Published in last 50 years
Articles published on Identity Theft
- New
- Research Article
- 10.64823/ijter.2507004
- Nov 6, 2025
- International Journal of Technology & Emerging Research
- Dr Anjum Ajmeri R Ansari
Social media usage and internet penetration have significantly expanded nationwide since the launch of the Digital India program, promoting social and economic development. But this digital growth has also led to a dramatic increase in cybercrimes, especially on social networking sites. In the context of Digital India, this research paper conducts an analytical analysis of the rise in cybercrimes, paying particular attention to social media abuse. It looks at the characteristics, origins, and trends of cybercrimes include financial fraud, identity theft, cyberstalking, online harassment, and the spread of false information. The paper assesses court interpretations and enforcement issues while critically analyzing the current legislative framework, particularly the Information Technology Act of 2000. It highlights the main weaknesses brought on by a lack of cybersecurity measures, a lack of digital literacy, and the ever-changing nature of cyberthreats. The study identifies weaknesses in the current regulatory and preventive systems using case studies and data analysis. In order to handle the new hazards, it also suggests extensive reforms that include technological, legal, and pedagogical measures. In order to protect the goals of the Digital India program, the results highlight the urgent need for a balanced strategy that fosters digital innovation while maintaining strong cybersecurity.
- New
- Research Article
- 10.1080/17440572.2025.2579992
- Nov 3, 2025
- Global Crime
- Fawn T Ngo + 1 more
ABSTRACT Adolescents represent an emerging population at risk of identity theft, yet little is known about their engagement in preventive behaviours. Using data from a nationally representative sample of U.S. adolescents who participated in the National Crime Victimization Survey – Identity Theft Supplement (NCVS-ITS), this study examined the prevalence of six identity theft-related preventive behaviours and assessed the influence of demographic and contextual factors on the likelihood of engaging in these practices. Descriptive findings revealed low overall adoption of preventive behaviours, even among adolescents with financial accounts. Logistic regression analyses indicated that having a checking/savings account and, to a lesser extent, owning a credit card were the most consistent and significant predictors of engagement in preventive behaviours. Age and household income also emerged as significant predictors in several models, while race, gender, and ethnicity were largely nonsignificant. The implications of the findings are discussed.
- New
- Research Article
- 10.70619/vol5iss11pp51-62-659
- Nov 3, 2025
- Journal of Information and Technology
- John Bugingo + 2 more
Rwanda's digital transformation, powered by policies like the Smart Rwanda Master Plan and Vision 2050, has significantly improved service delivery and digital inclusion. However, this progress has introduced rising cybersecurity challenges, including data breaches, phishing, and digital misinformation. This paper examines the interplay between digital device adoption and cybersecurity risks in Rwanda, particularly among youth and small businesses. It explores emerging technologies, national strategies, and digital literacy programs and offers actionable policy recommendations grounded in local capacity to ensure a secure and inclusive digital ecosystem. However, this digital revolution has also ushered in a complex array of cybersecurity and network security challenges. As more citizens, especially youth and small businesses, go online, the risks of cybercrime, data breaches, online fraud, identity theft, and digital misinformation have grown substantially. Many Rwandans lack the technical literacy and awareness required to identify and mitigate these threats, making them vulnerable to exploitation. Moreover, the proliferation of Internet of Things (IoT) devices, cloud-based systems, and mobile applications has expanded the national cyber threat surface, raising concerns about the resilience and robustness of Rwanda’s digital infrastructure. This paper examines the multifaceted impact of digital device adoption on the Rwandan population, with a focus on the evolving cyber threat landscape, the vulnerabilities faced by different user segments, and the measures required to promote secure, inclusive, and equitable access to digital technologies. Particular attention is given to the role of emerging technologies such as artificial intelligence (AI), blockchain, and 5G networks in enhancing security, as well as the importance of national cybersecurity strategies, legal and policy frameworks (e.g., Rwanda’s Data Protection and Privacy Law), and regional cooperation in mitigating digital risks. In addition, the paper explores best practices in cybersecurity education, public-private partnerships, and community-driven digital literacy programs that can empower citizens to use technology safely and responsibly. The ultimate goal is to provide actionable insights for policymakers, educators, and technology stakeholders working to build a resilient digital ecosystem that safeguards users while fostering innovation and growth.
