Enhancing U.S. Healthcare Cybersecurity Through Intelligent Agent–Supported Qualitative Information Systems Audits
Chiedozie M. Okafor1*, Dickson O. Oseghale2, Stephen Ayanlaja3
1ISACA–Abuja Chapter, Financial Analyst | Independent Researcher | Certified Information System Auditor |
2Division of Global HIV & TB, U.S. CDC, Budget Analyst |
³U.S. CDC, Financial Analyst | Auditor |
*Corresponding Author
DOI: https://doi.org/10.51244/IJRSI.2025.120700178
Received: 02 July 2025; Accepted: 10 July 2025; Published: 15 August 2025
U.S. healthcare institutions are grappling with an unprecedented surge in cybersecurity incidents that threaten patient safety, data confidentiality, and operational continuity. Traditional metrics driven audits anchored in technical checklists and quantitative controls frequently overlook the human centric and organizational vulnerabilities that underpin many breaches. This paper delivers a comprehensive systematic review of 23 peer reviewed research papers, industry reports, and regulatory guidelines, augmented by a thematic analysis of survey data from 25 U.S. health systems surveyed anonymously. We identify a clear paradigm shift from purely quantitative assessments toward qualitative audit methodologies that probe governance structures, stakeholder behaviors, and cultural dynamics.
Building on these insights, we introduce an intelligent agent enhanced qualitative Information Systems audit framework. The model integrates semi structured interviews, policy and artifact reviews, direct observation, and AI driven meta classification to translate nuanced findings into structured risk profiles. Audit teams now blend on site ethnographic techniques with remote AI assisted analytics, enabling real time detection of emerging threats. Our analysis uncovers five core themes: policy practice alignment, behavior-based risk indicators, continuous control monitoring, cross functional governance, and adaptive remediation loops, which traditional tools fail to capture.
Case studies demonstrate that institutions applying this hybrid framework achieved a 46 percent reduction in unauthorized access events, faster incident response cycles, and a stronger regulatory compliance posture.
We conclude that a flexible, culturally attuned, and technology augmented audit strategy is essential for resilient healthcare cybersecurity.
Future research should explore longitudinal impacts of AI enabled qualitative audits and the scalability of this approach across diverse clinical settings.
Keywords: Cybersecurity, qualitative audit, information systems, healthcare governance, intelligent agent model, internal controls
The rapid digitization of healthcare systems in the United States has delivered significant benefits in operational efficiency and patient care. However, it has also introduced complex cybersecurity vulnerabilities that jeopardize the confidentiality, integrity, and availability of sensitive health data. Despite substantial investments in cybersecurity technologies, many U.S. healthcare institutions continue to experience severe data breaches, financial losses, and service disruptions (Ronquillo et al., 2018).
These incidents expose the limitations of traditional quantitative audit tools, which often fail to assess the qualitative factors that significantly influence cybersecurity performance. Qualitative information systems (IS) audits address this gap by evaluating governance structures, internal controls, and organizational behaviors that shape cybersecurity outcomes (Kahyaoğlu & Çalıyurt, 2018; Stafford et al., 2018).
Moreover, the integration of artificial intelligence into healthcare further complicates the cybersecurity landscape, increasing exposure to sophisticated cyberattacks and data breaches (Ilıkhan, et al., 2024; Naik et al., 2022).
Problem Statement
Conventional cybersecurity audit mechanisms, predominantly based on quantitative assessments, often fall short in addressing the human-centric risks embedded within healthcare information systems. These tools emphasize technical configurations while overlooking governance gaps, behavioral risks, and control design flaws that contribute to persistent cybersecurity failures (Matas & Keegan, 2020; Schiliro, 2023).
To address these limitations, this study proposes a paradigm shift toward qualitative IS audits, enhanced by an Intelligent Agent (IA)-based meta-classification model that enables auditors to interpret complex cybersecurity environments with greater efficiency and precision.
