The Human Firewall Imperative: A Narrative Review of Interprofessional Collaboration for Cybersecurity in Patient-Centric Digital Healthcare

Hamad Hamdan Saad Al-Qahtani (1) , Salah Mohammed H Alshhry ,  Ruba Abdullah A Hadadi (1) , Ebtehal Turqi Alotaibi (1) , Ahmed Ali Abuazzam (2) , Sultan Shami Ali Othaibi (3) , Hadi Rasheed Mohammed Kumait (3) , Abdullah Ali Abdullah Dighriri (4) , Shaker Nayyaf Bader Alotaibi (5) , Alabbas Ibrahim Hussian Althurwi (6) , Atiah Abulrazaq Abdullah Mohmmed (7) , Norah Ghalib Alrowaili (8) , Baha Haweidi Aldosari (9)
(1) Erada Hospital For Mental Health In Al-Kharj,Ministry of Health, Saudi Arabia,
(2) Erada And Mental Health Complex In Riyadh, Third Health Cluster,Ministry of Health, Saudi Arabia,
(3) Erada Mental Health Hospital In Jazan,Ministry of Health, Saudi Arabia,
(4) Samta General Hospital,Ministry of Health, Saudi Arabia,
(5) Primary Care Center Rafai Aljamsh,Ministry of Health, Saudi Arabia,
(6) Aledabi General Hospital, Ministry of Health, Saudi Arabia,
(7) King Fahad Central Hospital-Jazan,Ministry of Health, Saudi Arabia,
(8) Haddah Primary Health Center,Ministry of Health, Saudi Arabia,
(9) King Salman Bin Abdulaziz Hospital,Ministry of Health, Saudi Arabia

Abstract

Background: The digitization of healthcare, while transformative, has exponentially expanded the attack surface for cyber threats. Patient-centric care models, which rely on seamless data flow across disciplines such as nursing, radiology, and family medicine, create unique vulnerabilities where clinical efficiency can conflict with security protocols. Cybersecurity is no longer a sole IT concern but a critical patient safety and care continuity issue.


Aim: This narrative review aims to analyze and synthesize evidence on collaborative frameworks that integrate frontline clinical disciplines—specifically nursing, radiology, and family medicine—with information security professionals to protect health data. 


Methods: A comprehensive search of PubMed, CINAHL, IEEE Xplore, and Scopus databases (2010-2024) was conducted. Keywords included interdisciplinary teams, cybersecurity, health information security, nursing informatics, radiology information systems, and primary care. Empirical studies, review articles, and framework proposals were included.


Results: Successful cybersecurity is predicated on moving beyond technical silos to embrace an interprofessional stewardship model. Nurses are pivotal in access control and phishing defense; radiologists govern high-risk imaging data workflows; family physicians balance accessibility with security in shared records. Effective frameworks incorporate embedded security champions, simulation-based training, and collaborative incident response protocols that prioritize clinical needs. A recurring theme is the tension between usability and security, mitigated through co-designed workflows.


Conclusion: Protecting patient data requires reconceptualizing cybersecurity as a shared, clinical-adjacent competency. Institutional strategies must foster authentic collaboration between IT security and frontline clinicians, investing in role-specific education, joint governance structures, and workflow-integrated security tools.

Full text article

Generated from XML file

References

Abdulhameed, I. S., Al-Mejibli, I., & Naif, J. R. (2021). The security and privacy of electronic health records in healthcare systems: A systematic review. Turkish Journal of Computer and Mathematics Education, 12(10), 1979-1992.

Ajami, S., & Arab-Chadegani, R. (2014). The effects of applying information technology on job empowerment dimensions. Journal of Education and Health promotion, 3(1), 84. DOI: 10.4103/2277-9531.139250

Aldossri, R., & Hafizur Rahman, M. M. (2023). A Systematic Literature Review on Cybersecurity Issues in Healthcare. Computational Vision and Bio-Inspired Computing: Proceedings of ICCVBIC 2022, 813-823. https://doi.org/10.1007/978-981-19-9819-5_58

Aljuraid, R., & Justinia, T. (2022). Classification of challenges and threats in healthcare cybersecurity: a systematic review. Advances in Informatics, Management and Technology in Healthcare, 362-365. doi:10.3233/SHTI220739

