Open Access iconOpen Access

ARTICLE

crossmark

Analyzing the Implications of Healthcare Data Breaches through Computational Technique

Ahmed H. Almulihi1, Fawaz Alassery2, Asif Irshad Khan3, Sarita Shukla4, Bineet Kumar Gupta4, Rajeev Kumar4,*

1 Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia
2 Department of Computer Engineering, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia
3 Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
4 Department of Computer Applications, Shri Ramswaroop Memorial University, Barabanki, 225003, Uttar Pradesh, India

* Corresponding Author: Rajeev Kumar. Email: email

Intelligent Automation & Soft Computing 2022, 32(3), 1763-1779. https://doi.org/10.32604/iasc.2022.023460

Abstract

The contributions of the Internet of Medical Things (IoMT), cloud services, information systems, and smart devices are useful for the healthcare industry. With the help of digital healthcare, our lives have been made much more secure and effortless and provide more convenient and accessible treatment. In current, the modern healthcare sector has become more significant and convenient for the purpose of both external and internal threats. Big data breaches affect clients, stakeholders, organisations, and businesses, and they are a source of concern and complication for security professionals. This research examines the many types and categories of big data breaches that companies face. In addition, the study’s main purpose is to investigate and draw conclusions from healthcare big data breaches, with the goal of improving healthcare big data confidentiality. From the beginning of 2020–21, both years, practically our entire world moved online due to the COVID-19 pandemic. The coronavirus pandemic dramatically increased the extent of use of technology. Hacking/IT incidents, followed by unauthorised internal disclosures, are the most typical attacks behind healthcare data breaches, according to the report. This has become a main enticement for healthcare data theft and misuse. The number of healthcare big data breaches, the number of records exposed, and the resulting significant commercial losses are increasing. In the report, they analyze and investigate the number of healthcare big data breaches, the number of records exposed during the COVID-19 pandemic. Also, the study assesses the correctness of the datasets in order to achieve a dynamic digital healthcare data breaches environment using fuzzy based computational technique.

Keywords


Cite This Article

APA Style
Almulihi, A.H., Alassery, F., Khan, A.I., Shukla, S., Gupta, B.K. et al. (2022). Analyzing the implications of healthcare data breaches through computational technique. Intelligent Automation & Soft Computing, 32(3), 1763-1779. https://doi.org/10.32604/iasc.2022.023460
Vancouver Style
Almulihi AH, Alassery F, Khan AI, Shukla S, Gupta BK, Kumar R. Analyzing the implications of healthcare data breaches through computational technique. Intell Automat Soft Comput . 2022;32(3):1763-1779 https://doi.org/10.32604/iasc.2022.023460
IEEE Style
A.H. Almulihi, F. Alassery, A.I. Khan, S. Shukla, B.K. Gupta, and R. Kumar "Analyzing the Implications of Healthcare Data Breaches through Computational Technique," Intell. Automat. Soft Comput. , vol. 32, no. 3, pp. 1763-1779. 2022. https://doi.org/10.32604/iasc.2022.023460



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2490

    View

  • 1219

    Download

  • 0

    Like

Share Link