New approaches in education and health sciences management

New approaches in education and health sciences management

Cybercrimes in the Healthcare Sector: An Analysis of Unauthorized Access to Patients’ Sensitive Data

Document Type : Original Article

Authors
Department of Private Law, Behshahr Branch, Islamic Azad University, Behshahr, Iran
Abstract
Background and Objective: The digitization of medical records has increased the risk of unauthorized access to patients’ sensitive data, posing a significant challenge in the field of healthcare cybercrime. Therefore, this study aimed to investigate cybercrimes in healthcare, focusing on the analysis of unauthorized access to patients’ sensitive information.
Methods: This study employed a qualitative–analytical approach to examine the types of unauthorized access, intrusion methods, and their legal and security implications. Data were collected from scientific articles, reports from healthcare organizations, and real case files, and were analyzed using content analysis.
Results: The findings indicate that security vulnerabilities in health information systems and legal shortcomings are the main factors contributing to such crimes. The results can inform the development of policies and strategies to prevent unauthorized access.
Conclusion: Protecting patients’ privacy and data in the digital era requires the establishment of a resilient security ecosystem. This ecosystem should be built on three pillars: smart and dynamic laws and regulations that keep pace with technological advancements; robust technical and managerial infrastructures that safeguard data against attacks; and, most importantly, a knowledgeable, responsible, and committed workforce that bridges the first two pillars and serves as the primary line of defense.
Keywords

  1. Clement T, Obunadike C, Ekweli DC, Ejiofor OE, Ogunleye O, Yufenyuy SS, et al. Cyber analytics: modelling the factors behind healthcare data breaches for smarter security solutions. International Journal of Advance Research, Ideas and Innovations in Technology. 2024;10(1):49-75. doi: 10.22108/jas.2017.75233.0
  2. Von Solms R, Van Niekerk J. From information security to cyber security. computers & security. 2013;38:97-102. doi: 10.1016/j.cose.2013.04.004
  3. Admass WS, Munaye YY, Diro AA. Cyber security: State of the art, challenges and future directions. Cyber Security and Applications. 2024;2:100031. doi: 10.1016/j.csa.2023.100031
  4. kaikhavani,S.,Saffarinia,M.,Alipor,A.,Farzad,V. Development of social dimensions of health from the perspective of urban management. Social Psychology Research, 2020; 10(38): 41-64. doi: 10.22034/spr.2020.114688
  5. 3. Rahim MJ, Rahim MI, Afroz A, Akinola O. Cybersecurity threats in healthcare it: Challenges, risks, and mitigation strategies. Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023. 2024;6(1):438-62. doi: 10.22108/jas.2021.121462.1868
  6. haghipour,S.,khosroshahi,G. A.,Pouryani,M. H. Evaluation of the Role and Performance of Formal and Informal Social Organizations in the Prevention of Recidivism with an Emphasis on the Social Rehabilitation Programs of Criminals in the Prison environment (Case of Study: Social and Support Organizations under the Supervision of the Judiciary). J of Criminal Law and Criminology, 2024; 11(22): 283-314. doi: 10.22034/jclc.2024.417962.1913
  7. Ugochukwu OM, Rosa RL, Adenike OO, Rodriguez DZ. Advancing Cybersecurity Use of Sensitive Data in Electronic Healthcare System: A Review of Privacy and Regulations. INFOCOMP Journal of Computer Science. 2024;23(2). doi: 10.22108/nmrj.2024.142157.3077
  8. Almalawi A, Khan AI, Alsolami F, Abushark YB, Alfakeeh AS. Managing security of healthcare data for a modern healthcare system. Sensors. 2023;23(7):3612. doi: 10.3390/s23073612