{"id":1207,"date":"2024-01-15T21:00:00","date_gmt":"2024-01-15T21:00:00","guid":{"rendered":"https:\/\/atras-univ-saida.dz\/en\/?p=1207"},"modified":"2025-02-01T10:11:31","modified_gmt":"2025-02-01T10:11:31","slug":"factors-facilitating-the-perpetration-of-medical-identity-theft-a-case-of-ahmadu-bello-university-teaching-hospital-abuth-zaria","status":"publish","type":"post","link":"https:\/\/atras-univ-saida.dz\/en\/?p=1207","title":{"rendered":"Article 07 Issue 01 VOL 5 January 2024"},"content":{"rendered":"\n<div id=\"section-g8e2a99\" class=\"wp-block-gutentor-e1 section-g8e2a99 gutentor-element gutentor-element-advanced-text text-align-center-desktop text-align-center-tablet text-align-center-mobile\"><div class=\"gutentor-text-wrap\"><h1 class=\"gutentor-text\"><strong>Title:&nbsp;Factors Facilitating the Perpetration of Medical Identity Theft: A Case of<strong> Ahmadu Bello University Teaching Hospital (ABUTH), Zaria<\/strong><\/strong><\/h1><\/div><\/div>\n\n\n\n<div id=\"section-g8662e3\" class=\"wp-block-gutentor-e1 section-g8662e3 gutentor-element gutentor-element-advanced-text text-align-center-desktop text-align-center-tablet text-align-center-mobile\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\"><strong><strong><strong>Akeem Olalekan <\/strong>Ayub<\/strong><\/strong><\/p><\/div><\/div>\n\n\n\n<div id=\"section-g275264\" class=\"wp-block-gutentor-e1 section-g275264 gutentor-element gutentor-element-advanced-text text-align-center-desktop text-align-center-tablet text-align-center-mobile\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\"><strong><strong><strong>Department of Sociology, Federal University Gusau, Zamfara<\/strong><\/strong><\/strong><\/p><\/div><\/div>\n\n\n\n<div id=\"section-g710be8\" class=\"wp-block-gutentor-e1 section-g710be8 gutentor-element gutentor-element-advanced-text text-align-left-desktop text-align-left-tablet text-align-left-mobile\"><div class=\"gutentor-text-wrap\"><h1 class=\"gutentor-text\"><strong>Abstract<\/strong><\/h1><\/div><\/div>\n\n\n\n<div id=\"section-gc1a0d9\" class=\"wp-block-gutentor-e1 section-gc1a0d9 gutentor-element gutentor-element-advanced-text text-align-justify-desktop text-align-justify-tablet text-align-justify-mobile\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">Medical Identity Theft is a pressing concern in healthcare systems, influenced by intricate motivations and vulnerabilities. This study investigates facilitating factors<br>behind MIT, uncovers internal vulnerabilities, and proposes mitigation strategies. This study contributes to patient well-being and trust by fostering a secure healthcare<br>environment through holistic MIT prevention strategies. A mixed-methods approach was employed, encompassing quantitative and qualitative aspects to explore the perpetration of MIT, Zaria, a significant healthcare institution. The diverse sample of 388 participants, including patients, healthcare providers, and stakeholders, was obtained through stratified random sampling. Structured interviews and questionnaires gathered primary data. <br>Findings showcase a diverse workforce with a mid-career presence and gender distribution in technical roles. Significant facilitating factors for MIT encompass<br>financial gain, fraudulent service access, and expense avoidance, necessitating robust patient identification procedures and comprehensive strategies. Internal vulnerabilities<br>and inadequate data security underscore the need for enhanced measures, updated systems, and education. Respondents endorse a multifaceted approach, advocating<br>biometric identification, authentication, patient photograph display, unique identifiers, access controls, staff training, real-time data verification, audit trails, data encryption,<br>and patient education. Collaboration, awareness, and technology emerge as key elements in safeguarding patient data, ethical healthcare standards, and integrity. Findings<br>advocate a comprehensive approach, emphasizing collaboration, awareness, and technology in addressing MIT<\/p><\/div><\/div>\n\n\n\n<div id=\"section-gd3268e\" class=\"wp-block-gutentor-e1 section-gd3268e gutentor-element gutentor-element-advanced-text text-align-left-desktop text-align-left-tablet text-align-left-mobile\"><div class=\"gutentor-text-wrap\"><h1 