2014 IEEE Conference on E-Learning, E-Management and E-Services (IC3e) 2014
DOI: 10.1109/ic3e.2014.7081237
|View full text |Cite
|
Sign up to set email alerts
|

Exploring user's compliance behavior towards Health Information System security policies based on extended Health Belief Model

Abstract: Information security awareness is important among users because it can influence user's behavior towards complying with organization information security policies. Therefore, the current study was conducted to examine information security awareness factors affecting user's compliance behavior towards Health Information System (HIS) security policies based on extended Health Belief Model. The questionnaires were distributed to the respondents at selected public hospitals in Malaysia (N = 454). Statistical resul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…The third-greatest threat is user error in handling information (six studies). This threat can be triggered by the weakness of information security policy compliance [ 57 , 74 ], ignorance of the risk involved [ 11 ], poor security skills and security monitoring [ 1 ], low user education, and lack of awareness of information security [ 50 , 75 ].…”
Section: Resultsmentioning
confidence: 99%
“…The third-greatest threat is user error in handling information (six studies). This threat can be triggered by the weakness of information security policy compliance [ 57 , 74 ], ignorance of the risk involved [ 11 ], poor security skills and security monitoring [ 1 ], low user education, and lack of awareness of information security [ 50 , 75 ].…”
Section: Resultsmentioning
confidence: 99%
“…Some of the frameworks were developed to assess only perception variables [4,26,33,36,37,40]. Other frameworks adopted only social constructs [4,7,35,42,43] or cultural factors [33,48,49]. However, in a scenario where a study must be conducted with the aim of comprehensively understanding and addressing the information security challenges often faced by health care professionals, it is important to know which of the existing frameworks will be adequate.…”
Section: Problem Specification Scope and Contribution Of The Studymentioning
confidence: 99%
“…The reviewed frameworks [8,[14][15][16]31,38,41,44,45,[49][50][51][52][53][54][55][56][57][58][59][60][61][62][63][64][65][66] were not fully comprehensive. Meanwhile, security issues are affected by all these aspects and not just psychological, social, cultural, or sociodemographic aspects alone [38].…”
Section: Problem Specification Scope and Contribution Of The Studymentioning
confidence: 99%
See 2 more Smart Citations