did not gather data on individual healthcare
organizations to analyze whether there are some
characteristics of that organizations that can be
correlated with the patterns of data breaches. This is
an interesting research avenue that would allow one
to go further in explaining our results. In the same
vein, in order to better contextualize the breaches
reported from different states, it would be interesting
to complement data from the US DHHS with data on
the states from other sources. For example, it would
be worthwhile to gather data on the specificities of
states with regard to health information exchange
regulations, or with regard to the rates of health IT
adoption; all data that would probably help explain,
or at least contextualize the levels of health data
breaches.
In spite of the limitations stated above, we hope
that this study contributes to a better understanding of
health data breaches related to the use of health IT,
which is a first step to devise IT security and privacy
practices to prevent data breaches from happening.
REFERENCES
Ablon, L. (2018). Data thieves. The motivations of cyber
threat actors and their use and monetization of stolen
data. Santa Monica, Ca: Rand Corporation.
Adler-Milstein, J., DesRoches, C. M., Kralovec, P., Foster,
G., Worzala, C., Charles, D., . . . Jha, A. K. (2015).
Electronic health record adoption in US hospitals:
Progress continues, but challenges persist. Health
Affairs, 34(12), 2174-2180.
Adler-Milstein, J., Holmgren, A. J., Kralovec, P., Worzala,
C., Searcy, T., & Patel, V. (2017). Electronic health
record adoption in US hospitals: The emergence of a
digital “advanced use” divide. Journal of the American
Medical Informatics Association, 24(6), 1142-1148.
Adler-Milstein, J., & Jha, A. K. (2017). HITECH Act drove
large gains in hospital electronic health record
adoption. Health Affairs, 36(8), 1416-1422.
Agno, C. F., & Guo, K. L. (2013). Electronic health
systems: Challenges faced by hospital-based providers.
The Health Care Manager, 32(3), 246-252.
Bittmann, R. M., & Gelbard, R. M. (2007). Decision-
making method using a visual approach for cluster
analysis problems; indicative classification algorithms
and grouping scope. Expert Systems, 24(3), 171-187.
Blumenthal, D. (2009). Stimulating the adoption of health
information technology. The New England Journal of
Medicine, 360(15), 1477-1479.
Blumenthal, D. (2011). Implementation of the federal
health information technology initiative. The New
England Journal of Medicine, 365(25), 2426-2431.
Chernyshev, M., Zeadally, S., & Baig, Z. (2019). Healthcare
data breaches: Implications for digital forensic readiness.
Journal of Medical Systems, 43(1), 1-12.
Daniel, O. U. (2018). Effects of health information
technology and health information exchanges on
readmissions and length of stay. Health Policy and
Technology, 7(3), 281-286.
Gelbard, R., Goldman, O., & Spiegler, I. (2007).
Investigating diversity of clustering methods: An
empirical comparison. Data & Knowledge
Engineering, 63(1), 155-166.
HHS Office for Civil Rights. (2018). Breach portal: Notice
to the secretary of HHS breach of unsecured protected
health information. Retrieved from
https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf
Hiller, J. S. (2016). Healthy predictions? Questions for data
analytics in health care. American Business Law
Journal, 53(2), 251-314.
Hogan, S. O., & Kissam, S. M. (2010). Measuring
meaningful use Health affairs (Project Hope), April
2010, Vol.29 (4), pp.601-6. Health Affairs, 29(4), 601-
606.
Hsiao, C.-J., Decker, S. L., Hing, E., & Sisk, J. E. (2012).
Most physicians were eligible for federal incentives in
2011, but few had EHR systems that met meaningful-
use criteria. Health Affairs, 31(5), 1100-1007.
Jones, E. B., & Furukawa, M. F. (2014). Adoption and use
of electronic health records among federally qualified
health centers grew substantially during 2010-12.
Health Affairs, 33(7), 1254-1261.
Koczkodaj, W. W., Mazurek, M., Strzałka, D., Wolny-
Dominiak, A., & Woodbury-Smith, M. (2019).
Electronic health record breaches as social indicators.
Social Indicators Research, 141(2), 861–871.
Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D.
K. (2017). Cybersecurity in healthcare: A systematic
review of modern threats and trends. Technology and
Health Care, 25(1), 1-10.
Levy, M., & Royne, M. B. (2009). Up for sale: Consumer
medical information. Journal of Consumer Marketing,
26(7), 465-467.
Libert, T. (2015). Privacy implications of health
information seeking on the web. Communications of the
ACM, 58(3), 68-77.
Liu, V., Musen, M. A., & Chou, T. (2015). Data breaches
of protected health information in the United States.
Journal of the American Medical Association, 313(14),
1471-1473.
McKenna, R. M., Dwyer, D., & Rizzo, J. A. (2018). Is HIT
a hit? The impact of health information technology on
inpatient hospital outcomes. Applied Economics,
50(27), 3016-3028.
McNeal, M. (2014). Hacking health care. Marketing Health
Services, 34(3), 16-21.
Milne, G. R., Pettinico, G., Hajjat, F. M., & Markos, E.
(2017). Information sensitivity typology: Mapping the
degree and type of risk consumers perceive in personal
data sharing. The Journal of Consumer Affairs, 51(1),
133-161.
Myers, J., Frieden, T. R., Bherwani, K. M., & Henning, K.
J. (2008). Privacy and public health at risk: Public
health confidentiality in the digital age. American
Journal of Public Health, 98(5), 793-801.