The Human Firewall Imperative: A Narrative Review of Interprofessional Collaboration for Cybersecurity in Patient-Centric Digital Healthcare
Abstract
Background: The digitization of healthcare, while transformative, has exponentially expanded the attack surface for cyber threats. Patient-centric care models, which rely on seamless data flow across disciplines such as nursing, radiology, and family medicine, create unique vulnerabilities where clinical efficiency can conflict with security protocols. Cybersecurity is no longer a sole IT concern but a critical patient safety and care continuity issue.
Aim: This narrative review aims to analyze and synthesize evidence on collaborative frameworks that integrate frontline clinical disciplines—specifically nursing, radiology, and family medicine—with information security professionals to protect health data.
Methods: A comprehensive search of PubMed, CINAHL, IEEE Xplore, and Scopus databases (2010-2024) was conducted. Keywords included interdisciplinary teams, cybersecurity, health information security, nursing informatics, radiology information systems, and primary care. Empirical studies, review articles, and framework proposals were included.
Results: Successful cybersecurity is predicated on moving beyond technical silos to embrace an interprofessional stewardship model. Nurses are pivotal in access control and phishing defense; radiologists govern high-risk imaging data workflows; family physicians balance accessibility with security in shared records. Effective frameworks incorporate embedded security champions, simulation-based training, and collaborative incident response protocols that prioritize clinical needs. A recurring theme is the tension between usability and security, mitigated through co-designed workflows.
Conclusion: Protecting patient data requires reconceptualizing cybersecurity as a shared, clinical-adjacent competency. Institutional strategies must foster authentic collaboration between IT security and frontline clinicians, investing in role-specific education, joint governance structures, and workflow-integrated security tools.
Full text article
References
Abdulhameed, I. S., Al-Mejibli, I., & Naif, J. R. (2021). The security and privacy of electronic health records in healthcare systems: A systematic review. Turkish Journal of Computer and Mathematics Education, 12(10), 1979-1992.
Ajami, S., & Arab-Chadegani, R. (2014). The effects of applying information technology on job empowerment dimensions. Journal of Education and Health promotion, 3(1), 84. DOI: 10.4103/2277-9531.139250
Aldossri, R., & Hafizur Rahman, M. M. (2023). A Systematic Literature Review on Cybersecurity Issues in Healthcare. Computational Vision and Bio-Inspired Computing: Proceedings of ICCVBIC 2022, 813-823. https://doi.org/10.1007/978-981-19-9819-5_58
Aljuraid, R., & Justinia, T. (2022). Classification of challenges and threats in healthcare cybersecurity: a systematic review. Advances in Informatics, Management and Technology in Healthcare, 362-365. doi:10.3233/SHTI220739
Carayon, P., & Hoonakker, P. (2019). Human factors and usability for health information technology: old and new challenges. Yearbook of medical informatics, 28(01), 071-077. DOI: 10.1055/s-0039-1677907
Choudhri, A. F., Chatterjee, A. R., Javan, R., Radvany, M. G., & Shih, G. (2015). Security issues for mobile medical imaging: a primer. Radiographics, 35(6), 1814-1824. https://doi.org/10.1148/rg.2015140039
Folasole, A., Adegboye, O. S., Ekuewa, O. I., & Eshua, P. E. (2023). Security, privacy challenges and available countermeasures in electronic health record systems: a review. European Journal of Electrical Engineering and Computer Science, 7(6), 27-33. https://doi.org/10.24018/ejece.2023.7.6.561
Frumento, E. (2019). Cybersecurity and the evolutions of healthcare: challenges and threats behind its evolution. In M_Health current and future applications (pp. 35-69). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-02182-5_4
García-Sánchez, S., Somoza-Fernández, B., de Lorenzo-Pinto, A., Ortega-Navarro, C., Herranz-Alonso, A., & Sanjurjo, M. (2022). Mobile health apps providing information on drugs for adult emergency care: systematic search on app stores and content analysis. JMIR mHealth and uHealth, 10(4), e29985. https://doi.org/10.2196/29985
Gastaldi, L., Appio, F. P., Corso, M., & Pistorio, A. (2018). Managing the exploration-exploitation paradox in healthcare: Three complementary paths to leverage on the digital transformation. Business Process Management Journal, 24(5), 1200-1234. https://doi.org/10.1108/BPMJ-04-2017-0092
Ghahremani, T., & Farnia, F. (2023). Investigating the Effect of Moral Disengagement and Organizational Culture on Behaviors Related to Information Security Awareness; Case Study Saderat and Mellat Banks. Iranian Journal of Information Processing and Management, 39(2), 453-476. https://doi.org/10.22034/jipm.2023.709000
Graber, M. L., Siegal, D., Riah, H., Johnston, D., & Kenyon, K. (2019). Electronic health record–related events in medical malpractice claims. Journal of patient safety, 15(2), 77-85. DOI: 10.1097/PTS.0000000000000240