- New
- Research Article
- 10.5121/ijcsit.2025.17506
- Oct 28, 2025
- International Journal of Computer Science and Information Technology
- Mohammed Kashif + 5 more
Artificial Intelligence (AI) has transformed multiple sectors but also introduced new risks through its use in sophisticated cybercrimes. AI-driven cyberattacks leverage machine learning, deep learning, and natural language processing to enhance the scale, speed, and precision of threats like phishing, malware, identity theft, and social engineering. This paper examines AI’s dual role—both as an enabler of complex cyberattacks and a tool for cybersecurity defence. Real-world examples include deepfake scams, heuristic malware, and AI-powered reconnaissance tools utilized by cybercriminals employing techniques such as Generative Adversarial Networks (GANs) and reinforcement learning to bypass conventional security systems. The dynamic nature of AI-enabled threats complicates detection and response, as these attacks adapt in real time. Conversely, AI is also applied defensively for predictive threat modelling, anomaly detection, behaviour-based intrusion prevention, and rapid incident response. The research underscores the necessity of robust AI governance, ethical AI use, and international collaboration to address these challenges. It concludes by proposing a strategic roadmap for stakeholders to develop AI-aware cybersecurity systems capable of evolving alongside the continuously changing threat landscape, aiming to harness AI’s potential for protection while mitigating its exploitation for malicious purposes.
- Research Article
- 10.26483/ijarcs.v15i5.7356
- Oct 20, 2025
- international journal of advanced research in computer science
- Muleka Christelle Masudi
Banks and financial institutions in the U.S. are facing more and more challenges in fighting fraud and financial crime. Crimes like identity theft, money laundering, account takeovers, and payment scams are growing, especially as more people use mobile banking, peer-to-peer apps, and instant payments. Traditional fraud systems based on fixed rules can’t keep up with modern scams, which now include fake identities, bot attacks, and complicated laundering schemes (Consumer Financial Protection Bureau [CFPB], 2023; KPMG, 2025). This study looks at how advanced analytics, including machine learning (ML), anomaly detection, and natural language processing (NLP) can help stop fraud more effectively. We used transaction data from five U.S. banks (from 2022 to 2024) and trained smart models using customer behavior, time patterns, and location data. The results were impressive: Fraud detection accuracy went up from 74% to 93%, and False alarms dropped by 48% New types of fraud (missed by older systems) were caught 70% of the time using unsupervised models like clustering and autoencoders. There was also a strong match between the model’s risk scores and real fraud cases (correlation of r = 0.88, p < .001) (Federal Reserve, 2024). NLP tools were also successful, reaching an F1-score of 0.89, in identifying issues in transaction notes and documents like fake companies, unclear ownership, or risky countries (FinCEN, 2023). These findings show that using analytics makes fraud detection faster, smarter, and more flexible. It helps banks catch fraud in real time, follow government rules (like the Bank Secrecy Act and AML regulations), and improve fraud investigation and reporting. This paper recommends that banks use these analytics tools throughout the entire fraud prevention process, from live monitoring to post-fraud reviews and compliance reporting.
- Research Article
- 10.55324/enrichment.v3i7.511
- Oct 14, 2025
- Enrichment: Journal of Multidisciplinary Research and Development
- Izul Saputra + 2 more
Financial technology (fintech) has expanded access to financial services in Indonesia but has also heightened risks of digital crimes such as identity theft, online fraud, phishing, and malware attacks. In Banten Province, the rapid growth of fintech platforms is coupled with low digital financial literacy, making the public more vulnerable. This study examines the role of Bank Indonesia's digital financial literacy in preventing financial crimes in Banten Province using a qualitative approach with interviews, observations, and documentation studies, analyzed thematically. Findings reveal that the Bank Indonesia Banten Representative Office plays a strategic role through three main functions: (1) as a regulator emphasizing literacy as early prevention; (2) as a facilitator conducting educational programs directly and online; and (3) as a supervisor monitoring and evaluating program effectiveness. Digital financial crimes in the region have risen in both frequency and complexity, with perpetrators exploiting low literacy through phishing, illegal loans, impersonation of official institutions, and emotional manipulation. This highlights digital literacy as a primary community safeguard. In Serang City, the literacy program is delivered through seminars, training, workshops, transaction simulations, and digital channels such as social media, webinars, and educational videos. The inclusive approach is tailored to varying levels of understanding and targets students, MSMEs, and the elderly, ensuring broad community engagement in crime prevention.