Carayon, P., & Hoonakker, P. (2019). Human factors and usability for health information technology: old and new challenges. Yearbook of medical informatics, 28(01), 071-077. DOI: 10.1055/s-0039-1677907

Choudhri, A. F., Chatterjee, A. R., Javan, R., Radvany, M. G., & Shih, G. (2015). Security issues for mobile medical imaging: a primer. Radiographics, 35(6), 1814-1824. https://doi.org/10.1148/rg.2015140039

Folasole, A., Adegboye, O. S., Ekuewa, O. I., & Eshua, P. E. (2023). Security, privacy challenges and available countermeasures in electronic health record systems: a review. European Journal of Electrical Engineering and Computer Science, 7(6), 27-33. https://doi.org/10.24018/ejece.2023.7.6.561

Frumento, E. (2019). Cybersecurity and the evolutions of healthcare: challenges and threats behind its evolution. In M_Health current and future applications (pp. 35-69). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-02182-5_4

García-Sánchez, S., Somoza-Fernández, B., de Lorenzo-Pinto, A., Ortega-Navarro, C., Herranz-Alonso, A., & Sanjurjo, M. (2022). Mobile health apps providing information on drugs for adult emergency care: systematic search on app stores and content analysis. JMIR mHealth and uHealth, 10(4), e29985. https://doi.org/10.2196/29985

Gastaldi, L., Appio, F. P., Corso, M., & Pistorio, A. (2018). Managing the exploration-exploitation paradox in healthcare: Three complementary paths to leverage on the digital transformation. Business Process Management Journal, 24(5), 1200-1234. https://doi.org/10.1108/BPMJ-04-2017-0092

Ghahremani, T., & Farnia, F. (2023). Investigating the Effect of Moral Disengagement and Organizational Culture on Behaviors Related to Information Security Awareness; Case Study Saderat and Mellat Banks. Iranian Journal of Information Processing and Management, 39(2), 453-476. https://doi.org/10.22034/jipm.2023.709000

Graber, M. L., Siegal, D., Riah, H., Johnston, D., & Kenyon, K. (2019). Electronic health record–related events in medical malpractice claims. Journal of patient safety, 15(2), 77-85. DOI: 10.1097/PTS.0000000000000240

Hadlington, L., Binder, J., & Stanulewicz, N. (2021). Exploring role of moral disengagement and counterproductive work behaviours in information security awareness. Computers in Human Behavior, 114, 106557. https://doi.org/10.1016/j.chb.2020.106557

Kelly, B. S., Quinn, C., Belton, N., Lawlor, A., Killeen, R. P., & Burrell, J. (2023). Cybersecurity considerations for radiology departments involved with artificial intelligence. European radiology, 33(12), 8833-8841. https://doi.org/10.1007/s00330-023-09860-1

Keshta, I., & Odeh, A. (2021). Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal, 22(2), 177-183. https://doi.org/10.1016/j.eij.2020.07.003

Koppel, R., Kuziemsky, C., Elkin, P. L., Monkman, H., Lesselroth, B., & Nøhr, C. G. (2023). Differential Perceptions of What Constitutes a Medical Error Associated with Electronic Medical Records. In Context Sensitive Health Informatics and the Pandemic Boost (pp. 21-25). IOS Press. DOI: 10.3233/SHTI230361

Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1-10. https://doi.org/10.3233/THC-161263

Mahou, X., Barral, B., Fernández, Á., Bouzas-Lorenzo, R., & Cernadas, A. (2021). eHealth and mHealth development in Spain: promise or reality?. International Journal of Environmental Research and Public Health, 18(24), 13055. https://doi.org/10.3390/ijerph182413055

Martínez-Pérez, B., De La Torre-Díez, I., & López-Coronado, M. (2015). Privacy and security in mobile health apps: a review and recommendations. Journal of medical systems, 39(1), 181. https://doi.org/10.1007/s10916-014-0181-3

Melnick, E. R., West, C. P., Nath, B., Cipriano, P. F., Peterson, C., Satele, D. V., ... & Dyrbye, L. N. (2021). The association between perceived electronic health record usability and professional burnout among US nurses. Journal of the American Medical Informatics Association, 28(8), 1632-1641. https://doi.org/10.1093/jamia/ocab059

