Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey

被引:11
作者
Yeng, Prosper Kandabongee [1 ]
Yang, Bian [1 ]
Snekkenes, Einar Arthur [1 ]
机构
[1] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, Gjovik, Norway
来源
PHEALTH 2019 | 2019年 / 261卷
关键词
Social-Culture; Information Security; Social Demography; Healthcare Staff; BEHAVIOR;
D O I
10.3233/978-1-61499-975-1-239
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The purpose of this study was to understand healthcare staffs' information security (IS) practices towards mitigating data breaches. A literature survey was conducted to understand the state-of-the-art methods, tools, evaluation techniques and the challenges to their implementation. The results would be used for emperical studies in a hospital setting in Norway on Healthcare Security Practice Analysis, Modeling and Incentivization (HSPAMI). Human Aspect of Information Security Questionnaire was identified as robust and comprehensive tool for gathering staff security practices. Integrated theories was being adopted to form a comprehensive staffs' characteristics. A mixed-method for evaluating the theories was also identified to be the best strategy.
引用
收藏
页码:239 / 245
页数:7
相关论文
共 31 条
[1]   Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior [J].
Ajzen, I .
JOURNAL OF APPLIED SOCIAL PSYCHOLOGY, 2002, 32 (04) :665-683
[2]   PREDICTION OF GOAL-DIRECTED BEHAVIOR - ATTITUDES, INTENTIONS, AND PERCEIVED BEHAVIORAL-CONTROL [J].
AJZEN, I ;
MADDEN, TJ .
JOURNAL OF EXPERIMENTAL SOCIAL PSYCHOLOGY, 1986, 22 (05) :453-474
[3]  
[Anonymous], 2006, AMCIS 2006 P
[4]   Gender difference and employees' cybersecurity behaviors [J].
Anwar, Mohd ;
He, Wu ;
Ash, Ivan ;
Yuan, Xiaohong ;
Li, Ling ;
Xu, Li .
COMPUTERS IN HUMAN BEHAVIOR, 2017, 69 :437-443
[5]   CASE RESEARCH IN MARKETING - OPPORTUNITIES, PROBLEMS, AND A PROCESS [J].
BONOMA, TV .
JOURNAL OF MARKETING RESEARCH, 1985, 22 (02) :199-208
[6]  
Box Debra., 2013, Procedia Technology, V9, P1093, DOI 10.1016/j.protcy.2013.12.122
[7]   Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory [J].
Cheng, Lijiao ;
Li, Ying ;
Li, Wenli ;
Holm, Eric ;
Zhai, Qingguo .
COMPUTERS & SECURITY, 2013, 39 :447-459
[8]  
Conner M., 2005, PREDICTING HLTH BEHA, V24, P402
[9]   Organisational culture, procedural countermeasures, and employee security behaviour A qualitative study [J].
Connolly, Lena Yuryna ;
Lang, Michael ;
Gathegi, John ;
Tygar, Doug J. .
Information and Computer Security, 2017, 25 (02) :118-136