The decreasing cost of information technologies has rapidly enabled the collection, storage, and application of highly sensitive personal information in healthcare environments, which until recently, were dependent on paper documentation, face-to-face interactions, and physical protections for all matters trust-related. As these environments migrate to the electronic setting, it is imperative, as well as our legal and social obligation, to protect the privacy of patients"""""""" electronic health records (EHRs) from threats that are external, as well as internal, to healthcare organizations (HCOs). For the most part, the medical informatics and computer science communities have focused on the external threat, which has led to the development of sophisticated information and computer security mechanisms. However, the internal threat has been neglected, mainly due to the dynamic nature of complex HCOs, such as large distributed medical centers. One of the most significant challenges of data protection in HCOs is that we cannot limit service providers'access to the records in mission critical settings. Consider when a hospital patient requires treatment and a care provider's access to their EHR is delayed or denied, the patient may suffer considerable harm or death. Federal regulations, such as the Security Rule of the Health Insurance Portability and Accountability Act, require HCOs to stockpile access logs, but there are no clear mechanisms for auditing beyond simple manual spot checks, which are limited in scope. Thus, the overarching goal of this project to develop automated methods to data mine EHR access logs to detect when potentially privacy-violating accesses have been committed, so that the appropriate authorities may be alerted to follow-up with an investigation. Our primary goal is to develop informatics tools to monitor how users (e.g., physicians) access the records of subjects (e.g., patients) in the system and flag potentially privacy-compromising actions (e.g., an unauthorized """"""""peek""""""""). The proposed tools will integrate HCO knowledge and access log repositories to represent the system as a dynamic social network of teams and business processes that are applied to score the """"""""safety"""""""" of each recorded access. The specific objectives of the proposed project are (1) to develop a scientific foundation for automatically learning and modeling the normal business operations of HCOs from EHR access logs, (2) to automatically detect EHR accesses that are suspicious in the context of learned HCO operations, (3) to evaluate our approach with expert feedback, and (4) to implement our approaches in an extendable software tool that is rapidly reconfigurable to any EHR system. In support of these goals, we will evaluate real world access logs from the EHR system of the Vanderbilt University Medical Center, which is a detailed repository with data covering tens of thousands of users and over a million patients. We believe that auditing tools for EHR systems, such as those developed through this research, are crucial to the continued adoption of health information technologies without sacrificing patients'privacy rights.
To ensure wide-scale adoption of electronic health records (EHRs), it is crucial to apply technologies that uphold patient privacy in the face of complex demands and healthcare operations. In this research, we will develop technologies to assist healthcare administrators' surveillance efforts by monitoring EHR access logs. The specific goals of this project are to (1) develop a scientific foundation for learning business operations from EHR access logs, (2) tailor data mining techniques to detect anomalous accesses, (3) evaluate our approaches with real logs and healthcare experts, and (4) deploy a reconfigurable and extendible software toolkit to support access log mining and surveillance for any EHR system.
|Chen, Robert; Sun, Jimeng; Dittus, Robert S et al. (2016) Patient Stratification Using Electronic Health Records from a Chronic Disease Management Program. IEEE J Biomed Health Inform :|
|Chen, You; Xie, Wei; Gunter, Carl A et al. (2015) Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization. AMIA Annu Symp Proc 2015:416-25|
|Chen, You; Ghosh, Joydeep; Bejan, Cosmin Adrian et al. (2015) Building bridges across electronic health record systems through inferred phenotypic topics. J Biomed Inform 55:82-93|
|Chen, You; Lorenzi, Nancy; Nyemba, Steve et al. (2014) We work with them? Healthcare workers interpretation of organizational relations mined from electronic health records. Int J Med Inform 83:495-506|
|Chen, You; Nyemba, Steve; Zhang, Wen et al. (2012) Specializing network analysis to detect anomalous insider actions. Secur Inform 1:|
|Chen, You; Nyemba, Steve; Malin, Bradley (2012) Detecting Anomalous Insiders in Collaborative Information Systems. IEEE Trans Dependable Secure Comput 9:332-344|
|Chen, You; Nyemba, Steve; Malin, Bradley (2012) Auditing medical records accesses via healthcare interaction networks. AMIA Annu Symp Proc 2012:93-102|
|Li, Xiaowei; Xue, Yuan; Malin, Bradley (2011) Towards Understanding the Usage Pattern of Web-based Electronic Medical Record Systems. World Wirel Mob Multimed Netw 2011:|
|Li, Xiaowei; Xue, Yuan; Chen, You et al. (2011) Context-Aware Anomaly Detection for Electronic Medical Record Systems. Healthsec 2011:8|
|Chen, You; Malin, Bradley (2011) Detection of Anomalous Insiders in Collaborative Environments via Relational Analysis of Access Logs. CODASPY 2011:63-74|
Showing the most recent 10 out of 14 publications