class=\"gutentor-text\"><strong>Keywords<\/strong><em>:<\/em><\/h1><\/div><\/div>\n\n\n\n<div id=\"section-g2b5af7\" class=\"wp-block-gutentor-e1 section-g2b5af7 gutentor-element gutentor-element-advanced-text text-align-justify-desktop text-align-justify-tablet text-align-justify-mobile\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">Healthcare Security, Internal Vulnerabilities, Medical Identity Theft, Mitigation Strategies, Patient Data Protection<\/p><\/div><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/drive.google.com\/file\/d\/1inJ1zKaAOfvuUqQ-kJaA8lTZnYkf3IOT\/view?usp=sharing\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"278\" src=\"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/image-2.png\" alt=\"\" class=\"wp-image-1136\" style=\"width:183px;height:auto\" srcset=\"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/image-2.png 1000w, https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/image-2-300x83.png 300w, https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/image-2-768x214.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n<\/div>\n\n\n<div id=\"section-g4fc883\" class=\"wp-block-gutentor-e1 section-g4fc883 gutentor-element gutentor-element-advanced-text text-align-left-desktop text-align-left-tablet text-align-left-mobile\"><div class=\"gutentor-text-wrap\"><h1 class=\"gutentor-text\"><strong><strong>How to Cite this Paper:<\/strong><\/strong><\/h1><\/div><\/div>\n\n\n\n<div id=\"section-g605b38\" class=\"wp-block-gutentor-e1 section-g605b38 gutentor-element gutentor-element-advanced-text text-align-justify-desktop text-align-justify-tablet text-align-justify-mobile\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">Akeem, O. A. (2024). Factors Facilitating the Perpetration of Medical Identity Theft: A Case of<strong> <\/strong>Ahmadu Bello University Teaching Hospital (ABUTH), Zaria. <em>Atras Journal, 5<\/em>(1), 84-101<\/p><\/div><\/div>\n\n\n\n<div id=\"section-g-l9llknw\" class=\"wp-block-gutentor-e1 section-g-l9llknw gutentor-element gutentor-element-advanced-text text-align-justify-desktop text-align-justify-tablet text-align-justify-mobile\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\"><strong>DOI<br><a href=\"https:\/\/doi.org\/10.70091\/Atras\/vol5no1.7\">https:\/\/doi.org\/10.70091\/Atras\/vol5no1.7<\/a><\/strong><\/p><\/div><\/div>\n\n\n\n<div id=\"section-gcde683\" class=\"wp-block-gutentor-e1 section-gcde683 gutentor-element gutentor-element-advanced-text text-align-left-desktop text-align-left-tablet text-align-left-mobile\"><div class=\"gutentor-text-wrap\"><h1 class=\"gutentor-text\"><strong>References<\/strong><\/h1><\/div><\/div>\n\n\n\n<div id=\"section-gd8eb5f\" class=\"wp-block-gutentor-e1 section-gd8eb5f gutentor-element gutentor-element-advanced-text text-align-justify-desktop text-align-justify-tablet text-align-justify-mobile\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">Alexander, M. (2022). Your medical records, stolen. Available at ReadersDigest.com.<br>Allstate Identity Protection (2022). <em>Why is the Healthcare Industry the Biggest Victim of Identity Theft and Data Breaches? <\/em>Available at<br><a href=\"https:\/\/www.allstateidentityprotection.com\/business\/content-hub\/why%20healthcareindustry-biggest-victim-of-identity-theft-and-data-breaches\">https:\/\/www.allstateidentityprotection.com\/business\/content-hub\/why healthcareindustry-biggest-victim-of-identity-theft-and-data-breaches<\/a><br>Biegelman, M. T. (2012). Medical identity theft. In S. K. Johnson (Ed.), <em>Identity Theft Handbook <\/em>(pp. 97\u2013112). John Wiley&amp; Sons, Inc.<br><a href=\"http:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/9781119203162.ch8\/summary\">http:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/9781119203162.ch8\/summary<\/a><br>Chen, L., &amp; Wang, Y. (2022). \u201cLanguage Barriers and Patient Identification Errors.\u201d<em>Health<br>Communication Research, 10<\/em>(4), 210-225.<br>British Columbia Crime Prevention Association. (2017). <em>Identity Theft Victim\u2019s Toolkit.