-
Medical Image Analysis Feb 2024Artificial intelligence (AI) has a multitude of applications in cancer research and oncology. However, the training of AI systems is impeded by the limited availability...
Artificial intelligence (AI) has a multitude of applications in cancer research and oncology. However, the training of AI systems is impeded by the limited availability of large datasets due to data protection requirements and other regulatory obstacles. Federated and swarm learning represent possible solutions to this problem by collaboratively training AI models while avoiding data transfer. However, in these decentralized methods, weight updates are still transferred to the aggregation server for merging the models. This leaves the possibility for a breach of data privacy, for example by model inversion or membership inference attacks by untrusted servers. Somewhat-homomorphically-encrypted federated learning (SHEFL) is a solution to this problem because only encrypted weights are transferred, and model updates are performed in the encrypted space. Here, we demonstrate the first successful implementation of SHEFL in a range of clinically relevant tasks in cancer image analysis on multicentric datasets in radiology and histopathology. We show that SHEFL enables the training of AI models which outperform locally trained models and perform on par with models which are centrally trained. In the future, SHEFL can enable multiple institutions to co-train AI models without forsaking data governance and without ever transmitting any decryptable data to untrusted servers.
Topics: Humans; Artificial Intelligence; Learning; Neoplasms; Image Processing, Computer-Assisted; Radiology
PubMed: 38104402
DOI: 10.1016/j.media.2023.103059 -
Journal of Medical Internet Research Aug 2023The health care industry has faced various challenges over the past decade as we move toward a digital future where services and data are available on demand. The... (Review)
Review
The health care industry has faced various challenges over the past decade as we move toward a digital future where services and data are available on demand. The systems of interconnected devices, users, data, and working environments are referred to as the Internet of Health Care Things (IoHT). IoHT devices have emerged in the past decade as cost-effective solutions with large scalability capabilities to address the constraints on limited resources. These devices cater to the need for remote health care services outside of physical interactions. However, IoHT security is often overlooked because the devices are quickly deployed and configured as solutions to meet the demands of a heavily saturated industry. During the COVID-19 pandemic, studies have shown that cybercriminals are exploiting the health care industry, and data breaches are targeting user credentials through authentication vulnerabilities. Poor password use and management and the lack of multifactor authentication security posture within IoHT cause a loss of millions according to the IBM reports. Therefore, it is important that health care authentication security moves toward adaptive multifactor authentication (AMFA) to replace the traditional approaches to authentication. We identified a lack of taxonomy for data models that particularly focus on IoHT data architecture to improve the feasibility of AMFA. This viewpoint focuses on identifying key cybersecurity challenges in a theoretical framework for a data model that summarizes the main components of IoHT data. The data are to be used in modalities that are suited for health care users in modern IoHT environments and in response to the COVID-19 pandemic. To establish the data taxonomy, a review of recent IoHT papers was conducted to discuss the related work in IoHT data management and use in next-generation authentication systems. Reports, journal articles, conferences, and white papers were reviewed for IoHT authentication data technologies in relation to the problem statement of remote authentication and user management systems. Only publications written in English from the last decade were included (2012-2022) to identify key issues within the current health care practices and their management of IoHT devices. We discuss the components of the IoHT architecture from the perspective of data management and sensitivity to ensure privacy for all users. The data model addresses the security requirements of IoHT users, environments, and devices toward the automation of AMFA in health care. We found that in health care authentication, the significant threats occurring were related to data breaches owing to weak security options and poor user configuration of IoHT devices. The security requirements of IoHT data architecture and identified impactful methods of cybersecurity for health care devices, data, and their respective attacks are discussed. Data taxonomy provides better understanding, solutions, and improvements of user authentication in remote working environments for security features.
Topics: Humans; Confidentiality; Telemedicine; Pandemics; COVID-19; Internet; Computer Security
PubMed: 37490633
DOI: 10.2196/44114 -
Cureus Nov 2023The integration of 5G technology in the healthcare sector is poised to bring about transformative changes, offering numerous advantages such as enhanced telemedicine... (Review)
Review
The integration of 5G technology in the healthcare sector is poised to bring about transformative changes, offering numerous advantages such as enhanced telemedicine services, expedited data transfer for medical records, improved remote surgery capabilities, real-time monitoring and diagnostics, advancements in wearable medical devices, and the potential for precision medicine. However, this technological shift is not without its concerns, including potential health implications related to 5G radiation exposure, heightened cybersecurity risks for medical devices and data systems, potential system failures due to technology dependence, and privacy issues linked to data breaches in healthcare. We are striking a balance between harnessing these benefits and addressing the associated risks. Achieving this equilibrium requires the establishment of a robust regulatory framework, ongoing research into the health impacts of 5G radiation, the implementation of stringent cybersecurity measures, education and training for healthcare professionals, and the development of ethical standards. The future of 5G in the medical field holds immense promise, but success depends on our ability to navigate this evolving landscape while prioritizing patient safety, privacy, and ethical practice.