- Research Article
- 10.1002/spy2.70105
- Oct 11, 2025
- SECURITY AND PRIVACY
- Himanshu Nandanwar + 1 more
ABSTRACTBlockchain technology has emerged as a pivotal solution for securing sensitive data across various domains, including artificial intelligence (AI), supply chain management, cloud computing, and healthcare. Its core attributes, confidentiality, decentralization, security, and privacy, offer significant advantages to the healthcare sector. The integration of Internet of Things (IoT) devices within healthcare systems enhances interoperability, enabling seamless communication between healthcare software and IT infrastructure. However, traditional healthcare systems face persistent security challenges, including phishing, masquerading, and identity theft. To address these issues, we propose a secure blockchain‐based decentralized application for generating, maintaining, and validating medical certificates. This application facilitates secure interactions among healthcare entities, including hospitals, patients, and IoT devices, while ensuring confidentiality, authentication, and access control through smart contracts. The proposed blockchain architecture enhances data integrity and secure transmission using the zero‐knowledge proof (ZKP) mechanism. Additionally, we incorporate the interplanetary file system (IPFS) for off‐chain data storage to optimize storage costs and enhance security through Ethereum smart contracts. Performance evaluations demonstrate the effectiveness of our approach in mitigating existing security vulnerabilities, thereby offering a robust and scalable solution for secure healthcare data management.
- Research Article
- 10.63056/acad.004.04.0912
- Oct 9, 2025
- ACADEMIA International Journal for Social Sciences
- Muqadas Sarfaraz + 5 more
The rapid shift toward digital banking in Pakistan has transformed the financial landscape while simultaneously increasing exposure to digital financial crimes such as money laundering, identity theft, and online fraud. This study examines the capacity of bank compliance units in Lahore to detect and prevent such crimes through the use of Know Your Customer (KYC) and Anti-Money Laundering (AML) tools. Adopting a quantitative cross-sectional design, the research collected survey data from 200 compliance officers representing commercial, private, and Islamic banks. To complement these findings, a synthetic dataset of 2,000 anonymized digital transactions was analyzed to evaluate how KYC and AML indicators predict fraud detection outcomes. The results reveal that well-implemented KYC and AML systems substantially enhance a bank’s ability to identify suspicious activities, explaining a large portion of variance in overall fraud detection performance. However, heavy workloads, inadequate training, and limited organizational support were found to weaken the effectiveness of compliance operations. The study concludes that improving compliance capacity requires not only advanced technological tools but also consistent staff development and stronger institutional oversight. These findings contribute to criminological and legal discussions on financial governance by emphasizing the importance of proactive institutional guardianship in safeguarding Pakistan’s digital banking ecosystem against emerging financial crimes.
- Research Article
- 10.9734/ajess/2025/v51i102518
- Oct 7, 2025
- Asian Journal of Education and Social Studies
- Joanna Reeve Canada + 3 more
The widespread use of online platforms has heightened privacy concerns among university students, reflecting the well-documented Privacy Paradox. This phenomenological study examined the lived experiences of 15 college students in Digos City, Philippines, through semi-structured interviews. The analysis identified three focal areas: privacy concerns encountered, their impacts, and coping strategies. Students reported threats such as account breaches, data exposure, and identity theft, which resulted in psychological distress, academic difficulties and social withdrawal. Coping strategies included emotional adjustment, moderated platform use, and strengthened privacy practices. The findings highlight the urgent need for universities to embed digital literacy and mental health support within student programs. The study mechanisms include emotional control, deliberate downgrading of social media activities, and enhancing countermeasures toward privacy with activities such as digital security enhancement and increased caution when online.
- Research Article
- 10.64252/6mcmfh56
- Oct 3, 2025
- International Journal of Environmental Sciences
- Vishal Vikram Singh + 4 more
Social networks have transformed the way individuals communicate, share information, and build digital communities. However, this widespread connectivity has introduced significant cybersecurity concerns that threaten user privacy, data integrity, and system resilience. This state-of-the-art survey explores the evolving landscape of social network security, identifying core challenges such as account hijacking, misinformation dissemination, malware propagation, identity theft, and AI-driven threats. The paper critically analyzes existing security frameworks, emerging attack vectors, and current defense mechanisms deployed across various platforms. In addition, it highlights the role of artificial intelligence, blockchain, and regulatory policies in shaping the future of secure social networking. By synthesizing recent advancements and ongoing research, this survey aims to provide a comprehensive understanding of the current threat environment and proposes a strategic outlook toward mitigating emerging risks in social network ecosystems.
