2022
DOI: 10.32604/cmes.2022.018163
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis of Integrating Machine Learning in Healthcare for Ensuring Confidentiality of the Electronic Records

Abstract: The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare services and ensured that E-health technology caters efficiently and promptly to the needs of the stakeholders associated with healthcare. Despite the phenomenal advancement in the present healthcare services, the major obstacle that mars the success of E-health is the issue of ensuring the confidentiality and privacy of the patients' data. A thorough scan of several research studies reveals that healthcare data cont… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 56 publications
1
5
0
Order By: Relevance
“…Machine learning for this application has, to-date, been relatively under-used for EHR security despite its success in other cyber security applications (). This is confirmed in the detailed findings by Adil et al who conduct an SLR-based analysis of existing applications of machine learning for safeguarding EHR (Seh et al, 2021). Their analysis covers 7 digital libraries, and findings indicate that there are 19 related articles in this domain (3 of which are by the authors of this article), from which the K-nearest neighbour algorithm is predominantly employed.…”
Section: Related Worksupporting
confidence: 72%
See 1 more Smart Citation
“…Machine learning for this application has, to-date, been relatively under-used for EHR security despite its success in other cyber security applications (). This is confirmed in the detailed findings by Adil et al who conduct an SLR-based analysis of existing applications of machine learning for safeguarding EHR (Seh et al, 2021). Their analysis covers 7 digital libraries, and findings indicate that there are 19 related articles in this domain (3 of which are by the authors of this article), from which the K-nearest neighbour algorithm is predominantly employed.…”
Section: Related Worksupporting
confidence: 72%
“…Their approach is also tested by means of the Cooja simulator rather than real-world data, as employed in this article. Crucially, as Adil et al discuss, there are very few articles adopting a machine learning approach for EHR security despite the success of its application in related security domains (Seh et al, 2021). This is also confirmed by Qayyum et al who question the levels of robustness for the use of machine learning within healthcare-based security applications (Adnan Qayyum et al, 2020).…”
Section: Introductionmentioning
confidence: 96%
“…Internal validity. This determines the quality of the assessment used to conduct the study and ensures the efficacy of the literature review process (Kaur et al, 2020;Seh et al, 2022). For this purpose, a search mechanism was created, as detailed in the "Methodology" section.…”
Section: Validity and Limitations Of This Studymentioning
confidence: 99%
“…External validity. This assures the results are generalizable, or in other words, it determines the applicability of the results (Kaur et al, 2020;Seh et al, 2022). For this purpose, the search engines of specific digital libraries were used to obtain the results.…”
Section: Validity and Limitations Of This Studymentioning
confidence: 99%
“…Concern over the privacy and confidentiality of patient data is rising as electronic health records become more widely used and technology is incorporated into healthcare systems on a larger scale [17] . Issues of dependability, security, and privacy are particularly important because healthcare information is sensitive and there is a lot of reliance on reliable records [18] .…”
Section: Introductionmentioning
confidence: 99%