Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits

作者: He Zhang , Sanjay Mehotra , David Liebovitz , Carl A. Gunter , Bradley Malin

DOI: 10.1145/2544102

关键词:

摘要: In electronic medical record (EMR) systems, administrators often provide EMR users with broad access privileges, which may leave the system vulnerable to misuse and abuse. Given that patient care is based on a coordinated workflow, we hypothesize pathways can be represented as progression of through introduce strategy model patient’s flow sequence accesses defined over graph. Elements in correspond features associated transaction (e.g., reason for access). Based this motivation, patterns usage, indicate deviations from workflows. We evaluate our approach using several months data large academic center. Empirical results show framework finds small portion constitute outliers such flows. also observe violation deviate different types services. Analysis suggests greater deviation normal by nonclinical users. simulate anomalies context real illustrate efficiency proposed method As an illustration capabilities method, it was observed area under receiver operating characteristic (ROC) curve Pediatrics service found 0.9166. The suggest competitive with, better than, existing state-of-the-art its outlier detection performance. At same time, more efficient, orders magnitude, than previous approaches, allowing thousands seconds.

参考文章(67)
Karen Having, Diane Davis, Compliance with HIPAA security standards in U.S. Hospitals. Journal of healthcare information management. ,vol. 20, pp. 108- 115 ,(2006)
Margret Amatayakul, Think a privacy breach couldn't happen at your facility? Think again. Journal of the Healthcare Financial Management Association. ,vol. 62, pp. 100- 101 ,(2008)
Vikramaditya R. Jakkula, Aaron S. Crandall, Diane J. Cook, Enhancing Anomaly Detection Using Temporal Pattern Discovery Springer, Boston, MA. pp. 175- 194 ,(2009) , 10.1007/978-0-387-76485-6_8
Phillip V. Asaro, James E. Ries, Data Mining in Medical Record Access Logs american medical informatics association annual symposium. pp. 855- 855 ,(2001)
Aziz A Boxwala, Xiaoqian Jiang, Debra Mikels, Jihoon Kim, Lucila Ohno-Machado, Janice M Grillo, Rose B Mandelbaum, Bhakti A Patel, Staal A Vinterbo, Anomaly and signature filtering improve classifier performance for detection of suspicious access to EHRs. american medical informatics association annual symposium. ,vol. 2011, pp. 723- 731 ,(2011)
Christian W. Probst, René Rydhof Hansen, Flemming Nielson, Where Can an Insider Attack? Formal Aspects in Security and Trust. pp. 127- 142 ,(2006) , 10.1007/978-3-540-75227-1_9
Angelos Keromytis, Steven M. Bellovin, Shlomo Hershkop, Salvatore J. Stolfo, Sean W. Smith, Sara Sinclair, Insider Attack and Cyber Security: Beyond the Hacker Springer Publishing Company, Incorporated. ,(2010)
Advanced Intelligent Environments Springer Publishing Company, Incorporated. ,(2009) , 10.1007/978-0-387-76485-6
Rafae Bhatti, Tyrone Grandison, Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement Lecture Notes in Computer Science. pp. 158- 173 ,(2007) , 10.1007/978-3-540-75248-6_11
Ravi S. Sandhu, Role-based Access Control Advances in Computers. ,vol. 46, pp. 237- 286 ,(1998) , 10.1016/S0065-2458(08)60206-5