Data Security Analysis in Electronic Health Information Systems

  • Adi Ahmad STMIK Indonesia Banda Aceh
  • Yusmanidar Sekolah Tinggi Ilmu Administrasi Pelita Nusantara
  • Juria Hastuti Sekolah Tinggi Ilmu Administrasi Pelita Nusantara
  • Maudi Hijriatin Sekolah Tinggi Ilmu Administrasi Pelita Nusantara
  • Sarno Sekolah Tinggi Ilmu Administrasi Pelita Nusantara
Keywords: Data Security, Electronic Health Information System, Vulnerability, Data Protection, Encryption, Multi-Factor Authentication.

Abstract

This study aims to analyze data security in electronic health information systems (EHIS). With the increasing use of information technology in healthcare, data security issues are becoming increasingly important given the sensitivity of medical information. The research methodology involved an in-depth literature review as well as case study analysis on several hospitals that have implemented SIKE. Data analysis techniques included evaluation of system vulnerabilities, identification of potential threats, and assessment of data protection mechanisms in place. The results showed that despite various efforts to improve data security, there are still many vulnerabilities that can be exploited by irresponsible parties. The main threats include cyberattacks, data leakage, and unauthorized access. In addition, this study found that the implementation of security protocols such as data encryption, multi-factor authentication, and regular audits can significantly reduce these risks. However, this research has several limitations, including a limited sample of case studies that may not represent the entire SIKE landscape in Indonesia and limited access to internal hospital data. Nonetheless, this research makes a significant contribution in providing practical recommendations for SIKE managers to improve data security, as well as a basis for further research in this area.

References

Adi Ahmad, Riyan Maulana, & Muhammad Yassir. (2024). Cybersecurity Challenges In The Era Of Digital Transformation A Comprehensive Analysis Of Information Systems. Journal Informatic, Education and Management (JIEM), 6(1), 7-11. https://doi.org/10.61992/jiem.v6i1.57

Adi Ahmad, Maulana, R., & Akmal, K. (2024). Data Privacy and Security in the Age of IoT A Comprehensive Study on Information System Vulnerabilities. Journal Informatic, Education and Management (JIEM), 6(2), 1-7. https://doi.org/10.61992/jiem.v6i2.78

Gordon, W. J., & Fairhall, A. (2018). Security and privacy of patient information and electronic health records. Journal of the American Medical Informatics Association, 25(3), 408-412.

Humphreys, E. (2018). Information security management standards: Compliance, governance and risk management. Information Security Journal: A Global Perspective, 27(2), 52-61.

Jones, T., & Ashford, R. (2019). Cybersecurity threats in healthcare: An urgent call for action. Journal of Healthcare Information Management, 34(3), 112-118.

Kementerian Kesehatan Republik Indonesia. (2021). Laporan keamanan data kesehatan di Indonesia. Jakarta: Kementerian Kesehatan RI.

Kim, D., & Solomon, M. G. (2018). Fundamentals of Information Systems Security (3rd ed.). Jones & Bartlett Learning.

Lee, A. (2019). Global perspectives on health data breaches. International Journal of Medical Informatics, 127, 57-63.

Miller, K., Smith, L., & Anderson, J. (2020). Data security in electronic health records. Healthcare Management Review, 45(4), 231-239.

Oltsik, J. (2020). The state of cybersecurity. Journal of Cybersecurity, 6(1), 1-12.

Smith, J. (2020). Protecting patient information in the digital age. Healthcare Security Insights, 22(2), 45-53.

Stallings, W., & Brown, L. (2021). Computer Security: Principles and Practice (5th ed.). Pearson.

Whitman, M. E., & Mattord, H. J. (2020). Principles of Information Security (6th ed.). Cengage Learning.

Published
2025-02-21
How to Cite
Adi Ahmad, Yusmanidar, Hastuti, J., Hijriatin, M., & Sarno. (2025). Data Security Analysis in Electronic Health Information Systems. Journal Informatic, Education and Management (JIEM), 7(1), 1-11. https://doi.org/10.61992/jiem.v7i1.107

Most read articles by the same author(s)

1 2 > >>