Show simple item record

Flagging and Ranking Suspicious Accesses in Electronic Health Record Systems.

dc.creatorHedda, Monica Satyanarayan
dc.date.accessioned2020-08-22T00:04:29Z
dc.date.available2019-04-02
dc.date.issued2018-04-02
dc.identifier.urihttps://etd.library.vanderbilt.edu/etd-03262018-133815
dc.identifier.urihttp://hdl.handle.net/1803/11467
dc.description.abstractHospitals are facing steep challenges to protect privacy of patient data in Electronic Health Records (EHR) from insider threats. To achieve fast detection of insider misuse and reduce further harm, large hospitals need automated suspicious access detection mechanisms. Currently, the use of rule-based auditing systems is prevalent across several healthcare organizations. However, rule-based auditing systems have not been evaluated empirically. Hence in this work, we first propose a principled approach to evaluate the effectiveness of rule-based methods in identifying suspicious behavior. Furthermore, rule-based auditing systems rely on predefined rules and are oblivious to the statistical properties of the EHR data. To this end, we propose an auditing method based on supervised machine learning techniques which utilizes clinical context to identify suspicious behavior. Experiment results show the effectiveness of our approach to identify suspicious behavior in EHR systems.
dc.format.mimetypeapplication/pdf
dc.subjectElectronic Health Records Auditing
dc.titleFlagging and Ranking Suspicious Accesses in Electronic Health Record Systems.
dc.typethesis
dc.contributor.committeeMemberBradley A. Malin, PhD
dc.type.materialtext
thesis.degree.nameMS
thesis.degree.levelthesis
thesis.degree.disciplineComputer Science
thesis.degree.grantorVanderbilt University
local.embargo.terms2019-04-02
local.embargo.lift2019-04-02
dc.contributor.committeeChairDaniel Fabbri, PhD


Files in this item

Icon

This item appears in the following Collection(s)

Show simple item record