GET THE APP

Threats and need of information security in health care industry
..

Industrial Engineering & Management

ISSN: 2169-0316

Open Access

Threats and need of information security in health care industry


International Summit on Industrial Engineering

December 08-10, 2014 DoubleTree by Hilton Hotel San Francisco Airport, USA

Rajiv Mahajan

Accepted Abstracts: Ind Eng Manage

Abstract :

In today?s scenario, every medicine and health care industry is considering that controlling costs is the most difficult task but they are not worried about the information of the patient, research data methodology for manufacturing and contents or ingredients composition which is stored in the digital form as an information over and computer or electronic devices. Consider this: In the past years since the Department of Health and Human Services mandated public disclosure of any exposure of data involving 500 or more patients, breaches affecting more than 10 million individuals have been reported. And most people think that's just the tip of the iceberg-many other individuals likely have had their data compromised and many more will in the future. When a person's health record is exposed, the implications often go beyond basic fraud and financialidentity theft. Data may end up on the Internet, leading to embarrassment and social stigma. Criminals can exploit patient information to steal drugs, supplies or health care itself. And when a stolen identity is used to gain medical care, it can carry health consequences for the victim, whose medical record becomes corrupted by the thief 's own medical data. Correcting fraud, or even stopping it, can be a byzantine nightmare. Threats to patient privacy and information security could be categorized into two broad areas: (1) Organizational threats that arise from inappropriate access of patient data by either internal agents abusing their privileges or external agents exploiting vulnerability of information systems, and (2) Systemic threats that arise from an agent in the information flow chain exploiting the disclosed data beyond its intended use (NRC 1997).

Google Scholar citation report
Citations: 739

Industrial Engineering & Management received 739 citations as per Google Scholar report

Industrial Engineering & Management peer review process verified at publons

Indexed In

 
arrow_upward arrow_upward