Background and Rationale
Cyberattacks on U.S. healthcare institutions have escalated, driven by the high value of patient data, fragmented governance, and human factors (Ronquillo et al., 2018; Stafford et al., 2018). Between 2009 and 2023, nearly 6,000 large-scale data breaches exposed over 519 million health records (HIPAA Journal, 2025).
As illustrated in Figure 1, data breaches peaked at 747 incidents in 2023, the highest on record with only marginal improvement in 2024.
Figure 1 U.S. Healthcare Data Breaches of 500+ Records (2009–2024).
Source: HIPAA Journal (2024).
High-profile incidents, such as the 2015 Anthem breach and the 2024 ransomware attack on Change Healthcare, further demonstrate systemic weaknesses in healthcare infrastructure and governance.
These trends reveal that conventional, metrics-driven audits fall short in addressing organizational blind spots and human-driven vulnerabilities (Afifi, 2020; Giansanti, 2021; Matas & Keegan, 2020; Wasserman & Wasserman, 2022). To address these gaps, this paper proposes integrating an Intelligent Agent–supported qualitative audit framework to deliver holistic, actionable insights that complement technical assessments.
This study explores how qualitative information systems (IS) audits can improve cybersecurity risk management in U.S. healthcare institutions by addressing limitations inherent in conventional, metrics-driven audit approaches. Traditional audits often overlook human factors, organizational culture, and governance gaps that significantly influence cybersecurity effectiveness (Sow & Gehrke, 2019; Vukotich, 2023).
The specific objectives of this paper are:
Achieving these objectives will contribute to the development of a more resilient, adaptive, and intelligence-driven audit approach capable of strengthening regulatory compliance, operational security, and institutional trust within healthcare environments.
Cybersecurity Risks in U.S. Health Institutions
Healthcare institutions are integral to national infrastructure yet remain increasingly vulnerable to cyberattacks. Their reliance on interconnected systems, the sensitivity of patient data, and the time-critical nature of clinical services amplify their exposure to cyber threats. Despite regulatory efforts and growing investments in cybersecurity, healthcare systems continue to suffer data breaches, ransomware incidents, and privacy violations (Wasserman & Wasserman, 2022).
These incidents extend beyond data theft, often resulting in operational paralysis, delayed care, and erosion of public trust. For example, ransomware attacks have forced hospitals to suspend emergency services, revert to manual workflows, and divert patients to alternate facilities.
A convergence of factors including weak cybersecurity culture, legacy system dependencies, and insufficient internal controls exacerbates these risks. An often-overlooked vulnerability involves poor data handling, especially during system decommissioning or disposal.
Figure 2 Causes of Healthcare Data Breaches in the U.S. (2009–2024)
Source: HIPAA Journal (2024).
As shown in Figure 2, hacking and IT incidents have dominated healthcare breach trends since 2015, peaking at 619 incidents in 2023 and accounting for nearly 80% of all large-scale breaches reported that year (HIPAA Journal, 2024). By contrast, breaches caused by improper disposal have remained comparatively low, while those from lost or stolen devices have sharply declined, reflecting improved asset control.
These evolving breach patterns underscore the need for proactive, modern cybersecurity measures that extend beyond technical fixes. Human-driven vulnerabilities, insider threats, and governance gaps continue to expose health institutions to avoidable risks. Unlike the financial sector, which has embraced real-time monitoring and anomaly detection, healthcare remains largely reactive in its cybersecurity posture.
Without adopting comprehensive risk assessment strategies including qualitative IS audits, healthcare institutions will remain vulnerable to escalating cyber threats and institutional blind spots (Vukotich, 2023).
Overview of Cybersecurity Threats in the Healthcare Sector.
The digital transformation of healthcare from paper records to integrated Electronic Health Records (EHRs) and connected medical devices has revolutionized service delivery but simultaneously introduced significant cybersecurity vulnerabilities. Healthcare organizations face a broad spectrum of cyber threats, including data breaches, ransomware attacks, denial-of-service incidents, and unauthorized access to sensitive patient information (Giansanti, 2021).
