Effects of Continuous Security Monitoring on Security Controls of Electronic Health Records in Public Hospitals, Tanzania
Abstract
This paper examines the effects of continuous security monitoring on the security of electronic health records in Tanzanian public hospitals. The study adopted a cross-sectional research design and quantitative research approach using a sample of 300 respondents from the six public hospitals in Tanzania. A questionnaire was used to collect data from the main users of EHRs such as medical doctors, IT officers, nurses, pharmacists, laboratory technologists, record officers and administrative officers. A multiple linear regression model was used to evaluate the effects of continuous security monitoring on the security of electronic health records in Tanzanian public hospitals. The findings revealed that continuous security monitoring is a significant predictor of the security of electronic health records in Tanzanian public hospitals, (B= .509, p< 0.001). This implies that, continuous security monitoring explains 50.9% of the variance in security of electronic health records in Tanzanian public hospitals. Based on this finding, is recommended that, to enhance effective security controls in electronic health records, public hospitals in Tanzanian should consider the adoption of continuous security monitoring by making security controls more automated
Downloads
References
Abiola, I., & Oyewole, A. T. (2013). Internal control system on fraud detection: Nigeria experience. Journal of Accounting and Finance, 13(5), 141-152.
Apuke, O.D. (2017). Quantitative research methods: A synopsis approach. Kuwait Chapter of Arabian Journal of Business and Management Review, 33(5471), 1-8
AlSadhan. T and J.S. Park, "Leveraging information security continuous monitoring for cyber defence", Proceedings of the 10th International Conference on Cyber Warfare and Security, pp. 401, March 2015.
Ellen Z (2019). What is data loss prevention (DLP)? A definition of data loss prevention. Available at:https//digitalguardian.com/blog/what-data-loss-prevention-dlp-definition-data-loss-prevention
Hair, J. F, Babin, J. B., Anderson, R.E. & Black, C.W. (2010). Multivariate data analysis. (7th edition). Upper Saddle River: Pearson Prentice Hall.
Jacobs, S. (2016). Engineering Information Security. Hoboken: Jacobs.
Justin B (2019). How to gain security visibility into a modern environment, Available at: https://blog.rapid7.com/2019/03/27/hw-to-gain-security-visibility-into-a-modern-environment/ [Assessed on 16 March 2023]
Kirtley, E. (2018). What is SIEM? What is SOAR? How are they different? Retrieved from Swimlane: https://swimlane.com/blog/siem-soar/
Microsoft. (2018, May 30). Task Scheduler - Windows application. Retrieved from Microsoft Docs: https://docs.microsoft.com/en-us/windows/desktop/taskschd/task-scheduler-startpage
MOHCDGEC (2017). Tanzania digital health investment road map 2017-2023: The journey to better data for better health in Tanzania. https://www.healthdatacollaborative.org/where-we- work/Tanzania/; [accessed on 16 Jun. 2021]
Montesino, R., & Fenz, S. (2011). Automation possibilities in information security management. 2011 European Intelligence and Security Informatics Conference
Petersdide, G. B., Zavarsky, P., & Butakov, S. (2015). Automated security configuration checklist for a Cisco IPSec VPN router using SCAP 1.2. The 10th International Conference for Internet Technology and Secured Transactions, 355-360
Ponemon Institute. (2018). 2018 Cost of a Data Breach Study: Global Overview. Traverse City, MI: IBM Security and Ponemon Institute, LLC.
Tabachnick, B.G., & Fidell, L.S. (2014). Using multivariate statistics. Harlow. Essex: Pearson Education Limited
Tsai P-W, Tsai C-W, Hsu C-W, Yang C-S (2018). Network monitoring in software-defined networking: a review. IEEE Syst J. https://doi.org/10.1109/JSYST.2018.2798060
Yash P, (2017). How automating SOD controls monitoring and management strengthens compliance and security. Available at: https://saviynt.com/blog/how-automating-sod-controls-monitoring-and-management-strngtherns-compliance-and-security [Assessed on 06 May 2023]
Copyright (c) 2023 Ernest Godson, Deus Dominic Ngaruko, George Oreku
This work is licensed under a Creative Commons Attribution 4.0 International License.