Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Securing electronic health records against insider-threats: A supervised machine learning approach

Hurst, W, Tekinerdogan, B, Alskaif, T, Boddy, A and Shone, N (2022) Securing electronic health records against insider-threats: A supervised machine learning approach. Smart Health, 26. p. 100354. ISSN 2352-6483

Securing electronic health records against insider-threats A supervised machine learning approach.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial No Derivatives.

Download (4MB) | Preview
Open Access URL: https://doi.org/10.1016/j.smhl.2022.100354 (Published version)


The introduction of electronic health records (EHR) has created new opportunities for efficient patient data management. For example, preventative medical practice, rather than reactive, is possible through the integration of machine learning to mine digital patient record datasets. Furthermore, within the wider smart cities’ infrastructure, EHR has considerable environmental and cost-saving benefits for healthcare providers. Yet, there are inherent dangers to digitising patient records. Considering the sensitive nature of the data, EHR is equally at risk of both external threats and insider attacks, but security applications are predominantly facing the outer boundary of the network. Therefore, in this work, the focus is on insider data misuse detection. The approach involves the use of supervised classification (decision tree, random forest and support vector machine) based off pre-labelled real-world data collated from a UK-based hospital for the detection of EHR data misuse. The results demonstrate that by employing a machine learning approach to analyse EHR data access, anomaly detection can be achieved with a 0.9896 accuracy from a test set and 0.9908 from the validation set using a support vector machine classifier. The emphasis of this research is on the detection of EHR data misuse, through the detection of anomalous behavioural patterns. Based on the results, the recommendation is to adopt an SVM for data misuse/insider threat detection.

Item Type: Article
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
R Medicine > R Medicine (General)
Divisions: Computer Science & Mathematics
Publisher: Elsevier
SWORD Depositor: A Symplectic
Date Deposited: 10 Jan 2023 11:40
Last Modified: 10 Jan 2023 11:45
DOI or ID number: 10.1016/j.smhl.2022.100354
URI: https://researchonline.ljmu.ac.uk/id/eprint/18592
View Item View Item