<\/em>https:\/\/bnra.assistidentite.com\/assets\/docs\/en\/IDAssist-Toolkit.pdf<br>Dixon, P., &amp; Emerson, J. (2017). <em>The Geography of Medical Identity Theft. <\/em>World Privacy<br>Forum. Available at <a href=\"https:\/\/www.ftc.gov\/system\/files\/documents\/public_comments\/2018\/01\/00037-%20142815.pdf\">https:\/\/www.ftc.gov\/system\/files\/documents\/public_comments\/2018\/01\/00037- 142815.pdf<\/a><br>Garcia, R. (2023). Provider Negligence and MIT Vulnerabilities.<em>Healthcare Ethics Review,<br>20<\/em>(3), 112-128.<br>Gupta, S., &amp; Sharma, R. (2023). Automated Registration Processes and MIT Risk Reduction.<br><em>Health Information Management Journal, 17<\/em>(3), 150-165.<br>Hedstrom, K., Karlsson, F., &amp; Kolkowska, E. (2013). Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale.<br><em>Information Management &amp; Computer Security<\/em>, <em>21<\/em>(4), 266-287.doi:10.1108\/imcs-08-2012-0043<br>Jones, A. (2023). \u201cFamily Dynamics and Unauthorized Access in Healthcare.\u201d<em>Journal of<br>Medical Privacy, 15<\/em>(2), 78-92.<br>Kassem, R. &amp; Higson, A. (2012). The New Fraud Triangle Model. <em>Journal of Emerging Trends in Economics and Management Sciences (JETEMS), 3<\/em>(3), 191-195.<br>Kim, S., &amp; Lee, H. (2022). Unauthorized Access to Electronic Medical Records and MIT.<br><em>Health Data Security Journal, 18<\/em>(1), 45-60.<br>Miller, J., &amp; Evans, K. (2023). \u201cImplementing Biometric Solutions for MIT<br>Prevention.\u201d <em>Journal of Healthcare Security, 16<\/em>(1), 30-45.<br>National Health Agency. (2018). <em>Anti-Fraud Guidelines. <\/em>Ayushman Bharat \u2013Pradhan Mantri Jan ArogyaYojana (PMJAY).<br>Nguyen, T. (2022). Role of Compliance Regulations in MIT Mitigation. <em>Journal of Healthcare Compliance, 9<\/em>(2), 78-92.<br>Ponemon Institute. (2013). <em>Survey on Medical Identity Theft. <\/em>Available at<br>https:\/\/www.ponemon.org\/local\/upload\/file\/2013%20Medical%20Identity%20Theft%2<br>0Report%20FINAL%2011.pdf<br>Robinson, E. (2022). Staff Training and Awareness Programs for MIT Prevention. <em>Journal of  Healthcare Training, 14<\/em>(4), 200-215.<br>Smith, R. G. &amp; Jorna, P. (2018). <em>Counting the costs of identity crime and misuse in Australia,<br>2015\u201316<\/em>. Statistical Bulletin no. 15. Canberra: Australian Institute of Criminology. Available at <a href=\"https:\/\/aic.gov.au\/publications\/sb\/sb15\">https:\/\/aic.gov.au\/publications\/sb\/sb15<\/a><br>Stephens, R. (2020). <em>5 Tips for preventing medical identity theft in healthcare. <\/em>Available at <a href=\"https:\/\/www.rightpatient.com\/blog\/five-tips-preventing-medical-identity-theft\/\">https:\/\/www.rightpatient.com\/blog\/five-tips-preventing-medical-identity-theft\/<\/a><br>US Department of Health and Human Services. (2022).<em>Medical Identity Theft. <\/em>Available at (https:\/\/oig.hhs.gov\/fraud\/medical-id-theft\/index.asp)<br>World Privacy Forum. (2022).<em>Medical Identity Theft. <\/em>Available at https:\/\/www. worldprivacyforum.org\/category\/med-id-theft\/<\/p><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"145\" height=\"50\" src=\"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2025\/01\/image.png\" alt=\"\" class=\"wp-image-2538\" style=\"width:119px;height:auto\"\/><\/figure>\n\n\n\n<div id=\"section-g-6264hl4\" class=\"wp-block-gutentor-e1 section-g-6264hl4 gutentor-element gutentor-element-advanced-text text-align-justify-desktop\"><div class=\"gutentor-text-wrap\"><p class=\"gutentor-text\">Copyright for all articles published in&nbsp;<strong>ATRAS&nbsp;<\/strong>belongs to the author. The authors also grant permission to the publisher to publish, reproduce, distribute, and transmit the articles.&nbsp;<strong>ATRAS&nbsp;<\/strong>publishes accepted papers under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) License. Authors submitting papers for publication in&nbsp;<strong>ATRAS&nbsp;<\/strong>agree to apply the CC BY-NC 4.0 license to their work. For non-commercial purposes, anyone may copy, redistribute material, remix, transform, and construct material in any media or format, provided that the terms of the license are observed and the original source is properly cited.