Effects of Continuous Security Monitoring on Security Controls of Electronic Health Records in Public Hospitals, Tanzania

  • Ernest Godson The Open University of Tanzania
  • Deus Dominic Ngaruko The Open University of Tanzania
  • George Oreku The Open University of Tanzania
Keywords: Continuous Security Monitoring, Security Controls, Electronic Health Records, Tanzania
Share Article:

Abstract

This paper examines the effects of continuous security monitoring on the security of electronic health records in Tanzanian public hospitals. The study adopted a cross-sectional research design and quantitative research approach using a sample of 300 respondents from the six public hospitals in Tanzania. A questionnaire was used to collect data from the main users of EHRs such as medical doctors, IT officers, nurses, pharmacists, laboratory technologists, record officers and administrative officers. A multiple linear regression model was used to evaluate the effects of continuous security monitoring on the security of electronic health records in Tanzanian public hospitals. The findings revealed that continuous security monitoring is a significant predictor of the security of electronic health records in Tanzanian public hospitals, (B= .509, p< 0.001). This implies that, continuous security monitoring explains 50.9% of the variance in security of electronic health records in Tanzanian public hospitals. Based on this finding, is recommended that, to enhance effective security controls in electronic health records, public hospitals in Tanzanian should consider the adoption of continuous security monitoring by making security controls more automated

Downloads

Download data is not yet available.

References

Abiola, I., & Oyewole, A. T. (2013). Internal control system on fraud detection: Nigeria experience. Journal of Accounting and Finance, 13(5), 141-152.

Apuke, O.D. (2017). Quantitative research methods: A synopsis approach. Kuwait Chapter of Arabian Journal of Business and Management Review, 33(5471), 1-8

AlSadhan. T and J.S. Park, "Leveraging information security continuous monitoring for cyber defence", Proceedings of the 10th International Conference on Cyber Warfare and Security, pp. 401, March 2015.

Ellen Z (2019). What is data loss prevention (DLP)? A definition of data loss prevention. Available at:https//digitalguardian.com/blog/what-data-loss-prevention-dlp-definition-data-loss-prevention

Hair, J. F, Babin, J. B., Anderson, R.E. & Black, C.W. (2010). Multivariate data analysis. (7th edition). Upper Saddle River: Pearson Prentice Hall.

Jacobs, S. (2016). Engineering Information Security. Hoboken: Jacobs.

Justin B (2019). How to gain security visibility into a modern environment, Available at: https://blog.rapid7.com/2019/03/27/hw-to-gain-security-visibility-into-a-modern-environment/ [Assessed on 16 March 2023]

Kirtley, E. (2018). What is SIEM? What is SOAR? How are they different? Retrieved from Swimlane: https://swimlane.com/blog/siem-soar/

Microsoft. (2018, May 30). Task Scheduler - Windows application. Retrieved from Microsoft Docs: https://docs.microsoft.com/en-us/windows/desktop/taskschd/task-scheduler-startpage

MOHCDGEC (2017). Tanzania digital health investment road map 2017-2023: The journey to better data for better health in Tanzania. https://www.healthdatacollaborative.org/where-we- work/Tanzania/; [accessed on 16 Jun. 2021]

Montesino, R., & Fenz, S. (2011). Automation possibilities in information security management. 2011 European Intelligence and Security Informatics Conference

Petersdide, G. B., Zavarsky, P., & Butakov, S. (2015). Automated security configuration checklist for a Cisco IPSec VPN router using SCAP 1.2. The 10th International Conference for Internet Technology and Secured Transactions, 355-360

Ponemon Institute. (2018). 2018 Cost of a Data Breach Study: Global Overview. Traverse City, MI: IBM Security and Ponemon Institute, LLC.

Tabachnick, B.G., & Fidell, L.S. (2014). Using multivariate statistics. Harlow. Essex: Pearson Education Limited

Tsai P-W, Tsai C-W, Hsu C-W, Yang C-S (2018). Network monitoring in software-defined networking: a review. IEEE Syst J. https://doi.org/10.1109/JSYST.2018.2798060

Yash P, (2017). How automating SOD controls monitoring and management strengthens compliance and security. Available at: https://saviynt.com/blog/how-automating-sod-controls-monitoring-and-management-strngtherns-compliance-and-security [Assessed on 06 May 2023]

Published
14 September, 2023
How to Cite
Godson, E., Ngaruko, D., & Oreku, G. (2023). Effects of Continuous Security Monitoring on Security Controls of Electronic Health Records in Public Hospitals, Tanzania. East African Journal of Business and Economics, 6(1), 364-374. https://doi.org/10.37284/eajbe.6.1.1433