PubMed: 38098915
DOI: 10.7759/cureus.48767 -
Journal of Medical Internet Research May 2024Health care organizations worldwide are faced with an increasing number of cyberattacks and threats to their critical infrastructure. These cyberattacks cause... (Review)
Review
BACKGROUND
Health care organizations worldwide are faced with an increasing number of cyberattacks and threats to their critical infrastructure. These cyberattacks cause significant data breaches in digital health information systems, which threaten patient safety and privacy.
OBJECTIVE
From a sociotechnical perspective, this paper explores why digital health care systems are vulnerable to cyberattacks and provides sociotechnical solutions through a systematic literature review (SLR).
METHODS
An SLR using the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) was conducted by searching 6 databases (PubMed, Web of Science, ScienceDirect, Scopus, Institute of Electrical and Electronics Engineers, and Springer) and a journal (Management Information Systems Quarterly) for articles published between 2012 and 2022 and indexed using the following keywords: "(cybersecurity OR cybercrime OR ransomware) AND (healthcare) OR (cybersecurity in healthcare)." Reports, review articles, and industry white papers that focused on cybersecurity and health care challenges and solutions were included. Only articles published in English were selected for the review.
RESULTS
In total, 5 themes were identified: human error, lack of investment, complex network-connected end-point devices, old legacy systems, and technology advancement (digitalization). We also found that knowledge applications for solving vulnerabilities in health care systems between 2012 to 2022 were inconsistent.
CONCLUSIONS
This SLR provides a clear understanding of why health care systems are vulnerable to cyberattacks and proposes interventions from a new sociotechnical perspective. These solutions can serve as a guide for health care organizations in their efforts to prevent breaches and address vulnerabilities. To bridge the gap, we recommend that health care organizations, in partnership with educational institutions, develop and implement a cybersecurity curriculum for health care and intelligence information sharing through collaborations; training; awareness campaigns; and knowledge application areas such as secure design processes, phase-out of legacy systems, and improved investment. Additional studies are needed to create a sociotechnical framework that will support cybersecurity in health care systems and connect technology, people, and processes in an integrated manner.
Topics: Computer Security; Humans; Delivery of Health Care; Patient Safety
PubMed: 38820579
DOI: 10.2196/46904 -
Indian Journal of Medical Ethics 2023Mobile phone-based interventions are being increasingly used in community health work in India. The extensive use of mobile phones in community health work is associated... (Review)
Review
BACKGROUND
Mobile phone-based interventions are being increasingly used in community health work in India. The extensive use of mobile phones in community health work is associated with several ethical issues. This review was conducted to identify the ethical issues related to mHealth applications in community health work in India.
METHODS
We performed a scoping review of literature in PubMed and Google Scholar using a search strategy that we developed. We included studies that mentioned ethical issues in mHealth applications that involved community health work and community health workers in India, published in peer reviewed English language journals between 2011 and 2021. All three authors screened the articles, shortlisted them, read them, and extracted the data. We then synthesised the data into a conceptual framework.
RESULTS
Our search yielded 1125 papers, from which we screened and shortlisted 121, after reading which we included 58 in the final scoping review. The main ethical issues identified from review of these papers included benefits of mHealth applications such as improved quality of care, increased awareness about health and illness, increased accountability of the health system, accurate data capture and timely data driven decision making. The risks of mHealth applications identified were impersonal communication of community health worker, increased workload, potential breach in privacy, confidentiality, and stigmatisation. The inherent inequities in access to mobile phones in the community due to gender and class led to exclusion of women and the poor from the benefits of mHealth interventions. Though mHealth interventions increased access to healthcare by taking healthcare to remote areas through tele-health, unless we contextualise mHealth to local rural settings through community engagement, it is likely to remain inequitable.
CONCLUSION
This scoping review revealed that there is a lack of well conducted empirical studies which explore the ethical issues related to mHealth applications in community health work.
Topics: Humans; Female; Public Health; Delivery of Health Care; Cell Phone; Telemedicine; India; Mobile Applications
PubMed: 37310008
DOI: 10.20529/IJME.2023.037 -
Journal of Medical Internet Research May 2024Mobile health (mHealth) apps have the potential to enhance health care service delivery. However, concerns regarding patients' confidentiality, privacy, and security... (Review)
Review
BACKGROUND
Mobile health (mHealth) apps have the potential to enhance health care service delivery. However, concerns regarding patients' confidentiality, privacy, and security consistently affect the adoption of mHealth apps. Despite this, no review has comprehensively summarized the findings of studies on this subject matter.
