- School of Management, Harbin University of Commerce, Harbin, China
Background: Within China's healthcare landscape, the sharing of medical data has emerged as a pivotal force propelling advancements in the insurance sector and enhancing patient engagement with healthcare services. However, medical institutions often exhibit reluctance toward data sharing due to apprehensions regarding data security and privacy safeguards. To navigate this conundrum, our research introduces and empirically validates a model grounded in evolutionary game theory, offering a robust theoretical framework and actionable strategies for facilitating healthcare data sharing while harmonizing the dual imperatives of data utility and privacy preservation.
Methods: In this paper, we construct an evolutionary game model involving medical institutions, big data innovation platforms, and insurance companies within the context of digital platforms. The model integrates exogenous causes of data breaches, endogenous causes of data breaches, compensation payments, government penalties, subsidies, unreasonable fees, claims efficiency, and insurance fraud.
Results: The stability analysis of the evolutionary game identifies eight equilibrium points among medical institutions, platforms, and insurance companies. Numerical simulations demonstrate convergence toward strategy E7 = (0, 0, 1), suggesting a trend for medical institutions to adopt a fully anonymous information-sharing strategy, platforms to implement strict regulation, and insurance companies to opt for an auditing approach. Sensitivity analysis reveals that the parameters selected in this study significantly influence the players' behavioral choices and the game's equilibria.
Conclusions: When breaches occur, medical institutions tend to seek co-sharing between platforms and insurance companies. This promotes enhanced regulation by platforms and incentivizes insurance companies to perform audits. If the responsibility for the breach is attributed to the platform or the insurance company, the liability sharing system will push healthcare organizations to choose a fully anonymous information sharing strategy. Otherwise, medical institutions will choose partially anonymous information sharing for more benefits. In case of widespread data leakage, the amount of compensation shall augment, and the role of compensation shall replace the role of government supervision. Then, the government shall penalize them, which shall reduce the motivation of each subject.
1 Introduction
In the contemporary digital era, the significance of healthcare data sharing has become increasingly prominent. This practice not only fosters advancements in medical research but also substantially enhances the quality and efficiency of healthcare services. As highlighted by the New England Journal of Medicine, effective utilization of shared data enables healthcare organizations to better comprehend disease trends and devise more precise prevention strategies, thereby reducing disease incidence. For instance, during the global response to Coronavirus Disease 2019 (COVID-19), international research collaborations expedited vaccine development through the sharing of viral genetic sequence information. In the United States, Blue Cross Blue Shield employs data analytics to identify high-risk patients and implement preventive interventions for chronic diseases, thereby improving patient quality of life and mitigating long-term healthcare expenditures. The landscape of health insurance data sharing, however, exhibits considerable variation across nations. The U.S. predominantly relies on a private insurance framework and safeguards personal health information via the Health Insurance Portability and Accountability Act (HIPAA), albeit with more restricted protections for data subjects' rights compared to the European Union. Conversely, the EU's General Data Protection Regulation (GDPR) enforces stringent standards concerning data transparency, data subject rights, and accountability for data processors, especially regarding cross-border data transfers. On January 17, 2024, the Shanghai Big Data Center, in collaboration with the Shanghai Medical Insurance Center and the China Insurance Science and Technology Federation, inaugurated the Shanghai Medical Insurance Big Data Innovation Laboratory. This initiative aims to foster the integration and sharing of medical and commercial insurance data, thereby enhancing the exploration and application of commercial health insurance in actuarial research, product development, and service innovation. Medical insurance data are derived from a subset of medical data, which is relatively more open compared to the more sensitive and complex medical data that involve patient privacy and may necessitate individual user consent (1). The implications of patient privacy breaches present substantial concerns for medical data custodians, notably healthcare institutions. Such incidents can result in stringent penalties for data custodians, fostering an environment of reticence regarding data sharing due to the looming threat of legal liabilities (2). Addressing the concerns of medical institutions regarding data leakage and enhancing their willingness to share information is the core issue of this paper.
The advent of anonymous information sharing has paved the way for the exchange of data among medical institutions. In China, the National Health Commission has championed the establishment of a universal health information platform that facilitates cross-regional and cross-organizational medical data sharing through anonymization. This initiative not only enhances the efficiency of healthcare services but also furnishes critical data support for epidemic prevention, control, and epidemiological investigations. When managing medical data, insurance companies must adhere to relevant laws and regulations while ensuring data security and protecting patient privacy. Furthermore, they should leverage information technology for effective risk management. Auditing, a crucial risk management tool, enables insurers to identify potential security threats and ensure compliance with industry standards and legal requirements. However, the cost and technological investment associated with auditing are significant considerations. Consequently, insurers must strike a balance between various factors to optimize business operations and risk management. Given the context provided, how can the risk of data breaches be mitigated? Under what circumstances would a medical institution choose to share information fully anonymously? Could a liability-sharing system alleviate medical institutions' reluctance to share information? What role does platform regulation play in the entire information chain, and are platforms willing to implement strict supervision for their own interests? Is it in the interest of insurance companies to implement an audit mechanism? How should government subsidy and penalty policies be coordinated to promote the development of medical data sharing?
According to extant literature, scholars have explored the utilization of digital technology to mitigate data breaches (3), while others have advocated for third-party oversight to prevent such incidents (4). In the context of medical data breaches, smart contracts and blockchains are utilized to enhance data sharing, thereby reducing the risk of leaks (5). Despite the reduced risk, medical institutions may struggle to absorb significant losses incurred from data breaches, thereby diminishing their enthusiasm for information sharing. This presents a novel challenge in the realm of medical data sharing. This paper applies evolutionary game theory to healthcare data sharing research, providing a theoretical framework to understand the dynamic interactions among stakeholders (e.g., medical institutions, data platforms, insurance companies). By constructing an evolutionary game model, we can analyze how each participant achieves a steady state through strategic adjustments amid data breach risks. This methodology is particularly suitable for exploring the choice of different strategies and their evolutionary trends in long-term cooperation and competition contexts (6). Previous research has seldom examined the role of medical data sharing in promoting the development of commercial health insurance and healthcare organizations. Section 2 verifies these gaps.
Building on this foundation, our study investigates the impact of medical data sharing on the growth of commercial health insurance and healthcare institutions, considering factors such as insurance claim efficiency, unreasonable charges, data breaches, and government reward and punishment policies. Within the context of digital platforms, this study examines a medical data information chain that includes medical institutions, digital platforms, and insurance companies. Medical institutions adopt strategies for anonymous information sharing, platforms implement regulatory measures, and insurance companies utilize auditing strategies. What factors influence the decision-making processes of these entities? Given the complex landscape of the digitalized medical industry data information chain involving multiple stakeholders, evolutionary game theory models can be employed to simulate and analyze the interactions and decision-making processes among the participants, thereby shedding light on their interrelationships. This paper investigates the strategies adopted by medical institutions, platforms, and insurance companies, delves into the choices made when these strategies reach equilibrium, and further explores how the information-sharing chain can enhance the performance of these three parties.
The study demonstrates that when healthcare organizations are responsible for data breaches, they tend to seek shared responsibility between platforms and insurers. This promotes stricter regulation by platforms and encourages insurers to conduct thorough audits. Conversely, if the platform or insurer is at fault, the liability-sharing system compels healthcare organizations to adopt a fully anonymous information-sharing strategy. Otherwise, they opt for partial anonymity to maximize benefits. In the event of a widespread data breach, compensation amounts increase, potentially overshadowing government supervision. Consequently, the government may impose penalties and reduce incentives for all involved parties.
The remainder of this paper is structured as follows: Section 2 provides a literature review and summarizes previous studies for comparative analysis with the current work. Section 3 outlines the problem description and basic assumptions. Section 4 develops the evolutionary game model. In Section 5, we conduct a numerical simulation analysis to validate the consistency of the simulation results with the theoretical derivations. Finally, Section 6 summarizes the findings and offers recommendations.
