Uncovering Security Vulnerabilities in Electronic Medical Record Systems: A Comprehensive Review of Threats and Recommendations for Enhancement
DOI:
https://doi.org/10.26555/jiteki.v10i1.28192Keywords:
Electronic Medical Record Systems, Security Vulnerabilities, Threats, Recommendations for Enhancement, CybersecurityAbstract
Cybersecurity is a critical concern for healthcare organizations in the digital era, as patient data privacy faces significant risks from numerous vulnerabilities. Given the escalating cyberattacks in healthcare, understanding EMR system vulnerabilities has become imperative. This study aimed to find the main weaknesses in Electronic Health Record (EHR) systems and suggest proven methods to improve security and keep patient information private. Utilizing a cross-sectional analysis, we assessed the effectiveness of current security protocols against identified threats. We systematically reviewed 25 recent, high-quality articles (from 2020 to 2023) on EMR vulnerabilities, selected based on their relevance and the efficacy of their proposed solutions. Our analysis revealed that system architecture flaws and credential misuse represented the most significant threats, with hacking incidents most frequently targeting these weaknesses. The analysis identified six key threat categories to EMR security: compromised access, system architecture flaws, data sharing challenges, hacking, credential misuse, and non-compliance with regulations. This framework introduced a multi-layered defense strategy, unique in incorporating both technical and behavioral security measures. The study provided a novel framework combining technological and management safeguards, offering a fresh perspective on modern EMR vulnerabilities. The detailed threat categorization gave healthcare organizations a strategic basis for improved security planning and resource allocation. The actionable insights from this study could greatly enhance EMR security protocols in healthcare settings, potentially reducing data breaches and improving patient trust. Further research was warranted to test the effectiveness of the proposed framework across various healthcare environments.Downloads
Published
2024-02-17
How to Cite
[1]
D. Wijayanti, E. I. H. Ujianto, and R. Rianto, “Uncovering Security Vulnerabilities in Electronic Medical Record Systems: A Comprehensive Review of Threats and Recommendations for Enhancement”, J. Ilm. Tek. Elektro Komput. Dan Inform, vol. 10, no. 1, pp. 73–98, Feb. 2024.
Issue
Section
Articles
License
Copyright (c) 2024 Dian Wijayanti, Erik Iman Heri Ujianto, Rianto Rianto
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with JITEKI agree to the following terms:
- Authors retain copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
This work is licensed under a Creative Commons Attribution 4.0 International License