\
 

Start Date

16-8-2018 12:00 AM

Description

Over the past decade, Saudi Arabia has made remarkable efforts in implementing Electronic Health Record (EHR) technologies across the facets of its healthcare facilities. While the implementation has shown enormous promise for advancing healthcare delivery in the Kingdom, concerns over security of patient data has, however, emerged. There are emerging evidences showing that EHR systems have vulnerabilities that deserve attention. This study explores the existing Information technology security policies at two distinct types of hospitals (a government controlled and a private owned), from a policy perspective, and the end users perspectives (i.e., physicians, nurses, Information technology administrators, and allied health practitioners). Using a mixed methodology, the study aims to further determine the differences in security policies between the two hospital types. Particularly, the study investigates the relationship between the security policies at these hospital types, and the security of their EHR systems from the perspectives of the end users of EHR technologies.

Share

COinS
 
Aug 16th, 12:00 AM

A Study of IT Security Policies

Over the past decade, Saudi Arabia has made remarkable efforts in implementing Electronic Health Record (EHR) technologies across the facets of its healthcare facilities. While the implementation has shown enormous promise for advancing healthcare delivery in the Kingdom, concerns over security of patient data has, however, emerged. There are emerging evidences showing that EHR systems have vulnerabilities that deserve attention. This study explores the existing Information technology security policies at two distinct types of hospitals (a government controlled and a private owned), from a policy perspective, and the end users perspectives (i.e., physicians, nurses, Information technology administrators, and allied health practitioners). Using a mixed methodology, the study aims to further determine the differences in security policies between the two hospital types. Particularly, the study investigates the relationship between the security policies at these hospital types, and the security of their EHR systems from the perspectives of the end users of EHR technologies.