2 Literature review
2.1 Medical information sharing
The evolution of medical data information sharing has been ongoing for several years, currently moving toward digitalization, networking, and intelligentization. The establishment of inter-institutional information sharing among medical institutions facilitates the creation of regional medical information integration platforms, enabling the exchange and sharing of regional medical data across various platforms. This contributes to advancing medical reform, enhancing technological application, and improving social service capacities through the provision of solutions and strategies (7), thereby fostering an information-sharing network capable of reducing diagnostic error rates (8). The real-time sharing of patient information between medical institutions and patients can enhance the development of the healthcare industry and improve patient self-care (9). Doctors in medical settings can alleviate parental anxiety by sharing treatment details and actively involving parents in surgical decision-making processes (10). Notwithstanding advances in robust data anonymization techniques and the widely acknowledged advantages of data sharing, privacy concerns persist as a predominant obstacle to data exchange (11). Enhanced information transparency heightens risks for healthcare facilities; however, imposing caps on medical malpractice compensation may alleviate shortages in medical services caused by exorbitant claims, albeit this measure does not constitute a comprehensive remedy (12).
Based on our research, we find that few studies have shared medical data with insurance companies to promote the development of the insurance industry. We consider medical institutions, insurance companies, and platforms as game subjects and provide a theoretical framework to understand the dynamic interactions between these stakeholders (medical institutions, data platforms, and insurance companies). By constructing an evolutionary game model, we can analyze how each participant can achieve a stable state through strategic adjustments in the face of data breach risks.
2.2 Medical data breaches
Medical data breaches present a substantial challenge within the global data security domain. While patients and the public generally support data sharing for health research, they do so with certain conditions in place. Despite recognizing the potential benefits of data research, participants express apprehensions regarding data breaches (13). Scholars have investigated the integration of comprehensive privacy protection mechanisms within intelligent medical systems (14). The integration of emerging digital technologies in medical data management raises apprehensions regarding the potential introduction of novel inaccuracies and vulnerabilities (15). Following a data breach, medical institutions often switch partners, and the extent of the impact is dependent on the severity of the breach (16). Research has demonstrated that educating healthcare managers about risk factors can reduce the likelihood of data breaches (17). The integration of digital technology in establishing a network infrastructure significantly bolsters the security of healthcare information exchanges, consequently reducing the likelihood of healthcare data breaches (18).
To mitigate the risk of data breaches and enhance the willingness of medical institutions to share information, we integrate anonymous information-sharing strategies into their decision-making processes. We then examine the effects of these institutions' decisions regarding partially vs. fully anonymous information-sharing strategies on the overall supply chain.
2.3 Data-driven development of commercial health insurance
With the expansion of the insurance sector, commercial health insurance has become increasingly crucial as a beneficial supplementary tool in promoting residents' health. Some insurance companies even reduce their prices to stimulate market demand (19). Within this framework, the insurance sector necessitates more accurate data for product enhancements and demographic analysis (20). Accurate data can facilitate product optimization and enhance product credibility. By aligning product design more closely with residents' lifestyles, their willingness to purchase commercial health insurance can be increased (21). Improvements in credibility and economies of scale can lead to a reduction in insurance costs (22). Credit insurance mitigates the risk of retailer default, thereby facilitating manufacturers in augmenting their profitability through enhanced creditworthiness (23). Many insurance companies strive to enhance data precision through the advancement of digital technology. Nevertheless, the enhancement of digital capabilities does not significantly influence their adoption rates within these companies themselves (24).
This study reveals a gap in the literature concerning the factors influencing the information-sharing process and its effects within commercial health insurance. While existing research predominantly highlights the benefits of information sharing, there is scarce analysis on the determinants affecting this mechanism and the specific outcomes it impacts. We delve into aspects such as data breaches, reimbursement payments, penalty charges, subsidies, and unjustified fees to scrutinize their interplay with information sharing.
2.4 Government reward and penalty policies
Government reward and penalty policies are crucial for promoting the sharing of medical data. These policies aim to enhance the quality of medical services, standardize data-sharing practices, and protect patient privacy through various incentives and sanctions (25). These policies encompass fiscal subsidies (26), tax incentives (27), financial support (28), and punitive actions such as fines, administrative penalties, and market access restrictions (29). The operational details involve creating pertinent regulations, disseminating guiding principles, and establishing specific implementing agencies. For example, the government may grant financial rewards to medical institutions that proactively engage in data sharing and elevate service quality, while imposing fines or administrative penalties on those that breach data security protocols (30). Measures are designed to ensure that medical institutions adhere to laws and regulations while reaping the benefits of data-sharing efficiency, thereby preserving patients' privacy rights. In the event of a medical data breach, government reward and penalty policies can exert a positive influence (31).
Based on this premise, we find that while extensive literature exists on exploring and optimizing reward and punishment mechanisms, there is no precise mechanism tailored specifically for the healthcare information-sharing industry. We differentiate between penalty payments and compensation payments and delineate responsibilities for data breaches to promote the development of healthcare data and information sharing within the insurance industry.
3 Problem description and basic assumptions
3.1 Problem description
As illustrated in Figure 1, the health insurance big data innovation platform is a government-led initiative. The government collaborates with a third-party regulator to establish and manage the platform. The government implements penalty and subsidy policies, while the third-party regulator oversees the operation and supervision of the platform. Insured individuals purchase commercial health insurance from insurance companies and can submit claims on the platform following medical consultations at healthcare institutions. Healthcare institutions share medical data with the platform, which in turn shares this data with insurance companies. This enables insurance firms to use the data more effectively for product innovation, actuarial pricing, and refined risk management. The strategic choices of healthcare institutions, the platform, and insurance companies within this three-party evolutionary game are depicted in Figure 1.
Figure 1. The process diagram of medical data information sharing and strategies for the three subjects.
The strategy options for medical institutions, platforms, and insurance companies are illustrated in Figure 1. Medical institutions are obliged to protect patients' privacy and personal information security. By anonymizing the process, the risk of leaking sensitive information can be reduced to meet research or administrative needs. According to privacy protection theory, anonymization also achieves the principle of minimum necessity, i.e., collecting and processing only the necessary information required to accomplish a specific task, thereby reducing the risk of misuse or leakage of information. Therefore, the strategic choice for medical institutions is to partially or completely anonymize information sharing. Big data innovation platforms act as intermediaries to bridge the data flow between medical institutions and insurance companies. The regulatory mechanism is chosen not only to ensure the security and compliance of the data transfer process but also to establish a trust mechanism. According to governance theory, an effective regulatory mechanism can facilitate cooperation among participants and provide a reliable operational framework for data sharing. The existence of regulatory mechanisms helps platforms avoid potential legal risks and increases system transparency, thus boosting confidence among all stakeholders. Consequently, the strategic options for platforms are either strict or loose regulation. Insurance companies, as data users, need to balance the need for cost-benefit analysis and risk management when deciding whether to conduct an audit. According to risk management theory, audits are crucial tools for assessing data quality and integrity, aiding insurance companies in making more accurate risk assessments and pricing decisions. However, audits also introduce additional costs and technical complexity. Therefore, the strategic choice for insurance companies is whether to perform audit.
3.2 Basic assumptions
Table 1 presents the parameters and their descriptions. The specific hypotheses are outlined in Hypotheses 1 through 5 below.
Hypothesis 1: Medical data encompasses a vast amount of sensitive information, including medical history records and genetic test results. Leaks of such data can lead to severe consequences for patients and may result in legal liability and a loss of social trust for medical organizations. To mitigate these risks, medical institutions often opt for anonymized information sharing. However, the distinction between partial and complete anonymity influences both the benefits gained by the institutions and the likelihood of data breaches (32). Medical institutions choose between {Fully Anonymous Information Sharing, Partially Anonymous Information Sharing}. The probability of a medical institution choosing fully anonymous information sharing is 1−x, while the probability of choosing partially anonymous information sharing is x. Medical institutions choose to share information anonymously and obtain a profit of c1, while sharing partially anonymous information results in a profit of c2(c1<c2). The implementation of a fully anonymous information-sharing strategy can lead to diminished data traceability due to the complete anonymization of information. Consequently, this impairs the auditing and supervision of the medical service process, heightening the risk of unreasonable charges owing to the difficulty in tracing specific service items and detailed costs (33). With a probability of a1, unreasonable charges occur; if the medical institution fails to detect these unreasonable charges, which happens with a probability of b1, it incurs a potential loss of n1. When the medical institution partially shares information anonymously, the probability of failing to detect unreasonable charges is b2(1>b1>b2>0 ).