<\/p><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Healthcare Security, Internal Vulnerabilities, Medical Identity Theft, Mitigation Strategies, Patient Data Protection<\/p>\n","protected":false},"author":2,"featured_media":1282,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[28,27,26,29],"class_list":["post-1207","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vol-05-n01-2024","tag-healthcare-security","tag-internal-vulnerabilities","tag-medical-identity-theft","tag-mitigation-strategies"],"gutentor_comment":0,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Article 07 Issue 01 VOL 5 January 2024 - ATRAS journal<\/title>\n<meta name=\"description\" content=\"Healthcare Security, Internal Vulnerabilities, Medical Identity Theft,Mitigation Strategies, Patient Data Protection\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/atras-univ-saida.dz\/en\/?p=1207\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Factors Facilitating the Perpetration of Medical Identity Theft: A Case of Ahmadu Bello University Teaching Hospital\" \/>\n<meta property=\"og:description\" content=\"Healthcare Security, Internal Vulnerabilities, Medical Identity Theft, Mitigation Strategies, Patient Data Protection\" \/>\n<meta property=\"og:url\" content=\"https:\/\/atras-univ-saida.dz\/en\/?p=1207\" \/>\n<meta property=\"og:site_name\" content=\"ATRAS journal\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/p\/ATRAS-journal-100083161450894\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-15T21:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-01T10:11:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/plume-article-02-300x300-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"atras\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Factors Facilitating the Perpetration of Medical Identity Theft: A Case of Ahmadu Bello University Teaching Hospital\" \/>\n<meta name=\"twitter:description\" content=\"Healthcare Security, Internal Vulnerabilities, Medical Identity Theft, Mitigation Strategies, Patient Data Protection\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/plume-article-02-300x300-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"atras\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/?p=1207#article\",\"isPartOf\":{\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/?p=1207\"},\"author\":{\"name\":\"atras\",\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/#\/schema\/person\/ad5e6fcff0b37638480b00e92868cd64\"},\"headline\":\"Article 07 Issue 01 VOL 5 January 2024\",\"datePublished\":\"2024-01-15T21:00:00+00:00\",\"dateModified\":\"2025-02-01T10:11:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/?p=1207\"},\"wordCount\":776,\"publisher\":{\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/?p=1207#primaryimage\"},\"thumbnailUrl\":\"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/plume-article-02-300x300-1.png\",\"keywords\":[\"Healthcare Security\",\"Internal Vulnerabilities\",\"Medical Identity Theft\",\"Mitigation Strategies\"],\"articleSection\":[\"Vol 05 N01 2024\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/?p=1207\",\"url\":\"https:\/\/atras-univ-saida.dz\/en\/?p=1207\",\"name\":\"Article 07 Issue 01 VOL 5 January 2024 - ATRAS journal\",\"isPartOf\":{\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/?p=1207#primaryimage\"},\"image\":{\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/?p=1207#primaryimage\"},\"thumbnailUrl\":\"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/plume-article-02-300x300-1.png\",\"datePublished\":\"2024-01-15T21:00:00+00:00\",\"dateModified\":\"2025-02-01T10:11:31+00:00\",\"description\":\"Healthcare Security, Internal Vulnerabilities, Medical Identity Theft,Mitigation Strategies, Patient Data Protection\",\"breadcrumb\":{\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/?p=1207#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/atras-univ-saida.dz\/en\/?p=1207\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/?p=1207#primaryimage\",\"url\":\"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/plume-article-02-300x300-1.png\",\"contentUrl\":\"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/plume-article-02-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"created by mebarki merouane ATRAS journal\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/?p=1207#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/atras-univ-saida.dz\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Article 07 Issue 01 VOL 5 January 