Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-642-03549-4_5guidebooksArticle/Chapter ViewAbstractPublication PagesBookacm-pubtype
chapter

Data Hemorrhages in the Health-Care Sector

Published: 21 July 2009 Publication History

Abstract

Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including privacy violations, medical fraud, financial identity theft, and medical identity theft. We also examine the types and sources of data hemorrhages, focusing on inadvertent disclosures. Through an analysis of leaked files, we examine data hemorrhages stemming from inadvertent disclosures on internet-based file sharing networks. We characterize the security risk for a group of health-care organizations using a direct analysis of leaked files. These files contained highly sensitive medical and personal information that could be maliciously exploited by criminals seeking to commit medical and financial identity theft. We also present evidence of the threat by examining user-issued searches. Our analysis demonstrates both the substantial threat and vulnerability for the health-care sector and the unique complexity exhibited by the US health-care system.

Cited By

View all
  • (2024)Security and privacy oriented information security culture (ISC)Computers and Security10.1016/j.cose.2023.103489136:COnline publication date: 1-Feb-2024
  • (2022)Modelling privacy harms of compromised personal medical data - beyond data breachProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544462(1-9)Online publication date: 23-Aug-2022
  • (2021)Recent Developments in Privacy-preserving Mining of Clinical DataACM/IMS Transactions on Data Science10.1145/34477742:4(1-32)Online publication date: 15-Nov-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide books
Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers
July 2009
380 pages
ISBN:9783642035487

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 21 July 2009

Author Tags

  1. Health-care information
  2. data leaks
  3. identity theft
  4. security

Qualifiers

  • Chapter

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Security and privacy oriented information security culture (ISC)Computers and Security10.1016/j.cose.2023.103489136:COnline publication date: 1-Feb-2024
  • (2022)Modelling privacy harms of compromised personal medical data - beyond data breachProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544462(1-9)Online publication date: 23-Aug-2022
  • (2021)Recent Developments in Privacy-preserving Mining of Clinical DataACM/IMS Transactions on Data Science10.1145/34477742:4(1-32)Online publication date: 15-Nov-2021
  • (2014)Human and Organizational Factors of Healthcare Data BreachesInternational Journal of Healthcare Information Systems and Informatics10.4018/ijhisi.20140101039:1(42-60)Online publication date: 1-Jan-2014
  • (2012)CRYPEProceedings of the First International Conference on Security of Internet of Things10.1145/2490428.2490457(204-209)Online publication date: 17-Aug-2012
  • (2012)Privacy in mobile technology for personal healthcareACM Computing Surveys10.1145/2379776.237977945:1(1-54)Online publication date: 7-Dec-2012
  • (2011)ESPACInternational Journal of Security and Networks10.1504/IJSN.2011.0436666:2/3(67-76)Online publication date: 1-Nov-2011
  • (2010)Threat analysis of online health information systemProceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments10.1145/1839294.1839331(1-7)Online publication date: 23-Jun-2010
  • (2009)Personal health information leak prevention in heterogeneous textsProceedings of the Workshop on Adaptation of Language Resources and Technology to New Domains10.5555/1859148.1859157(58-69)Online publication date: 17-Sep-2009
  • (2009)HIPAA compliance in home healthProceedings of the first ACM workshop on Security and privacy in medical and home-care systems10.1145/1655084.1655087(13-20)Online publication date: 13-Nov-2009

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media