90324-4_177
  75. Naqvi, Bilal., & Seffah, Ahmed. (2019). Interdependencies, Conflicts and Trade-Offs Between Security and Usability: Why and How Should We Engineer Them? In International Conference on Human-Computer Interaction, Vol.11594,pp.314–324). https://doi.org/10.1007/978-3-030-22351-9_21
  76. Noor, Muhammad Usman., & Darmaningrat, Eko Wahyu Tyas. (2023). Critical Realism as Innovative Approach for Social Science Research: Information Governance Practices Context. In Proocedings of the 6th International Conference on Vocational Education Applied Science and Technology (ICVEAST 2023) (pp.612–624). Springer: Atlantis Press. https://doi.org/10.2991/ 978-2-38476-132-6_53
  77. Obeng, Osborne., & Paul, Souren. (2019). Understanding HIPAA compliance practice in healthcare organizations in a cultural context. 25th Americas Conference on Information Systems, AMCIS 2019. https://www.semanticscholar.org/paper/Understanding-HIPAA-Compliance-Practice-in-in-a-Obeng-Paul/98eff336e32aab862 81299af6abb3f4ac3bf3afc
  78. Padrão, Pascoal., Ribeiro, Maria Isabel., & Lopes, Isabel. (2024). Implementation of the General Regulation on Data Protection – In the Intermunicipal Community of Douro, Portugal. In International Conference on Management, Tourism and Technologies, Vol.773,pp.360–367. https://doi.org/10.1007/978-3-031-44131-8_35
  79. Santos, Jose Amancio Macedo., Santos, Alcemir Rodrigues., & De Mendonça, Manoel Gomes. (2015). Investigating bias in the search phase of Software Engineering secondary studies. CIBSE 2015 - XVIII Ibero-American Conference on Software Engineering,pp.488–501. https://eventos.spc.org.pe/cibse2015/pdfs/03_ESELAW15.pdf
  80. Shahri, Ahmad Bakhtiyari., & Mohanna, Shahram. (2016). The Impact of the Security Competency on “Self-efficacy in Information Security” for Effective Health Information Security in Iran. In Advances in Intelligent Systems and Computing, Vol.445,pp.51–61. https://doi.org/10.1007/978-3-319-31307-8_6
  81. Shanmugam, Divya., Diaz, Fernando., Shabanian, Samira., Finck, Michele., & Biega, Asia. (2022). Learning to Limit Data Collection via Scaling Laws: A Computational Interpretation for the Legal Principle of Data Minimization. In Proceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency (pp.839–849). https://doi.org/ 10.1145/3531146.3533148
  82. Sharma, Priynka., Bir, Jasvir., & Prakash, Surya. (2024). Navigating Privacy and Security Challenges in Electronic Medical Record (EMR) Systems: Strategies for Safeguarding Patient Data in Developing Countries – A Case Study of the Pacific. In International Conference on Medical Imaging and Computer-Aided Diagnosis, Vol.1166,pp.375–386. https://doi.org/10.1007/978-981-97-1335-6_33
  83. Sumra, Irsyad Ahmed., Hasbullah, Halabi Bin, & AbManan, Jamalul-Lail Bin. (2015). Attacks on security goals (confidentiality, integrity, availability) in VANET: A survey. Advances in Intelligent Systems and Computing, Vol.306,pp.51–61 (Conference Paper). https://doi.org/10.1007/978-981-287-158-9_5
  84. Vaishnavi, P., Sam Nithish, K. C., & Parvathi, S. (2024). Secure Data Sharing Using an Elliptic Curve Cryptography Method for Medical Mecord Transactions in Cloud Environment. In International Conference on Reliability, Safety, and Hazard, pp.821–827). https://doi.org/10.1007/978-981-97-3087-2_73
  85. van Boom, Willem H., Desmet, Pieter., & Mascini, Peter. (2018). Empirical legal research in action: Reflections on methods and their applications. In Empirical Legal Research in Action: Reflections on Methods and their Applications. Edward Elgar Publishing Ltd. https://doi.org/10.4337/9781785362750
  86. Wang, Xianping., Qiu, Hao., Shen, Jiayue., & Chen, Weiru. (2023). A Survey on the Cybersecurity of IoT From The Perspective of SoC. In 10th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2023 (pp. 66–71). https://doi.org/10.1109/IOTSMS59855.2023.10325724
  87. Winckler, Marco., Larusdottir, Marta., Kuusinen, Kati., Bogdan, Cristian., & Palanque, Phillipe. (2017). Dealing with conflicting user interface properties in user-centered development processes. In 16th Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.521-523. https://hal.science/hal-01680275/
  88. Zalloum, Mutaz., & Alamleh, Hosam. (2020). Privacy Preserving Architecture for Healthcare Information Systems. 2020 IEEE International Conference on Communication, Networks and Satellite (Comnetsat 2020) pp.429-432. DOI: 10.1109/Comnetsat50391.2020
  89. Zoghlami, Meryem., Ayeb, Salma., & Rached, Kaouter Saied. Ben. (2021). Using e-health in the prevention against covid-19: An approach based on the theory of planned behavior. In International Conference on Human-Computer Interaction, pp.507–517. Conference Paper https://doi.org/10.1007/ 978-3-030-78465-2_37
  90. Kalaiselvi, R., & Sumathi, V. P. (2023). Encountering Privacy – Sensitive Information in Medical Documents. In Sustainable Digital Technologies for Smart Cities: Healthcare, Communication, and Transportation (pp. 213–220). CRC Press. https://doi.org/10.1201/9781003307716-21
  91. Kesale, Anosisye Mwandulusya., & Swai, Idda Lyatonga. (2023). Management and Governance of Health Facilities. In Leadership and Governance in Primary Healthcare: An Exemplar for Practice in Resource Limited Settings (pp.13–26). CRC Press. https://doi.org/10.1201/97810 03346821-2

Last update:

No citation recorded.

Last update: 2024-10-12 06:25:51

No citation recorded.