The migration to electronic health records (EHR) in the healthcare industry has raised issues with respect to security and privacy. One issue that has become a concern for healthcare providers, insurance companies, and pharmacies is patient health information (PHI) leaks because PHI leaks can lead to violation of privacy laws, which protect the privacy of individuals’ identifiable health information, potentially resulting in a healthcare crisis. This study explores the issue of PHI leaks from an access control viewpoint. We utilize access control policies and PHI leak scenarios derived from semi structured interviews with four healthcare practitioners and use the lens of activity theory to articulate the design of an access control model for detecting and mitigating PHI leaks. Subsequently, we follow up with a prototype as a proof of concept.
Valecha, Rohit; Upadhyaya, Shambhu; and Rao, H. Raghav
"An Activity Theory Approach to Leak Detection and Mitigation in Patient Health Information (PHI),"
Journal of the Association for Information Systems: Vol. 22
, Article 6.
Available at: https://aisel.aisnet.org/jais/vol22/iss4/6
When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.