Défilement des Logos
INDEXED BY
DATABASE DGRST ASJP crossref AJOL SEARCH BASE Acadmic-BCDI MLA ISSN SSRN COPERNICUS ipindexing MIAR mirabel OpenAlex OUCI RAOD worldcat1 DataCite ISIDORE DRJI COSMOS OPENAIRE OSF ascidatabase ASI-INDEX EuroPub LIBRIS openedition J-Gate-Indexed scilit DLibraries EZB zdb-katalog emarefa MAKTABA UNIV-BIBLIOTHEEK IE-University Harvard-Library UBL-UNIVESITATS Website 1 scienceopen emarefa Archiving dataverse.harvard Registered Signed DORA Journal-Accounts GOOGLE-SCHOOLAR semanticscholar ACADAMIA ORCID NO CLASS CALENDA julib-extended asianindexing  FH-Aachen DTU-FINDIT SJSU-library  eth-swisscovery  mtmt kobvlogo  bib berlin california-university
created by mebarki merouane ATRAS journal

Title: Factors Facilitating the Perpetration of Medical Identity Theft: A Case of Ahmadu Bello University Teaching Hospital (ABUTH), Zaria

Akeem Olalekan Ayub

Department of Sociology, Federal University Gusau, Zamfara

Abstract

Medical Identity Theft is a pressing concern in healthcare systems, influenced by intricate motivations and vulnerabilities. This study investigates facilitating factors
behind MIT, uncovers internal vulnerabilities, and proposes mitigation strategies. This study contributes to patient well-being and trust by fostering a secure healthcare
environment through holistic MIT prevention strategies. A mixed-methods approach was employed, encompassing quantitative and qualitative aspects to explore the perpetration of MIT, Zaria, a significant healthcare institution. The diverse sample of 388 participants, including patients, healthcare providers, and stakeholders, was obtained through stratified random sampling. Structured interviews and questionnaires gathered primary data.
Findings showcase a diverse workforce with a mid-career presence and gender distribution in technical roles. Significant facilitating factors for MIT encompass
financial gain, fraudulent service access, and expense avoidance, necessitating robust patient identification procedures and comprehensive strategies. Internal vulnerabilities
and inadequate data security underscore the need for enhanced measures, updated systems, and education. Respondents endorse a multifaceted approach, advocating
biometric identification, authentication, patient photograph display, unique identifiers, access controls, staff training, real-time data verification, audit trails, data encryption,
and patient education. Collaboration, awareness, and technology emerge as key elements in safeguarding patient data, ethical healthcare standards, and integrity. Findings
advocate a comprehensive approach, emphasizing collaboration, awareness, and technology in addressing MIT

Keywords:

Healthcare Security, Internal Vulnerabilities, Medical Identity Theft, Mitigation Strategies, Patient Data Protection

How to Cite this Paper:

Akeem, O. A. (2024). Factors Facilitating the Perpetration of Medical Identity Theft: A Case of Ahmadu Bello University Teaching Hospital (ABUTH), Zaria. Atras Journal, 5(1), 84-101

References

Alexander, M. (2022). Your medical records, stolen. Available at ReadersDigest.com.
Allstate Identity Protection (2022). Why is the Healthcare Industry the Biggest Victim of Identity Theft and Data Breaches? Available at
https://www.allstateidentityprotection.com/business/content-hub/why healthcareindustry-biggest-victim-of-identity-theft-and-data-breaches
Biegelman, M. T. (2012). Medical identity theft. In S. K. Johnson (Ed.), Identity Theft Handbook (pp. 97–112). John Wiley& Sons, Inc.
http://onlinelibrary.wiley.com/doi/10.1002/9781119203162.ch8/summary
Chen, L., & Wang, Y. (2022). “Language Barriers and Patient Identification Errors.”Health
Communication Research, 10
(4), 210-225.
British Columbia Crime Prevention Association. (2017). Identity Theft Victim’s Toolkit.https://bnra.assistidentite.com/assets/docs/en/IDAssist-Toolkit.pdf
Dixon, P., & Emerson, J. (2017). The Geography of Medical Identity Theft. World Privacy
Forum. Available at https://www.ftc.gov/system/files/documents/public_comments/2018/01/00037- 142815.pdf
Garcia, R. (2023). Provider Negligence and MIT Vulnerabilities.Healthcare Ethics Review,
20
(3), 112-128.
Gupta, S., & Sharma, R. (2023). Automated Registration Processes and MIT Risk Reduction.
Health Information Management Journal, 17(3), 150-165.
Hedstrom, K., Karlsson, F., & Kolkowska, E. (2013). Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale.
Information Management & Computer Security, 21(4), 266-287.doi:10.1108/imcs-08-2012-0043
Jones, A. (2023). “Family Dynamics and Unauthorized Access in Healthcare.”Journal of
Medical Privacy, 15
(2), 78-92.
Kassem, R. & Higson, A. (2012). The New Fraud Triangle Model. Journal of Emerging Trends in Economics and Management Sciences (JETEMS), 3(3), 191-195.
Kim, S., & Lee, H. (2022). Unauthorized Access to Electronic Medical Records and MIT.
Health Data Security Journal, 18(1), 45-60.
Miller, J., & Evans, K. (2023). “Implementing Biometric Solutions for MIT
Prevention.” Journal of Healthcare Security, 16(1), 30-45.
National Health Agency. (2018). Anti-Fraud Guidelines. Ayushman Bharat –Pradhan Mantri Jan ArogyaYojana (PMJAY).
Nguyen, T. (2022). Role of Compliance Regulations in MIT Mitigation. Journal of Healthcare Compliance, 9(2), 78-92.
Ponemon Institute. (2013). Survey on Medical Identity Theft. Available at
https://www.ponemon.org/local/upload/file/2013%20Medical%20Identity%20Theft%2
0Report%20FINAL%2011.pdf
Robinson, E. (2022). Staff Training and Awareness Programs for MIT Prevention. Journal of Healthcare Training, 14(4), 200-215.
Smith, R. G. & Jorna, P. (2018). Counting the costs of identity crime and misuse in Australia,
2015–16
. Statistical Bulletin no. 15. Canberra: Australian Institute of Criminology. Available at https://aic.gov.au/publications/sb/sb15
Stephens, R. (2020). 5 Tips for preventing medical identity theft in healthcare. Available at https://www.rightpatient.com/blog/five-tips-preventing-medical-identity-theft/
US Department of Health and Human Services. (2022).Medical Identity Theft. Available at (https://oig.hhs.gov/fraud/medical-id-theft/index.asp)
World Privacy Forum. (2022).Medical Identity Theft. Available at https://www. worldprivacyforum.org/category/med-id-theft/

Copyright for all articles published in ATRAS belongs to the author. The authors also grant permission to the publisher to publish, reproduce, distribute, and transmit the articles. ATRAS publishes accepted papers under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) License. Authors submitting papers for publication in ATRAS agree to apply the CC BY-NC 4.0 license to their work. For non-commercial purposes, anyone may copy, redistribute material, remix, transform, and construct material in any media or format, provided that the terms of the license are observed and the original source is properly cited.