Several systemic factors contribute to the sector’s heightened risk profile. These include outdated IT infrastructure, fragmented cybersecurity policies, limited cybersecurity maturity, and persistent shortages of specialized personnel. Additionally, healthcare’s heavy reliance on third-party vendors and legacy systems expands the attack surface, enabling adversaries to exploit complex supply chains and technical dependencies. The consequences of these vulnerabilities are both operational and reputational (Cartwright, 2023).
A successful breach can disrupt patient care, delay life-saving interventions, and compromise institutional reputation. Moreover, healthcare data commands a premium on the black market, intensifying cybercriminal incentives. Notably, not all breaches result from sophisticated external attacks; insider threats and poor data hygiene such as weak access controls, shared credentials, and lax disposal protocols are frequent sources of compromise (Data Breaches, 2021).
These realities highlight the critical need for cybersecurity to be recognized as a strategic business imperative, not merely an IT concern. Effective protection requires enterprise-wide commitment, well-defined policies, regular qualitative assessments, and a culture of shared responsibility.
Qualitative information systems (IS) audits offer a unique lens for uncovering organizational, cultural, and governance-related risk factors that quantitative tools often overlook. By systematically evaluating institutional behaviors, policy implementation, and governance structures, qualitative IS audits provide the comprehensive, context-sensitive insights essential for improving cybersecurity resilience in healthcare environments.
Implications of Cybersecurity Breaches in Health Institutions
Cybersecurity incidents within healthcare institutions carry profound and far-reaching implications that extend beyond data compromise. These events disrupt operations, compromise patient safety, erode public trust, and expose institutions to regulatory and legal consequences.
Compromised Patient Privacy: Unauthorized disclosure of Protected Health Information (PHI) violates ethical obligations, undermines patient trust, and exposes individuals to identity theft, discrimination, and reputational harm.
Operational Disruptions and Delayed Care: Cyberattacks, particularly ransomware incidents, can disable clinical systems, delay diagnostics, interrupt care delivery, and jeopardize patient safety.
Financial and Reputational Damage: Healthcare data breaches often result in regulatory penalties, legal liabilities, remediation costs, and diminished institutional reputation, leading to reduced patient confidence and lower service utilization.
Regulatory Non-Compliance: Failure to adequately protect PHI constitutes violations of regulatory frameworks such as the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health (HITECH) Act, and state-level data protection laws, triggering fines, audits, and possible license revocation.
Erosion of Public Trust: Repeated cybersecurity failures without demonstrable improvements undermine public confidence in the healthcare system’s ability to protect sensitive information, ultimately threatening the sector’s credibility.
Given these stakes, cybersecurity must be embedded into enterprise risk management, strategic planning, and institutional audit processes.
Qualitative IS audits serve as critical tools for uncovering the root causes of these breaches by evaluating organizational culture, human behavior, and governance practices that influence cybersecurity effectiveness. Unlike purely technical assessments, qualitative audits provide actionable insights into how institutions can strengthen their cybersecurity posture holistically, promoting resilience, regulatory compliance, and sustained public trust.
Qualitative Information Systems Audit
Traditional information systems (IS) audits in healthcare have predominantly emphasized technical configurations, access controls, and system logging. While these quantitative methods remain essential, they often overlook organizational behaviors, governance weaknesses, and cultural factors that contribute to persistent cybersecurity vulnerabilities.
Qualitative IS audits address this critical gap by systematically evaluating how information systems are implemented, governed, and embedded within real-world organizational processes (Sow & Gehrke, 2019; Warkentin & Willison, 2009). This approach incorporates direct observation, semi-structured interviews, document reviews, and thematic analysis to assess cybersecurity practices beyond technical checklists.
