You are on page 1of 10

Dr.

Sulaiman Al Habib Medical Journal (2022) 4:126–135


https://doi.org/10.1007/s44229-022-00016-9

REVIEW ARTICLE

Patient Confidentiality of Electronic Health Records: A Recent Review


of the Saudi Literature
Nada Saddig Almaghrabi1,2 · Bussma Ahmed Bugis1

Received: 31 May 2022 / Accepted: 4 July 2022 / Published online: 22 July 2022
© The Author(s) 2022

Abstract
Background Health systems harbor lucrative data that can be targeted for illegal access, thus posing a serious privacy
breach. In addition, patients could lose their lives or suffer permanent and irreversible harm due to such unauthorized access
to health care data used in treatment. To ensure patient safety, the health care sector must integrate cybersecurity into its
operations. Additionally, the health care industry must collaborate to tackle cybercrime and prevent unauthorized access to
patient data. With the rapid transition from paper-based health records to electronic health records (EHRs), it is important
to study, identify, and address the challenges that confront EHRs to protect patient confidentiality.
Aim The main goal of this research was to create a clear picture of the role of EHRs in the health care system of Saudi Arabia
regarding patient confidentiality. This work focused on the privacy and confidentiality challenges encountered in adopting
EHRs in the health care system, and the advantages of using EHRs in terms of protecting patient confidentiality.
Methods This project utilized a systematic literature review approach, and the methodology involved a careful critique of
11 recent articles.
Results The confidentiality and privacy of patient data and information must be ensured, because the health care sector
in Saudi Arabia is flawed with several security risks that may corrupt the integrity of patient data. The health care system
is facing many cybercrimes whereby hackers can gain access to confidential data and patient information. Internal factors
such as inexperienced medical personnel have also necessitated EHRs in Saudi Arabia. Health care workers who lack the
appropriate skills in handling EHRs may cause breaches of patient data, which in turn may compromise the health and safety
of the patients.
Conclusion Confidentiality and privacy are critical components of a reliable EHR system. EHR confidentiality has a signifi-
cant impact on maintaining patient safety and security, thus enhancing patient care in Saudi Arabia. Additionally, challenges
such as hackers and data breaches have slowed the adoption process among health care companies in Saudi Arabia.

Public Interest Summary


Health systems harbor data that can be targeted by cyber attackers, allowing hackers to gain access to confidential data and
information about patients. Patients may lose their lives or suffer permanent and irreversible harm as a result of unauthorized
access to health care data used in treatment. To ensure patient safety, the health care sector must integrate cybersecurity into
its operations. Additionally, the health care industry must collaborate to tackle cybercrime and prevent unauthorized access to
patient data. With the rapid transition from paper health records to electronic health records, it is important to identify, study,

* Bussma Ahmed Bugis


bussma31311@yahoo.com
Nada Saddig Almaghrabi
nadasalmaghrabi@gmail.com
1
Department of Public Health, College of Health Sciences,
Saudi Electronic University, Riyadh, Saudi Arabia
2
Pathology and Clinical Laboratory Medicine Administration,
King Fahad Medical City, Riyadh, Saudi Arabia

13
Vol:.(1234567890)
Dr. Sulaiman Al Habib Medical Journal (2022) 4:126–135 127

and address the challenges that confront electronic health records in terms of protecting patient confidentiality. Examples of
factors that may affect patient confidentiality are healthcare security software, and relationships between health professionals.

Keywords Electronic health records · Saudi Arabia · Patient confidentiality · Privacy · Security

