In this study, we want to show that despite the important and crucial data that health structures (hospitals, clinics, health centers etc.) manage, they do not take into account the risks of patient data leaks. As a result, these structures do not seem to favor computer audits on a regular basis in order to determine possible intrusion doors. some people think that data leaks are due to external factors which can be characterized by cyber-attacks coming from outside. Health care workers can take confidential patient information and expose it and without a security audit it would be difficult to find the fault and the person responsible, hence the interest of security audits. The research was done because we noticed that the health structures in Burkina Faso manage big and crucial data and they need to pay attention with. Data leakage situations can be crucial on the one hand for patients who will see their personal information end up in the public square and on the other hand discredit the image of the health structure and which will result in the non-attendance of this structure. In this study, the expected result is to show the existence of the negligence of health structures in Burkina Faso when managing patient data that can lead to a leak of this data, also to propose palliative solutions to the risks to which they are exposed. We went to meet the managers in charge of managing these structures in order to collect useful information and analyze it.
Published in | American Journal of Science, Engineering and Technology (Volume 7, Issue 2) |
DOI | 10.11648/j.ajset.20220702.12 |
Page(s) | 39-43 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2022. Published by Science Publishing Group |
IT Security Audit, Burkina-Faso Health Structure, Computer Security Risks, Leak of Data, System Management
[1] | DOCUMENTATION, T. P. S., & LOGICAL, C. (2005). Information technology–Security techniques–Information security management systems–Requirements. |
[2] | Kanatov, M., Atymtayeva, L., & Yagaliyeva, B. (2014, December). Expert systems for information security management and audit. Implementation phase issues. In 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS) (pp. 896-900). IEEE. |
[3] | Stoel, D., Havelka, D., & Merhout, J. W. (2012). An analysis of attributes that impact information technology audit quality: A study of IT and financial audit practitioners. International Journal of Accounting Information Systems, 13 (1), 60-79. |
[4] | Ardito, C., Di Noia, T., Di Sciascio, E., Lofù, D., Pazienza, A., & Vitulano, F. (2021). An artificial intelligence cyberattack detection system to improve threat reaction in e-health. In Proceedings of Italian Conference on Cybersecurity (ITASEC 2021). |
[5] | Mohammadi, F., Panou, A., Ntantogian, C., Karapistoli, E., Panaousis, E., & Xenakis, C. (2019, October). CUREX: seCUre and pRivate hEalth data eXchange. In IEEE/WIC/ACM International Conference on Web Intelligence-Companion Volume (pp. 263-268). |
[6] | Arasteh, A. R., Debbabi, M., Sakha, A., & Saleh, M. (2007). Analyzing multiple logs for forensic evidence. digital investigation, 4, 82-91. |
[7] | Ray, A., & Newell, S. (2010). Exploring information security risks in healthcare systems. In Health Information Systems: Concepts, Methodologies, Tools, and Applications (pp. 1713-1719). IGI Global. |
[8] | Kim, J., & Park, N. (2022). De-Identification Mechanism of User Data in Video Systems According to Risk Level for Preventing Leakage of Personal Healthcare Information. Sensors, 22 (7), 2589. |
[9] | Gringinger, E., Schuetz, C. G., & Schrefl, M. (2021, February). Towards Informed Watermarking of Personal Health Sensor Data for Data Leakage Detection. In Digital Forensics and Watermarking: 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25–27, 2020, Revised Selected Papers (Vol. 12617, p. 109). Springer Nature. |
[10] | Mallissery, S., Wu, M. C., Bau, C. A., Huang, G. Z., Yang, C. Y., Lin, W. C., & Wu, Y. S. (2020, October). POSTER: Data Leakage Detection for Health Information System based on Memory Introspection. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (pp. 898-900). |
APA Style
Yanogo Kiswendsida Jean Hermann, Kabore Baowendnere Tanguy. (2022). Study on the Audit of IT Security in Health Structures: Case of Health Structures in Burkina Faso. American Journal of Science, Engineering and Technology, 7(2), 39-43. https://doi.org/10.11648/j.ajset.20220702.12
ACS Style
Yanogo Kiswendsida Jean Hermann; Kabore Baowendnere Tanguy. Study on the Audit of IT Security in Health Structures: Case of Health Structures in Burkina Faso. Am. J. Sci. Eng. Technol. 2022, 7(2), 39-43. doi: 10.11648/j.ajset.20220702.12
@article{10.11648/j.ajset.20220702.12, author = {Yanogo Kiswendsida Jean Hermann and Kabore Baowendnere Tanguy}, title = {Study on the Audit of IT Security in Health Structures: Case of Health Structures in Burkina Faso}, journal = {American Journal of Science, Engineering and Technology}, volume = {7}, number = {2}, pages = {39-43}, doi = {10.11648/j.ajset.20220702.12}, url = {https://doi.org/10.11648/j.ajset.20220702.12}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajset.20220702.12}, abstract = {In this study, we want to show that despite the important and crucial data that health structures (hospitals, clinics, health centers etc.) manage, they do not take into account the risks of patient data leaks. As a result, these structures do not seem to favor computer audits on a regular basis in order to determine possible intrusion doors. some people think that data leaks are due to external factors which can be characterized by cyber-attacks coming from outside. Health care workers can take confidential patient information and expose it and without a security audit it would be difficult to find the fault and the person responsible, hence the interest of security audits. The research was done because we noticed that the health structures in Burkina Faso manage big and crucial data and they need to pay attention with. Data leakage situations can be crucial on the one hand for patients who will see their personal information end up in the public square and on the other hand discredit the image of the health structure and which will result in the non-attendance of this structure. In this study, the expected result is to show the existence of the negligence of health structures in Burkina Faso when managing patient data that can lead to a leak of this data, also to propose palliative solutions to the risks to which they are exposed. We went to meet the managers in charge of managing these structures in order to collect useful information and analyze it.}, year = {2022} }
TY - JOUR T1 - Study on the Audit of IT Security in Health Structures: Case of Health Structures in Burkina Faso AU - Yanogo Kiswendsida Jean Hermann AU - Kabore Baowendnere Tanguy Y1 - 2022/05/12 PY - 2022 N1 - https://doi.org/10.11648/j.ajset.20220702.12 DO - 10.11648/j.ajset.20220702.12 T2 - American Journal of Science, Engineering and Technology JF - American Journal of Science, Engineering and Technology JO - American Journal of Science, Engineering and Technology SP - 39 EP - 43 PB - Science Publishing Group SN - 2578-8353 UR - https://doi.org/10.11648/j.ajset.20220702.12 AB - In this study, we want to show that despite the important and crucial data that health structures (hospitals, clinics, health centers etc.) manage, they do not take into account the risks of patient data leaks. As a result, these structures do not seem to favor computer audits on a regular basis in order to determine possible intrusion doors. some people think that data leaks are due to external factors which can be characterized by cyber-attacks coming from outside. Health care workers can take confidential patient information and expose it and without a security audit it would be difficult to find the fault and the person responsible, hence the interest of security audits. The research was done because we noticed that the health structures in Burkina Faso manage big and crucial data and they need to pay attention with. Data leakage situations can be crucial on the one hand for patients who will see their personal information end up in the public square and on the other hand discredit the image of the health structure and which will result in the non-attendance of this structure. In this study, the expected result is to show the existence of the negligence of health structures in Burkina Faso when managing patient data that can lead to a leak of this data, also to propose palliative solutions to the risks to which they are exposed. We went to meet the managers in charge of managing these structures in order to collect useful information and analyze it. VL - 7 IS - 2 ER -