Treffer: Exploring information security compliant behaviors in healthcare Knowledge Process Outsourcing (KPOs).

Title:
Exploring information security compliant behaviors in healthcare Knowledge Process Outsourcing (KPOs).
Authors:
Mahipala C; Insight Information Security L.L.C, Floor 03, Grand Mall, Muscat, Oman. charitha.rakkitha@outlook.com., Perera P; School of Engineering and Technology, Central Queensland University, Brisbane, 4000, Australia.; Sellinger School of Business Management, Loyola University Maryland, 4501 N, Charles St, Baltimore, MD, 21210, USA.
Source:
BMC medical informatics and decision making [BMC Med Inform Decis Mak] 2025 Oct 24; Vol. 25 (1), pp. 394. Date of Electronic Publication: 2025 Oct 24.
Publication Type:
Journal Article
Language:
English
Journal Info:
Publisher: BioMed Central Country of Publication: England NLM ID: 101088682 Publication Model: Electronic Cited Medium: Internet ISSN: 1472-6947 (Electronic) Linking ISSN: 14726947 NLM ISO Abbreviation: BMC Med Inform Decis Mak Subsets: MEDLINE
Imprint Name(s):
Original Publication: London : BioMed Central, [2001-
References:
Infect Dis Ther. 2019 Dec;8(4):613-626. (PMID: 31667696)
Health Manag Technol. 2001 Jan;22(1):14-8. (PMID: 11213608)
Int J Med Inform. 2004 Mar 31;73(3):251-7. (PMID: 15066555)
Pediatr Infect Dis J. 2011 Jul;30(7):625-7. (PMID: 21206398)
Health Aff (Millwood). 2017 Aug 1;36(8):1416-1422. (PMID: 28784734)
Radiol Med. 2024 Nov;129(11):1656-1666. (PMID: 39243293)
Contributed Indexing:
Keywords: Health informatics; Healthcare KPO; Information security; Patient data privacy; Security compliant behaviors
Entry Date(s):
Date Created: 20251024 Date Completed: 20251025 Latest Revision: 20251027
Update Code:
20251027
PubMed Central ID:
PMC12553237
DOI:
10.1186/s12911-025-03007-6
PMID:
41136972
Database:
MEDLINE

Weitere Informationen

Background: The healthcare industry increasingly relies on Knowledge Process Outsourcing (KPO) to manage vast amounts of sensitive patient data. Ensuring information security compliance is critical to protecting patient privacy and maintaining data integrity. This study aims to explore the current state of information security compliance in healthcare KPOs and the factors influencing it.
Methods: A quantitative approach was employed to analyze existing security policies in healthcare KPOs. Key aspects investigated include employee training, technological measures, regulatory adherence, and organizational culture. Statistical analyses were used to evaluate the relationships between these factors and their impact on compliance.
Results: The study revealed significant gaps in security practices and compliance levels among healthcare KPOs. Employee training and organizational culture were identified as pivotal in mitigating security risks, while technology and regulatory adherence played supporting roles. The findings also highlighted best practices to enhance security compliance.
Practical Contribution: This study provides actionable insights for healthcare KPOs, IT security leaders, and policymakers. The results emphasize that investing in security awareness training, promoting HIS adoption, and integrating AI-driven security frameworks will be more effective than merely imposing regulations. Organizations should focus on continuous employee education, AI-powered anomaly detection, and blockchain-enhanced EHR systems to strengthen security compliance. The study's findings serve as a roadmap for designing security policies that align with real-world operational challenges in the healthcare outsourcing sector.
Conclusions: This research provides actionable insights for KPO leaders, healthcare providers, and policymakers to strengthen information security compliance in healthcare KPOs. By addressing critical vulnerabilities and fostering a culture of security, the study contributes to safeguarding sensitive patient data amid evolving threats and regulations.
Trial Registration: Not applicable.
(© 2025. The Author(s).)

Declarations. Ethics approval and consent to participate: The authors confirm that all experiments were performed in accordance with relevant guidelines and regulations. The need for ethics approval and informed consent is deemed unnecessary according to national regulations: Sri Lanka National Policy on Health Information Sect. 4/ 2017, Sect. 4.1/ 2017 (Data/Information Security, Client Privacy, Confidentiality and Ethics) and Sect. 4.2/ 2017 (Data and information security for client data protection). Nevertheless, the study prioritized the issue of consent. all participants provided informed consent prior to their participation in the survey. The consent form explained the purpose of the survey, procedures involved, potential risks and benefits, confidentiality measures, and the right to withdraw from the survey at any time. Participants were also informed that their data would be kept confidential and used only for research purposes. Consent for publication: Not applicable. Competing interests: The authors declare no competing interests.