OBJECTIVE
This systematic review aims to investigate patients' perspectives and awareness of the confidentiality, privacy, and security of the data collected through mHealth apps.
METHODS
Using the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines, a comprehensive literature search was conducted in 3 electronic databases: PubMed, Ovid, and ScienceDirect. All the retrieved articles were screened according to specific inclusion criteria to select relevant articles published between 2014 and 2022.
RESULTS
A total of 33 articles exploring mHealth patients' perspectives and awareness of data privacy, security, and confidentiality issues and the associated factors were included in this systematic review. Thematic analyses of the retrieved data led to the synthesis of 4 themes: concerns about data privacy, confidentiality, and security; awareness; facilitators and enablers; and associated factors. Patients showed discordant and concordant perspectives regarding data privacy, security, and confidentiality, as well as suggesting approaches to improve the use of mHealth apps (facilitators), such as protection of personal data, ensuring that health status or medical conditions are not mentioned, brief training or education on data security, and assuring data confidentiality and privacy. Similarly, awareness of the subject matter differed across the studies, suggesting the need to improve patients' awareness of data security and privacy. Older patients, those with a history of experiencing data breaches, and those belonging to the higher-income class were more likely to raise concerns about the data security and privacy of mHealth apps. These concerns were not frequent among patients with higher satisfaction levels and those who perceived the data type to be less sensitive.
CONCLUSIONS
Patients expressed diverse views on mHealth apps' privacy, security, and confidentiality, with some of the issues raised affecting technology use. These findings may assist mHealth app developers and other stakeholders in improving patients' awareness and adjusting current privacy and security features in mHealth apps to enhance their adoption and use.
TRIAL REGISTRATION
PROSPERO CRD42023456658; https://tinyurl.com/ytnjtmca.
Topics: Humans; Confidentiality; Telemedicine; Mobile Applications; Computer Security; Privacy
PubMed: 38820572
DOI: 10.2196/50715 -
Mathematical Biosciences and... Nov 2023In many fields, such as medicine and the computer industry, databases are vital in the process of information sharing. However, databases face the risk of being stolen...
In many fields, such as medicine and the computer industry, databases are vital in the process of information sharing. However, databases face the risk of being stolen or misused, leading to security threats such as copyright disputes and privacy breaches. Reversible watermarking techniques ensure the ownership of shared relational databases, protect the rights of data owners and enable the recovery of original data. However, most of the methods modify the original data to a large extent and cannot achieve a good balance between protection against malicious attacks and data recovery. In this paper, we proposed a robust and reversible database watermarking technique using a hash function to group digital relational databases, setting the data distortion and watermarking capacity of the band weight function, adjusting the weight of the function to determine the watermarking capacity and the level of data distortion, using firefly algorithms (FA) and simulated annealing algorithms (SA) to improve the efficiency of the search for the location of the watermark embedded and, finally, using the differential expansion of the way to embed the watermark. The experimental results prove that the method maintains the data quality and has good robustness against malicious attacks.
PubMed: 38124599
DOI: 10.3934/mbe.2023943 -
Cureus Nov 2023This comprehensive exploration unveils the transformative potential of Artificial Intelligence (AI) within medicine and surgery. Through a meticulous journey, we examine... (Review)
Review
This comprehensive exploration unveils the transformative potential of Artificial Intelligence (AI) within medicine and surgery. Through a meticulous journey, we examine AI's current applications in healthcare, including medical diagnostics, surgical procedures, and advanced therapeutics. Delving into the theoretical foundations of AI, encompassing machine learning, deep learning, and Natural Language Processing (NLP), we illuminate the critical underpinnings supporting AI's integration into healthcare. Highlighting the symbiotic relationship between humans and machines, we emphasize how AI augments clinical capabilities without supplanting the irreplaceable human touch in healthcare delivery. Also, we'd like to briefly mention critical findings and takeaways they can expect to encounter in the article. A thoughtful analysis of the economic, societal, and ethical implications of AI's integration into healthcare underscores our commitment to addressing critical issues, such as data privacy, algorithmic transparency, and equitable access to AI-driven healthcare services. As we contemplate the future landscape, we project an exciting vista where more sophisticated AI algorithms and real-time surgical visualizations redefine the boundaries of medical achievement. While acknowledging the limitations of the present research, we shed light on AI's pivotal role in enhancing patient engagement, education, and data security within the burgeoning realm of AI-driven healthcare.
PubMed: 38125253
DOI: 10.7759/cureus.49082