Hypothesis 2: The regulation of data platforms is crucial, as big data platforms grapple with the dual challenge of promoting data sharing while ensuring information security (34). Big Data Innovation Platform has two options: {Loose Regulation, Strict Regulation}. The probability of the platform choosing loose regulation is 1−y, and the probability of choosing strict regulation is y. The implementation of stringent regulatory policies necessitates the adoption of advanced security measures, encompassing but not limited to encryption technology, access control mechanisms, firewalls, and intrusion detection systems. These measures, while enhancing security, can significantly increase the operational costs of the platform. The cost for the platform to conduct loose supervision is c3, while the cost for strict supervision is c4(c3<c4). The data platform receives medical data shared by medical institutions and shares the processed data with insurance companies, and the platform receives operational revenues. The operational revenue of the platform is f1. Strict regulatory strategies are usually accompanied by more stringent security monitoring and preventive measures, which enable platforms to detect and respond to potential security threats earlier. Regular security reviews and testing also help to identify vulnerabilities and take remedial action in a timely manner. The probability of detecting safety risks and other issues under loose regulation is d1, whereas the probability under strict regulation is d2(0 < d1<d2 < 1 ).
Hypothesis 3: The implementation of audits by insurance companies is a key component in the process of sharing information between healthcare organizations and data platforms as well as insurance companies. It helps ensure the accuracy and security of data. For example, the Blue Cross Blue Shield Association and its member companies routinely conduct internal audits to ensure that their members are complying with health insurance-related laws, such as HIPAA. These audits include a review of data access controls, data integrity, and security in the EHR system. Insurance companies choose between {No Audit, Audit}. The probability of an insurance company opting for no audit is 1−z, and the probability of choosing to audit is z. The cost for an insurance company not auditing is c5, whereas the cost of auditing is c6. When medical institutions share information partially anonymously, resulting in increased data transparency, insurance companies incur an additional cost of c7. Insurance companies use data analytics tools to review medical bills to identify unusual charging patterns or potential fraud. These tools can process large amounts of data quickly and can compare it with historical data as well as data from other insurers to identify irregularities. Audits can also improve claims processing efficiency, and global insurers such as Allianz have been investing in technology solutions to improve the customer experience and increase operational efficiency. A patient's medical visit with unreasonable charges can cause the insurance company's claims to become larger, resulting in greater losses for the insurance company. After patients receive medical treatment and are discharged, they file for claims, with the efficiency of the process represented by a certain value, and the probability of not detecting unreasonable charges from the medical institution is also represented by a certain value. After an audit by the insurance company, the efficiency of the claims process is d3, and the probability of not detecting unreasonable charges is b4. If the insurance company discovers unreasonable charging practices, it will reduce the claim expenses by d4(0 < d3<d4). After an insurance company's claims efficiency has been improved to a certain extent, customer satisfaction may have reached a high level, and the effect of further efficiency improvements on customer satisfaction may gradually diminish (35). So we use the sin(x) function of to model the relationship between benefits and claims efficiency. Improvements in claims efficiency attract consumers to purchase insurance products, with the efficiency affecting the revenue through a function represented by (i = 3, 4), and f2 represents the average revenue brought about by improvements in claims efficiency. The probability of fraudulent claims is u0; the probability of not being detected when the insurance company does not audit is u1; the probability of not being detected when the insurance company does audit is u2(1>u1>u2>0), and the loss caused by fraudulent claims is n0.
Hypothesis 4: Fully anonymous information sharing strategy protects patient privacy and can reduce the risk of data leakage when sharing information. The risk of information leakage is higher for partially anonymized information sharing strategy than the former. When medical institutions engage in fully anonymous information sharing, the probability of data breaches in the information chain is d5. When partially sharing information anonymously, the probability of a data breach occurring is d6(0 < d5<d6 < 1). When a medical institution chooses a partially or fully anonymous information sharing strategy, the risk of information breach due to incomplete masking of information is higher for partially anonymous information sharing than for fully anonymous information sharing. Platforms with strictly regulated strategies will use more secure protection measures to reduce the probability of data breach. Insurance companies monitor, process, and store large amounts of data by means of auditing to achieve a reduction in the probability of data breaches. Strict regulation by the platform reduces the probability of a data breach by d7, and audits implemented by the insurance company also reduce the probability of a data breach by d8. If the breach violates relevant laws and regulations (e.g., GDPR, HIPAA, etc.), individual subjects can face fines. Subjects may be required to provide credit monitoring services or other forms of compensation to affected customers. Data breaches lead to a decrease in public and customer trust in a business, which can affect future sales and market share. When a data breach occurs, all three subjects experience indirect and direct losses. The responsible parties are required to provide compensation to the victims, amounting to d0. The medical institution bears a proportion of g1, third-party organizations bear a proportion of g2, and the insurance company bears a proportion of 1−g1−g2(0 ≤ g1+g2 < 1 ).
Hypothesis 5: In the process of constructing information sharing between medical institutions and data platforms as well as insurance companies, the China Health Insurance Bureau mentioned that the risk of information leakage would make each subject participate in information sharing negatively, so it proposed to share the risk of leakage and impose penalties in case of leakage. In the event of a data breach, the government penalizes members of the information chain, with each subject bearing a different percentage of the penalty. The government also promotes anonymous information sharing among healthcare providers in the form of subsidies, as in the case of Jining City, China, which issued the Implementing Opinions on Further Improving and Perfecting the Mechanism for Sharing Information and Data on Persons Receiving Medical Assistance, which aims to further improve the mechanism for sharing information and data on medical assistance recipients. The government policy is divided into subsidy policy and penalty policy. Penalty policy: the function of penalty payment is p0mα(gα)(α = 1, 2, 3), p0 is the amount of the fine, mα(gα) is an indicator function that takes the value of 1 when gαexceeds 0.5, and 0 otherwise. If ma(ga) in ga are < 0.5, it means that it is impossible to find out which subject caused the data breach, at this time, medical institutions, insurance companies and platforms only need to pay compensation to the patients do not need to pay penalties. Subsidy policy: the amount of subsidy under a fully anonymous information sharing policy for a medical institution isl1, and the amount of subsidy under a partially anonymous information sharing policy is l2(l1>l2). The platforms are rewarded for identifying problems in the information chain such as data security risks h2.
4 Responsibility sharing model
4.1 Model construction
Based on the aforementioned assumptions of this model, an evolutionary game model has been established. The payoff matrices for medical institutions, platform, and insurance companies are presented in Tables 2, 3. The probability that a medical institution chooses a partially anonymous information sharing strategy is x, and the probability that a medical institution chooses a fully anonymous information sharing strategy is 1 – x; the probability that a big data innovation platform chooses a strictly regulated strategy is y, and the probability that a big data innovation platform chooses a loose regulated strategy is 1 – y. The probability that an insurance company chooses an auditing strategy is z, and the probability that an insurance company chooses a no-auditing strategy is 1 – z. Revenue components of medical institutions: revenue from implementing strategies + subsidies – compensation payments – penalties – losses due to unreasonable fees; revenue components of platforms: operational revenue + rewards for detecting safety hazards – compensation payments – penalties – costs of implementing strategies; revenue components of insurance companies: revenue from claims efficiency – costs of implementing strategies – losses due to unreasonable fees – compensation payments – penalties – losses due to fraudulent insurance policies Losses due to insurance fraud.
4.2 Replicating dynamic equations and evolutionary equilibria
4.2.1 Strategic stability analysis of medical organizations
In Tables 2, 3, there are benefit matrices that represent the medical institutions. Based on the payoff matrix constructed in the previous text, the expected revenue for medical institutions under partially anonymous information sharing is obtained:
Expected benefits of fully anonymous information sharing for medical institutions:
The average expected return for medical institutions is:
From Equations 1–3, the equation for the replication dynamics of the medical institution is given as:
4.2.2 Strategic stability analysis of digital platforms
In Tables 2, 3, there are benefit matrices that represent the platform. With the benefit matrix constructed above, the expected benefit of strict regulation of the platform can be obtained as:
The expected return on the platform's loose regulation is:
The average expected return of the platform is.
From Equations 5–7, the replicated dynamic equation of the platform is given as:
4.2.3 Strategic stability analysis of insurance companies
In Tables 2, 3, there are benefit matrices that represent the insurance company. With the benefit matrix constructed above, the expected benefit of the insurance company audit is obtained as:
The expected return on an insurance company's non-audit is:
From Equations 9–11, the replicated dynamic equation for the insurance company is given as:
4.3 Analysis of stability and evolutionary results of the system
4.3.1 Stability analysis of the equilibrium point
Based on the previously mentioned chapter on the replicator dynamic equations [Fx(x), Fy(y), Fz(z)] of the three parties in the game, we can further obtain the Jacobian matrix of the evolutionary game system under the responsibility sharing mode.