Abbreviations laboratory results, medical treatments, diagnoses, medicines,


CIA Confidentiality, integrity, and availability vaccination status, and even certain sound and picture data.
EHR Electronic health records The EHR consolidates patients’ medical information from
EMRs Electronic medical records many independent HCPs in the same city, nation, or across
GDPR General Data Protection Regulation a country boundary [3].
HCP Health care provider The sharing of personal and health information over the
HIPAA Health Insurance Portability and Accountability internet and different servers/clouds located outside of the
Act secure environment of the health care institution has cre-
HIS Health information system ated privacy, security, access, and compliance concerns
ISCB Information security compliance behavior [1]. Health organizations must identify methods that will
ISPs Information security policies assist them in securing EHRs, to ensure the trust relationship
IT Information technology between the patient and HCPs [2]. According to Jabeen et al.
KSA Kingdom of Saudi Arabia [3], trust is considered an essential element in the equation
NEHR National Electronic Health Records because it has a substantial indirect impact on the quality
SDL Saudi Digital Library of health care; the degree of trust reflects patients’ percep-
SLR Systematic literature review tions of HCPs and their ability to differentiate among certain
health care institutions.
Confidential information is protected by confidentiality,
1 Introduction which restricts unauthorized access to specific informa-
tion and ensures that personal information is kept safe and
Electronic health records (EHRs) are defined by Keshta and secure. Unauthorized access may result in data loss and, in
Odeh [1] as “an electronic version of a medical history of the certain cases, pose personal risks to the individual patient
patient as kept by the health care provider (HCP) for some at multiple levels (e.g., data breaches/leaks concerning HIV
time.” In addition, “it is inclusive of all the vital adminis- and other sexually transmitted disease cases) [4]. Health
trative clinical data that are in line to the care given to an information collection must adhere to legal and ethical pri-
individual by a particular provider.” Such datasets include vacy rules and regulations, such as the General Data Protec-
patient demographics, progress reports issues, medications, tion Regulation (GDPR) in Europe and the Health Insurance
important signs, medical history, immunization reports, Portability and Accountability Act (HIPAA) in the United
laboratory data, and radiology reports. EHRs are often States [4]. The main objective of these regulations is to guar-
referred to as electronic medical records (EMRs), which antee that confidential patient information is kept private and
have increasingly been used with global digital transforma- protected from disclosure and to safeguard the hospital and
tion. However, it is important to distinguish between EMRs its various service information [5].
and EHRs. EMRs collect all paper-based charts regarding an According to the Cybersecurity Quarterly Bulletin report
individual patient present in the clinician’s office, as a digital of the fourth quarter of 2020, which was published by the
version. EHRs contain all information present within EMRs Saudi National Cybersecurity Authority, the health care sec-
in digital format and overall health status datasets for the tor ranks third in the top targeted sectors globally by 14%,
individual patient, designed for use by clinicians and health unauthorized activity ranks first as the top threat, and infor-
specialists from other medical specialties, if so required. mation leakage ranks fourth in the Kingdom of Saudi Arabia
EMRs include legal records created at hospitals and used as (KSA) [6]. The presence of personal health data in the elec-
the primary source of EHR data [1]. tronic environment endangers patient privacy and informa-
Since their introduction in the late 1970s [2], evidence tion confidentiality. Rieder et al. [7] highlighted the impor-
has shown a high rate of adoption of EHRs globally. The tance of ensuring information secrecy, without which the
adoption rate relies on the technological development of patient may be compelled to conceal information from the
each country to achieve a competitive level of quality of care HCP. This action restricts the physician’s ability to provide
and safety and improve patient satisfaction. EHR systems proper care, and the legal environment may enable political
allow HCPs to monitor patients’ health status online and authorities to abuse administrative authority by weaken-
save information from medical examinations in EHRs. The ing the concept of medical confidentiality itself. Samkari
generated information may include personal information, et al. [8] also added that, regarding health care systems, the

13
128 Dr. Sulaiman Al Habib Medical Journal (2022) 4:126–135

ultimate security objectives are confidentiality, integrity, ensure their compliance to this novel legislation. However,
and availability (CIA) triads. A data breach, according to this will only be enforced as of March 2023. This legislation
the US Department of Health and Human Services, is “the will necessitate registration of data controller details, records
illegal use or disclosure of confidential health information of processing, increased governance on such personal data,
that compromises its privacy or security under the privacy enforce data subject rights, limit data transfers (especially
rule and poses a sufficiently high risk of financial, reputa- outside KSA), and the enforcement of individual consent for
tional, or another type of harm to the affected person” [9]. personal data handling and storage/sharing, increased impact
In addition, cybersecurity was defined by Schatz et al. [10] assessments, privacy notices, breach notification protocol
as “the collection of tools, policies, security concepts, secu- implementations, together with more intense regulation over
rity safeguards, guidelines, risk management approaches, sensitive data (including health-related) [13]. This project
actions, training, best practices, assurance and technologies aimed to identify and address the challenges facing EHRs
that can be used to protect the cyber environment and organi- regarding protecting patient confidentiality in the KSA,
zation and assets.” The KSA ranks second among the 193 based on an extensive review of related literature.
members of the Global Security Index, rising significantly
from 11th in 2 years [11]. However, based on the Interna-
tional Communication Union index, it ranks first among 2 Methodology
Middle East countries and Asia. A long-term study of data
breaches by Seh et al. [9] revealed that health care records The methodology of this project was based on a systematic
were exposed because of both internal and external sources literature review (SLR). A web-based search was conducted
of the breach, including hacking, theft/loss, unauthenticated using several electronic search engines, including Google
internal disclosure, and incorrect disposal of unneeded yet Scholar, Saudi Digital Library (SDL), and PubMed, to iden-
sensitive data. tify different published articles. Google Scholar was used
A data breach may occur if sensitive health information as the primary database, whereas the other two served as
is transferred or shared without appropriate authorization. complementary databases.
Patients may lose their lives or face permanent and irrep- The initial search was conducted on patient confidential-
arable harm if the data used in health care treatment are ity articles in the KSA. In total, 742 results were generated
compromised because of unauthorized access [4]. Hence, that were then refined by adding more specific keywords
EHRs must not be retained for any longer than is necessary such as “Confidential,” “Confidentiality,” “Breach,” “Data
for their intended purpose. Additionally, when data are kept, Breach,” “Electronic Health Record,” “EHR,” and “Saudi
transferred, and utilized, they should not be compromised. Arabia.” The only Boolean operator used to narrow the find-
The health care sector must also incorporate cybersecu- ings was “and.” Furthermore, because of the rapid progress
rity into the health care system to safeguard patient safety. in technology, the range of publication years was customized
Additionally, the health care sector must work together to to only include articles from 2016 to 2021 (the last 6 years).
overcome cybercrime and forestall illegal access to patient Thus, the number of results was reduced to 162 articles.
information. EHRs are often protected by cryptography or To address the research questions, the most explicit and
recently by steganography; however, using cryptography in relevant articles were identified and retrieved. Additionally,
combination with steganography has generated an intriguing duplicated and non-English findings were excluded, yield-
advancement [8]. According to a study conducted in Malay- ing 105 articles. Inclusion criteria were (a) relevance to the
sia by Dong et al. [12], health institutions must increase their studied research niche; (b) Published studies in the English
commitment to monitoring these human-associated security language; (c) peer-reviewed studies on the Saudi Arabian
breaches if they must achieve effective system information population; (d) studies providing original data; (e) and stud-
protection results. Health organizations have faced signifi- ies in which the sample comprised any HCP and informa-
cant security breaches not only because of technological tion technologist who work in the health care sector or with
mistakes but also because of an inadequate security cul- patients. Exclusion criteria were (a) articles not written in
ture, security awareness, and security management among the English language; (b) any type of review article; (c) arti-
the organizations’ workers, according to the authors. The cles conducted in countries other than the KSA; (d) articles
implementation of an effective information security policy that were not peer-reviewed; (e) articles published before
compliance framework is required for every sector. 2016; (f) articles giving inconclusive outcomes for their
The sole reference regarding applicable legislation con- study aims; or (g) articles not providing a comprehensive
cerning data protection within the KSA region is the Per- explanation of the conducted methodology.
sonal Data Protection Law, which was implemented in Three areas guided the selection of relevant articles
September 2021 and requested organizations to perform for analysis: confidentiality compliance of HCPs and
multiple modifications in their routine daily operations to driving factors of data breaching, challenges concerning

