Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees

被引:6
|
作者
Mikuletic, Samanta [1 ]
Vrhovec, Simon [2 ]
Skela-Savic, Brigita [1 ]
Zvanut, Bostjan [3 ]
机构
[1] Angela Boskin Fac Hlth Care, Spodnji Plavz 3, Jesenice 4270, Slovenia
[2] Univ Maribor, Fac Criminal Justice & Secur, Kotnikova 8, Ljubljana 1000, Slovenia
[3] Univ Primorska, Fac Hlth Sci, Polje 42, Izola 6310, Slovenia
关键词
Information security culture; Healthcare data; Electronic health records; EHR; Data breach; Information security; Nursing; POLICY COMPLIANCE; DATA BREACHES; FRAMEWORK; BEHAVIOR; MODEL; DETERRENCE; MANAGEMENT; NORMS;
D O I
10.1016/j.cose.2023.103489
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting sensitive healthcare data is particularly challenging. Nursing employees are critical in protecting healthcare data since they make up a large portion of the healthcare workforce and have direct access to healthcare data. Information security culture (ISC) plays a prominent role in protection of healthcare data albeit their relationship remains unclear. In this study, we first define and operationalize two new dimensions of organizational ISC related to security and privacy. Then, a survey of Slovenian nursing employees (n = 527) was conducted to validate the measurement instrument and examine the associations between the newly developed ISC dimensions and unauthorized access to healthcare data by nursing employees based on the theory of planned behavior (TPB). The measurement instrument was first validated with an exploratory and then with a confirmatory factor analysis. Both analyses indicate adequate validity and reliability of the newly developed ISC dimensions. The results of PLS-SEM analysis show that security oriented ISC is negatively associated with subjective norm and normative beliefs while privacy oriented ISC is negatively associated with attitude towards behavior. Additionally, they indicate that TPB explains well unauthorized access to healthcare data. The results of our study thus indicate an indirect relation between ISC and unauthorized access to healthcare data. Awareness training is considered as essential means for ensuring proper practical implementations of ethical norms, such as privacy-preserving behavior, by nursing employees. Our study suggests that such awareness interventions may aim either to strengthen the social influence on nursing employees, their attitudes or both. Awareness interventions aiming to strengthen the social influence of nursing employees may focus on established organizational data protection practices and other important organizational values, norms, and accepted ways of working in an organization. Attitudes of nursing employees may be strengthened with awareness interventions focusing on their personal beliefs and ethics.
引用
收藏
页数:14
相关论文
共 44 条
  • [31] Implementation of a Biometric-Based Blockchain System for Preserving Privacy, Security, and Access Control in Healthcare Records
    Barka, Ezedin
    Al Baqari, Mohammed
    Kerrache, Chaker Abdelaziz
    Herrera-Tapia, Jorge
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (04)
  • [32] Social network information security and artificial intelligence privacy protection based on data mining
    Wang, Yanhui
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023,
  • [33] A Global Medical Data Security and Privacy Preserving Standards Identification Framework for Electronic Healthcare Consumers
    Mishra, Vinaytosh
    Gupta, Kishu
    Saxena, Deepika
    Singh, Ashutosh Kumar
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 4379 - 4387
  • [34] DATABASE ACCESS INFORMATION SECURITY MANAGEMENT SIMULATION UNDER BIG DATA PLATFORM
    Li Z.
    Wang D.
    Scalable Computing, 2024, 25 (03): : 1841 - 1851
  • [35] Differential Privacy Technology of Big Data Information Security based on ACA-DMLP
    Han, Yubiao
    Wang, Lei
    He, Dianhong
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (09) : 45 - 52
  • [36] DATABASE ACCESS INFORMATION SECURITY MANAGEMENT SIMULATION UNDER BIG DATA PLATFORM
    Li, Zhaocui
    Wang, Dan
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (03): : 1841 - 1851
  • [37] Research on information security and privacy protection model based on consumer behavior in big data environment
    Li, Yuxue
    Song, Lijun
    Zeng, Yucheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (10)
  • [38] Network Security Vulnerabilities and Personal Privacy Issues in Healthcare Information Systems: A case study in a private hospital in Turkey
    Namoglu, Nihan
    Ulgen, Yekta
    INFORMATICS, MANAGEMENT AND TECHNOLOGY IN HEALTHCARE, 2013, 190 : 126 - 128
  • [39] Blockchain-Based Healthcare Information Preservation Using Extended Chaotic Maps for HIPAA Privacy/Security Regulations
    Lee, Tian-Fu
    Chang, I-Pin
    Kung, Ting-Shun
    APPLIED SCIENCES-BASEL, 2021, 11 (22):
  • [40] Ontology-based data access control model supported with grid computing for improving security in healthcare data
    Kiran, G. M.
    Nalini, N.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (11)