Oracle's Role in Cyber-Ethical Decision-Making for Healthcare Data Security
DOI:
https://doi.org/10.63282/3050-9416.IJAIBDCMS-V6I2P103Keywords:
Oracle, Healthcare Data Security, Blockchain, AI, HIPAA, GDPRAbstract
The increasing digitization of healthcare systems necessitates robust data security mechanisms. Implementing oracle-based devices provides a greater effect towards securing healthcare information and overcoming cyber-ethics. This paper aims to examine the use of Oracle in cyber-ethical decision-making for health data security. Oracle’s security structure of databases, analytics based on artificial intelligence, and blockchain application can help maintain privacy, align with the requirements of healthcare governing bodies like HIPAA and GDPR, and manage ethical issues in AI. The use of Oracle-based security solutions in the healthcare frameworks offers secure internal features, and it eliminates unprofessionalism such as unauthorized access to patients’ information or their biopsy without consent. This paper reveals that implementing the decision-making ethical models within the infrastructure of Oracle networks is crucial to prevent such cyber threats and guarantee the organization’s transparency. This paper shows an actual life case study to let people understand how efficiently and effectively Oracle’s solution can be used
References
[1] Lee, I. (2022). Analysis of insider threats in the healthcare industry: A text mining approach. Information, 13(9), 404.
[2] Rajamäki, J. (2021). Ethics of cybersecurity in digital healthcare and well-being of elderly at home. In Proceedings of the 20th European Conference on Cyber Warfare and Security ECCWS 2021. Academic Conferences International.
[3] Weber, K., & Kleine, N. (2020). Cybersecurity in health care. The Ethics of Cybersecurity, 21, 139-156.
[4] Lieneck, C., McLauchlan, M., & Phillips, S. (2023, November). Healthcare cybersecurity ethical concerns during the COVID-19 global pandemic: a rapid review. In Healthcare (Vol. 11, No. 22, p. 2983). MDPI.
[5] Wright, J. B., & Burrell, D. N. (2023). Cybersecurity leadership ethics in healthcare. In Handbook of Research on Cybersecurity Risk in Contemporary Business Systems (pp. 137-148). IGI Global.
[6] Sendelj, R., & Ognjanovic, I. (2022). Cybersecurity challenges in healthcare. In Achievements, Milestones and Challenges in Biomedical and Health Informatics (pp. 190-202). IOS Press.
[7] Tully, J., Selzer, J., Phillips, J. P., O'Connor, P., & Dameff, C. (2020). Healthcare challenges in the era of cybersecurity. Health security, 18(3), 228-231.
[8] He, Y., Aliyu, A., Evans, M., & Luo, C. (2021). Health care cybersecurity challenges and solutions under the climate of COVID-19: scoping review. Journal of medical Internet research, 23(4), e21747.
[9] Salama, R., Altrjman, C., & Al-Turjman, F. (2024). Healthcare cybersecurity challenges: a look at current and future trends. Computational intelligence and Blockchain in complex systems, 97-111.
[10] Wang, L., & Jones, R. (2019, April). Big data, cybersecurity, and challenges in healthcare. In 2019 SoutheastCon (pp. 1-6). IEEE.
[11] Rahim, M. J., Rahim, M. I. I., Afroz, A., & Akinola, O. (2024). Cybersecurity threats in healthcare it: Challenges, risks, and mitigation strategies. Journal of Artificial Intelligence General Science (JAIGS) ISSN: 3006-4023, 6(1), 438-462.
[12] Kelly, B., Quinn, C., Lawlor, A., Killeen, R., & Burrell, J. (2023). Cybersecurity in healthcare. In Trends of artificial intelligence and big data for e-health (pp. 213-231). Cham: Springer International Publishing.
[13] Lorenzini, G., Shaw, D. M., & Elger, B. S. (2022). It takes a pirate to know one: ethical hackers for healthcare cybersecurity. BMC medical ethics, 23(1), 131.
[14] Cottone, R. R., & Claus, R. E. (2000). Ethical decision‐making models: A literature review. Journal of Counseling & Development, 78(3), 275-283.
[15] McDevitt, R., Giapponi, C., & Tromley, C. (2007). A model of ethical decision making: The integration of process and content. Journal of Business Ethics, 73, 219-229.
[16] Schwartz, M. S. (2016). Ethical decision-making theory: An integrated approach. Journal of Business Ethics, 139, 755-776.
[17] Ke, M. (2001). Computer database security and Oracle security implementation.
[18] Srivastava, V., Bond, M. D., McKinley, K. S., & Shmatikov, V. (2011). A security policy oracle: Detecting security holes using multiple API implementations. ACM SIGPLAN Notices, 46(6), 343-354.
[19] Palaniswamy, R., & Frank, T. G. (2002). Oracle ERP and network computing architecture: Implementation and performance. Information Systems Management, 19(2).
[20] Shaul, J., & Ingram, A. (2011). Practical Oracle Security: Your Unauthorized Guide to Relational Database Security. Syngress.