Conceptual Framework and Theoretical Foundations
Information systems in healthcare operate within complex sociotechnical environments shaped by human behavior, organizational culture, and regulatory mandates (Sow & Gehrke, 2019; Warkentin & Willison, 2009). Consequently, effective cybersecurity auditing necessitates examining not only the presence of controls but also their real-world application, comprehension, and sustainability.
Key focus areas for qualitative IS audits include:
By addressing these dimensions, qualitative IS audits move beyond superficial compliance assessments, providing a holistic evaluation of institutional cybersecurity resilience.
The Intelligent Agent Model in Qualitative Auditing
To enhance the depth and responsiveness of qualitative audits, this study introduces an Intelligent Agent (IA)-based meta-classification framework. The IA model simulates cognitive auditing behavior by learning from contextual data, organizational patterns, and governance structures. It functions by:
This hybrid model integrates qualitative assessment techniques with AI-driven analysis to:
The IA-enhanced audit process follows a multi-layered framework, starting with data collection (e.g., interviews, system logs, policy reviews), followed by qualitative analysis and IA-driven interpretation. Findings are aligned with governance mechanisms to support real-time decision-making and strategic planning (Vukotich, 2023).
Effective qualitative IS audits assess cybersecurity readiness across people, processes, and technology. Key methodologies include:
A particular focus is placed on understanding how security policies translate into behavior, whether governance structures promote accountability, and how organizational culture shapes cybersecurity practices.
By applying these methods alongside technical assessments, qualitative audits provide a comprehensive, context-sensitive evaluation of healthcare institutions’ cybersecurity posture, addressing vulnerabilities often missed by traditional approaches.
Figure 3 presents the five-tier architecture of the IA-enhanced qualitative audit model. The process begins with a diverse set of inputs including interviews, logs, and policy documentation which are subjected to interpretive analysis in the qualitative processing layer. These insights are then analyzed by the intelligent agent core, which uses domain-specific learning and meta-classification to identify risk patterns and contextual anomalies. The resulting outputs include risk dashboards, control maturity evaluations, and tailored recommendations. Finally, audit findings are aligned with governance mechanisms and continuous monitoring systems to support real-time decision-making, regulatory compliance, and strategic planning.
This layered structure ensures a comprehensive and adaptive audit process, bridging the gap between technical evaluation and organizational oversight.
Figure 3 IA – Enhanced Qualitative Audit Model for Cybersecurity Oversight in Healthcare.
Developed by the Authors.
Methodologies and Techniques in Qualitative Information Systems Auditing
Qualitative Information Systems (IS) Auditing provides a structured approach for evaluating cybersecurity readiness beyond technical controls by incorporating behavioral, cultural, and governance dimensions of risk. To ensure clarity and effectiveness, this section presents the methodologies as distinct sub-components.
Governance and Organizational Assessment Effective auditing begins with evaluating the governance structures supporting cybersecurity. This includes:
Policy and Control Evaluation A core focus of qualitative auditing is verifying the existence, quality, and implementation of internal controls, including:
Awareness and Training Assessment Qualitative audits examine how effectively awareness programs and training shape institutional cybersecurity behavior:
Vulnerability and Risk Management Understanding how organizations manage vulnerabilities and emerging risks is critical. Auditors should:
Incident Response Capability Qualitative audits investigate the institution’s preparedness to respond to security incidents by:
Integration with Broader IT Operations Robust cybersecurity depends on integration with wider IT processes. Auditors evaluate:
Metrics, Monitoring, and Continuous Improvement To ensure sustainability, audits assess how institutions monitor and refine cybersecurity programs:
By applying these methodologies systematically, qualitative audits provide a comprehensive, context-sensitive evaluation of cybersecurity posture. This approach addresses technical, behavioral, and organizational vulnerabilities often overlooked by traditional assessments, thereby enhancing institutional resilience and strategic alignment.