According to the Liapunov system stability criterion, the equilibrium is asymptotically stable when all eigenvalues of the Jacobi matrix satisfy the condition; if one or more λ < 0, then the equilibrium is unstable λ>0. By setting Fx(x) = 0, Fy(y) = 0, and Fz(z) = 0, we can obtain 8 local equilibrium points: E1 = (0, 0, 0), E2 = (0, 0, 1), E3 = (0, 1, 0), E4 = (1, 0, 0), E5 = (1, 1, 0), E6 = (1, 0, 1), E7 = (0, 1, 1), E8 = (1, 1, 1), where the elements in parentheses correspond to the values of strategies (x, y, z) to be adopted by the medical institution, platform, and insurance company at each equilibrium point, respectively. According to the Lyapunov theorem, when all the eigenvalues of the Jacobian matrix are negative, the local equilibrium point is an Evolutionarily Stable Strategy (ESS). The eigenvalues of the Jacobian matrix corresponding to each equilibrium point are calculated as shown in Table 4.
The equilibrium points (*,*,*) in Table 4 represent that each eigenvalue (λ1, λ2, λ3, ) may be >0, may be equal to 0, or may be < 0. In an evolutionary game, a stabilization point occurs only if all eigenvalues are < 0. Revenue components of medical institutions: revenue from implementing strategies + subsidies – compensation payments – penalties – losses due to unreasonable fees; revenue components of platforms: operational revenue + rewards for detecting safety hazards – compensation payments – penalties – costs of implementing strategies; revenue components of insurance companies: revenue from claims efficiency – costs of implementing strategies – losses due to unreasonable fees – compensation payments – penalties – losses due to fraudulent insurance policies Losses due to insurance fraud. By observing and analyzing Table 4, we can obtain the stable measurement combinations of the evolutionary game under the model we constructed for the eight scenarios (see Strategies 1–8).
Strategy 1 When the three eigenvalues corresponding to E1 in Table 3 are all < 0 (λ1 < 0, λ2 < 0, λ3 < 0), there exists a stabilization point in the replicated dynamic equation E1(0, 0, 0). λ1 < 0 in E1 represents that medical institutions have higher benefits under a fully anonymous information sharing strategy than those obtained under a partially anonymous information sharing strategy; λ2 < 0 represents that platforms have higher benefits under a loosely regulated strategy than those obtained under a tightly regulated strategy; and λ3 < 0 represents that insurance companies have higher benefits under a no-audit strategy than those obtained under an audit strategy. At this time, the strategies of each subject are: fully anonymous information sharing by healthcare providers, loose regulation by platforms, and no auditing by insurance companies.
Strategy 2 When the three eigenvalues corresponding to E2 in Table 3 are all < 0 (λ1 < 0, λ2 < 0, λ3 < 0), there exists a stabilization point in the replicated dynamic equation E2(0, 0, 1). λ1 < 0 in E2 represents that medical institutions have higher benefits under a fully anonymous information sharing strategy than those obtained under a partially anonymous information sharing strategy; λ2 < 0 represents that platforms have higher benefits under a loosely regulated strategy than those obtained under a tightly regulated strategy; and λ3 < 0 represents that insurance companies have lower benefits under a no-audit strategy than those obtained under an audit strategy. At this time, the strategies of each subject are: fully anonymous information sharing by healthcare providers, loose regulation by platforms, and auditing by insurance companies.
Strategy 3 When the three eigenvalues corresponding to E3 in Table 3 are all < 0 (λ1 < 0, λ2 < 0, λ3 < 0), there exists a stabilization point in the replicated dynamic equation E3(0, 1, 0). λ1 < 0 in E3 represents that medical institutions have higher benefits under a fully anonymous information sharing strategy than those obtained under a partially anonymous information sharing strategy; λ2 < 0 represents that platforms have lower benefits under a loosely regulated strategy than those obtained under a tightly regulated strategy; and λ3 < 0 represents that insurance companies have higher benefits under a no-audit strategy than those obtained under an audit strategy. At this time, the strategies of each subject are: fully anonymous information sharing by healthcare providers, strict regulation by platforms, and no auditing by insurance companies.
Strategy 4 When the three eigenvalues corresponding to E4 in Table 3 are all < 0 (λ1 < 0, λ2 < 0, λ3 < 0), there exists a stabilization point in the replicated dynamic equation E4(1, 0, 0). λ1 < 0 in E4 represents that medical institutions have lower benefits under a fully anonymous information sharing strategy than those obtained under a partially anonymous information sharing strategy; λ2 < 0 represents that platforms have higher benefits under a loosely regulated strategy than those obtained under a tightly regulated strategy; and λ3 < 0 represents that insurance companies have higher benefits under a no-audit strategy than those obtained under an audit strategy. At this time, the strategies of each subject are: partially anonymous information sharing by healthcare providers, loose regulation by platforms, and no auditing by insurance companies.
Strategy 5 When the three eigenvalues corresponding to E5 in Table 3 are all < 0 (λ1 < 0, λ2 < 0, λ3 < 0), there exists a stabilization point in the replicated dynamic equation E5(1, 1, 0). λ1 < 0 in E5 represents that medical institutions have lower benefits under a fully anonymous information sharing strategy than those obtained under a partially anonymous information sharing strategy; λ2 < 0 represents that platforms have lower benefits under a loosely regulated strategy than those obtained under a tightly regulated strategy; and λ3 < 0 represents that insurance companies have higher benefits under a no-audit strategy than those obtained under an audit strategy. At this time, the strategies of each subject are: partially anonymous information sharing by healthcare providers, strict regulation by platforms, and no auditing by insurance companies.
Strategy 6 When the three eigenvalues corresponding to E6 in Table 3 are all < 0 (λ1 < 0, λ2 < 0, λ3 < 0), there exists a stabilization point in the replicated dynamic equation E6(1, 0, 1). λ1 < 0 in E6 represents that medical institutions have lower benefits under a fully anonymous information sharing strategy than those obtained under a partially anonymous information sharing strategy; λ2 < 0 represents that platforms have higher benefits under a loosely regulated strategy than those obtained under a tightly regulated strategy; and λ3 < 0 represents that insurance companies have lower benefits under a no-audit strategy than those obtained under an audit strategy. At this time, the strategies of each subject are: partially anonymous information sharing by healthcare providers, loose regulation by platforms, and auditing by insurance companies.
Strategy 7 When the three eigenvalues corresponding to E7 in Table 3 are all < 0 (λ1 < 0, λ2 < 0, λ3 < 0), there exists a stabilization point in the replicated dynamic equation E7(0, 1, 1). λ1 < 0 in E7 represents that medical institutions have higher benefits under a fully anonymous information sharing strategy than those obtained under a partially anonymous information sharing strategy; λ2 < 0 represents that platforms have lower benefits under a loosely regulated strategy than those obtained under a tightly regulated strategy; and λ3 < 0 represents that insurance companies have lower benefits under a no-audit strategy than those obtained under an audit strategy. At this time, the strategies of each subject are: fully anonymous information sharing by healthcare providers, strict regulation by platforms, and auditing by insurance companies.
Strategy 8 When the three eigenvalues corresponding to E8 in Table 3 are all < 0 (λ1 < 0, λ2 < 0, λ3 < 0), there exists a stabilization point in the replicated dynamic equation E8(1, 1, 1). λ1 < 0 in E8 represents that medical institutions have lower benefits under a fully anonymous information sharing strategy than those obtained under a partially anonymous information sharing strategy; λ2 < 0 represents that platforms have lower benefits under a loosely regulated strategy than those obtained under a tightly regulated strategy; and λ3 < 0 represents that insurance companies have lower benefits under a no-audit strategy than those obtained under an audit strategy. At this time, the strategies of each subject are: partially anonymous information sharing by healthcare providers, strict regulation by platforms, and auditing by insurance companies.
