Evolution of Information Security and Data Privacy in Medical Systems: A Bibliometric Analysis (2010-2024)
Evolution of Information Security and Data Privacy in Medical Systems: A Bibliometric Analysis (2010-2024) |
||
|
||
© 2024 by IJETT Journal | ||
Volume-72 Issue-12 |
||
Year of Publication : 2024 | ||
Author : Adam Muhudin, Abdullahi Mohamud Osoble, Abdirahman Abdullahi Omar, Mohamed Abdirahman Addow, Osman Diriye Hussein |
||
DOI : 10.14445/22315381/IJETT-V72I12P108 |
How to Cite?
Adam Muhudin, Abdullahi Mohamud Osoble, Abdirahman Abdullahi Omar, Mohamed Abdirahman Addow, Osman Diriye Hussein, "Evolution of Information Security and Data Privacy in Medical Systems: A Bibliometric Analysis (2010-2024)," International Journal of Engineering Trends and Technology, vol. 72, no. 12, pp. 88-98, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I12P108
Abstract
This paper describes the evolution of information security and data privacy in medical systems from 2010-2024. The protection of sensitive patient data, regarding which critical concern has been raised, is an imperative part of the healthcare world in these fast-growing digital times. This study explores the trends, research domains, highly-cited publications, and contributions of different countries and institutions in the concerned discipline. Using data derived from the Scopus database, this study has highlighted a significant increase in research output with regard to technological advancement and the raising of cybersecurity concerns in healthcare. The findings reveal that the research domain is collaborative, journal articles and conference papers dominate, and emerging influential scholars and sources are present. The paper further looks into thematic developments and highlights areas that call for further research, especially in advanced technologies like AI and blockchain, for better data security. This analysis, therefore, enhances insights for scholars, policymakers, and practitioners in efforts towards hardening medical systems against evolving cyber threats with the continued protection of patient privacy.
Keywords
Information security, Data privacy, Medical systems, Cybersecurity, Technological advancement.
References
[1] Yingnan Sun, Frank P-W. Lo, and Benny Lo, “Security and Privacy for The Internet of Medical Things Enabled Healthcare Systems: A Survey,” IEEE Access, vol. 7, pp. 183339-183355, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[2] AKM Iqtidar Newaz et al., “A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses,” ACM Transactions on Computing for Healthcare, vol. 2, no. 3, pp. 1-44, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Karim Abouelmehdi et al., “Big Data Security and Privacy in Healthcare: A Review,” Procedia Computer Science, vol. 113, pp. 73-80, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Farrukh Aslam Khan et al., “A Cloud-Based Healthcare Framework for Security and Patients’ Data Privacy Using Wireless Body Area Networks,” Procedia Computer Science, vol. 34, pp. 511-517, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Harsh Kupwade Patil, and Ravi Seshadri, “Big Data Security and Privacy Issues in Healthcare,” In 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, pp. 762-765, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Bradley A. Malin, Khaled El Emam, and Christine M. O'Keefe, “Biomedical Data Privacy: Problems, Perspectives, and Recent Advances,” Journal of The American Medical Informatics Association, vol. 20, no. 1, pp. 2-6, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Anam Sajid, and Haider Abbas, “Data Privacy in Cloud-Assisted Healthcare Systems: State of The Art and Future Challenges,” Journal of Medical Systems, vol. 40, no. 6, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Josh Benaloh et al., “Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,” CCSW ‘09: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago Illinois USA, pp. 103-114, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[9] José Luis Fernández-Alemán et al., “Security and Privacy in Electronic Health Records: A Systematic Literature Review,” Journal of Biomedical Informatics, vol. 46, no. 3, pp. 541-562, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[10] William J. Gordon, Adam Fairhall, and Adam Landman, “Threats to Information Security: Public Health Implications,” The New England Journal of Medicine, vol. 377, no. 8, pp. 707-709, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Cynthia Dwork, “Differential Privacy: A Survey of Results,” International Conference on Theory and Applications of Models of Computation, Xi'an, China, vol. 4978, pp. 1-19, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Aqeel Sahi, David Lai, and Yan Li, “A Review of the State of the Art in Privacy and Security in the eHealth Cloud,” IEEE Access, vol. 9, pp. 104127-104141, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Osman Diriye Hussein, and Husein Osman, “IoT-Based Air Quality Management in Somalia,” International Journal of Electronics and Communication Engineering, vol. 11, no. 3, pp. 77-86, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[14] David Kotz, “A Threat Taxonomy for mHealth Privacy,” Third International Conference on Communication Systems and Networks (COMSNETS 2011), Bangalore, India, pp. 1-6, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Eirini C. Schiza et al., “Data Protection Issues of Integrated Electronic Health Records (EHR),” In XIV Mediterranean Conference on Medical and Biological Engineering and Computing 2016, Paphos, Cyprus, Springer, Cham, pp. 787-790, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Ajit Appari, and M. Eric Johnson, “Information Security and Privacy in Healthcare: Current State of Research,” International journal of Internet and enterprise management, vol. 6, no. 4, pp. 279-314, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Shahid Latif et al., “A Blockchain-Based Architecture for Secure and Trustworthy Operations in The Industrial Internet of Things,” Journal of Industrial Information Integration, vol. 21, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Suveen Angraal, Harlan M. Krumholz, Wade L. Schulz, “Blockchain Technology: Applications in Health Care,” Circulation: Cardiovascular Quality and Outcomes, vol. 10, no. 9, pp. 1-3, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Federico Cabitza, Raffaele Rasoini, Gian Franco Gensini, “Unintended Consequences of Machine Learning in Medicine,” JAMA, vol. 318, no. 6, pp. 517-518, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Catherine Dinh-Le et al., “Wearable Health Technology and Electronic Health Record Integration: Scoping Review and Future Directions,” JMIR mHealth and uHealth, vol. 7, no. 9, pp. 1-13, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Mirza Mansoor Baig, Hamid GholamHosseini, and Martin J. Connolly, “Mobile Healthcare Applications: System Design Review, Critical Issues and Challenges,” Australasian Physical & Engineering Sciences in Medicine, vol. 38, pp. 23-38, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Kit Huckvale et al., “Unaddressed Privacy Risks in Accredited Health and Wellness Apps: A Cross-Sectional Systematic Assessment,” BMC Medicine, vol. 13, pp. 1-13, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Joseph Jeremiah Adekunle et al., “AI Shield: Leveraging Artificial Intelligence to Combat Cyber Threats in Healthcare,” Iconic Research and Engineering Journals, vol. 8, no. 3, pp. 184-195, 2024.
[Google Scholar] [Publisher Link]