Your browser does not support JavaScript!

Security and privacy issues in UK healthcare

Security and privacy issues in UK healthcare

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Security and Privacy of Electronic Healthcare Records: Concepts, paradigms and solutions — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The healthcare must be a most concern issue for any developed countries in terms of security and wellness of its citizens. In 2015-16, the UK spent £185 billion on healthcare as shown in [1] that provides free medical care to all UK residents, treating 1 million patients every 36 hours as discussed in [2-5]. There must be a governing system which guaranteed the safety, security, and privacy of such data. As such data are vulnerable to cyberattacks and hold the millions of confidential data. This chapter discusses and analyses the various security and privacy issues in the UK healthcare infrastructure and several challenges to be resolved for different attacks.

Chapter Contents:

  • 12.1 Introduction
  • 12.1.1 Scope and context
  • 12.1.2 Security and privacy issues in healthcare infrastructure
  • 12.1.3 Challenges in resolving S&P issues
  • 12.2 Detailed problem analysis
  • 12.2.1 Security attacks
  • 12.2.2 Privacy attacks
  • 12.2.3 Impact on enterprise
  • 12.3 Proposed solution
  • 12.3.1 Overall solution description resolving discussed S&P issues
  • 12.3.2 Resistance against security attacks
  • 12.3.3 Resistance against privacy attacks
  • 12.4 Conclusion and future directions
  • Appendix A
  • A.1 Identify the need for PIA
  • A.2 Describe the information flow (As shown in Figures A.1–A.3)
  • A.3 Identify the privacy and related risks
  • A.4 Identify privacy solutions
  • A.5 Sign off and record the PIA outcomes
  • A.6 Integrate the PIA outcomes back into the project plan
  • References

Inspec keywords: security of data; health care; data privacy; medical information systems

Other keywords: UK healthcare infrastructure; time 36.0 hour; free medical care; security issues; privacy issues

Subjects: Biology and medical computing; Data security; Medical administration

Preview this chapter:
Zoom in

Security and privacy issues in UK healthcare, Page 1 of 2

| /docserver/preview/fulltext/books/he/pbhe020e/PBHE020E_ch12-1.gif /docserver/preview/fulltext/books/he/pbhe020e/PBHE020E_ch12-2.gif

Related content

This is a required field
Please enter a valid email address