| Peer-Reviewed

Study on the Audit of IT Security in Health Structures: Case of Health Structures in Burkina Faso

Received: 22 March 2022    Accepted: 23 April 2022    Published: 12 May 2022
Views:       Downloads:
Abstract

In this study, we want to show that despite the important and crucial data that health structures (hospitals, clinics, health centers etc.) manage, they do not take into account the risks of patient data leaks. As a result, these structures do not seem to favor computer audits on a regular basis in order to determine possible intrusion doors. some people think that data leaks are due to external factors which can be characterized by cyber-attacks coming from outside. Health care workers can take confidential patient information and expose it and without a security audit it would be difficult to find the fault and the person responsible, hence the interest of security audits. The research was done because we noticed that the health structures in Burkina Faso manage big and crucial data and they need to pay attention with. Data leakage situations can be crucial on the one hand for patients who will see their personal information end up in the public square and on the other hand discredit the image of the health structure and which will result in the non-attendance of this structure. In this study, the expected result is to show the existence of the negligence of health structures in Burkina Faso when managing patient data that can lead to a leak of this data, also to propose palliative solutions to the risks to which they are exposed. We went to meet the managers in charge of managing these structures in order to collect useful information and analyze it.

Published in American Journal of Science, Engineering and Technology (Volume 7, Issue 2)
DOI 10.11648/j.ajset.20220702.12
Page(s) 39-43
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

IT Security Audit, Burkina-Faso Health Structure, Computer Security Risks, Leak of Data, System Management

References
[1] DOCUMENTATION, T. P. S., & LOGICAL, C. (2005). Information technology–Security techniques–Information security management systems–Requirements.
[2] Kanatov, M., Atymtayeva, L., & Yagaliyeva, B. (2014, December). Expert systems for information security management and audit. Implementation phase issues. In 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS) (pp. 896-900). IEEE.
[3] Stoel, D., Havelka, D., & Merhout, J. W. (2012). An analysis of attributes that impact information technology audit quality: A study of IT and financial audit practitioners. International Journal of Accounting Information Systems, 13 (1), 60-79.
[4] Ardito, C., Di Noia, T., Di Sciascio, E., Lofù, D., Pazienza, A., & Vitulano, F. (2021). An artificial intelligence cyberattack detection system to improve threat reaction in e-health. In Proceedings of Italian Conference on Cybersecurity (ITASEC 2021).
[5] Mohammadi, F., Panou, A., Ntantogian, C., Karapistoli, E., Panaousis, E., & Xenakis, C. (2019, October). CUREX: seCUre and pRivate hEalth data eXchange. In IEEE/WIC/ACM International Conference on Web Intelligence-Companion Volume (pp. 263-268).
[6] Arasteh, A. R., Debbabi, M., Sakha, A., & Saleh, M. (2007). Analyzing multiple logs for forensic evidence. digital investigation, 4, 82-91.
[7] Ray, A., & Newell, S. (2010). Exploring information security risks in healthcare systems. In Health Information Systems: Concepts, Methodologies, Tools, and Applications (pp. 1713-1719). IGI Global.
[8] Kim, J., & Park, N. (2022). De-Identification Mechanism of User Data in Video Systems According to Risk Level for Preventing Leakage of Personal Healthcare Information. Sensors, 22 (7), 2589.
[9] Gringinger, E., Schuetz, C. G., & Schrefl, M. (2021, February). Towards Informed Watermarking of Personal Health Sensor Data for Data Leakage Detection. In Digital Forensics and Watermarking: 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25–27, 2020, Revised Selected Papers (Vol. 12617, p. 109). Springer Nature.
[10] Mallissery, S., Wu, M. C., Bau, C. A., Huang, G. Z., Yang, C. Y., Lin, W. C., & Wu, Y. S. (2020, October). POSTER: Data Leakage Detection for Health Information System based on Memory Introspection. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (pp. 898-900).
Cite This Article
  • APA Style

    Yanogo Kiswendsida Jean Hermann, Kabore Baowendnere Tanguy. (2022). Study on the Audit of IT Security in Health Structures: Case of Health Structures in Burkina Faso. American Journal of Science, Engineering and Technology, 7(2), 39-43. https://doi.org/10.11648/j.ajset.20220702.12

