Cargando…

Assessing the Legal Aspects of Information Security Requirements for Health Care in 3 Countries: Scoping Review and Framework Development

BACKGROUND: The loss of human lives from cyberattacks in health care is no longer a probabilistic quantification but a reality that has begun. In addition, the threat scope is also expanding to involve a threat of national security, among others, resulting in surging data breaches within the health...

Descripción completa

Detalles Bibliográficos
Autores principales: Yeng, Prosper Kandabongee, Fauzi, Muhammad Ali, Sun, Luyi, Yang, Bian
Formato: Online Artículo Texto
Lenguaje:English
Publicado: JMIR Publications 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9178444/
https://www.ncbi.nlm.nih.gov/pubmed/35612891
http://dx.doi.org/10.2196/30050
_version_ 1784723062296412160
author Yeng, Prosper Kandabongee
Fauzi, Muhammad Ali
Sun, Luyi
Yang, Bian
author_facet Yeng, Prosper Kandabongee
Fauzi, Muhammad Ali
Sun, Luyi
Yang, Bian
author_sort Yeng, Prosper Kandabongee
collection PubMed
description BACKGROUND: The loss of human lives from cyberattacks in health care is no longer a probabilistic quantification but a reality that has begun. In addition, the threat scope is also expanding to involve a threat of national security, among others, resulting in surging data breaches within the health care sector. For that matter, there have been provisions of various legislation, regulations, and information security governance tools such as policies, standards, and directives toward enhancing health care information security–conscious care behavior among users. Meanwhile, in a research scenario, there are no comprehensive required security practices to serve as a yardstick in assessing security practices in health care. Moreover, an analysis of the holistic view of the requirements that need more concentration of management, end users, or both has not been comprehensively developed. Thus, there is a possibility that security practice research will leave out vital requirements. OBJECTIVE: The objective of this study was to systematically identify, assess, and analyze the state-of-the-art information security requirements in health care. These requirements can be used to develop a framework to serve as a yardstick for measuring the future real security practices of health care staff. METHODS: A scoping review was, as a result, adopted to identify, assess, and analyze the information security requirement sources within health care in Norway, Indonesia, and Ghana. RESULTS: Of 188 security and privacy requirement sources that were initially identified, 130 (69.1%) were fully read by the authors. Subsequently, of these 188 requirement documents, 82 (43.6%) fully met the inclusion criteria and were accessed and analyzed. In total, 253 security and privacy requirements were identified in this work. The findings were then used to develop a framework to serve as a benchmark for modeling and analyzing health care security practices. CONCLUSIONS: On the basis of these findings, a framework for modeling, analyzing, and developing effective security countermeasures, including incentivization measures, was developed. Following this framework, research results of health care security practices would be more reliable and effective than relying on incomprehensive security requirements.
format Online
Article
Text
id pubmed-9178444
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher JMIR Publications
record_format MEDLINE/PubMed
spelling pubmed-91784442022-06-10 Assessing the Legal Aspects of Information Security Requirements for Health Care in 3 Countries: Scoping Review and Framework Development Yeng, Prosper Kandabongee Fauzi, Muhammad Ali Sun, Luyi Yang, Bian JMIR Hum Factors Review BACKGROUND: The loss of human lives from cyberattacks in health care is no longer a probabilistic quantification but a reality that has begun. In addition, the threat scope is also expanding to involve a threat of national security, among others, resulting in surging data breaches within the health care sector. For that matter, there have been provisions of various legislation, regulations, and information security governance tools such as policies, standards, and directives toward enhancing health care information security–conscious care behavior among users. Meanwhile, in a research scenario, there are no comprehensive required security practices to serve as a yardstick in assessing security practices in health care. Moreover, an analysis of the holistic view of the requirements that need more concentration of management, end users, or both has not been comprehensively developed. Thus, there is a possibility that security practice research will leave out vital requirements. OBJECTIVE: The objective of this study was to systematically identify, assess, and analyze the state-of-the-art information security requirements in health care. These requirements can be used to develop a framework to serve as a yardstick for measuring the future real security practices of health care staff. METHODS: A scoping review was, as a result, adopted to identify, assess, and analyze the information security requirement sources within health care in Norway, Indonesia, and Ghana. RESULTS: Of 188 security and privacy requirement sources that were initially identified, 130 (69.1%) were fully read by the authors. Subsequently, of these 188 requirement documents, 82 (43.6%) fully met the inclusion criteria and were accessed and analyzed. In total, 253 security and privacy requirements were identified in this work. The findings were then used to develop a framework to serve as a benchmark for modeling and analyzing health care security practices. CONCLUSIONS: On the basis of these findings, a framework for modeling, analyzing, and developing effective security countermeasures, including incentivization measures, was developed. Following this framework, research results of health care security practices would be more reliable and effective than relying on incomprehensive security requirements. JMIR Publications 2022-05-25 /pmc/articles/PMC9178444/ /pubmed/35612891 http://dx.doi.org/10.2196/30050 Text en ©Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Luyi Sun, Bian Yang. Originally published in JMIR Human Factors (https://humanfactors.jmir.org), 25.05.2022. https://creativecommons.org/licenses/by/4.0/This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Human Factors, is properly cited. The complete bibliographic information, a link to the original publication on https://humanfactors.jmir.org, as well as this copyright and license information must be included.
spellingShingle Review
Yeng, Prosper Kandabongee
Fauzi, Muhammad Ali
Sun, Luyi
Yang, Bian
Assessing the Legal Aspects of Information Security Requirements for Health Care in 3 Countries: Scoping Review and Framework Development
title Assessing the Legal Aspects of Information Security Requirements for Health Care in 3 Countries: Scoping Review and Framework Development
title_full Assessing the Legal Aspects of Information Security Requirements for Health Care in 3 Countries: Scoping Review and Framework Development
title_fullStr Assessing the Legal Aspects of Information Security Requirements for Health Care in 3 Countries: Scoping Review and Framework Development
title_full_unstemmed Assessing the Legal Aspects of Information Security Requirements for Health Care in 3 Countries: Scoping Review and Framework Development
title_short Assessing the Legal Aspects of Information Security Requirements for Health Care in 3 Countries: Scoping Review and Framework Development
title_sort assessing the legal aspects of information security requirements for health care in 3 countries: scoping review and framework development
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9178444/
https://www.ncbi.nlm.nih.gov/pubmed/35612891
http://dx.doi.org/10.2196/30050
work_keys_str_mv AT yengprosperkandabongee assessingthelegalaspectsofinformationsecurityrequirementsforhealthcarein3countriesscopingreviewandframeworkdevelopment
AT fauzimuhammadali assessingthelegalaspectsofinformationsecurityrequirementsforhealthcarein3countriesscopingreviewandframeworkdevelopment
AT sunluyi assessingthelegalaspectsofinformationsecurityrequirementsforhealthcarein3countriesscopingreviewandframeworkdevelopment
AT yangbian assessingthelegalaspectsofinformationsecurityrequirementsforhealthcarein3countriesscopingreviewandframeworkdevelopment