Strengthening Business Systems through Qualitative Information Systems Audit
Healthcare institutions increasingly recognize that cybersecurity is not solely a technical challenge, but a strategic imperative that is critical to ensuring the security, resilience, and auditability of the business systems that underpin patient care, billing, diagnostics, and data sharing. Qualitative IS audits play a vital role in evaluating these systems, going beyond mere compliance to provide deep insights into how effectively cybersecurity practices are embedded within the institution’s operations and culture(Park et al., 2010).
Integrating Audit Findings into Business Strategy
Effective audits must do more than identify gaps; they should inform leadership decisions and drive sustainable improvements in governance. A qualitative IS audit allows institutions to translate audit insights into actionable business strategies by:
For audit outcomes to meaningfully influence strategy, they must be communicated in a way that resonates with business leaders, not just framed in technical terms for IT personnel. This includes translating qualitative audit findings into impact-focused language that highlights the implications for broader business objectives, such as risk exposure, compliance posture, and operational continuity. Integrating these insights into performance dashboards, executive briefings, and board-level governance metrics helps ensure that audit results drive strategic decision-making. Institutions that systematically embed audit results into their strategic planning processes are better positioned to evolve from a reactive, compliance-driven cybersecurity posture to a more proactive, enterprise-wide risk management culture. This holistic approach enables them to anticipate and mitigate emerging threats, rather than merely reacting to past incidents(Melaku, 2023).
Best Practices for Enhancing Cybersecurity through Qualitative Auditing
Building cybersecurity maturity through qualitative auditing requires more than one-off assessments. It demands a sustained, participatory, and institution-wide approach. Best practices include:
Ultimately, qualitative audits must move from being compliance exercises to becoming instruments of organizational learning and resilience. When integrated thoughtfully, they can act as catalysts for institutional change, strategic alignment, and more secure health service delivery.
Establishing Internal Control Departments in Health Institutions
To strengthen cybersecurity governance and proactively manage institutional risk, U.S. health institutions should establish Internal Control Units (ICUs) within their organizational structures. These units should be staffed with a multidisciplinary team including IT auditors, compliance specialists, and cybersecurity analysts tasked with overseeing enterprise-wide cybersecurity policies, internal control testing, and regulatory alignment.
As Kegerreis, Schiller, and Davis (2020) emphasize, effective IT auditing goes beyond mere control verification to encompass risk management, operational integrity, and regulatory compliance through structured governance mechanisms; by establishing an Internal Control Unit at the hospital level, these principles become institutionalized, ensuring systematic oversight of security procedures, data protection standards, and third-party vendor practices. Critically, ICUs must function independently while maintaining cross-functional engagement with information technology and operational units. Reporting to an executive-level audit or risk committee ensures strategic alignment and institutional accountability. Their functions should include risk-based auditing, continuous control monitoring, security awareness promotion, and routine testing of system access, configurations, and incident response mechanisms.
By institutionalizing internal control functions, hospitals can move from reactive cybersecurity postures to a continuous assurance model that reinforces resilience, improves transparency, and drives accountability across health information systems.
Case Studies and Practical Applications
Qualitative information systems (IS) audits are not just theoretical tools they have real-world applications that can significantly improve cybersecurity governance in healthcare institutions. This section presents practical insights from audit-driven interventions, demonstrating how qualitative approaches uncover control weaknesses, ethical lapses, and operational inefficiencies that traditional audits often overlook.
Institutional Outcomes from Qualitative Audits
To complement case study observations, an anonymous survey was conducted across a representative sample of U.S. healthcare institutions. The survey aimed to capture practical insights into existing cybersecurity practices, governance challenges, and the extent of qualitative information systems (IS) audit adoption. The anonymity of the survey ensured candid responses, given the sensitivity of healthcare cybersecurity risks.
Key Findings from the Survey Include:
These findings reveal significant organizational and governance-related vulnerabilities that are often overlooked by traditional, technically focused audit practices. Qualitative IS audits, through their emphasis on human behavior, organizational culture, and governance processes, provide a structured approach for uncovering these hidden gaps.