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/#website\",\"url\":\"https:\/\/atras-univ-saida.dz\/en\/\",\"name\":\"ATRAS journal\",\"description\":\"ATRAS is a double-blind, peer-reviewed, and multidisciplinary journal issued by the Faculty of Letters, Languages, and Arts, Saida University\",\"publisher\":{\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/#organization\"},\"alternateName\":\"ATRAS journal\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/atras-univ-saida.dz\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/#organization\",\"name\":\"ATRAS journal\",\"alternateName\":\"ATRAS is a double-blind, peer-reviewed, and multidisciplinary journal issued by the Faculty of Letters, Languages, and Arts, Saida University\",\"url\":\"https:\/\/atras-univ-saida.dz\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/05\/logo-512x512-1.png\",\"contentUrl\":\"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/05\/logo-512x512-1.png\",\"width\":512,\"height\":512,\"caption\":\"ATRAS journal\"},\"image\":{\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/p\/ATRAS-journal-100083161450894\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/atras-univ-saida.dz\/en\/#\/schema\/person\/ad5e6fcff0b37638480b00e92868cd64\",\"name\":\"atras\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/607d3e9ced6ad1403645c0d9854f1d33abaeefbd7fecc154ab8216f3dd005418?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/607d3e9ced6ad1403645c0d9854f1d33abaeefbd7fecc154ab8216f3dd005418?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/607d3e9ced6ad1403645c0d9854f1d33abaeefbd7fecc154ab8216f3dd005418?s=96&d=mm&r=g\",\"caption\":\"atras\"},\"url\":\"https:\/\/atras-univ-saida.dz\/en\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Article 07 Issue 01 VOL 5 January 2024 - ATRAS journal","description":"Healthcare Security, Internal Vulnerabilities, Medical Identity Theft,Mitigation Strategies, Patient Data Protection","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/atras-univ-saida.dz\/en\/?p=1207","og_locale":"en_US","og_type":"article","og_title":"Factors Facilitating the Perpetration of Medical Identity Theft: A Case of Ahmadu Bello University Teaching Hospital","og_description":"Healthcare Security, Internal Vulnerabilities, Medical Identity Theft, Mitigation Strategies, Patient Data Protection","og_url":"https:\/\/atras-univ-saida.dz\/en\/?p=1207","og_site_name":"ATRAS journal","article_publisher":"https:\/\/www.facebook.com\/p\/ATRAS-journal-100083161450894\/","article_published_time":"2024-01-15T21:00:00+00:00","article_modified_time":"2025-02-01T10:11:31+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/plume-article-02-300x300-1.png","type":"image\/png"}],"author":"atras","twitter_card":"summary_large_image","twitter_title":"Factors Facilitating the Perpetration of Medical Identity Theft: A Case of Ahmadu Bello University Teaching Hospital","twitter_description":"Healthcare Security, Internal Vulnerabilities, Medical Identity Theft, Mitigation Strategies, Patient Data Protection","twitter_image":"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/plume-article-02-300x300-1.png","twitter_misc":{"Written by":"atras","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/atras-univ-saida.dz\/en\/?p=1207#article","isPartOf":{"@id":"https:\/\/atras-univ-saida.dz\/en\/?p=1207"},"author":{"name":"atras","@id":"https:\/\/atras-univ-saida.dz\/en\/#\/schema\/person\/ad5e6fcff0b37638480b00e92868cd64"},"headline":"Article 07 Issue 01 VOL 5 January 2024","datePublished":"2024-01-15T21:00:00+00:00","dateModified":"2025-02-01T10:11:31+00:00","mainEntityOfPage":{"@id":"https:\/\/atras-univ-saida.dz\/en\/?p=1207"},"wordCount":776,"publisher":{"@id":"https:\/\/atras-univ-saida.dz\/en\/#organization"},"image":{"@id":"https:\/\/atras-univ-saida.dz\/en\/?p=1207#primaryimage"},"thumbnailUrl":"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/plume-article-02-300x300-1.png","keywords":["Healthcare Security","Internal Vulnerabilities","Medical Identity Theft","Mitigation Strategies"],"articleSection":["Vol 05 N01 2024"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/atras-univ-saida.dz\/en\/?p=1207","url":"https:\/\/atras-univ-saida.dz\/en\/?p=1207","name":"Article 07 Issue 01 VOL 5 January 2024 - ATRAS