Ethical Implications of AI in Healthcare Data: A Case Study Using Healthcare Data Breaches from the US Department of Health and Human Services Breach Portal between 2009-2021

Digital technology in the healthcare industry through Artificial intelligence (AI) tools has laid a solid foundation for more convenient and accessible patient treatment, thereby making lives much more manageable. Recent developments in A I tools in the healthcare industry have heightened the need f...

Full description

Saved in:
Bibliographic Details
Published in2022 International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC) pp. 343 - 349
Main Authors Ugwu, Augustina O., Gao, Xianghua, Ugwu, Johnson O., Chang, Victor
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.09.2022
Subjects
Online AccessGet full text
DOI10.1109/IIoTBDSC57192.2022.00070

Cover

Abstract Digital technology in the healthcare industry through Artificial intelligence (AI) tools has laid a solid foundation for more convenient and accessible patient treatment, thereby making lives much more manageable. Recent developments in A I tools in the healthcare industry have heightened the need for healthcare professionals to identify and address ethical issues in digital health care. Notwithstanding the benefits of AI tools, healthcare industry data has become a central target for many cyber invaders in this era of big data, as they are regarded as valuable information. Health care data breaches occur due to unauthorized access to patients' health records that violate the privacy and security of confidential health information. Therefore, this study aimed to use Microsoft Power BI tools to conduct in-depth data analytics and visualization on healthcare data breaches to determine the causes of the breach and provide insights that will help to enhance healthcare data security and confidentiality. This study observed from the analysis that Hacking /IT incidents are the major predominant types of data breaches in the healthcare industry, followed by unauthorized access/disclosures. This study was able to identify the significant factors that contribute to healthcare data breaches. The insight produced from this study could potentially contribute to our understanding of data breaches and set the benchmark that future security experts will undoubtedly tackle. Therefore, more in-depth studies are highly needed to validate the findings as this study has several important implications for future discovery. All the results are subject to the validity of the dataset analyzed.
AbstractList Digital technology in the healthcare industry through Artificial intelligence (AI) tools has laid a solid foundation for more convenient and accessible patient treatment, thereby making lives much more manageable. Recent developments in A I tools in the healthcare industry have heightened the need for healthcare professionals to identify and address ethical issues in digital health care. Notwithstanding the benefits of AI tools, healthcare industry data has become a central target for many cyber invaders in this era of big data, as they are regarded as valuable information. Health care data breaches occur due to unauthorized access to patients' health records that violate the privacy and security of confidential health information. Therefore, this study aimed to use Microsoft Power BI tools to conduct in-depth data analytics and visualization on healthcare data breaches to determine the causes of the breach and provide insights that will help to enhance healthcare data security and confidentiality. This study observed from the analysis that Hacking /IT incidents are the major predominant types of data breaches in the healthcare industry, followed by unauthorized access/disclosures. This study was able to identify the significant factors that contribute to healthcare data breaches. The insight produced from this study could potentially contribute to our understanding of data breaches and set the benchmark that future security experts will undoubtedly tackle. Therefore, more in-depth studies are highly needed to validate the findings as this study has several important implications for future discovery. All the results are subject to the validity of the dataset analyzed.
Author Ugwu, Augustina O.
Gao, Xianghua
Ugwu, Johnson O.
Chang, Victor
Author_xml – sequence: 1
  givenname: Augustina O.
  surname: Ugwu
  fullname: Ugwu, Augustina O.
  email: talk2oge20@yahoo.com
  organization: Teesside University,Cybersecurity, Information System and AI Research Group, School of Computing, Engineering and Digital Technologies,Middlesbrough,UK
