Background: Health care data breaches are the most rapidly increasing type of cybercrime; however, the predictors of health care data breaches are uncertain.

Objective: This quantitative study aims to develop a predictive model to explain the number of hospital data breaches at the county level.

Methods: This study evaluated data consolidated at the county level from 1032 short-term acute care hospitals. We considered the association between data breach occurrence (a dichotomous variable), predictors based on county demographics, and socioeconomics, average hospital workload, facility type, and average performance on several hospital financial metrics using 3 model types: logistic regression, perceptron, and support vector machine.

Results: The model coefficient performance metrics indicated convergent validity across the 3 model types for all variables except bad debt and the factor level accounting for counties with >20% and up to 40% Hispanic populations, both of which had mixed coefficient directionality. The support vector machine model performed the classification task best based on all metrics (accuracy, precision, recall, F1-score). All the 3 models performed the classification task well with directional congruence of weights. From the logistic regression model, the top 5 odds ratios (indicating a higher risk of breach) included inpatient workload, medical center status, pediatric trauma center status, accounts receivable, and the number of outpatient visits, in high to low order. The bottom 5 odds ratios (indicating the lowest odds of experiencing a data breach) occurred for counties with Black populations of >20% and <40%, >80% and <100%, and >40% but <60%, as well as counties with ≤20% Asian or between 80% and 100% Hispanic individuals. Our results are in line with those of other studies that determined that patient workload, facility type, and financial outcomes were associated with the likelihood of health care data breach occurrence.

Conclusions: The results of this study provide a predictive model for health care data breaches that may guide health care managers to reduce the risk of data breaches by raising awareness of the risk factors.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10767628PMC
http://dx.doi.org/10.2196/51471DOI Listing

Publication Analysis

Top Keywords

data breaches
16
hospital data
8
quantitative study
8
health care
8
care data
8
data breach
8
model types
8
logistic regression
8
support vector
8
performed classification
8

Similar Publications

Conventional personal health record (PHR) management systems are centralized, making them vulnerable to privacy breaches and single points of failure. Despite progress in standardizing healthcare data with the FHIR format, hospitals often lack efficient platforms for transferring PHRs, leading to redundant tests and delayed treatments. To address these challenges, we propose a decentralized PHR management system leveraging Personal Data Stores (PDS) and Decentralized Identifiers (DIDs) in line with the Web 3.

View Article and Find Full Text PDF

What are the Thoughts of Women Whose Husbands' Frozen Testicular Sperm Is Thawed for in vitro Fertilization on the Day of Oocyte Retrieval? A Qualitative Study.

Int J Womens Health

January 2025

Nursing Department, Sir Run Run Shaw Hospital, College of Medicine, Zhejiang University, Hangzhou City, Zhejiang Province, People's Republic of China.

Objective: The psychological experiences will be analyzed to understand the needs and burdens of women on the day of oocyte retrieval when the thawed testicular sperm of their husbands is used for in vitro fertilization, in order to provide a basis for the subsequent formulation of relevant nursing measures.

Methods: This study utilized a descriptive phenomenological research approach. A cohort of 13 women undergoing oocyte retrieval on the day when thawed testicular sperm from their husbands is used for in vitro fertilization at the Reproductive Medicine Center of Sir Run Run Shaw Hospital, Zhejiang University School of Medicine, between August and October 2024, were chosen as participants for this study.

View Article and Find Full Text PDF

To combat dynamically loaded code in anti-emulated environments, DLCDroid is an Android app analysis framework. DL-CDroid uses the reflection API to effectively identify information leaks due to dynamically loaded code within malicious apps, incorporating static and dynamic analysis techniques. The Dynamically Loaded Code (DLC) technique employs Java features to allow Android apps to dynamically expand their functionality at runtime.

View Article and Find Full Text PDF

, the grey mould fungus affecting over 1400 plant species, employs infection cushion (IC), a branched and claw-like structure formed by mycelia, as a critical strategy to breach host surface barriers. However, the molecular mechanisms underlying IC formation remain largely unexplored. In this study, we utilized a forward genetics approach to establish a large T-DNA tagged population of , which contained 14,000 transformants.

View Article and Find Full Text PDF

Computational nuclear oncology for precision radiopharmaceutical therapy (RPT) is a new frontier for theranostic treatment personalization. A key strategy relies on the possibility to incorporate clinical, biomarker, image-based, and dosimetric information in theranostic digital twins (TDTs) of patients to move beyond a one-size-fits-all approach. The TDT framework enables treatment optimization by real-time monitoring of the real-world system, simulation of different treatment scenarios, and prediction of resulting treatment outcomes, as well as facilitating collaboration and knowledge sharing among health care professionals adopting a harmonized TDT.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!