13
Dr. Sulaiman Al Habib Medical Journal (2022) 4:126–135 129

confidentiality and security of EHRs, and the influence of breaching? What are the challenges facing the confidentiality
confidentiality on EHR adoption. Forty-five articles were and security of EHRs? What is the influence of confidenti-
chosen for a critical and thorough evaluation of their con- ality on EHR adoption? Table 1 shows the selected articles
tents after examining their abstract and conclusion. The for analysis.
excluded articles were used in other sections to suggest All 11 articles posed a concern regarding securing pri-
solutions and address the explored challenges relevant to vacy and confidentiality of patient information that corre-
the study’s background. An article was considered eligible lated with the high adoption of EHRs or EMRs. However,
only if it provided answers to any of these three questions. in a study that assessed family physicians’ attitudes toward
Later, only 14 articles were subjected to thorough screening EHR privacy and identified factors that influenced these
and analysis in this review. Both technical factors and human attitudes, most believed EHRs were more secure than paper
factors were explored, with a greater focus on the latter. Fig- records, but some disagreed and expressed concern about
ure 1 shows the process of article selection. data leakage. Senior physicians (P = 0.05), non-Saudi phy-
We read the full-text papers to assess the quality and suit- sicians (P = 0.029), and consultants (P = 0.004) all had a
ability of the remaining articles in more depth. Three papers favorable perception of the privacy of computerized data.
were removed from consideration for the review process Many physicians agreed to share data with the Ministry of
because they lacked a clear description of the conducted Health (53/89; 59.6%) and hospital-based research centers
methodology. Finally, we only included 11 high-quality (49/89; 55%) but were opposed to data accessibility and
articles that were properly referenced. Eligible articles were sharing with insurance and pharmaceutical companies. Most
included in Table 1 according to the authors’ names, publi- respondents (48/89; 54%) disagreed with the risk of possible
cation year, research title, publication journal, study popu- confidentiality loss when using EHRs [14].
lation, data collection methodology, and project/research
objectives. 3.1 Confidentiality Compliance of HCPs and Driving
Factors of Data Breaching

3 Results In a descriptive study, Almulhem [15] investigated the


access privilege of medical interns from various Saudi Ara-
In this review, 11 research articles that fulfilled the eligible bian medical colleges. Almost 62.8% of the participants had
inclusion criteria in the methodology section were analyzed access to medical records, 66.1% had access to EHRs, and
based on the three main project questions: What is the con- 83.27% had read-only access. These participants had privi-
fidentiality compliance of HCPs and driving factors of data leges to perform a quick search for patient records (70.1% of

Fig. 1  Steps of articles selection

13
Table 1  List of included articles for analysis
130

Authors, references Title Journal Study population Data collection method Objectives