– sequence: 2
  givenname: Xianghua
  surname: Gao
  fullname: Gao, Xianghua
  email: gaoxianghua218@gmail.com
  organization: Teesside University,Cybersecurity, Information System and AI Research Group, School of Computing, Engineering and Digital Technologies,Middlesbrough,UK
– sequence: 3
  givenname: Johnson O.
  surname: Ugwu
  fullname: Ugwu, Johnson O.
  email: J.Ugwu@tees.ac.uk
  organization: Teesside University,School of Computing Engineering and Digital Technologies,Middlesbrough,UK
– sequence: 4
  givenname: Victor
  surname: Chang
  fullname: Chang, Victor
  email: victorchang.research@gmail.com
  organization: Aston University,Aston Business School,Department of Operations and Information Management,Birmingham,UK
BookMark eNpdkEFOwzAQRY0ECwrcgMVcIMVO4thm16aFRqoEUtp15TgTYilxKscF9VKckaCyQrP4o9G8rz8zI9ducEgIMDpnjKqnohh2y1WZc8FUPI9pHM8ppYJekRnLMp5Oxfkt-V6H1hrdQdEfu6kJdnAjDA0sCrAONqi70BrtEVY66GdYQK5HhDKc6jPsR-s-_u_A0qM2LY7Q-KGH0CLsS1jhUfvQowu_5hcEtKthc-q1gxL9pzUTc4HhffBhClVh-EJ0EFOqoukGdk9uGt2N-PCnd2T_st7lm2j79lrki21kY5qGqKo10pQzRTUizQQVTCopsBJKS1MrmcYy4ygTIyRWCpOUMT7NUiGbxBie3JHHi69FxMPR217784FNDxRUJskPUhVrkw
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IIoTBDSC57192.2022.00070
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1665454555
9781665454551
EndPage 349
ExternalDocumentID 10077083
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i204t-bdae045190aee0670718987eb79a8cd9842865e83c78eb9e34115428478f3cc53
IEDL.DBID RIE
IngestDate Thu Jan 18 11:14:49 EST 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i204t-bdae045190aee0670718987eb79a8cd9842865e83c78eb9e34115428478f3cc53
PageCount 7
ParticipantIDs ieee_primary_10077083
PublicationCentury 2000
PublicationDate 2022-Sept.
PublicationDateYYYYMMDD 2022-09-01
PublicationDate_xml – month: 09
  year: 2022
  text: 2022-Sept.
PublicationDecade 2020
PublicationTitle 2022 International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC)
PublicationTitleAbbrev IIOTBDSC
PublicationYear 2022
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8372734
Snippet Digital technology in the healthcare industry through Artificial intelligence (AI) tools has laid a solid foundation for more convenient and accessible patient...
SourceID ieee
SourceType Publisher
StartPage 343
SubjectTerms Artificial Intelligence
Big Data
Data Analysis and Privacy
Data breach
Ethical Issue for Healthcare
Ethics
Health Data Breach
Industries
Medical services
Privacy
Supply chains
US Department of Health and Human Services
Title Ethical Implications of AI in Healthcare Data: A Case Study Using Healthcare Data Breaches from the US Department of Health and Human Services Breach Portal between 2009-2021
URI https://ieeexplore.ieee.org/document/10077083
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEF1sT55UrPjNHLymTbr52Hjrh6URLEJb6K3sbiZQlFRqetAf5W90dpPUIgjeQsgmYRLy3mTem2HsLvAywk03c5RQ2qH8K3BiYrmOTtF1deynXBpz8tMkHM_9x0WwqMzq1guDiFZ8hm2zaWv56Vpvza-yjqnoR8QZGqwRibA0a9XqHDfuJMl61h9OB0FEtIVSv67txWnGEO8NTrG4MTpik_qKpVzkpb0tVFt__mrG-O9bOmatH4sePO_A54QdYH7Kvqx6Xb5CsqcTh3UGvQRWOYx3Wi8YykLeQw8GBGJgtIQfYMUDv4-B_sa2fH4H40MBYoswn8KQMGxj5enm5OUSkHkKtiQA9fenWgylWhUqSRjYSgnFzWux-ehhNhg71UAGZ9V1_cJRqUTbj8aViMbgQ8AWiwhVFEuh01j4xueKgutIoIqREJIYmgFAkXGtA37Gmvk6x3MG3FdhykMR-pRielpIzbsZ96SkfFBh4F6wlgn28q3subGs43z5x_4rdmgeeKn-umbNYrPFG6ILhbq1r8k310m_Rw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT4NAEN1oPehJjTV-OwevtLS7C4u3ftiAto1J26S3ZndZEqMBU-lBf5S_0d0FatPExBshLJCB8N4w780gdEdbicZNN3EEE9LR-Rd1As1yHRkr15UBiTE35uTR2Atn5HFO56VZ3XphlFJWfKYaZtPW8uNMrsyvsqap6PuaM-yiPUoIoYVdq9LnuEEzirJptz_pUV8TF538tW03TjOIeGN0ikWOwSEaV9csBCOvjVUuGvJrqx3jv2_qCNV_TXrwvIafY7Sj0hP0bfXr_A2iDaU4ZAl0InhJIVyrvaDPc34PHehpGAOjJvwEKx_YPga6S9v0-QOMEwU0X4TZBPoaxZZWoG5OXiwBnsZgiwJQfYHKxVDoVaEUhYGtlei4tepoNniY9kKnHMngvLRdkjsi5sp2pHG5Usbio6EtYL4SfsCZjANGjNNVMSx9pkSgNEZqjmYgkCVYSopPUS3NUnWGABPhxdhjHtFJZksyLnE7wS3OdUYoFHXPUd0Ee_FedN1YVHG--GP_LdoPp6PhYhiNny7RgXn4hRbsCtXy5Upda_KQixv7yvwABjbClA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+International+Conference+on+Industrial+IoT%2C+Big+Data+and+Supply+Chain+%28IIoTBDSC%29&rft.atitle=Ethical+Implications+of+AI+in+Healthcare+Data%3A+A+Case+Study+Using+Healthcare+Data+Breaches+from+the+US+Department+of+Health+and+Human+Services+Breach+Portal+between+2009-2021&rft.au=Ugwu%2C+Augustina+O.&rft.au=Gao%2C+Xianghua&rft.au=Ugwu%2C+Johnson+O.&rft.au=Chang%2C+Victor&rft.date=2022-09-01&rft.pub=IEEE&rft.spage=343&rft.epage=349&rft_id=info:doi/10.1109%2FIIoTBDSC57192.2022.00070&rft.externalDocID=10077083