5 Evolutionary game simulation analysis
This study employs MATLAB to simulate evolutionary game data, aiming to elucidate the influence of medical institutions, big data innovation platforms, and insurance companies on game stability. Parameter values are derived from existing literature and specifically tailored using insights from the “Research Report on the Collaborative Innovation Model of Commercial Health Insurance and Pharmaceuticals” alongside the “Securities Research Report on Medicare Individual Accounts Purchasing Commercial Insurance Functions Online and the Anticipated Acceleration of Health Insurance Development,” among others. Setting parameters a1 = 0.5, b1 = 0.6, b2 = 0.5, b4 = 0.6, b5 = 0.4, c1 = 10, c2 = 15, c3 = 15, c4 = 20, c5 = 15, c6 = 20, d0 = 100, d1 = 0.3, d2 = 0.6, d3 = 0.6, d4 = 0.8, d5 = 0.4, d6 = 0.5, d7 = 0.5, d8 = 0.5, f2 = 20, g1 = 1/3, g2 = 1/3, h2 = 15, l1 = 10, l2 = 5, m1 = 0, m2 = 0, m3 = 0, p0 = 50, u0 = 0.2, u1 = 0.5, u2 = 0.3, n0 = 80n1 = 20, n2 = 20, accordingly. Utilizing the specified parameter settings, we examine the stability of the eight strategies outlined in the preceding section, focusing on the roles of medical institutions, platforms, and insurance companies within the evolutionary game. A critical inquiry is whether mechanisms such as platform monitoring, insurance company auditing, and governmental reward-and-punishment policies can enhance the propensity of medical institutions to share information when their initial willingness is minimal. Additionally, it is pertinent to investigate other factors that influence the functionality of the information chain and the decision-making proclivity of each entity. This section analyzes these dimensions through various parameters.
5.1 Stabilization points under different strategies
The system exhibits multiple evolutionary paths. To explore the evolutionary process of each stakeholder and to verify the correctness and validity of the model based on evolutionary stability results, three groups comprising E1, E2, E3, E4, E5, E6, E7, and E8 are selected for numerical simulation using eight equilibrium points of pure strategy. Initial values (randomized between 0 and 1) are provided. To ensure the rationality of the original parameter settings, the model parameters must satisfy economic assumptions and empirical determinations. Based on the practical significance of the model parameters and previous research experience, the parameter settings are as shown above.
5.1.1 Stable points under strategies 1–4
When the values are set to c4 = 30, c6 = 30 , and the other parameters remain unchanged, the corresponding eigenvalues for E1 are all negative (λ1 < 0, λ2 < 0, λ3 < 0), indicating stability at point E1(0, 0, 0). The stabilizing strategy for the three parties is {fully anonymous information sharing, loose regulation, no auditing}, with the evolutionary trajectory depicted in Figure 2A.
Figure 2. (A–D) The evolution of the tripartite participants toward a stable equilibrium of strategies 1–4.
When the value is set to c4 = 30 while others stay constant, the eigenvalues associated with E2 become negative (λ1 < 0, λ2 < 0, λ3 < 0), leading to stability at E2(0, 0, 1). The resulting strategy is {fully anonymous information sharing, loose regulation, auditing}, as shown in Figure 2B.
Changing only c6 = 30 maintains the other parameters, resulting in negative eigenvalues for E3 (λ1 < 0, λ2 < 0, λ3 < 0), and stabilization at E3(0, 1, 0). The stable strategy here is {fully anonymous information sharing, strict regulation, no auditing}, illustrated in Figure 2C.
Finally, setting c2 = 20, c4 = 30, c6 = 30, d0 = 50 with other parameters unaltered yields negative eigenvalues for E4 (λ1 < 0, λ2 < 0, λ3 < 0). This leads to stabilization at E4(1, 0, 0), characterized by the strategy {partially anonymous information sharing, loose regulation, no auditing}, as displayed in Figure 2D.
5.1.2 Stable points under strategies 5–8
When the value of c2 = 20, c6 = 30 is changed and the other values remain unchanged, the corresponding three eigenvalues corresponding to E5 are all < 0 (λ1 < 0, λ2 < 0, λ3 < 0), and strategy 5 reaches the stabilization point E5(1, 1, 0). The stabilizing evolutionary strategy of the three parties is {partially anonymous information sharing, strict regulation, no auditing}, and the evolutionary trajectory is shown in Figure 3A.
Figure 3. (A–D) The evolution of the tripartite participants toward a stable equilibrium of strategies 5–8.
When the values are changed to c2 = 20, c4 = 30 and the other values remain unchanged, the corresponding three eigenvalues corresponding to E6 are all < 0 (λ1 < 0, λ2 < 0, λ3 < 0), and strategy 6 reaches the stabilization point E6(1, 0, 1). The stabilizing evolutionary strategy of the three parties is {partially anonymous information sharing, loose regulation, auditing}, and the evolutionary trajectory is shown in Figure 3B.
When all parameters take constant values, the three eigenvalues corresponding to E7 are all < 0 (λ1 < 0, λ2 < 0, λ3 < 0), and the strategy 7 reaches the stabilization point E7(0, 1, 1). The stabilizing evolutionary strategy of the three parties is {fully anonymous information sharing, strict regulation, auditing}, and the evolutionary trajectory is shown in Figure 3C.
When the values are changed to c2 = 20, l2 = 7 and the other values remain unchanged, the corresponding three eigenvalues corresponding to E8 are all < 0 (λ1 < 0, λ2 < 0, λ3 < 0), and strategy 8 reaches the stabilization point E8(1, 1, 1). The stable evolution strategy of the three parties is {partially anonymous information sharing, strict regulation, auditing}, and the evolution trajectory is shown in Figure 3D.
5.2 Impact of changes in government penalization policies and the severity of penalties on different subjects
5.2.1 The impact of government punitive policies on data breaches caused by medical institutions themselves
When a data breach occurs due to a medical institution, the medical institution bears the main compensation amount, and g1 represents the proportion of the compensation amount borne by the medical institution. The government punishes the medical institution, at this time set m1 = 1. Only change the value of g1, g2, m1, other values remain unchanged, analyze the change of the main body in the case of the whole system bears the different proportion of the compensation amount. As shown in Figure 4.
Figure 4. Impact of medical institutions taking varying responsibility for data breaches caused by themselves.
When a data breach occurs due to a medical institution, if the compensation amount is fully paid by the medical institution, the platform will choose loose regulation due to a “fluke mind.” By sharing a certain amount of compensation between the platform and the insurance company, the platform can shift to strict regulation. However, excessive sharing of the compensation amount will reduce the incentive of insurance companies to implement auditing strategies. Figure 4 illustrates that when a data breach occurs due to a medical institution, having the platform and insurance company bear a certain percentage of the compensation plays a supervisory role, and oversharing will reduce the motivation of the platform and insurance company.
5.2.2 The impact of government punitive policies on data breaches caused by platforms themselves
When there is a data breach due to the platform, the platform bears the main compensation amount, and g2 represents the proportion of the compensation amount borne by the platform. The government punishes the platform, at this time set m2 = 1. Only change the value of g1, g2, m2, other values remain unchanged, and analyze the change of the main body when the whole system bears the different proportion of the compensation amount. As shown in Figure 5.
When a data breach occurs due to a platform, if the compensation amount is fully paid by the platform, the medical institution will choose a partially anonymous information sharing strategy in order to gain more benefits. Medical institutions and insurance companies bear a certain amount of compensation, and the liability sharing system deters medical institutions from continuing to choose a partially anonymous information sharing strategy, causing them to shift to a fully anonymous information sharing strategy. Excessive sharing of the compensation amount does not increase the motivation of insurance companies to implement the auditing strategy and medical institutions to implement the fully anonymous information sharing strategy.
5.2.3 The impact of government punitive policies on data breaches caused by insurance companies themselves
When the data breach occurs due to the insurance company, the insurance company bears the main compensation amount, 1−g1−g2 represents the proportion of the compensation amount borne by the insurance company. The government punishes the insurance company, at this time, set m3 = 1. Only change the values of g1, g2, m3, other values remain unchanged, and analyze the change of each subject when the whole system bears the different proportion of the compensation amount. As shown in Figure 6.
Figure 6. Impact of insurance companies taking varying responsibility for data breaches caused by themselves.
When a data breach occurs at an insurance company, if the compensation amount is fully covered by the insurance company, medical institutions will choose a partially anonymous information-sharing strategy to maximize their benefits. If the medical institution and the platform share a certain amount of compensation, the liability sharing system will discourage the medical institution from continuing to choose a partially anonymous information-sharing strategy and make the medical institution change to a fully anonymous information sharing strategy. Excessive sharing of compensation will not increase the motivation of platforms to implement auditing strategies and medical institutions to implement fully anonymous information sharing strategies.