- Research Article
- 10.47475/2311-696x-2025-46-3-124-129
- Sep 30, 2025
- LEGAL ORDER: History, Theory, Practice
- M.A Efremova
The article discusses the problem of ensuring proper protection of an individual’s digital data. Interacting online with other users, everyone leaves a digital footprint in one way or another, while forming an image of a digital personality. To gain access to various online services, you need credentials, financial information, and biometric data. The totality of such information makes it possible to identify a person in a digital environment and constitutes his digital identity. This kind of data can be the subject of digital identity theft. In addition to obtaining data about individuals, identity theft includes their use or sale, transfer to others, and further use in illegal activities. Artificial intelligence technologies have become one of the new methods used for identity theft and fraud. Deepfake technology can be used to steal personal data, just as digital identity data can be used to create a deepfake. The article concludes that in most cases the norms of the current criminal legislation can be applied to qualify the described acts. The need to focus efforts to counter identity theft and the use of deepfake technologies on a set of measures is emphasized.
- Research Article
- 10.47760/cognizance.2025.v05i09.023
- Sep 30, 2025
- Cognizance Journal of Multidisciplinary Studies
- Mary Pauline D Calungsod + 4 more
The increasing use of modern biometrics technology, such as Iris Scanning, is strong evidence of our generation leaning towards innovation and trust in modern technology. The World App by Worldcoin is a prime example of this. This app has been gaining recognition locally for offering accessible and safe access to financial services. Although the new generation is quick to adapt to new technology, numerous debates are emerging online about whether this app can truly deliver on its promises to users and whether it can effectively uphold data security, which is increasingly crucial in modern technology. Nowadays, news about data security has been flooding the internet due to the numerous victims of online fraud. This study will examine whether the World App can protect its users' data, which it has collected through its iris scanning device, known as the "Orb". This will cover related issues, such as identity theft, spoofing, and data breaches. Iris patterns are considered unique data for each person, which poses a permanent risk to millions of individuals; as a result, it could lead to data misuse if compromised. Moreover, this encompasses ethical and legal issues, such as data transparency, user consent, and legal regulations like the General Data Protection Regulation (GDPR). This will also discuss the importance of maintaining security protocols and handling sensitive biometric data in building trust with users. The imposing threats it would bring, although iris scanning improves security, reduces fraud, and accelerates digital verification, are undeniable. This study examines how World App's biometric iris scanning system addresses user privacy and security concerns by considering the risks and opportunities associated with iris scanning on financial digital platforms.
- Research Article
- 10.35335/zdghvb94
- Sep 29, 2025
- Seriat Ekonomisi
- Rohani Situmorang
The rapid growth of digital payment systems, such as e-wallets, online banking, and fintech platforms, has transformed financial transactions by offering convenience and efficiency. However, these systems remain vulnerable to fraud, identity theft, double-spending, and data breaches, raising critical concerns about transaction security. This research analyzes the application of blockchain technology in digital payment systems with a focus on improving transaction security. Employing a qualitative approach supported by a review of existing literature, the study examines blockchain’s effectiveness in preventing fraudulent activities, enhancing transparency, and fostering trust among users. The findings indicate that blockchain’s decentralized and immutable ledger, combined with cryptographic mechanisms, provides strong safeguards against unauthorized access while also reducing costs and processing times. Nonetheless, challenges such as scalability issues, high energy consumption, regulatory uncertainty, and integration complexities hinder its widespread adoption. The study concludes that blockchain represents a promising innovation for securing digital payment systems, though its success requires regulatory adaptation, technological improvement, and cross-sector collaboration. The research offers important implications for businesses seeking secure payment solutions, consumers demanding trust and safety, regulators tasked with designing supportive frameworks, and academics contributing to the evolving discourse on digital finance.
- Research Article
- 10.62872/zep90829
- Sep 24, 2025
- Ipso Jure
- Yusep Mulyana
The development of information and communication technology has presented new opportunities as well as challenges in the life of the global community. One of the negative impacts of digital transformation is the emergence of various forms of cybercrime, especially online fraud and identity theft. These two crimes have transnational characteristics so that they are difficult to deal with with national law alone. This study uses a normative juridical method with a qualitative approach to analyze national regulations and relevant international legal instruments in countering cybercrime. The results of the study show that Indonesia already has a legal basis through the ITE Law, the Criminal Code, and the Personal Data Protection Law, but still faces obstacles in terms of jurisdiction, capacity of law enforcement officials, and limitations of international agreements. At the global level, the Budapest Convention on Cybercrime and the United Nations Convention against Transnational Organized Crime (UNTOC) are important instruments, although their implementation is limited by the lack of universal state participation. Therefore, it is necessary to strengthen national regulations, increase international cooperation through extradition mechanisms and mutual legal assistance, and digital literacy of the public to prevent the widespread impact of online fraud and identity theft.