    Copy | Download

    ACS Style

    Yanogo Kiswendsida Jean Hermann; Kabore Baowendnere Tanguy. Study on the Audit of IT Security in Health Structures: Case of Health Structures in Burkina Faso. Am. J. Sci. Eng. Technol. 2022, 7(2), 39-43. doi: 10.11648/j.ajset.20220702.12

    Copy | Download

    AMA Style

    Yanogo Kiswendsida Jean Hermann, Kabore Baowendnere Tanguy. Study on the Audit of IT Security in Health Structures: Case of Health Structures in Burkina Faso. Am J Sci Eng Technol. 2022;7(2):39-43. doi: 10.11648/j.ajset.20220702.12

    Copy | Download

  • @article{10.11648/j.ajset.20220702.12,
      author = {Yanogo Kiswendsida Jean Hermann and Kabore Baowendnere Tanguy},
      title = {Study on the Audit of IT Security in Health Structures: Case of Health Structures in Burkina Faso},
      journal = {American Journal of Science, Engineering and Technology},
      volume = {7},
      number = {2},
      pages = {39-43},
      doi = {10.11648/j.ajset.20220702.12},
      url = {https://doi.org/10.11648/j.ajset.20220702.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajset.20220702.12},
      abstract = {In this study, we want to show that despite the important and crucial data that health structures (hospitals, clinics, health centers etc.) manage, they do not take into account the risks of patient data leaks. As a result, these structures do not seem to favor computer audits on a regular basis in order to determine possible intrusion doors. some people think that data leaks are due to external factors which can be characterized by cyber-attacks coming from outside. Health care workers can take confidential patient information and expose it and without a security audit it would be difficult to find the fault and the person responsible, hence the interest of security audits. The research was done because we noticed that the health structures in Burkina Faso manage big and crucial data and they need to pay attention with. Data leakage situations can be crucial on the one hand for patients who will see their personal information end up in the public square and on the other hand discredit the image of the health structure and which will result in the non-attendance of this structure. In this study, the expected result is to show the existence of the negligence of health structures in Burkina Faso when managing patient data that can lead to a leak of this data, also to propose palliative solutions to the risks to which they are exposed. We went to meet the managers in charge of managing these structures in order to collect useful information and analyze it.},
     year = {2022}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Study on the Audit of IT Security in Health Structures: Case of Health Structures in Burkina Faso
    AU  - Yanogo Kiswendsida Jean Hermann
    AU  - Kabore Baowendnere Tanguy
    Y1  - 2022/05/12
    PY  - 2022
    N1  - https://doi.org/10.11648/j.ajset.20220702.12
    DO  - 10.11648/j.ajset.20220702.12
    T2  - American Journal of Science, Engineering and Technology
    JF  - American Journal of Science, Engineering and Technology
    JO  - American Journal of Science, Engineering and Technology
    SP  - 39
    EP  - 43
    PB  - Science Publishing Group
    SN  - 2578-8353
    UR  - https://doi.org/10.11648/j.ajset.20220702.12
    AB  - In this study, we want to show that despite the important and crucial data that health structures (hospitals, clinics, health centers etc.) manage, they do not take into account the risks of patient data leaks. As a result, these structures do not seem to favor computer audits on a regular basis in order to determine possible intrusion doors. some people think that data leaks are due to external factors which can be characterized by cyber-attacks coming from outside. Health care workers can take confidential patient information and expose it and without a security audit it would be difficult to find the fault and the person responsible, hence the interest of security audits. The research was done because we noticed that the health structures in Burkina Faso manage big and crucial data and they need to pay attention with. Data leakage situations can be crucial on the one hand for patients who will see their personal information end up in the public square and on the other hand discredit the image of the health structure and which will result in the non-attendance of this structure. In this study, the expected result is to show the existence of the negligence of health structures in Burkina Faso when managing patient data that can lead to a leak of this data, also to propose palliative solutions to the risks to which they are exposed. We went to meet the managers in charge of managing these structures in order to collect useful information and analyze it.
    VL  - 7
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • Institute of Computer Engineering and Telecommunication, Polytechnic School of Ouagadougou, Ouagadougou, Burkina Faso

  • Institute of Computer Engineering and Telecommunication, Polytechnic School of Ouagadougou, Ouagadougou, Burkina Faso

  • Sections