HOW INFORMATION SECURITY MANAGEMENT SYSTEMS INFLUENCE THE HEALTHCARE PROFESSIONALS' SECURITY BEHAVIOR IN A PUBLIC HOSPITAL IN INDONESIA

被引:1
作者
Sari P.K. [1 ,2 ]
Handayani P.W. [1 ]
Hidayanto A.N. [1 ]
Busro P.W. [3 ]
机构
[1] University of Indonesia, Depok
[2] Telkom University, Bandung
[3] National Cardiovascular Center Harapan Kita, Jakarta
关键词
deterrence; health information system; hospital; information security behavior; protection motivation;
D O I
10.28945/5185
中图分类号
学科分类号
摘要
Aim/Purpose This study analyzes health professionals' information security behavior (ISB) as health information system (HIS) users concerning associated information secu-rity controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementa-tion to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the ele-ments influencing behavior and current information security implementation. Contribution This study contributes to ISB practices in hospitals. It discusses how HIS man-agers could build information security programs to enhance health profession-als' behavior by considering PMT and GDT elements. Findings According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on interna-tional standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working prac-tices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive infor-mation online, leaving a password in an unsupervised area, and revealing sensi-tive information via social media. Recommendations for Practitioners Hospital managers should create work practices that align with information se-curity requirements. HIS managers should provide incentives to improve work-ers' perceptions of the benefit of robust information security measures. Recommendations for Researchers This study suggests more research into the components that influence ISB uti-lizing diverse theoretical foundations such as Regulatory Focus Theory to com-pare preventive and promotion motivation to enhance ISB. Impact on Society This study can potentially improve information security in the healthcare indus-try, which has substantial risks to human life but still lags behind other vital sec-tor implementations. Future Research Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors. © 2023 Informing Science Institute. All rights reserved.
引用
收藏
页码:583 / 607
页数:24
相关论文
共 59 条
[1]  
Ahouanmenou S., Van Looy A., Poels G., Information security and privacy in hospitals: A literature mapping and review of research gaps, Informatics for Health and Social Care, 48, 1, pp. 30-46, (2022)
[2]  
Alexandrou A., Chen L.-C., A security risk perception model for the adoption of mobile devices in the healthcare industry, Security Journal, 32, pp. 410-434, (2019)
[3]  
Aljedaani B., Ahmad A., Zahedi M., Babar M. A., Security awareness of end-users of mobile health applications: An empirical study, Proceedings of the 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 125-136, (2020)
[4]  
Lanskap Keamanan Siber Indonesia 2022.[Indonesia's cybersecurity land-scape 2022], (2022)
[5]  
Bakkar M., Alazab A., Information security: Definitions, threats and management in Dubai hospitals context, Proceedings of the Cybersecurity and Cyberforensics Conference, pp. 152-159, (2019)
[6]  
Brady J. W., Securing health care: Assessing factors that affect HIPAA security compliance in academic medical centers, Proceedings of the Hawaii International Conference on System Sciences, pp. 1-10, (2011)
[7]  
Bulgurcu B., Cavusoglu H., Benbasat I., Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, MIS Quarterly, 34, 3, pp. 523-548, (2010)
[8]  
Burhan F. A., Data Pasien Covid-19 Bocor Dianggap Tanggung Jawab Kemenkes. [Leaking Covid-19 patient data is considered the responsibility of the Ministry of Health], (2020)
[9]  
Burns A. J., Protecting organizational information assets: Exploring the influence of regulatory focus on rational choices, Proceedings of the 54th Hawaii International Conference on System Sciences, pp. 5228-5237, (2021)
[10]  
Top 5 cyber security frameworks in healthcare, (2018)