- Research Article
- Sep 16, 2025
- Revista espanola de salud publica
- Claudia Sánchez Gómez-Tostón + 1 more
The increase in aggressions through social media poses a serious threat to Public Health. The objective of this paper was to verify the existence of cyber victimization in influential women on the social media platform Instagram and determine the health consequences. A cross-sectional descriptive study was conducted through an online survey based on the Cyber Victimization Scale in Higher Education. Two additional questions were included to understand the consequences of such events on health. A sample of 150 female Instagram profiles with over 40,000 followers each, dedicated to promoting a healthy lifestyle, whether professionals in this field or not, was selected. Validity was subject to expert judgment, and reliability was measured using Cronbach's alpha. Data collection began in Spain on July 20, 2022, and the study concluded in May 2023. Fifty women responded. 74% claimed to have experienced some form of cyberbullying, with denigration being more common than identity theft. Regarding the consequences of these acts, 32% reported having suffered from a depressive and/or anxious condition related to this situation. In terms of general conditions, discouragement, stress, and anxiety stood out above the rest. This study highlights the importance of increasing research in this area due to the serious consequences it can have on health. It is essential to approach this issue with the initiative to eliminate the currently ingrained routine nature and prevent the emergence of victims and aggressors, especially among younger individuals.
- Research Article
- 10.70382/ajsitr.v9i9.045
- Sep 3, 2025
- Journal of Science Innovation and Technology Research
- Augustine Ndudi Egere + 2 more
Cybersecurity is a critical concern for individuals who rely on digital technologies for daily activities such as communication and financial transactions, particularly in underserved regions. In Northeast Nigeria, where digital literacy is low and formal education is limited, ordinary users are especially vulnerable to cyber threats such as phishing, identity theft, and social engineering. To address these risks, this paper presents a community-centric cybersecurity awareness enhancement model targeted at users with low literacy levels in this region. A mixed-methods study was conducted involving surveys and focus group discussions with participants across three states; Taraba, Adamawa, and Bauchi. In the first phase, the current cybersecurity awareness level was assessed, revealing widespread misconceptions and risky behaviors. Thereafter, localized training sessions were conducted using simplified materials and local languages. The results showed a significant improvement in the participants’ ability to recognize and respond to basic cyber threats. Notably, users who initially had no prior cybersecurity knowledge demonstrated increased awareness and behavioral change after undergoing the community-centric training. These findings confirm that cybersecurity awareness among low-literacy users can be meaningfully improved through culturally and linguistically tailored interventions.
- Research Article
- 10.69554/hbgg8150
- Sep 1, 2025
- Journal of Data Protection & Privacy
- Sanya Darakhshan Kishwar + 4 more
Deep fake technology presents a profound challenge to data protection, privacy and regulatory frameworks worldwide. By exploiting biometric data without consent, deep fakes pose severe threats to privacy frameworks such as the European Union’s (EU) General Data Protection Regulation (GDPR) and India’s Digital Personal Data Protection Act 2023 (DPDPA). The ability to manipulate digital content using artificial intelligence (AI) raises concerns over identity theft, misinformation and biometric data security. This paper examines regulatory gaps, emerging AI-driven detection strategies and the need for privacy-preserving technological solutions. Through a comparative legal analysis, we identify gaps in existing regulations and propose a privacy-centric framework for mitigating deep fake risks. We further examine AI-driven solutions for authentication and policy interventions necessary for global regulatory alignment. Our findings suggest a multitiered regulatory response integrating technology, governance and privacy laws to counter deep fake threats while protecting individual rights. This article is also included in The Business & Management Collection which can be accessed at https://hstalks.com/business/.