5.2.4 Data breaches caused by external factors
Explore how the government's punishment policy should be implemented when the data breach is caused by external factors and it is not known which subject caused the data breach. When m1, m2, m3 is 1, it means that the government should penalize medical institutions, platforms and insurance companies even though the cause of data breach cannot be found. When m1, m2, m3 is 1, it means that the government does not penalize the three subjects; p0 represents the amount of penalty for the three subjects; and d0 represents the compensation to consumers. Only change the values of m1, m2, m3, p0, d0, the rest of the parameter values remain unchanged. As shown in Figure 7. In Figure 7A, d0 = 10, which represents the case of data breach in a small range. In Figure 7B, d0 = 100, which represents the case of data breach in a large range.
Figure 7. Impact of changes in penalization policies on data breaches caused by externalities [(A) for small data breaches; (B) for large data breaches].
As illustrated in Figure 7A, when a minor data breach occurs, the lack of penalties for medical institutions, platforms, and insurance companies can lead to these entities opting for a partially anonymous information-sharing strategy to maximize profits. The profits gained from this strategy are then used to cover the compensation costs. In such scenarios, governmental penalties against these three entities can incentivize medical institutions to adopt a fully anonymous information-sharing strategy, thereby promoting the development of the entire system. However, if all three entities are penalized, increasing the fine amount may reduce the incentive for insurance companies to implement auditing strategies.
As illustrated in Figure 7B, large-scale data breaches necessitate substantial compensation from medical institutions, platforms, and insurance companies. Consequently, these entities recognize the severe repercussions of data breaches, which diminishes the efficacy of governmental punitive measures. Large-scale data breaches infringe upon legal boundaries and are not merely moral issues or matters that can be resolved through government fines alone. They require accountability in accordance with local laws. In this context, heightened fines and stringent government penalties not only fail to bolster systemic oversight but also dampen the incentives for these organizations to adopt proactive data protection strategies.
5.3 Impact of changes in government subsidies on different subjects
Medical institutions are worried about the data breach problem caused by medical data information sharing, and the subsidy policy in this paper only subsidizes medical institutions. Only the value of l1 is changed, and other values remain unchanged to analyze the impact on the whole chain when medical institutions are subsidized. As shown in Figure 8.
To optimize clarity, concision, and academic style, the paragraph has been revised as follows: When medical institutions receive a modest subsidy, they tend to abandon strategies with lower data breach probabilities in favor of higher profits, opting instead for partially anonymous information-sharing strategies. As subsidies increase, these institutions are more likely to adopt fully anonymous information sharing and select strategies with minimal chances of data breach detection. However, excessive government subsidies can diminish the motivation for platforms to implement stringent regulatory measures and for insurance companies to undertake thorough audits, thereby exerting a negative influence on overall governance.
5.4 Impact of changes in claims efficiency on different subjects
The implementation of auditing in insurance companies will increase the efficiency of claims processing. Change only the value of d4 and leave the other values unchanged to analyze the claims efficiency of the insurance company, and the impact on the chain as a whole. As shown in Figure 9.
The adoption of audit mechanisms by insurance companies can improve claim settlement efficiency. As illustrated in Figure 9, there is a positive correlation between claim efficiency and the propensity of insurance companies to undertake audits. However, this correlation diminishes at higher levels of efficiency. Once a certain level of efficiency is reached, additional enhancements do not significantly influence the inclination of medical institutions. At this point, insurance companies should not expend excessive resources to achieve optimal claim speed; rather, they could adopt a strategy where d4 = 0.8, which not only helps improve their own profitability but also ensures the willingness of the entire supply chain in finance to the greatest extent.
5.5 The impact of changes in the probability of insurance fraud on different entities
The implementation of audits by insurance companies reduces the probability of insurance fraud. Change only the value of u2 and leave the other values unchanged to analyze the probability of insurance company cheating on the insurance policy, and the impact on the whole chain. This is shown in Figure 9.
As seen in Figure 10. Upon implementing an audit mechanism, insurance companies observe a significant reduction in the willingness to continue audits due to an increased probability of insurance fraud, thereby augmenting the platform's demand for stringent oversight. From the standpoint of medical institutions, extreme probabilities of fraud, whether high or low, diminish their propensity to actively share information. When insurance companies carry out audits, they can maintain the probability at u2 = 0.3, where the willingness of medical institutions to actively share information is at its highest, and the platform's willingness for strict oversight is also greater than at u2 = 0.2. In this scenario, insurance companies can save on cost inputs and achieve an optimal solution.
5.6 The impact of changes in the probability of unreasonable charges on different entities
Unreasonable charges affect medical institutions and insurance companies, Figure 11A shows the impact of the change in the probability of undetected unreasonable charges for medical institutions on different subjects, and Figure 11B shows the impact of the change in the probability of undetected unreasonable charges for insurance companies on different subjects. The impact of unreasonable charges on the whole chain is analyzed by changing only the values of b2, b5 and leaving the other values unchanged. As shown in Figure 11.
Figure 11. No impact of changes in the probability of unreasonable charges on strategies was found. (A) Medical institutions (B) insurance companies.
Figure 11A shows the impact of the change in the probability of not detecting unreasonable charges in medical institutions on different subjects. If the probability of detecting unreasonable charging phenomenon can be substantially increased under the partially anonymous information sharing strategy, medical institutions will ignore the impact of data breach and choose the partially anonymous information sharing strategy. Figure 11B shows the impact of the change in the probability of not detecting unreasonable charges in medical institutions on different subjects. A significant increase in the probability of detecting unreasonable charges under the insurance company's choice of auditing strategy does not bring significant benefits and positive changes to the chain. Consequently, we conclude that medical institutions are primarily responsible for the detection of unreasonable charges, while insurance companies play a secondary role. Medical institutions can afford to invest more in detecting unreasonable charges, whereas insurance companies should not prioritize this issue excessively, as doing so would incur higher costs without achieving the desired benefits.
6 Discussion
This study employs evolutionary game theory to examine the promotion of mutual development between medical institutions and insurance companies through healthcare data sharing. The model is constructed based on factors such as data breaches, government rewards and penalties, claim processing efficiency, insurance fraud, and unreasonable fees. It proposes a cost-sharing mechanism for data breaches. We discuss the stability of the model and validate the theoretical framework through numerical simulations. Additionally, this paper explores the factors influencing the evolution of the healthcare data sharing system.
6.1 Conclusion
Our research has yielded several important conclusions. First, while most existing studies focus on the allocation of responsibility to individual entities (36), this study emphasizes a cost-sharing mechanism among multiple entities and proposes a more comprehensive framework for responsibility allocation. When breaches are triggered by medical institutions, they tend to seek co-sharing between platforms and insurance companies, which promotes platforms to strengthen regulation and incentivizes insurance companies to perform audits. If the responsibility for the breach lies with either the platform or the insurance company, the burden-sharing system will encourage medical institutions to choose a fully anonymous information sharing strategy; otherwise, medical institutions will opt for partially anonymous information sharing for the greater benefit.
Second, numerous studies advocate for enhancing the complexity and stringency of medical data sharing protocols to bolster security (37). Minor data breaches can prompt governmental penalties against healthcare institutions, platforms, and insurance companies, incentivizing these entities to adopt fully anonymous information-sharing methodologies, thereby influencing the overall system. While escalating fines may deter insurance firms from deploying audit strategies, a balanced approach is crucial in penalty policy formulation. Conversely, during extensive data breaches, the efficacy of government penalties diminishes due to the substantial compensation obligations faced by all parties involved, rendering increased fines counterproductive and potentially dissuading proactive strategy implementation.
Third, moderate subsidies can incentivize medical institutions to share information more actively. In contrast to previous studies (38), excessive subsidies may actually weaken their motivation. When receiving a small subsidy, medical institutions tend to forsake the strategy of low data breach probability in favor of partially anonymous information sharing to maximize profit. With limited resources, they may prioritize economic benefits over data security. As the subsidy amount increases, institutions are more likely to adopt fully anonymous information sharing and lower data breach probability. Sufficient financial incentives can encourage institutions to implement prudent data handling practices, thereby reducing the risk of data breaches. Although government subsidies aim to promote secure data management strategies, over-subsidization may backfire by diminishing the incentives for platforms to choose strictly regulated strategies and for insurance companies to conduct audits.
