1 Computer Science, The University of Alabama, Tuscaloosa, AL, USA.
2 Management, Law and Social Sciences, University of Bradford, West Yorkshire, UK.
3 Business Analytics and Insight, University of Wisconsin, Madison, WI, USA.
4 Public Health, Saint Louis University, Missouri, USA.
5 School of Public Management and Policy, University of Illinois, Springfield, USA.
World Journal of Advanced Research and Reviews, 2025, 25(01), 1015-1023
Article DOI: 10.30574/wjarr.2025.25.1.0124
Received on 03 December 2024; revised on 11 January 2025; accepted on 13 January 2025
Cyberattacks threaten the safety and security of patient data and system integrity, and these have been a major problem healthcare faces in recent times. Their main target is the Electronic Health Records (EHR) of the industry. These cyberattacks come with serious consequences such as disruption of operations, ransomware infections and data breaches to mention a few [1]. This paper explains how quantum-driven predictive cybersecurity framework can secure EHR systems through the use of quantum computing and machine learning. The application of quantum algorithms such as Quantum Support Vector Machines (QSVM) and Grover’s Search helps in detecting, preventing and predicting cyber threats [2, 3]. The paper also focuses on end-to-end methodology, real-world case scenarios, traditional models, comparative analysis and implementable recommendations.
Quantum Computing; Cybersecurity; Electronic Health Records (EHR); Patient Data Privacy; Machine Learning; Healthcare Systems
Preview Article PDF
Kelvin Ovabor, Opeyemi Oluwagbenga Owolabi, Travis Atkison, Akinyemi Iledare, Chisom Ijeoma Adirika and Chukwuemezie Charles Emejuo. Quantum-driven predictive cybersecurity framework for safeguarding Electronic Health Records (EHR) and enhancing patient data privacy in healthcare systems. World Journal of Advanced Research and Reviews, 2025, 25(01), 1015-1023. Article DOI: https://doi.org/10.30574/wjarr.2025.25.1.0124.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0