- Research Article
- 10.58346/jisis.2025.i3.021
- Aug 30, 2025
- Journal of Internet Services and Information Security
- Dr.K Vinutha + 5 more
The emergence of wireless networks has promoted the ease, immediacy and efficiency of access and transacting financial internet services. Nonetheless, such developments offer chances of severe criminal activities, including information violations, identity theft, and data leakage. The paper reviews protective structures of financial internet services, emphasizing secure wireless convenience and connection. It evaluates the vulnerabilities of Wi-Fi, LTE, and emerging 5G wireless communication technologies concerning confidentiality, integrity, and availability of sensitive financial information. A layered security approach towards wireless transactions is proposed and it includes end-to-end encryption, multifactor authentication, VPNs and advanced intrusion detection systems (IDS). Moreover, blockchain is regarded with zero-trust frameworks to enhance trust and transparency in the financial systems. Cases of cyberattack on financial infrastructures have revealed flaws in the current systems, demonstrating vulnerabilities in current wireless security frameworks. It is based on these trends of flexibility to develop this model to articulate the policies of the electronic security in wireless networks without infringing on the standards of PCI-DSS and GDPR. The hyper-connected world enables service providers to manage risk more effectively and deliver services safely to users by introducing risk-enhancing principles that amplify networks and financial systems. This study will be part of the overall process of improving the cybersecurity condition and resilience of financial technologies to more complex and varied vectors of cyber threats.
- Abstract
- 10.1192/j.eurpsy.2025.1795
- Aug 26, 2025
- European Psychiatry
- S F Abu Dayeh + 2 more
IntroductionThis study aimed to identify the big five personality factors among cybercrime victims in Jordan and to investigate the differences in the level of the big five personality factors due to the type of crime, gender, age, and educational level. The descriptive analytical approach was used. The study sample consisted of (515) cybercrime victims in Jordan. To achieve the aims of the study, the five major factor scale was used, and its reliability and validity were checked.ObjectivesStudy Objectives:ersonality traits of cybercrime victims in Jordan.The differences in the Big Five personality traits of cybercrime victims based on the type of cybercrime.whether Big Five personality traits among cybercrime victims varied significantly with regard to gender, age, and educational status of respondents.MethodsStudy Tool: The Big Five Personality Traits ScaleThis study used The Big Five Personality Traits Scale (Costa & McCrae, 1992) . In its original configuration, the scale consisted of 60 items or questions.Item Characteristics of the Assessments Scale: 1.Internal Construct Validity. Internal consistency was checked using Cronbach’s alpha. The Cronbach’s alpha reliability coefficient was 0.701to 0.818, which was above 0.70; therefore, it is acceptable. Scoring of the scale: A 5-point Likert scale was employed .The second question was approached with One-way ANOVA. The third question was addressed via MANOVA.ResultsThe results show that the level of extraversion and openness factors came at a high level, while the conscientiousness, agreeableness, and neuroticism factors came at a moderate level. Also, the results found that there were no differences due to the type of crime in the neuroticism factor and there were differences in the factors (extraversion in favor of device hacking crime, openness in favor of unwanted sexual crime, conscientiousness, and agreeableness in favor of identity theft crime). Also, the results show that there are differences in the factors (neuroticism, extraversion, and openness) due to gender in favor of females, and due to age in the factors (neuroticism, acceptability, and conscientiousness) in favor of less than 30 years, and the level of education in the openness factor in favor of a secondary class or less, while in the acceptability factor in favor of a bachelor, while in the scientific factor in favor of postgraduate students.ConclusionsActions should be taken against cybercrimes, which include:More education about cybercrimes and how to use internet in a safe way.Supervision of people who are still not efficient in using technology and close supervision of the way that teenagers are using high technology devices.Trainings should be done to start protecting people from such crimes.Disclosure of InterestNone Declared
- Research Article
- 10.1038/s41598-025-13831-5
- Aug 19, 2025
- Scientific Reports
- D Gowtham Chakravarthy + 3 more
Confidentiality and access control are essential to protect sensitive data, prevent cyber threats, ensure compliance, and avoid risks like identity theft. Hence, a framework towards secure patient Data access using Hybrid Integrated Hashing Method is introduced to ensure patient confidentiality and efficient data access in healthcare systems. Unlike conventional solutions that rely solely on standard blockchain and secure hash algorithm 256 for data protection, this proposed method integrates a multi-layer hybrid hashing approach combining dynamic hash chaining with temporal entropy encoding, making hash collisions virtually infeasible. A selective data compression mechanism is also embedded to maintain performance while preserving cryptographic strength. Additionally, the system employs role-based decentralized access control, enforced through smart contracts, enabling real-time permission verification and immutable audit trails. A simulated blockchain environment evaluates the proposed method’s resilience against ransomware, hash collision, and data manipulation attacks. By employing a standard secure hash algorithm 256 hashing without compression or access-layer optimization, experimental findings show 27% reduced storage usage and 35% quicker data retrieval than typical blockchain-based electronic health record systems. The system shows robust resistance to illegal access compared to traditional role-based access control systems.