Cargando…

Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study

BACKGROUND: Blocklisting malicious activities in health care is challenging in relation to access control in health care security practices due to the fear of preventing legitimate access for therapeutic reasons. Inadvertent prevention of legitimate access can contravene the availability trait of th...

Descripción completa

Detalles Bibliográficos
Autores principales: Yeng, Prosper Kandabongee, Nweke, Livinus Obiora, Yang, Bian, Ali Fauzi, Muhammad, Snekkenes, Einar Arthur
Formato: Online Artículo Texto
Lenguaje:English
Publicado: JMIR Publications 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8734935/
https://www.ncbi.nlm.nih.gov/pubmed/34941549
http://dx.doi.org/10.2196/19250
_version_ 1784628120562696192
author Yeng, Prosper Kandabongee
Nweke, Livinus Obiora
Yang, Bian
Ali Fauzi, Muhammad
Snekkenes, Einar Arthur
author_facet Yeng, Prosper Kandabongee
Nweke, Livinus Obiora
Yang, Bian
Ali Fauzi, Muhammad
Snekkenes, Einar Arthur
author_sort Yeng, Prosper Kandabongee
collection PubMed
description BACKGROUND: Blocklisting malicious activities in health care is challenging in relation to access control in health care security practices due to the fear of preventing legitimate access for therapeutic reasons. Inadvertent prevention of legitimate access can contravene the availability trait of the confidentiality, integrity, and availability triad, and may result in worsening health conditions, leading to serious consequences, including deaths. Therefore, health care staff are often provided with a wide range of access such as a “breaking-the-glass” or “self-authorization” mechanism for emergency access. However, this broad access can undermine the confidentiality and integrity of sensitive health care data because breaking-the-glass can lead to vast unauthorized access, which could be problematic when determining illegitimate access in security practices. OBJECTIVE: A review was performed to pinpoint appropriate artificial intelligence (AI) methods and data sources that can be used for effective modeling and analysis of health care staff security practices. Based on knowledge obtained from the review, a framework was developed and implemented with simulated data to provide a comprehensive approach toward effective modeling and analyzing security practices of health care staff in real access logs. METHODS: The flow of our approach was a mapping review to provide AI methods, data sources and their attributes, along with other categories as input for framework development. To assess implementation of the framework, electronic health record (EHR) log data were simulated and analyzed, and the performance of various approaches in the framework was compared. RESULTS: Among the total 130 articles initially identified, 18 met the inclusion and exclusion criteria. A thorough assessment and analysis of the included articles revealed that K-nearest neighbor, Bayesian network, and decision tree (C4.5) algorithms were predominantly applied to EHR and network logs with varying input features of health care staff security practices. Based on the review results, a framework was developed and implemented with simulated logs. The decision tree obtained the best precision of 0.655, whereas the best recall was achieved by the support vector machine (SVM) algorithm at 0.977. However, the best F1-score was obtained by random forest at 0.775. In brief, three classifiers (random forest, decision tree, and SVM) in the two-class approach achieved the best precision of 0.998. CONCLUSIONS: The security practices of health care staff can be effectively analyzed using a two-class approach to detect malicious and nonmalicious security practices. Based on our comparative study, the algorithms that can effectively be used in related studies include random forest, decision tree, and SVM. Deviations of security practices from required health care staff’s security behavior in the big data context can be analyzed with real access logs to define appropriate incentives for improving conscious care security practice.
format Online
Article
Text
id pubmed-8734935
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher JMIR Publications
record_format MEDLINE/PubMed