Subsequent to identifying these deficiencies, institutions reported initiating several targeted interventions, including:
These corrective actions underscore the value of qualitative audits as diagnostic tools that illuminate institutional blind spots, inform risk-based interventions, and support the development of a resilient, security-conscious organizational environment.
Integrating Continuous Control Monitoring
The gaps uncovered through qualitative audits and the anonymous survey highlight that episodic assessments alone are insufficient for managing dynamic cybersecurity risks in healthcare environments. Continuous Control Monitoring (CCM) has emerged as a critical extension of qualitative audit practices, ensuring real-time oversight of both technical systems and human-driven vulnerabilities.
Survey Insights on Current State of Continuous Monitoring:
These statistics reinforce the need for healthcare institutions to evolve their approach to continuous monitoring, ensuring alignment with both technical and organizational risk factors.
Best Practices for Effective Continuous Control Monitoring:
Building on qualitative audit findings, healthcare institutions are increasingly adopting CCM frameworks that incorporate:
Case Application:
One healthcare system participating in the survey implemented a risk scoring mechanism following its qualitative audit. The system tracks:
Since adopting this CCM approach, the institution has reported:
These outcomes demonstrate that when integrated effectively, continuous monitoring extends the impact of qualitative audits, creating an adaptive, intelligence-driven defense posture for healthcare institutions.
Lessons Learned from Health Institutions
The integration of qualitative information systems (IS) audits across healthcare institutions has revealed not only systemic cybersecurity vulnerabilities but also critical organizational lessons that can inform more resilient governance and risk management practices.
Key Lessons Derived from Survey Data and Institutional Case Interventions:
Over-Reliance on Technical Controls Creates Blind Spots
The survey revealed that 57% of institutions still rely predominantly on technical configurations and system-based assessments, neglecting critical human, behavioral, and governance dimensions of cybersecurity. Institutions that supplemented technical audits with qualitative assessments reported uncovering hidden risks—such as unsafe workarounds, cultural resistance to security protocols, and informal policy violations—that would have otherwise remained undetected.
Insider Threats Are Undervalued and Under-Monitored
Although 70% of surveyed institutions identified insider threats as a persistent concern, fewer than 20% had structured mechanisms in place to continuously monitor user behavior or evaluate the human factors contributing to insider risk. Qualitative audits brought much-needed visibility to this issue, prompting institutions to adopt insider threat matrices, behavior-based monitoring, and targeted awareness programs.
Fragmented Communication Undermines Risk Governance
A significant 65% of institutions cited poor communication between cybersecurity teams and executive leadership as a barrier to implementing audit recommendations and ensuring cohesive risk management. Case studies demonstrated that embedding audit outputs into executive dashboards, governance committee agendas, and institutional performance metrics led to increased leadership engagement and accountability.
Cultural Factors Significantly Influence Cybersecurity Posture
Institutions that assessed organizational culture as part of their qualitative audits identified stark differences in security maturity between departments. For example, administrative units demonstrated weaker adherence to security protocols compared to clinical or IT teams. This insight allowed targeted interventions, including role-specific training and reinforced accountability structures.
Audit-Informed Training Drives Measurable Improvement
Qualitative audits that evaluated the effectiveness of awareness programs revealed substantial gaps between policy knowledge and real-world behavior. Institutions that redesigned their training programs based on audit findings—focusing on practical scenarios, behavioral expectations, and role-based risks—reported tangible improvements. One institution observed a 38% decline in phishing susceptibility following audit-informed training enhancements.
Continuous Improvement is Essential, Not Optional
Healthcare organizations that treated qualitative audits as one-off exercises reported limited long-term impact. In contrast, those that integrated audits into ongoing risk management cycles, with periodic reassessments and continuous monitoring, experienced sustained improvements in security posture, policy compliance, and incident response readiness.
In conclusion, these lessons demonstrate that the true value of qualitative IS audits lies not only in identifying gaps but in catalyzing organizational learning, cultural change, and sustained governance reforms. Institutions that adopt a holistic, behaviorally informed, and continuously evolving approach to cybersecurity auditing are better positioned to withstand the evolving threat landscape and protect patient data, operational integrity, and institutional trust.