Fourth, the audit mechanisms of insurance companies enhance claim processing efficiency. However, as efficiency increases, the growth in their willingness to conduct audits gradually diminishes. There is an efficiency threshold beyond which further improvement does not significantly increase medical institutions' motivation to share information. Therefore, insurance companies should strive to find the optimal balance between cost and efficiency.
Fifth, an increase in insurance fraud probability diminishes the auditing enthusiasm of insurance companies while augmenting the regulatory zeal of platforms. An optimal level of insurance fraud probability exists that maximizes both the information sharing by medical institutions and the regulatory willingness of platforms. Consequently, insurance companies should maintain the probability of insurance fraud at this optimal level to optimize cost-effectiveness.
Sixth, the probability of detecting unreasonable charges significantly impacts both medical institutions and insurance companies. Compared to previous studies (39), our findings indicate that medical institutions tend to overlook the potential risk of data breaches, prioritizing the adoption of partially anonymous information-sharing strategies when such strategies substantially increase the likelihood of identifying unjustified billing. In their pursuit of economic efficiency and regulatory compliance, medical institutions may compromise a certain level of data privacy protection.
Although the implementation of audit strategies by insurance companies enhances the detection of unreasonable charges, it does not yield significant efficiency gains or motivate the various actors in the healthcare chain effectively. Medical institutions should be the primary force in detecting unreasonable charges and should allocate more resources to this area, while insurance companies should play a supportive role and avoid considering this issue as a central concern to prevent over-investment with limited returns. This means that tasks should be rationally allocated to ensure maximum efficiency with limited resources. For medical institutions, although there is a cost associated with detecting unreasonable charges, such an investment is justifiable given the potential benefits, including avoiding financial losses and maintaining reputation. Conversely, for insurance companies, prioritizing this issue may result in costs outweighing the benefits.
6.2 Theoretical findings
The objective of this study is to investigate the mechanisms for fostering collaboration between healthcare institutions and commercial health insurers through the sharing of medical data. Methodologically, the research employs evolutionary game theory, predicated on the assumption that both healthcare providers, digital platforms, and insurance entities exhibit bounded rationality. In constructing the model, variables such as irrational billing practices within medical settings, the efficacy of insurance claim processing, data security concerns among stakeholders, and the implementation of incentive and punitive measures in response to data breaches were incorporated. Results indicate that elements like inappropriate charges, claim processing efficiency, and the presence of rewards and penalties significantly impact the evolutionary trajectory of medical data-sharing behaviors. This investigation contributes not only methodological insights and modeling frameworks for enhancing cooperation between healthcare entities and commercial insurers but also broadens the application domains and theoretical boundaries of evolutionary game theory. Future research avenues might involve the utilization of more sophisticated mathematical models to precisely characterize collaborative interactions between healthcare institutions and commercial insurers, and exploring quadruple games or other advanced gaming approaches to delve deeper into the cooperative dynamics of these parties.
6.3 Management insights
Drawing from the analysis, several managerial implications emerge to foster medical institution and commercial health insurance development via healthcare data sharing. Firstly, this study introduces a novel multi-object cost-sharing mechanism in medical information security. By delineating responsibilities for data breaches and instituting a rational cost-sharing framework, it incentivizes active regulatory and auditing participation, facilitating fully anonymous information exchange in healthcare settings. This bolsters data protection, ensuring service quality and safety.
Secondly, policy penalties are essential for monitoring minor data breaches. However, in cases of major breaches, compensation should be prompt, tempered by avoiding overly stringent governmental sanctions that could deter long-term incentives for full anonymity in data sharing. Governments are advised to adopt a balanced, flexible approach in regulation, securing data while fostering information flow for a thriving healthcare sector.
Thirdly, moderate subsidies can stimulate medical institutions' engagement in information sharing, crucial for optimizing resource allocation. Careful subsidy amount determination is vital to avoid detrimental effects of excessive or insufficient funding, enhancing overall service efficiency, innovation, and technological advancement in medicine.
Fourthly, insurance companies must enhance claim processing efficiency through optimized audit processes, yet remain cautious against overinvestment in audit technologies to prevent diminishing returns. Striking this balance is key to operational efficacy across the healthcare ecosystem, alleviating institutional burdens, and strengthening patient trust in insurance services.
Fifthly, fraudulent claims impair insurers' audit enthusiasm and platform regulation. Managing insurance fraud probability optimally ensures audit effectiveness and minimizes unnecessary expenses, vital for a stable and healthy insurance market.
Lastly, intensifying audits on unreasonable charges aids insurers in cost control and encourages fair pricing and transparency within medical institutions. Addressing such charges seriously fosters a fairer, more transparent healthcare market, boosting patient confidence, insurance company credibility, and competitiveness, thereby advancing medical information sharing.
6.4 Potential ethical concerns
Due to disparities in size, service quality, and other aspects between smaller and larger medical institutions, stringent penalties may deter smaller entities from participating in information sharing. This paper introduces a collaborative liability framework wherein the government imposes penalties for minor data breaches. For significant breaches, the costs are shared among medical institutions, digital platforms, and insurance companies, alleviating the burden on smaller institutions without governmental penalties. Large-scale data breaches infringe upon legal boundaries and are not merely moral issues or matters that can be resolved through government fines alone. They require accountability in accordance with local laws. Furthermore, the Chinese government is spearheading an initiative alongside various organizations to establish a unified big data innovation platform, ensuring regional medical data conformity and facilitating cross-regional information sharing.
6.5 Limitations and future directions
Although evolutionary game theory has been employed to analyze how medical data sharing fosters collaboration between healthcare providers and commercial insurers, several limitations persist. The model, while reflecting real-world conditions closely, fails to encompass all intricacies and variances inherent in practice. Future empirical research can be conducted to test the theoretical predictions of the model and validate the effectiveness of its assumptions. Moreover, the investigation predominantly adopts a micro-level viewpoint, concentrating on the dynamics of cooperation promotion via data exchange, neglecting broader macroeconomic and political influences. Subsequent research should delve into these overarching factors' impact on data sharing and collaborative frameworks. Additionally, the study overlooks the burgeoning role of technologies like blockchain and AI in shaping data-sharing practices and their consequent effects on partnerships within the sector. Future inquiries are encouraged to incorporate these technological trends' influence on sharing behaviors and their transformative potential for collaboration paradigms.
Data availability statement
The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.
Author contributions
SB: Conceptualization, Funding acquisition, Investigation, Project administration, Resources, Supervision, Writing – review & editing. JZ: Conceptualization, Formal analysis, Methodology, Software, Validation, Visualization, Writing – original draft. WW: Formal analysis, Validation, Writing – review & editing. DG: Writing – review & editing. XG: Writing – review & editing.
Funding
The author(s) declare financial support was received for the research, authorship, and/or publication of this article. This work was funded by Heilongjiang Provincial Social Science Fund (grant no. 22GLD356).
Conflict of interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Publisher's note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
References
1. Kalkman S, Van Delden J, Banerjee A, Tyl B, Mostert M, Van Thiel G, et al. Patients' and public views and attitudes towards the sharing of health data for research: a narrative review of the empirical evidence. J Med Ethics. (2022) 48:3–13. doi: 10.1136/medethics-2019-105651
2. Chen Y. Research on healthcare data sharing and personal information protection. J Intell. (2023) 42:192–9. doi: 10.3969/j.issn.1002-1965.2023.05.026
3. Ansar K, Ahmed M, Helfert M, Kim J. Blockchain-based data breach detection: approaches, challenges, and future directions. Math. (2023) 12:107. doi: 10.3390/math12010107
4. Han P, Gu L, Ye D, Li N. Research on evolutionary game of blockchain-based government data sharing under reward and punishment. JIEM. (2024) 38:122–32. doi: 10.13587/j.cnki.jieem.2024.04.008
5. Vidhya S, Kalaivani V. A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme. Peer Peer Netw Appl. (2023) 16:900–13. doi: 10.1007/s12083-023-01449-1
6. Cheng L, Liu G, Huang H, Wang X, Chen Y, Zhang J, et al. Equilibrium analysis of general N-population multi-strategy games for generation-side long-term bidding: an evolutionary game perspective. J Cleaner Prod. (2020) 276:124123. doi: 10.1016/j.jclepro.2020.124123
7. Zhang L, Zhao X, Wang M, Li J, Han Z. Construction and strategy exploration of stepped regional medical and health resources information integration sharing platform. Chin Sci Tech. (2022) 38:187–92. doi: 10.3969/j.issn.1002-9753.2022.z1.022
8. Centola D, Becker J, Zhang J, Aysola J, Guilbeault D, Khoong E, et al. Experimental evidence for structured information–sharing networks reducing medical errors. PNAS. (2023) 120:e2108290120. doi: 10.1073/pnas.2108290120
9. Sauer LM, Resnick B, Links JL, Garibaldi BT, Rutkow L. Information challenges associated with accessing and sharing of patient information in disasters: a qualitative analysis. Health Secur. (2023) 21:479–88. doi: 10.1089/hs.2023.0058
10. Claus LE, Amos JM, Links AR, Beach MC, Boss EF. Surgeon information-sharing, parent verbal engagement, and parent knowledge of pediatric adenotonsillectomy. Otolaryng Head Neck Surg. (2024) 170:552–9. doi: 10.1002/ohn.549
11. Benevento M, Mandarelli G, Carravetta F, Ferorelli D, Caterino C, Nicolì S, et al. Measuring the willingness to share personal health information: a systematic review. Front Public Health. (2023) 11:1213615. doi: 10.3389/fpubh.2023.1213615
12. Kim Y, Ayvaci MU, Raghunathan S, Ayer T. When it creates legal vulnerability: not just overutilization but underprovisioning of health care could be a consequence. MIS Q. (2022) 46:1483–516.