13
Almuayqil et al. [20] Ranking of E-Health barriers Health Saudi Arabian citizens, health- Designed questionnaire To rank the barriers of e-health
faced by Saudi Arabian citi- care professionals, and IT in KSA from the perspectives
zens, healthcare professionals, specialists of Saudi Arabian citizens,
and IT specialists in Saudi healthcare professionals, and IT
Arabia specialists
Chikhaoui et al. [19] Privacy and security issues in Communications of the IBIMA Associates working in health Literature review and survey To examine the usage of cloud
the use of clouds in e-health sectors in Saudi Arabia computing in healthcare and the
in the Kingdom of Saudi privacy laws in Saudi Arabia
Arabia
Jabali and Jarrar [22] Electronic health records func- Global Journal of Health Sci- Medium and large size hospital Comprehensive survey To assess the adoption of EHR
tionalities in Saudi Arabia: ence stakeholders in Saudi public hospitals and to
obstacles and major chal- identify the major challenges
lenges
Altamimi et al. [16] The role of neutralization tech- 2018 4th IEEE International Medical interns from selected Questionnaire To determine if the neutralization
niques in violating hospitals Conference on Information academic hospitals theory can be used to anticipate
privacy policies in Saudi Management reasons for the violation of
Arabia hospitals’ privacy policies
Alqahtani et al. [24] Assessment of the patients’ International Journal of Medi- Patients from selected hospitals Questionnaire-based survey To determine patient knowl-
awareness regarding their cine in Developing Countries edge of their rights and duties
rights and responsibilities in in major public hospitals in
the major governmental hos- Riyadh, Saudi Arabia
pitals in Riyadh, Saudi Arabia
Mishah et al. [18] Status of e-security in Saudi Computer Methods and Pro- Healthcare IT and health Developed online questionnaire To examine how well Saudi
hospitals grams in Biomedicine information management hospitals defend their electronic
professionals systems against e-threats that
may jeopardize patient privacy,
data confidentiality, system
integrity, patient information
availability, and other electronic
resources
Altamimi et al. [23] “I do it because they do it”: Risks and Security of Internet Medical interns, and IT special- Semi-structured interview To examine the influence of
social neutralization in infor- and Systems ists from an academic hospital social variables on medical
mation security in Saudi Arabia interns’ incentives to avoid
practices of Saudi medical hospital ISPs
interns
Alsahafi et al. [21] The acceptance of national elec- ACIS 2020 Proceedings Saudi citizens Questionnaire-based survey To investigate factors impacting
tronic health records in Saudi healthcare consumers’ accept-
Arabia: healthcare consumers’ ance of NEHRs in Saudi Arabia
perspectives
Alanazi et al. [17] Theory-based model and pre- Symmetry Health workers from selected Questionnaire-based survey To assess a theory-based model’s
diction analysis of information healthcare centers utility and identify ISCB pre-
security compliance behavior dictors among Saudi healthcare
in the Saudi healthcare sector professionals
Dr. Sulaiman Al Habib Medical Journal (2022) 4:126–135
Dr. Sulaiman Al Habib Medical Journal (2022) 4:126–135 131

medical interns who accessed EHRs and 67.1% of peers who

access to paper medical records


and EHRs in Saudi Arabia and
views on EHR privacy and the

compare students’ experience


accessed paper medical records). Three of the eleven studies

records and EHR from their


of accessing paper medical
To assess family physicians’

variables influencing them


were focused on analyzing the driving factors that contrib-

To assess medical students’


ute to the breaching of information security policies (ISPs)
by HCPs. Furthermore, in these three articles, the possible
determinants of compliance and noncompliance using cer-

perspective
tain behavior theories with few variations were discussed.
Objectives

Two of these studies were conducted by Altamimi et al.


[16] and were focused on non-malicious behaviors of
breaching by medical interns training in academic hospi-
tals, revealing that behavioral justification was used when
medical interns do not comply with ISPs for various reasons,
including feeling better about not complying with ISPs. Fur-
Data collection method

Medical students from different Self-developed survey

thermore, they demonstrate that neutralization theory may


be used to explain behavior that differs from anticipated
Online survey

norms and that it can also be used to predict the medical


interns intention to breach hospital privacy rules in the
health care sector. In the third study conducted by Alanazi
et al. [17], the effectiveness of the theory-based model and
different information security compliance behavior (ISCB)
family medicine residents at a

predictions for health care professionals in the KSA govern-


Primary care physicians and

ment hospitals were explored. Moderating and uncommon


selected medical city

variables (such as morality and religion) affected ISCBs,


medical colleges

whereas demographic features (such as marital status, job


Study population

experiences, and age) had no effect.