Hadlington, L., Binder, J., & Stanulewicz, N. (2021). Exploring role of moral disengagement and counterproductive work behaviours in information security awareness. Computers in Human Behavior, 114, 106557. https://doi.org/10.1016/j.chb.2020.106557
Kelly, B. S., Quinn, C., Belton, N., Lawlor, A., Killeen, R. P., & Burrell, J. (2023). Cybersecurity considerations for radiology departments involved with artificial intelligence. European radiology, 33(12), 8833-8841. https://doi.org/10.1007/s00330-023-09860-1
Keshta, I., & Odeh, A. (2021). Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal, 22(2), 177-183. https://doi.org/10.1016/j.eij.2020.07.003
Koppel, R., Kuziemsky, C., Elkin, P. L., Monkman, H., Lesselroth, B., & Nøhr, C. G. (2023). Differential Perceptions of What Constitutes a Medical Error Associated with Electronic Medical Records. In Context Sensitive Health Informatics and the Pandemic Boost (pp. 21-25). IOS Press. DOI: 10.3233/SHTI230361
Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1-10. https://doi.org/10.3233/THC-161263
Mahou, X., Barral, B., Fernández, Á., Bouzas-Lorenzo, R., & Cernadas, A. (2021). eHealth and mHealth development in Spain: promise or reality?. International Journal of Environmental Research and Public Health, 18(24), 13055. https://doi.org/10.3390/ijerph182413055
Martínez-Pérez, B., De La Torre-Díez, I., & López-Coronado, M. (2015). Privacy and security in mobile health apps: a review and recommendations. Journal of medical systems, 39(1), 181. https://doi.org/10.1007/s10916-014-0181-3
Melnick, E. R., West, C. P., Nath, B., Cipriano, P. F., Peterson, C., Satele, D. V., ... & Dyrbye, L. N. (2021). The association between perceived electronic health record usability and professional burnout among US nurses. Journal of the American Medical Informatics Association, 28(8), 1632-1641. https://doi.org/10.1093/jamia/ocab059
Mumtaz, H., Riaz, M. H., Wajid, H., Saqib, M., Zeeshan, M. H., Khan, S. E., ... & Vohra, L. I. (2023). Current challenges and potential solutions to the use of digital health technologies in evidence generation: a narrative review. Frontiers in digital health, 5, 1203945. https://doi.org/10.3389/fdgth.2023.1203945
Mun, S. K., Lo, S. C. B., Wong, K., Koh, D. M., & Prior, F. (2023). Emerging value-based radiology in the era of artificial intelligence. Medical Research Archives, 11(5). https://doi.org/10.18103/mra.v11i5.3915
Offner, K. L., Sitnikova, E., Joiner, K., & MacIntyre, C. R. (2021). Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation. Health Security Intelligence, 92-121.
Patel, A. U., Williams, C. L., Hart, S. N., Garcia, C. A., Durant, T. J., Cornish, T. C., & McClintock, D. S. (2023). Cybersecurity and information assurance for the clinical laboratory. The journal of applied laboratory medicine, 8(1), 145-161. https://doi.org/10.1093/jalm/jfac119
Razaque, A., Amsaad, F., Khan, M. J., Hariri, S., Chen, S., Siting, C., & Ji, X. (2019). Survey: Cybersecurity vulnerabilities, attacks and solutions in the medical domain. IEEE access, 7, 168774-168797. https://doi.org/10.1109/ACCESS.2019.2950849
Sittig, D. F., Wright, A., Coiera, E., Magrabi, F., Ratwani, R., Bates, D. W., & Singh, H. (2020). Current challenges in health information technology–related patient safety. Health informatics journal, 26(1), 181-189. https://doi.org/10.1177/1460458218814893
Sittig, D. F., & Singh, H. (2010). A new sociotechnical model for studying health information technology in complex adaptive healthcare systems. BMJ Quality & Safety, 19(Suppl 3), i68-i74. https://doi.org/10.1136/qshc.2010.042085
Williams, P. A., & Woodward, A. J. (2015). Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical Devices: Evidence and Research, 305-316.
Zadvinskis, I. M., Smith, J. G., & Yen, P. Y. (2018). Nurses’ experience with health information technology: Longitudinal qualitative study. JMIR medical informatics, 6(2), e8734. https://doi.org/10.2196/medinform.8734
Zeb, S., Mahmood, A., Khowaja, S. A., Dev, K., Hassan, S. A., Qureshi, N. M. F., ... & Bellavista, P. (2022). Industry 5.0 is coming: A survey on intelligent nextG wireless networks as technological enablers. arXiv preprint arXiv:2205.09084. https://doi.org/10.48550/arXiv.2205.09084
Zhang, B., Rahmatullah, B., Wang, S. L., Zaidan, A. A., Zaidan, B. B., & Liu, P. (2023). A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations. Multimedia Tools and Applications, 82(14), 21867-21906. https://doi.org/10.1007/s11042-020-09629-4
Authors
Copyright (c) 2024 Hamad Hamdan Saad Al-Qahtani, Salah Mohammed H Alshhry, Ruba Abdullah A Hadadi, Ebtehal Turqi Alotaibi, Ahmed Ali Abuazzam, Sultan Shami Ali Othaibi, Hadi Rasheed Mohammed Kumait, Abdullah Ali Abdullah Dighriri, Shaker Nayyaf Bader Alotaibi, Alabbas Ibrahim Hussian Althurwi, Atiah Abulrazaq Abdullah Mohmmed, Norah Ghalib Alrowaili, Baha Haweidi Aldosari

This work is licensed under a Creative Commons Attribution 4.0 International License.