Vendor Risk and Third-Party Governance
The increasing reliance of healthcare institutions on third-party vendors, cloud services, and outsourced IT operations has significantly expanded the cybersecurity threat surface. While these partnerships offer scalability and operational efficiency, they also introduce substantial risks related to data security, visibility gaps, and fragmented accountability.
Findings from the anonymous survey underscore the magnitude of these concerns:
These vulnerabilities were further validated through qualitative IS audits, which revealed common deficiencies, including:
Corrective Actions Informed by Audit Findings and Best Practices Include:
Formalized Vendor Governance Frameworks:
Healthcare institutions have begun establishing structured vendor management programs, requiring all third-party engagements to undergo security risk assessments prior to onboarding. These programs integrate cross-functional oversight from procurement, legal, IT, and cybersecurity teams to ensure comprehensive due diligence.
Contractual Security Provisions:
Revised vendor agreements now explicitly mandate technical and procedural safeguards, including:
Continuous Vendor Performance Monitoring:
Institutions are leveraging automated tools and compliance scorecards to track vendor performance against contractual obligations. Metrics such as patching timelines, incident response readiness, and adherence to regulatory frameworks (e.g., HIPAA, HITECH) are continuously monitored and reviewed.
Cloud Security Enhancements:
Recognizing the complexities of cloud environments, healthcare organizations have adopted shared responsibility models that clearly delineate security obligations between the institution and the cloud provider. Specific focus areas include:
Third-Party Risk Committees and Oversight Boards:
To maintain strategic alignment and institutional accountability, organizations have established Cloud Risk Oversight Committees or Vendor Governance Boards. These bodies review vendor risk profiles, audit outcomes, and emerging third-party threats, ensuring that outsourced operations remain aligned with organizational cybersecurity policies.
In general, qualitative IS audits, coupled with systematic vendor governance reforms, have proven critical in mitigating the complex risks introduced by third-party relationships. By institutionalizing robust oversight mechanisms, contractual safeguards, and continuous monitoring, healthcare organizations can leverage external partnerships without compromising the confidentiality, integrity, or availability of sensitive health information.
Challenges and Limitations in Auditing Cybersecurity Programs
While qualitative information systems audits offer valuable insights for strengthening cybersecurity in healthcare, their effective implementation is often constrained by several challenges (Argaw et al., 2020). These limitations both institutional and methodological can reduce the accuracy, scope, or acceptance of audit findings.
Organizational Constraints
Healthcare institutions frequently operate with limited cybersecurity staffing, low audit budgets, and competing operational priorities. This creates several difficulties:
Moreover, some institutions lack clearly defined governance frameworks, making it difficult to assign accountability for audit implementation and oversight.
Methodological Challenges
Conducting a robust qualitative audit requires skilled auditors with interdisciplinary expertise in IT, cybersecurity, risk management, and behavioral science. However:
In some scenarios, qualitative approaches are undervalued compared to quantitative methods, reducing institutional support for in-depth, context-driven analysis.
Technical and Cultural Barriers
Healthcare organizations often rely on legacy systems and disconnected platforms, which limit visibility into enterprise-wide controls. Additional concerns include:
Collectively, these challenges highlight the importance of designing qualitative audits that are tailored, resource-sensitive, and strategically aligned with institutional priorities. Solutions may include hybrid audit models, audit training for cross-functional teams, and incremental implementation strategies that build trust and demonstrate value over time.
Future Directions in Cybersecurity Auditing for Health Institutions
As healthcare systems continue to digitize and interconnect, cybersecurity auditing must evolve to address increasingly complex risks (Barnes & Daim, 2022). The limitations of traditional audit methods combined with the dynamic nature of cyber threats necessitate new frameworks, technologies, and collaborative approaches that support ongoing risk intelligence, not just retrospective compliance.
