The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran

被引:10
作者
Shahri, Ahmad Bakhtiyari [1 ]
Ismail, Zuraini [2 ]
Mohanna, Shahram [1 ]
机构
[1] Univ Sistan & Baluchestan, Fac Elect & Comp Engn, Zahedan, Iran
[2] Univ Teknol Malaysia, AIS, Kuala Lumpur 54100, Malaysia
关键词
Health information system; Security effectiveness; Security competency; Self-efficacy in information security; TECHNOLOGY; INTENTION; ACCEPTANCE; PRIVACY; MODEL;
D O I
10.1007/s10916-016-0591-5
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
The security effectiveness based on users' behaviors is becoming a top priority of Health Information System (HIS). In the first step of this study, through the review of previous studies 'Self-efficacy in Information Security' (SEIS) and 'Security Competency' (SCMP) were identified as the important factors to transforming HIS users to the first line of defense in the security. Subsequently, a conceptual model was proposed taking into mentioned factors for HIS security effectiveness. Then, this quantitative study used the structural equation modeling to examine the proposed model based on survey data collected from a sample of 263 HIS users from eight hospitals in Iran. The result shows that SEIS is one of the important factors to cultivate of good end users' behaviors toward HIS security effectiveness. However SCMP appears a feasible alternative to providing SEIS. This study also confirms the mediation effects of SEIS on the relationship between SCMP and HIS security effectiveness. The results of this research paper can be used by HIS and IT managers to implement their information security process more effectively.
引用
收藏
页数:9
相关论文
共 58 条
[31]  
Landry J.P., 2011, 17 AM C INF SYST AMC
[32]   The Effects of Confidentiality on Nursing Self-Efficacy with Information Systems [J].
Lending, Diane ;
Dillon, Thomas W. .
INTERNATIONAL JOURNAL OF HEALTHCARE INFORMATION SYSTEMS AND INFORMATICS, 2007, 2 (03) :49-64
[33]   A methodology for construct development in MIS research [J].
Lewis, BR ;
Templeton, GF ;
Byrd, TA .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2005, 14 (04) :388-400
[34]  
Liang HG, 2010, J ASSOC INF SYST, V11, P394
[35]   Privacy and Security in Mobile Health Apps: A Review and Recommendations [J].
Martinez-Perez, Borja ;
de la Torre-Diez, Isabel ;
Lopez-Coronado, Miguel .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (01)
[36]  
Meyers LS., 2006, APPL MULTIVARIATE RE
[37]  
Mishra S., 2011, ISSUES INFORM SYSTEM, V12, P246, DOI 10.48009/1_iis_2011_246-255
[38]  
MOHME, 2011, COMPR HLTH PLAN
[39]  
MOHME, 2011, FRAM EV PERF HOSP IN
[40]  
Mussa C.C., 2012, PRUDENT ACCESS CONTR