spelling pubmed-87349352022-01-21 Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study Yeng, Prosper Kandabongee Nweke, Livinus Obiora Yang, Bian Ali Fauzi, Muhammad Snekkenes, Einar Arthur JMIR Med Inform Review BACKGROUND: Blocklisting malicious activities in health care is challenging in relation to access control in health care security practices due to the fear of preventing legitimate access for therapeutic reasons. Inadvertent prevention of legitimate access can contravene the availability trait of the confidentiality, integrity, and availability triad, and may result in worsening health conditions, leading to serious consequences, including deaths. Therefore, health care staff are often provided with a wide range of access such as a “breaking-the-glass” or “self-authorization” mechanism for emergency access. However, this broad access can undermine the confidentiality and integrity of sensitive health care data because breaking-the-glass can lead to vast unauthorized access, which could be problematic when determining illegitimate access in security practices. OBJECTIVE: A review was performed to pinpoint appropriate artificial intelligence (AI) methods and data sources that can be used for effective modeling and analysis of health care staff security practices. Based on knowledge obtained from the review, a framework was developed and implemented with simulated data to provide a comprehensive approach toward effective modeling and analyzing security practices of health care staff in real access logs. METHODS: The flow of our approach was a mapping review to provide AI methods, data sources and their attributes, along with other categories as input for framework development. To assess implementation of the framework, electronic health record (EHR) log data were simulated and analyzed, and the performance of various approaches in the framework was compared. RESULTS: Among the total 130 articles initially identified, 18 met the inclusion and exclusion criteria. A thorough assessment and analysis of the included articles revealed that K-nearest neighbor, Bayesian network, and decision tree (C4.5) algorithms were predominantly applied to EHR and network logs with varying input features of health care staff security practices. Based on the review results, a framework was developed and implemented with simulated logs. The decision tree obtained the best precision of 0.655, whereas the best recall was achieved by the support vector machine (SVM) algorithm at 0.977. However, the best F1-score was obtained by random forest at 0.775. In brief, three classifiers (random forest, decision tree, and SVM) in the two-class approach achieved the best precision of 0.998. CONCLUSIONS: The security practices of health care staff can be effectively analyzed using a two-class approach to detect malicious and nonmalicious security practices. Based on our comparative study, the algorithms that can effectively be used in related studies include random forest, decision tree, and SVM. Deviations of security practices from required health care staff’s security behavior in the big data context can be analyzed with real access logs to define appropriate incentives for improving conscious care security practice. JMIR Publications 2021-12-22 /pmc/articles/PMC8734935/ /pubmed/34941549 http://dx.doi.org/10.2196/19250 Text en ©Prosper Kandabongee Yeng, Livinus Obiora Nweke, Bian Yang, Muhammad Ali Fauzi, Einar Arthur Snekkenes. Originally published in JMIR Medical Informatics (https://medinform.jmir.org), 22.12.2021. https://creativecommons.org/licenses/by/4.0/This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Medical Informatics, is properly cited. The complete bibliographic information, a link to the original publication on https://medinform.jmir.org/, as well as this copyright and license information must be included.
spellingShingle Review
Yeng, Prosper Kandabongee
Nweke, Livinus Obiora
Yang, Bian
Ali Fauzi, Muhammad
Snekkenes, Einar Arthur
Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study
title Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study
title_full Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study
title_fullStr Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study
title_full_unstemmed Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study
title_short Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study
title_sort artificial intelligence–based framework for analyzing health care staff security practice: mapping review and simulation study
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8734935/
https://www.ncbi.nlm.nih.gov/pubmed/34941549
http://dx.doi.org/10.2196/19250
work_keys_str_mv AT yengprosperkandabongee artificialintelligencebasedframeworkforanalyzinghealthcarestaffsecuritypracticemappingreviewandsimulationstudy
AT nwekelivinusobiora artificialintelligencebasedframeworkforanalyzinghealthcarestaffsecuritypracticemappingreviewandsimulationstudy
AT yangbian artificialintelligencebasedframeworkforanalyzinghealthcarestaffsecuritypracticemappingreviewandsimulationstudy
AT alifauzimuhammad artificialintelligencebasedframeworkforanalyzinghealthcarestaffsecuritypracticemappingreviewandsimulationstudy
AT snekkeneseinararthur artificialintelligencebasedframeworkforanalyzinghealthcarestaffsecuritypracticemappingreviewandsimulationstudy