EconPapers    
Economics at your fingertips  
 

Risk perceptions of electronic health records

Patricia Le, Michael Tsiang, Natan Hekmatjah and Peter Katona

Cyber Security: A Peer-Reviewed Journal, 2018, vol. 2, issue 3, 270-285

Abstract: The increasing use of electronic health record (EHR) systems and networked medical devices by health institutions has put cyber security at the forefront of the healthcare landscape. Cyber security aims to prevent criminals from gaining access to networks to use stolen information for profit and/or to terrorise.1 EHR systems, which contain patients’ personal health information including their demographics, are becoming especially attractive to cybercriminals, and professionals who use EHR systems are largely unaware of many cyber-related risks. Unfortunately, the consequences could be extremely serious for both institutions and patients when sensitive patient information is released or devices are tampered with. Using a ten-question survey, this study investigates how professionals, ranging from physicians to emergency managers to information technology (IT) specialists, access and use EHR systems and medical devices, how they perceive cyber security risk in healthcare, and determines any significant differences between the survey choices among the respondent groups. Due to the size of the respondent groups, non-emergency managers’ opinions are compared to emergency managers’ opinions. An emergency manager leads mitigation, planning, response and recovery efforts for natural, technological and man-made disasters. These findings will then be compared to what is known of the reality of cyber security vulnerabilities. In the results, it was found that there were discrepancies between the perceptions and realities of EHR end users, although these discrepancies varied by question and user group.

Keywords: perceptions or optics; electronic health records (EHR); end users; medical devices; emergency manager; keylogger; phishing (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2018
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/3261/download/ (application/pdf)
https://hstalks.com/article/3261/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2018:v:2:i:3:p:270-285

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:csj000:y:2018:v:2:i:3:p:270-285