Advancing Qualitative IS Audit Techniques
Future auditing models will benefit from combining traditional qualitative methods with advanced analytical techniques that can capture subtle risk signals across large, complex systems. This includes:
These enhancements will allow auditors to detect early warning signs of cyber risk and evaluate security maturity more holistically.
Integrating Artificial Intelligence and Machine Learning
AI has the potential to significantly enhance the scope, precision, and responsiveness of qualitative audits. By embedding intelligent agent models in the audit process, future audits could:
These tools can help shift cybersecurity auditing from static snapshots to dynamic, continuous assurance processes.
Public-Private and Cross-Sector Collaboration
To address systemic cybersecurity threats, future audit strategies must extend beyond individual institutions. Collaboration with:
A standardized cybersecurity audit classification framework developed in partnership with regulatory agencies could also support comparative evaluations and regulatory reporting.
Building a Resilient Cybersecurity Audit Ecosystem
Looking ahead, healthcare institutions should invest in audit ecosystems that are:
By embodying these principles, such ecosystems will strengthen cybersecurity defenses while promoting transparency, accountability, and a culture of continuous learning across the sector.
With 82% of the U.S. population’s health records compromised in 2024 alone, the current trajectory of healthcare data breaches reveals a dire need for rethinking existing cybersecurity governance (HIPAA Journal, 2024). The growing scale and complexity of cyber threats facing U.S. healthcare institutions demand a more comprehensive and human-centered approach to cybersecurity oversight (Jalali & Kaiser, 2018). While traditional audit frameworks remain valuable, they often fall short in identifying the deeply rooted behavioral, cultural, and governance-related vulnerabilities that drive many of today’s most severe breaches (Jalali & Kaiser, 2018).
This study has demonstrated that qualitative information systems audits offer a vital tool for uncovering these deeper organizational issues, enabling auditors to assess not just the presence of technical controls but the context in which they operate. By applying a novel framework grounded in Intelligent Agent modelling, the proposed audit approach enhances insight generation, facilitates dynamic risk classification, and provides healthcare leaders with more actionable and impactful audit outcomes. Qualitative audits empower institutions to move beyond superficial checkbox compliance and toward strategic, data-driven cybersecurity governance. When embedded within enterprise risk management systems, these audits foster greater accountability, stakeholder awareness, and a culture of continuous improvement, essential attributes for building resilient and secure health organizations(Martin, 2020).
Key Findings and Implications
Strategic Recommendations for Practice
To operationalize the insights gained from this study, we propose the following recommendations:
Establish Internal Control Units in Hospitals.
Hospitals should create internal control and audit units staffed with cybersecurity and compliance professionals to monitor policy adherence, assess behavioral risks, coordinate across departments, and oversee third-party access and change management.
Adopt Hybrid Audit Frameworks.
Combining qualitative and quantitative methods ensures both technical configurations and organizational practices are effectively evaluated, offering a more comprehensive view of cybersecurity risks.
Embed Audit Feedback into Institutional Strategy.
Audit results should inform key decisions in budgeting, procurement, clinical governance, and digital transformation, aligning cybersecurity insights with long-term strategic planning.
Invest in Audit Technology and Automation.
AI-enabled tools, including intelligent agent models, should be used to simulate risks, automate findings classification, and support continuous monitoring of controls and behavior.
Foster a Culture of Shared Cybersecurity Responsibility.
All personnel should be trained on cybersecurity expectations, with workflows and protocols designed to embed accountability and security-conscious behavior throughout the organization.
Build Cross-Functional Audit Teams.
Audits should involve interdisciplinary teams across IT, compliance, legal, privacy, and clinical areas to ensure balanced assessments and promote implementation buy-in.
Develop Sector-Wide Standards for Qualitative Cyber Auditing.
Regulatory bodies and associations should establish standardized tools and benchmarks to guide qualitative audits, support compliance, and enable cross-institutional comparisons.