Digital Health (Jun 2024)

Healthcare professionals’ perception on emergence of security threat using digital health technologies in healthcare delivery

  • Jonathan Kissi,
  • Godwin Azakpah,
  • Nathan Kumasenu Mensah,
  • Kennedy Dzamvivie,
  • Twisty Ampofowaa Bosompem,
  • Victor Adu Wireko,
  • Grace Amoah-Anomah

DOI
https://doi.org/10.1177/20552076241260385
Journal volume & issue
Vol. 10

Abstract

Read online

Background The advancement of digital health technologies (DHTs) in the healthcare industry has revolutionized healthcare by improving efficiency and accessibility. The shift from paper-based records to electronic health records (EHRs) as a result of modern technologies introduced various security threats, endangering patient data privacy and system reliability. This study explores intricate security threats among healthcare professionals affecting DHT utilization. Methodology A structured questionnaire was designed to solicit for data from healthcare professionals on the existence of possible security threats, magnitude of physical and technical threats, and the extent to which the activities of staff and vendors affect the current DHTs being utilized in Cape Coast Teaching Hospital and Directorate of University Health Services at the University of Cape Coast. Purposive and convenience sampling techniques were employed to select healthcare professionals from various medical fields, and their views were captured for the study. Results Findings and data analyzed from the study revealed that technical threats, such as hacking, phishing, malware, and encryption weaknesses, pose more substantial dangers to DHTs compared to physical threats. The study explored viable strategies to prevent unauthorized access to DHTs and safeguard patient information. Encouraging measures, such as encryption, multi-factor authentication, regular security training, and periodic password changes, emerged as promising methods in addressing DHT security threats. Conclusion The study emphasizes the necessity of robust security measures and regular updates to effectively counter the emerging security threats. It underscores the critical necessity for a comprehensive protocol to enhance DHT security, addressing physical, technical, and personnel-related threats.