3.2 Challenges of Confidentiality and Security


of EHRs
Journal of Health Informatics

Mishah et al. [18] analyzed e-security in the KSA hospitals


in Developing Countries

and found that, in most Saudi hospitals, health information


BMC Medical Education

technology departments were well established, while health


information management departments were less prepared.
The security of server rooms, data centers, and hospital
information technology (IT) networks were all regarded as
the cornerstones of any hospital e-security platform. Addi-
Journal

tionally, the authors found a highly contradictory practice


regarding e-security in hospitals: for example, antivirus soft-
health records? Family physi-

ware was available in 93.75% of hospitals, but only 33.33%


Alshahrani et al. [14]. How private are the electronic

ence with accessing medical


cians’ perspectives towards

records in Saudi Arabia: a

of hospitals kept it up to date. An IT department was well


electronic health records

Medical students’ experi-

established in 83.3% of hospitals; however, e-security offic-


ers were unavailable in 83.3% of hospitals, among other
descriptive study

situations. An intrusion prevention system was absent in


62.5% of hospitals; although 67% of hospitals’ networks
privacy

were accessible to the internet, only 33.33% of them were


secured by a firewall, representing a significant deficiency.
Title

Remote backups are essential for hospitals, particularly in


the event of a natural catastrophe or fire disaster. However,
Table 1  (continued)
Authors, references

remote backups were inaccessible in 66.66% of cases. Only


Almulhem [15]

4% of the studied population had a digital catastrophe plan


including a system recovery exercise and restoration testing.
Based on the findings of Chikhaoui et al. [19] regarding
the issues that threaten the privacy and security of cloud

13
132 Dr. Sulaiman Al Habib Medical Journal (2022) 4:126–135

computing, more than half of the respondents believed that health care customers' behavioral intention to use the NEHR
patient medical records were vulnerable to cloud comput- system (beta = 0.22; P = 0.001). These findings indicated
ing. The data were kept secure, according to 40% of those that the intentions of Saudi health care consumers to use
polled, with the remaining 10% declining to respond. Com- the NEHR system could be significantly influenced by their
parison of the hospital data with bank data showed that most trust in government e-health applications concerning secu-
respondents claimed that “it is secured in the same way that rity standards, as well as health practitioners’ confidentiality
the bank account is secured, and there is no need to be con- in handling private health-related information. Furthermore,
cerned about security.” Additionally, several respondents trust had a substantial detrimental effect on perceived secu-
expressed concern about hospital data security. Although rity concerns (beta = − 0.39; P = 0.001). These data indicated
patient privacy was jeopardized by transferring of patient that Saudi health care customers who saw the NEHR system
information from one hospital to another, according to 85% and the parties engaged in its administration and usage as
of respondents, 5% disagreed and the remaining 10% did trustworthy were more likely to have fewer privacy and secu-
not respond. rity concerns, and therefore to plan to utilize it.
Almuayqil et al. [20] examined the barriers to e-health The survey by Jabali and Jarrar in 2018 tested the func-
care and the use of EHRs in the KSA among potential users tionality of major challenges of EHRs at 15 hospitals in the
of a proposed framework. Citizens and IT professionals Eastern Province of the KSA [22]. The survey concluded
reported no issues with security or privacy. However, con- that almost seven hospitals (46.6%) implemented or were in
cern about the security and privacy of patient records was the process of implementing an EHR system. In the KSA’s
shown by most health care professionals. Most health care Eastern Province, order entry (51.11%) is primarily made
professionals demonstrated the issue of unauthorized access by EHR and chart review, which account for approximately
to their patient EHRs (n = 9; 52.9%). Approximately one- 41.11%, with significant barriers to use for different docu-
third of physicians complained that their patients’ EHRs mentation functions, decision support, and other tools of
were not only distributed but also updated without their communication. Along with the “secure” EHR system,
personal consent (n = 7; 41.2%). Furthermore, half of these these results indicated that the security mechanism is not
health care professionals (n = 8; 47.1%) claimed that could adequately protected against all kinds of threats [22].
not control the access of their patients’ EHRs, and the same
number of respondents indicated that they had unauthor-
ized access to other patients’ EHRs. Over half of health care 4 Discussion
professionals (n = 9; 52.9%) could not determine who should
be given access to the EHRs of their patients. Additionally, The confidentiality and security of EHRs play a crucial role
much dissatisfaction was shown by most of the health care in patient satisfaction. The KSA has made considerable pro-
professionals because of their inability to determine and con- gress in improving the security of EHRs through privacy
trol the EHRs of their patients (n = 11; 64.7%). Addition- rules and confidentiality principles. According to Mishah
ally, a proportion of health care professionals (n = 6; 37.5%) et al. [18], only a few clinical and nonclinical electronic sys-
indicated that they could control the health records of other tems use advanced and moderate e-security features, tools,
patients. The citizens’ (layperson) mean score (mean, 3.5) well-established policies and practices to protect patient
was the highest of the three groups of respondents. The confidentiality. With the increased rate of hackers targeting
second highest mean score was 3.2, shown by health care patient data in Saudi's health system, evaluation of e-security
professionals, while the lowest mean score was shown by and other security measures in Saudi hospitals has become
IT specialists, which was calculated as 2.2. compulsory to avoid potential threats that may break patient
confidentiality. Therefore, improving e-security measures
3.3 Influence of Confidentiality on EHR Adoption and developing data security rules are crucial to limit the
risk of jeopardizing patient data integrity and safety [18].
According to the findings of another researcher, the par- The KSA has a reliable health care system that main-
ticipants in the study by Alsahafi et al. [21] perceived that tains trust and friendly relationships to build a confident and
security concerns had a substantial negative effect on their trustworthy public health care system. Thus, patient data
behavioral intention to use the National Electronic Health management by identifying motivations and driving factors
Records (NEHR) system in the Saudi setting (beta = − 0.22; is crucial. Altamimi et al. [23] demonstrated various motiva-
P = 0.001). These figures demonstrated that worries about tions that standardized the MIS for applications of behavioral
the security of people’s health information against unauthor- modes when all requirements of ISPs were failed. However,
ized access may deter health care consumers from using the the amenability of employees to adopt ISPs cannot be justi-
NEHR system. Additionally, the researchers discovered that fied. When those employees were uncomfortable with rules,
trust had a statistically significant beneficial impact on Saudi they applied neutralization approaches to suppress these

