2018
DOI: 10.1007/s10916-018-1123-2
|View full text |Cite
|
Sign up to set email alerts
|

Healthcare Data Breaches: Implications for Digital Forensic Readiness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 83 publications
(49 citation statements)
references
References 17 publications
0
49
0
Order By: Relevance
“…Health systems are encouraged to implement auditing systems that can capture digital forensic evidence. 22 Management best practice includes planning, training, incentives, and penalties to prevent breaches. 23 Security best practice includes locking up physical devices, data encryption, and stronger passwords.…”
Section: F I G U R E 1 Timeline (A) and Conceptual Model (B)mentioning
confidence: 99%
See 1 more Smart Citation
“…Health systems are encouraged to implement auditing systems that can capture digital forensic evidence. 22 Management best practice includes planning, training, incentives, and penalties to prevent breaches. 23 Security best practice includes locking up physical devices, data encryption, and stronger passwords.…”
Section: F I G U R E 1 Timeline (A) and Conceptual Model (B)mentioning
confidence: 99%
“…Following a breach, data handling and access privilege policies typically change. Health systems are encouraged to implement auditing systems that can capture digital forensic evidence . Management best practice includes planning, training, incentives, and penalties to prevent breaches .…”
Section: Introductionmentioning
confidence: 99%
“…Since, there are various sources of data, the size of data may also increase as the number of information sources increase. Each of these data sources can be subject to breaches; therefore, each source is responsible for the handling and management of the data they produce [91]. Also, the sources need to understand each other's data.…”
Section: A Patient Datamentioning
confidence: 99%
“…The log provides information about who all accessed the data (e.g.,, the doctor, nurse, secretarial staff ), and when. This may be helpful to trace unauthorized access to data, 27 especially in the situations of data hacking. 5.…”
Section: Handling Of Data and Its Importancementioning
confidence: 99%