Unknown

Dataset Information

0

Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering.


ABSTRACT: Many healthcare facilities enforce security on their electronic health records (EHRs) through a corrective mechanism: some staff nominally have almost unrestricted access to the records, but there is a strict ex post facto audit process for inappropriate accesses, i.e., accesses that violate the facility's security and privacy policies. This process is inefficient, as each suspicious access has to be reviewed by a security expert, and is purely retrospective, as it occurs after damage may have been incurred. This motivates automated approaches based on machine learning using historical data. Previous attempts at such a system have successfully applied supervised learning models to this end, such as SVMs and logistic regression. While providing benefits over manual auditing, these approaches ignore the identity of the users and patients involved in a record access. Therefore, they cannot exploit the fact that a patient whose record was previously involved in a violation has an increased risk of being involved in a future violation. Motivated by this, in this paper, we propose a collaborative filtering inspired approach to predicting inappropriate accesses. Our solution integrates both explicit and latent features for staff and patients, the latter acting as a personalized "finger-print" based on historical access patterns. The proposed method, when applied to real EHR access data from two tertiary hospitals and a file-access dataset from Amazon, shows not only significantly improved performance compared to existing methods, but also provides insights as to what indicates an inappropriate access.

SUBMITTER: Menon AK 

PROVIDER: S-EPMC3967851 | biostudies-other | 2014 Apr

REPOSITORIES: biostudies-other

altmetric image

Publications

Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering.

Menon Aditya Krishna AK   Jiang Xiaoqian X   Kim Jihoon J   Vaidya Jaideep J   Ohno-Machado Lucila L  

Machine learning 20140401 1


Many healthcare facilities enforce security on their electronic health records (EHRs) through a corrective mechanism: some staff nominally have almost unrestricted access to the records, but there is a strict <i>ex post facto</i> audit process for inappropriate accesses, i.e., accesses that violate the facility's security and privacy policies. This process is inefficient, as each suspicious access has to be reviewed by a security expert, and is purely retrospective, as it occurs after damage may  ...[more]

Similar Datasets

| S-EPMC3078661 | biostudies-literature
| S-EPMC4419773 | biostudies-literature
| S-EPMC6080680 | biostudies-literature
| S-EPMC3128412 | biostudies-literature
| S-EPMC6652024 | biostudies-literature
| S-EPMC7331997 | biostudies-literature
| S-EPMC7309230 | biostudies-literature
| S-EPMC7556423 | biostudies-literature
| S-EPMC5338873 | biostudies-literature
| S-EPMC6319253 | biostudies-literature