13
Dr. Sulaiman Al Habib Medical Journal (2022) 4:126–135 133

issues. These applied neutralization approaches included the by health care organizations in implementing EHR adoption
denial of responsibility, the denial of injury, appeal to higher and security included resistance to change by some medi-
loyalties, the metaphore of the ledger that reflects justifying cal staff. Some medical personnel failed to accept the use
negative actions based on past virtues, defense of necessity, of information technologies aimed at reducing patient data
and condemnation of condemners. In addition to neutraliza- breaches. Furthermore, low and weak financing strategies
tion approaches, preventive strategies are applied because were used to implement competent confidentiality EHR pro-
these approaches are insufficient to preserve privacy regula- grams. Moreover, medical staff were insufficiently trained in
tory rules. Therefore, Altamimi et al. [23] suggested that fur- the correct and secure usage of EHR systems [22].
ther research should identify more awareness approaches and Additionally, Chikhaoui et al. [19] described the chal-
training sessions (face-to-face contacts, web-based courses, lenges faced in EHR adoption by focusing on cloud comput-
and seminars) that are operational health care measures to ing. Some of the challenges included hackers who may gain
prevent these workers from justifying their wrong behav- access to confidential patient data, or computer viruses that
iors. By following these strategies, health care systems may may affect the integrity of patient records and information.
apply safety measures in the form of psychological layers for Similarly, the portability of data using cloud computing also
advancements in their technological systems. The support poses a challenge in adopting EHR systems in the KSA.
of a noncompliance system by social norms has also proven However, despite these challenges, cloud computing makes
helpful. Individuals appreciate descriptive norms compared health care processes more efficient by ensuring centralized
with injunctive norms. data storage and processing.
Furthermore, factors that impact ISCB are also the deter- Similarly, Alqahtani et al. [24] described how adopting
mining factors in maintaining the confidentiality of EHRs, EHRs can be improved by involving patients. In their study,
as described by Alanazi et al. [17]. Such factors include the patients stated that they had the right to make decisions
psychological behaviors, religious beliefs, cultural beliefs, based on the medical care they received, the right to accept
personality traits, cost of compliance, norms, technology or reject treatment, and the right to formulate advance direc-
awareness, and legal issues. According to their arguments, tives. Therefore, patient awareness is crucial in ensuring
ISCB is affected by uncommon factors such as religion or smooth EHR adoption because patients can make prompt
morality, whereas demographic factors such as work experi- decisions regarding any privacy or confidential areas in
ence have no effect. receiving health care.
Alsahafi et al. [21] demonstrated that some influential Almuayqil et al. [20] explained that one of the major chal-
factors, particularly social factors, may affect the confiden- lenges in maintaining data integrity and security in adopt-
tiality of EHRs. They agreed that factors such as health care ing EHRs is the connectivity of information systems. Other
consumers’ perspective could impact the decisions of policy barriers highlighted by this study included cultural barriers
makers in planning and improving the acceptance and imple- in technical expertise and barriers in computer skills. HCPs
mentation of the NEHRs in the KSA. Therefore, the trust of ranked security and privacy as the third barrier because it
health care consumers in the government's ability to ensure is common for medical records to be distributed without
confidentiality and standards set regarding access to patient a patient's or doctor's consent. Additionally, issues linked
data plays a key role in determining the confidentiality of to the potential of unauthorized individuals to access their
EHRs. patients’ data were among their second primary worries.
Almulhem [15] described that participants had unfettered Conversely, the IT experts’ group responses emphasized the
access to medical records, and their answers to open-ended importance of using different security and privacy meas-
questions showed the need for appropriate regulation of ures to protect the confidentiality of patients' information.
such access. Compared with paper medical records, medi- Therefore, health care organizations should identify such
cal students had a better experience using EHRs. Various obstacles to ensure smooth adoption of EHRs and ensure
essential skills can be learned by medical students from confidentiality.
medical records that benefit them in their future practice. Physicians’ perspectives on EHR privacy in the KSA
The educational experience of medical students was limited were reported in the study by Alshahrani et al. [14]. The
when read-only access was provided. However, before grant- doctors agreed that EHRs, which are password-protected in
ing medical students access to medical records, they should specific medical software, are more private and secure than
receive adequate EHR training because this enabled them to paper records and that the benefits and usefulness outweigh
practice and use EHR systems more effectively. the dangers. Overall, the use of computers in health care
However, several challenges in the adopting EHRs could was deemed to be extremely advantageous, resulting in EHR
also be faced by the health care system in the KSA, particu- deployment in the KSA's largest institutions. These findings
larly regarding privacy issues. For example, in their study, may help policy makers argue for the spread of EHRs. The
Jabali and Jarrar [22] found that some of the obstacles met

