THE ETHICS OF AI IN HEALTHCARE: PRIVACY AND DATA SECURITY
DOI:
https://doi.org/10.61841/72bne026Keywords:
Rules and regulation, privacy rule, judgmentsAbstract
AI has done a major role in human life now. I have become a part of human life. I have done so many roles in various fields to make human life easy. Now AI is playing a role in healthcare. We see that lots of news about cybercrime and hacking of data and online fraud from accounts and other things hackers hack our mobile and keep text data, so some of our medicine data and our health data will be safe by machine learning and AI. We use things like phoneme and other things on the internet, and then we first give priority to our privacy. Then it is a general question of if AI will take a look at our health. It is an important thing, but if it is done, then how will our privacy be safe? How will our data and our cyber be saved from hackers? We know that hackers use lots of things to hack our data. If they hack our medicine and other medical reports, then it will be dangerous, so it is a general question for humans: if AI is used in their health sector, then how will they save your data?
Downloads
References
1. F ozair fouzia and do hw, "ethical issues in electronic health records: a general overview," perspectives in clinical
research, 2015.
2. M. Bromwich and R. Bromwich, privacy risks when using mobile devices in health care.
3. T.T. Smith, "examining data privacy breaches in Healthcare," 2016.
4. S.B. wikina, "What caused the breach? An examination of use of information technology and health data
Breaches," Perspect. Health Inf. Manag., 2014.
5. M. Chernyshev, s. Zeadally, and z. Baig, "Healthcare data breaches: implications for digital forensic readiness," j.
Med. Syst., 2019.
6. J.x. jiang and g. Bai, "types of information compromised in breaches of protected health information," ann intern
medicine.
7. J. Miller, "2019 health care data breaches setting records," healio rheumatology, 2019
8. S. Alder, "Healthcare Data Breach Report," HIPAA Journal, 2019.
9. Global analysis, 2015.
10. J. Schoen, "Rise in health data breaches driven by criminal activity," Infectious Disease News.
11. J.K. Cohen, "July-reported healthcare breaches second-highest since tracking began," Modern Healthcare, 2019.
12. J.g ronquillo and hw do, "health it hacking and cybersecurity: national trends in data breaches of protected health
Information," Jamla opened, 2018.
13. R. K. Kaushik Anjali and d. Sharma, "analyzing the effect of partial shading on performance of grid connected
solar pv system," 2018 3rd international conference and workshops on recent advances and innovations in
engineering (icraie), 2018.
14. R. Kaushik, o. P. Mahela, p. K. Bhatt, b. Khan, s. Padmanaban and f. Blaabjerg, "a hybrid algorithm for recognition
of power quality disturbances," in IEEE Access, 2020.
15. Kaushik, r. K. "Pragati Analysis and Case Study of Power Transmission and Distribution." j adv res power electro
power sys (2020)
16. Sharma, R. and Kumar, G. (2017) “Availability improvement for the successive K-out-of-N machining system
using standby with multiple working vacations,” International Journal of Reliability and Safety.
17. Gireesh, K., Manju, K., and Preeti (2016), “Maintenance policies for improving the availability of a software-hardware system,” in 2016 11th International Conference on Reliability, Maintainability, and Safety (ICRMS).
IEEE.
18. Jain, M., Kaushik, M., and Kumar, G. (2015). “Reliability analysis for embedded systems with two types of faults and common cause failure using Markov processes,” in Proceedings of the Sixth International Conference on Computer and Communication Technology 2015. New York, NY, USA: ACM.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.