journal","isPartOf":{"@id":"https:\/\/atras-univ-saida.dz\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/atras-univ-saida.dz\/en\/?p=1207#primaryimage"},"image":{"@id":"https:\/\/atras-univ-saida.dz\/en\/?p=1207#primaryimage"},"thumbnailUrl":"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/plume-article-02-300x300-1.png","datePublished":"2024-01-15T21:00:00+00:00","dateModified":"2025-02-01T10:11:31+00:00","description":"Healthcare Security, Internal Vulnerabilities, Medical Identity Theft,Mitigation Strategies, Patient Data Protection","breadcrumb":{"@id":"https:\/\/atras-univ-saida.dz\/en\/?p=1207#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/atras-univ-saida.dz\/en\/?p=1207"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/atras-univ-saida.dz\/en\/?p=1207#primaryimage","url":"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/plume-article-02-300x300-1.png","contentUrl":"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/06\/plume-article-02-300x300-1.png","width":300,"height":300,"caption":"created by mebarki merouane ATRAS journal"},{"@type":"BreadcrumbList","@id":"https:\/\/atras-univ-saida.dz\/en\/?p=1207#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/atras-univ-saida.dz\/en\/"},{"@type":"ListItem","position":2,"name":"Article 07 Issue 01 VOL 5 January 2024"}]},{"@type":"WebSite","@id":"https:\/\/atras-univ-saida.dz\/en\/#website","url":"https:\/\/atras-univ-saida.dz\/en\/","name":"ATRAS journal","description":"ATRAS is a double-blind, peer-reviewed, and multidisciplinary journal issued by the Faculty of Letters, Languages, and Arts, Saida University","publisher":{"@id":"https:\/\/atras-univ-saida.dz\/en\/#organization"},"alternateName":"ATRAS journal","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/atras-univ-saida.dz\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/atras-univ-saida.dz\/en\/#organization","name":"ATRAS journal","alternateName":"ATRAS is a double-blind, peer-reviewed, and multidisciplinary journal issued by the Faculty of Letters, Languages, and Arts, Saida University","url":"https:\/\/atras-univ-saida.dz\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/atras-univ-saida.dz\/en\/#\/schema\/logo\/image\/","url":"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/05\/logo-512x512-1.png","contentUrl":"https:\/\/atras-univ-saida.dz\/en\/wp-content\/uploads\/2024\/05\/logo-512x512-1.png","width":512,"height":512,"caption":"ATRAS journal"},"image":{"@id":"https:\/\/atras-univ-saida.dz\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/p\/ATRAS-journal-100083161450894\/"]},{"@type":"Person","@id":"https:\/\/atras-univ-saida.dz\/en\/#\/schema\/person\/ad5e6fcff0b37638480b00e92868cd64","name":"atras","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/607d3e9ced6ad1403645c0d9854f1d33abaeefbd7fecc154ab8216f3dd005418?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/607d3e9ced6ad1403645c0d9854f1d33abaeefbd7fecc154ab8216f3dd005418?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/607d3e9ced6ad1403645c0d9854f1d33abaeefbd7fecc154ab8216f3dd005418?s=96&d=mm&r=g","caption":"atras"},"url":"https:\/\/atras-univ-saida.dz\/en\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/atras-univ-saida.dz\/en\/index.php?rest_route=\/wp\/v2\/posts\/1207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/atras-univ-saida.dz\/en\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/atras-univ-saida.dz\/en\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/atras-univ-saida.dz\/en\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/atras-univ-saida.dz\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1207"}],"version-history":[{"count":6,"href":"https:\/\/atras-univ-saida.dz\/en\/index.php?rest_route=\/wp\/v2\/posts\/1207\/revisions"}],"predecessor-version":[{"id":2637,"href":"https:\/\/atras-univ-saida.dz\/en\/index.php?rest_route=\/wp\/v2\/posts\/1207\/revisions\/2637"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/atras-univ-saida.dz\/en\/index.php?rest_route=\/wp\/v2\/media\/1282"}],"wp:attachment":[{"href":"https:\/\/atras-univ-saida.dz\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/atras-univ-saida.dz\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/atras-univ-saida.dz\/en\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}