13
134 Dr. Sulaiman Al Habib Medical Journal (2022) 4:126–135

privacy, security, and confidentiality of patient health infor- conceptualization, methodology, data curation, visualization, valida-
mation are not jeopardized by the EHR. tion, supervision, reviewing and editing. All authors read and approved
the final version of the manuscript.
The limitations of this study were the limited availabil-
ity of relevant publications in the KSA, the lack of original Funding None.
findings, and the biased methodology used. The strengths of
this study were that the reviewed articles were systematically Availability of Data and Material Not applicable.
explored from the last 5 years of publications, which are
considered relatively new. Furthermore, the study focused Declarations
on the Saudi population; thus, more focused results were
generated. Conflict of interest None declared.

Ethics approval and consent to participate Not applicable.

Consent to publication Not applicable.


5 Conclusion
Open Access This article is licensed under a Creative Commons Attri-
The goal of this project was to use an extensive review of bution 4.0 International License, which permits use, sharing, adapta-
related literature to identify and address the challenges fac- tion, distribution and reproduction in any medium or format, as long
ing EHRs in the KSA in terms of protecting patient confi- as you give appropriate credit to the original author(s) and the source,
provide a link to the Creative Commons licence, and indicate if changes
dentiality. To the best of our knowledge, literature is lacking were made. The images or other third party material in this article are
that examines the impact of training, measures the level of included in the article's Creative Commons licence, unless indicated
awareness and current practices of HCPs in the KSA, pro- otherwise in a credit line to the material. If material is not included in
tects patient information privacy and confidentiality from the article's Creative Commons licence and your intended use is not
permitted by statutory regulation or exceeds the permitted use, you will
the breach, and considers technical measures. However, need to obtain permission directly from the copyright holder. To view a
through extensive analysis of reliable studies and research copy of this licence, visit http://​creat​iveco​mmons.​org/​licen​ses/​by/4.​0/.
on EHR implementation in the KSA, reliable results can be
deduced. Furthermore, privacy and confidentiality are the
foundation of a reliable EHR system. Some of the explored
factors that affect the confidentiality of patient data include References
relationships among health care professionals, upgrading of
health care security software, and social influencers health 1. Keshta I, Odeh A. Security and privacy of electronic health
care consumers, among others. Therefore, if the KSA adopts records: concerns and challenges. Egypt Inform J. 2020. https://​
doi.​org/​10.​1016/j.​eij.​2020.​07.​003.
the mentioned implementation strategies, factors regarding 2. Evans RS. Electronic health records: then, now, and in the future.
patient confidentiality, and addresses the challenges posed, Yearb Med Inform. 2016;25:S48–61. https://​doi.​org/​10.​15265/​
the safety and care of patients will be significantly improved. IYS-​2016-​s006.
Recommendations for future studies/implementations 3. Jabeen F, Hamid Z, Akhunzada A, Abdul W, Ghouzali S. Trust
and reputation management in healthcare systems: taxonomy,
include (a) investigating various case studies and includ- requirements and open issues. IEEE Access. 2018;PP:1. https://​
ing hospitals from other regions of the KSA; (b) perform- doi.​org/​10.​1109/​ACCESS.​2018.​28103​37.
ing comparative studies (e.g., between governmental and 4. Hameed SS, Hassan WH, Abdul Latiff L, Ghabban F. A system-
privatized hospital settings); (c) analyzing the behaviors atic review of security and privacy issues in the internet of medi-
cal things; the role of machine learning approaches. PeerJ Comput
and attitudes of various HCPs toward confidential data; (d) Sci. 2021;7: e414. https://​doi.​org/​10.​7717/​peerj-​cs.​414.
clarifying and comparing various HIS models; (e) further 5. Masud M, Gaba G, Choudhary K, Alroobaea R, Hossain MS.
analyzing the role of leadership in the successful implemen- A robust and lightweight secure access scheme for cloud based
tation of EHR systems; (f) analyzing physicians’ roles in e-healthcare services. Peer-to-Peer Netw Appl. 2021;14:1–78.
https://​doi.​org/​10.​1007/​s12083-​021-​01162-x.
embracing novel EHR systems; (g) increasing EHR train- 6. NCA National Cybersecurity Authority. https://​nca.​gov.​sa/​en.
ing program availability, with minimal knowledge gaps; (h) Accessed 28 Jun 2022.
increasing investment in the latest EHR infrastructures; and 7. Rieder P, Louis-Courvoisier M, Huber P. The end of medi-
(i) improving data handling/sharing policies within KSA cal confidentiality? patients, physicians and the state in his-
tory. Med Humanit. 2016;42:149–54. https://​doi.​org/​10.​1136/​
hospital settings. medhum-​2015-​010773.
8. Samkari H, Gutub A. Protecting medical records against cyber-
crimes within Hajj period by 3-layer security. 2019. https://​doi.​
Author Contributions NSA contributed to study conceptualiza- org/​10.​5281/​zenodo.​35434​55
tion, methodology, data curation, writing, original draft prepara- 9. Seh AH, Zarour M, Alenezi M, Sarkar AK, Agrawal A, Kumar
tion, investigation, reviewing and editing. BAB contributed to study R, Ahmad Khan R. Healthcare data breaches: insights and