13. Wang C, Liu S, Yang H, Guo J, Wu Y, Liu J, et al. Ethical considerations of using ChatGPT in health care. J Med Internet Res. (2023) 25:e48009. doi: 10.2196/48009
14. Li J, Meng Y, Ma L, Du S, Zhu H, Pei Q, et al. federated learning based privacy-preserving smart healthcare system. IEEE Trans Ind Inform. (2021) 18:2021–31. doi: 10.1109/TII.2021.3098010
15. Naik N, Hameed BZ, Shetty DK, Swain D, Shah M, Paul R, et al. Legal and ethical consideration in artificial intelligence in healthcare: who takes responsibility? Front Surg. (2022) 9:266. doi: 10.3389/fsurg.2022.862322
16. Wang Q, Jiang S, Ngai EW, Huo B. Vendor selection in the wake of data breaches: a longitudinal study. J Oper Manag. (2024) 70:568–99. doi: 10.1002/joom.1294
17. Dolezel D, Beauvais B, Stigler Granados P, Fulton L, Kruse CS. Effects of internal and external factors on hospital data breaches: quantitative study. J Med Internet Res. (2023) 25:e51471. doi: 10.2196/51471
18. Settipalli L, Gangadharan GR. QFBN: quorum based federated blockchain network for healthcare system to avoid multiple benefits and data breaches. IEEE Consum Electron Mag. (2022) 13:24–35. doi: 10.1109/MCE.2022.3188880
19. Ma J, Gong L, Fan J. Pricing strategy and coordination of small-to medium-sized enterprises based on bank-insurance cooperative financing. Manag Decis Econ. (2022) 43:3915–30. doi: 10.1002/mde.3637
20. Fan C, Li C, Song X. The relationship between health insurance and economic performance: an empirical study based on meta-analysis. Front Public Health. (2024) 12:1365877. doi: 10.3389/fpubh.2024.1365877
21. Shen T, Wang Y, Xie J, Han X, Shao R, Jiang R, et al. Correlates of residents' enrolment intention toward inclusive commercial health insurance in China: involvement, perceived benefit, perceived sacrifice, and government participation. Front Public Health. (2023) 11:1121783. doi: 10.3389/fpubh.2023.1121783
22. Ma HL, Leung LC, Chung SH, Wong CWH. Insurance incentive to shippers by a container port: issues of risk management in supply chain finance. Ann Oper Res. (2023) 331:121–39. doi: 10.1007/s10479-021-04261-3
23. Li B, Du Z, Wang M. Financing preference and the role of credit insurance in a green supply chain. Manag Dec Econ. (2022) 43:3882–97. doi: 10.1002/mde.3635
24. Gupta S, Ghardallou W, Pandey DK, Sahu GP. Artificial intelligence adoption in the insurance industry: evidence using the technology–organization–environment framework. Res Int Bu Financ. (2022) 63:101757. doi: 10.1016/j.ribaf.2022.101757
25. Wager KA, Lee FW, Glaser JP. Health Care Information Systems: A Practical Approach for Health Care Management. Hoboken, NJ: John Wiley and Sons. (2021).
26. Wang W, Cai G. Curtailing bank loan and loan insurance under risk regulations in supply chain finance. Managt Sci. (2024) 70:2682–98. doi: 10.1287/mnsc.2023.4827
27. Mahmoudi SE. Late-career unemployment shocks, pension outcomes and unemployment insurance. J Public Econ. (2023) 218:104751. doi: 10.1016/j.jpubeco.2022.104751
28. He Y, Ren Y. Can carbon sink insurance and financial subsidies improve the carbon sequestration capacity of forestry? J Clean Prod. (2023) 397:136618. doi: 10.1016/j.jclepro.2023.136618
29. Nowrozy R, Ahmed K, Kayes ASM, Wang H, McIntosh TR. Privacy preservation of electronic health records in the modern era: a systematic survey. ACM Comput Surv. (2024) 56:1–37. doi: 10.1145/3653297
30. Chen M, Esmaeilzadeh P. Adoption and use of various health information exchange methods for sending inside health information in US hospitals. Int J Med Inform. (2023) 177:105156. doi: 10.1016/j.ijmedinf.2023.105156
31. Shan SN, Zhang ZC, Ji WY, Wang H. Analysis of collaborative urban public crisis governance in complex system: a multi-agent stochastic evolutionary game approach. Sustain Cities Soc. (2023) 91:104418. doi: 10.1016/j.scs.2023.104418
32. Scheibner J, Raisaro JL, Troncoso-Pastoriza JR, Ienca M, Fellay J, Vayena E, et al. Revolutionizing medical data sharing using advanced privacy-enhancing technologies: technical, legal, and ethical synthesis. J Med Internet Res. (2021) 23:e25120. doi: 10.2196/25120
33. Du M, Chen Q, Chen J, Ma X. An optimized consortium blockchain for medical information sharing. IEEE Trans Eng Manage. (2020) 68:1677–89. doi: 10.1109/TEM.2020.2966832
34. Ismagilova E, Hughes L, Rana NP, Dwivedi YK. Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework. Inform Syst Front. (2022) 24:393–414. doi: 10.1007/s10796-020-10044-1
35. Anderson EW, Fornell C, Lehmann DR. Customer satisfaction, market share, and profitability: findings from Sweden. J marketing. (1994) 58:53–66. doi: 10.1177/002224299405800304
36. Pool J, Akhlaghpour S, Fatehi F, Burton-Jones A. A systematic analysis of failures in protecting personal health data: a scoping review. Int J Inform Manage. (2024) 74:102719. doi: 10.1016/j.ijinfomgt.2023.102719
37. de Kok JW, de la Hoz MÁA, de Jong Y, Brokke V, Elbers PW, Thoral P, et al. A guide to sharing open healthcare data under the general data protection regulation. Sci data. (2023). 10, 404. doi: 10.1038/s41597-023-02256-2
38. Pan Y, Ng CT, Dong C, Cheng TCE. Information sharing and coordination in a vaccine supply chain. Ann Oper Res. (2023) 329:1197–220. doi: 10.1007/s10479-022-04562-1
Keywords: anonymous information sharing, medical data, data breaches, medical institution, information sharing, digital platform
Citation: Bai S, Zheng J, Wu W, Gao D and Gu X (2024) Research on healthcare data sharing in the context of digital platforms considering the risks of data breaches. Front. Public Health 12:1438579. doi: 10.3389/fpubh.2024.1438579
Received: 26 May 2024; Accepted: 21 October 2024;
Published: 06 November 2024.
Edited by:
Yawen Jiang, Sun Yat-sen University, Shenzhen Campus, ChinaReviewed by:
Gui Jin, China University of Geosciences Wuhan, ChinaMd Atiqul Haque, Hajee Mohammad Danesh Science & Technology University, Bangladesh
Kimiya Gohari, Tarbiat Modares University, Iran
Jusheng Liu, Shanghai University of Political Science and Law, China
Copyright © 2024 Bai, Zheng, Wu, Gao and Gu. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Wenya Wu, wuwenya2021@163.com