Mumtaz, H., Riaz, M. H., Wajid, H., Saqib, M., Zeeshan, M. H., Khan, S. E., ... & Vohra, L. I. (2023). Current challenges and potential solutions to the use of digital health technologies in evidence generation: a narrative review. Frontiers in digital health, 5, 1203945. https://doi.org/10.3389/fdgth.2023.1203945

Mun, S. K., Lo, S. C. B., Wong, K., Koh, D. M., & Prior, F. (2023). Emerging value-based radiology in the era of artificial intelligence. Medical Research Archives, 11(5). https://doi.org/10.18103/mra.v11i5.3915

Offner, K. L., Sitnikova, E., Joiner, K., & MacIntyre, C. R. (2021). Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation. Health Security Intelligence, 92-121.

Patel, A. U., Williams, C. L., Hart, S. N., Garcia, C. A., Durant, T. J., Cornish, T. C., & McClintock, D. S. (2023). Cybersecurity and information assurance for the clinical laboratory. The journal of applied laboratory medicine, 8(1), 145-161. https://doi.org/10.1093/jalm/jfac119

Razaque, A., Amsaad, F., Khan, M. J., Hariri, S., Chen, S., Siting, C., & Ji, X. (2019). Survey: Cybersecurity vulnerabilities, attacks and solutions in the medical domain. IEEE access, 7, 168774-168797. https://doi.org/10.1109/ACCESS.2019.2950849

Sittig, D. F., Wright, A., Coiera, E., Magrabi, F., Ratwani, R., Bates, D. W., & Singh, H. (2020). Current challenges in health information technology–related patient safety. Health informatics journal, 26(1), 181-189. https://doi.org/10.1177/1460458218814893

Sittig, D. F., & Singh, H. (2010). A new sociotechnical model for studying health information technology in complex adaptive healthcare systems. BMJ Quality & Safety, 19(Suppl 3), i68-i74. https://doi.org/10.1136/qshc.2010.042085

Williams, P. A., & Woodward, A. J. (2015). Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical Devices: Evidence and Research, 305-316.

Zadvinskis, I. M., Smith, J. G., & Yen, P. Y. (2018). Nurses’ experience with health information technology: Longitudinal qualitative study. JMIR medical informatics, 6(2), e8734. https://doi.org/10.2196/medinform.8734

Zeb, S., Mahmood, A., Khowaja, S. A., Dev, K., Hassan, S. A., Qureshi, N. M. F., ... & Bellavista, P. (2022). Industry 5.0 is coming: A survey on intelligent nextG wireless networks as technological enablers. arXiv preprint arXiv:2205.09084. https://doi.org/10.48550/arXiv.2205.09084

Zhang, B., Rahmatullah, B., Wang, S. L., Zaidan, A. A., Zaidan, B. B., & Liu, P. (2023). A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations. Multimedia Tools and Applications, 82(14), 21867-21906. https://doi.org/10.1007/s11042-020-09629-4

Authors

Hamad Hamdan Saad Al-Qahtani
Hhmmhhm8@Gmail.Com (Primary Contact)
Salah Mohammed H Alshhry
 Ruba Abdullah A Hadadi
Ebtehal Turqi Alotaibi
Ahmed Ali Abuazzam
Sultan Shami Ali Othaibi
Hadi Rasheed Mohammed Kumait
Abdullah Ali Abdullah Dighriri
Shaker Nayyaf Bader Alotaibi
Alabbas Ibrahim Hussian Althurwi
Atiah Abulrazaq Abdullah Mohmmed
Norah Ghalib Alrowaili
Baha Haweidi Aldosari
Al-Qahtani, H. H. S., Salah Mohammed H Alshhry,  Ruba Abdullah A Hadadi, Ebtehal Turqi Alotaibi, Ahmed Ali Abuazzam, Sultan Shami Ali Othaibi, … Baha Haweidi Aldosari. (2024). The Human Firewall Imperative: A Narrative Review of Interprofessional Collaboration for Cybersecurity in Patient-Centric Digital Healthcare. Saudi Journal of Medicine and Public Health, 1(2), 1277–1283. https://doi.org/10.64483/202412337

Article Details

Similar Articles

<< < 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)