13
Dr. Sulaiman Al Habib Medical Journal (2022) 4:126–135 135

implications. Healthcare (Basel). 2020;8:133. https://​doi.​org/​10.​ 19. Chikhaoui E, Sarabdeen J, Parveen R. Privacy and security issues
3390/​healt​hcare​80201​33. in the use of clouds in e-health in the Kingdom of Saudi Arabia.
10. Schatz D, Bashroush R, Wall J. Towards a more representa- Commun IBIMA. 2017. https://​doi.​org/​10.​5171/​2017.​369309.
tive definition of cyber security. J Digit Forensics Secur Law. 20. Almuayqil S, Atkins A, Sharp B. Ranking of E-health barriers
2017;12:53. https://​doi.​org/​10.​15394/​jdfsl.​2017.​1476. faced by Saudi Arabian citizens, healthcare professionals and IT
11. SPA Saudi Arabia is second globally, first in Arab, Middle East specialists in Saudi Arabia. Health. 2016;08:1004–13. https://​doi.​
and Asia on global cybersecurity index the official Saudi Press org/​10.​4236/​health.​2016.​810104.
Agency. https://​www.​spa.​gov.​sa/​22480​51. Accessed 28 Jun 2022. 21. Alsahafi Y, Gay V, Khwaji A. The acceptance of national elec-
12. Dong K, Ali RF, Dominic PDD, Ali SEA. The effect of organiza- tronic health records in Saudi Arabia: healthcare consumers’ per-
tional information security climate on information security policy spectives. In: ACIS 2020 proceedings, 2020.
compliance: the mediating effect of social bonding towards health- 22. Jabali K, Jarrar M. Electronic health records functionalities in
care nurses. Sustainability. 2021;13:2800. https://d​ oi.o​ rg/1​ 0.3​ 390/​ saudi arabia: obstacles and major challenges. Global J Health Sci.
su130​52800. 2018;10:50. https://​doi.​org/​10.​5539/​gjhs.​v10n4​p50.
13. IAPP How to prepare for Saudi Arabia’s personal data protection 23. Altamimi S, Renaud K, Storer T. Correction to: “I do it because
law (2022). they do it”: social-neutralisation in information security practices
14. Alshahrani A, Jamal A, Tharkar S. How private are the elec- of Saudi medical interns. In: Kallel S, Cuppens F, Cuppens-Bou-
tronic health records? Family physicians’ perspectives towards lahia N, Hadj Kacem A, editors. Risks and security of internet
electronic health records privacy. J Health Inform Dev Ctries. and systems. CRiSIS 2019. Lecture notes in computer science,
2021;15(1):1–16. vol. 12026; 2020. p. 227–43. https://​doi.​org/​10.​1007/​978-3-​030-​
15. Almulhem JA. Medical students’ experience with accessing medi- 41568-6_​25.
cal records in Saudi Arabia: a descriptive study. BMC Med Educ. 24. Alqahtani N, Alsulami S, Alzamel F, AlShamekh M, Almutairi A,
2021;21:272. https://​doi.​org/​10.​1186/​s12909-​021-​02715-7. AlDekhayel M, Fouhil A. Assessment of the patients’ awareness
16. Altamimi S, Storer T, Alzahrani A (2018) The role of neutralisa- regarding their rights and responsibilities in the major govern-
tion techniques in violating hospitals privacy policies in Saudi mental hospitals in Riyadh, Saudi Arabia. Int J Med Dev Ctries.
Arabia. In: Proceedings of the 2018 4th international conference 2019;3:198–203. https://​doi.​org/​10.​24911/​ijmdc.​51-​15425​86255
on information management (ICIM), May 2018, p 133–140
17. Alanazi ST, Anbar M, Ebad SA, Karuppayah S, Al-Ani HA. The- Publisher's Note Springer Nature remains neutral with regard to
ory-based model and prediction analysis of information security jurisdictional claims in published maps and institutional affiliations.
compliance behavior in the Saudi healthcare sector. Symmetry.
2020;12:1544. https://​doi.​org/​10.​3390/​sym12​091544.
18. Mishah N, Bukhari A, AlMutairi B, Mohreq M. Status of e-secu-
rity and privacy protection in Saudi hospitals. Comput Methods
Programs Biomed. 2019;171:5–6. https://d​ oi.o​ rg/1​ 0.1​ 016/j.c​ mpb.​
2018.​12.​012.

13

You might also like