Surma Mukhopadhyay, Ramsankar Basak, Darrell Carpenter and Brian J. Reithel
Little is known about factors that affect patient use of online medical records (OMR). Specifically, with rising vulnerability concerns associated with security and privacy…
Abstract
Purpose
Little is known about factors that affect patient use of online medical records (OMR). Specifically, with rising vulnerability concerns associated with security and privacy breaches, patient use of OMR requires further attention. This paper aims to investigate patient use of OMR. Using the Unified Theory of Acceptance and Use of Technology (UTAUT), factors affecting continued use of OMR were examined.
Design/methodology/approach
The Health Information National Trends Survey 5 (HINTS 5), Cycle 1 data were used. This is an ongoing nation-wide survey sponsored by the National Cancer Institute (NCI) of the USA. The subjects were 31-74 years old with access to the Internet. Descriptive information was projected to the US population.
Findings
In total, 765 respondents representing 48.7 million members of the US population were analyzed. Weighted regression results showed significant effects of perceived usefulness, visit frequency and provider encouragement on continued use of OMR while vulnerability perception was not significant. Moderating effects of these variables were also noted. Perceived usefulness and provider encouragement emerged as important predictors.
Practical implications
Insights may help design interventions by health-care providers and policymakers.
Social implications
Insights should help patient empowerment and developers with designing systems.
Originality/value
This is the first study to examine health-care consumers’ continued use of OMR using nationally representative data and real-world patients, many of who have one or more chronic diseases (e.g. diabetes, hypertension, asthma) or are cancer survivors. Results highlight factors helping or hindering continuing OMR use. As such, insights should help identify opportunities to increase the extent of use, project future OMR usage patterns and spread the benefits of OMR, including bringing forth positive health outcomes.
Details
Keywords
Jie Zhang, Brian J. Reithel and Han Li
The purpose of this paper based on compensation theory, is to incorporate perceived technical security protection into the theory of planned behavior and examined factors…
Abstract
Purpose
The purpose of this paper based on compensation theory, is to incorporate perceived technical security protection into the theory of planned behavior and examined factors affecting end‐user security behaviors, specifically, compliance with security policies.
Design/methodology/approach
An online survey is conducted to validate the proposed research model. The survey is sent out to an industrial panel. A total of 176 usable responses are received and used in the data analysis.
Findings
The results show that both perceived behavioral control (PBC) and attitude have significant impact on intention to comply with security policy. Perceived technical protection affects behavioral intentions both indirectly, through PBC, and directly. The negative direct effect (i.e. perceived high technical protection leads to low intention to comply with security policy) suggests possible risk compensation effects in the information security context.
Practical implications
This result should be of interest to practitioners. In practice (e.g. during security training), the power and capability of technical protection mechanisms should not be exaggerated. Instead, its limitations and drawbacks should be emphasized, so that end‐users will adopt more cautious security practices and adhere to the requirements of the organization's security policies.
Originality/value
This paper embeds risk compensation theory within the security policy compliance context and offers a useful starting point for further empirical examination of this theory in information security context.
Details
Keywords
Benedikt Lebek, Jörg Uffen, Markus Neumann, Bernd Hohler and Michael H. Breitner
This paper aims to provide an overview of theories used in the field of employees’ information systems (IS) security behavior over the past decade. Research gaps and implications…
Abstract
Purpose
This paper aims to provide an overview of theories used in the field of employees’ information systems (IS) security behavior over the past decade. Research gaps and implications for future research are worked out by analyzing and synthesizing existing literature.
Design/methodology/approach
This paper presents the results of a literature review comprising 113 publications. The literature review was designed to identify applied theories and to understand the cognitive determinants in the research field. A meta-model that explains employees’ IS security behavior is introduced by assembling the core constructs of the used theories.
Findings
The paper identified 54 used theories, but four behavioral theories were primarily used: Theory of Planned Behavior (TPB), General Deterrence Theory (GDT), Protection Motivation Theory (PMT) and Technology Acceptance Model (TAM). By synthesizing results of empirically tested research models, a survey of factors proven to have a significant influence on employees’ security behavior is presented.
Research limitations/implications
Some relevant publications might be missing within this literature review due to the selection of search terms and/or databases. However, by conduction a forward and a backward search, this paper has limited this error source to a minimum.
Practical implications
This study presents an overview of determinants that have been proven to influence employees’ behavioral intention. Based thereon, concrete training and awareness measures can be developed. This is valuable for practitioners in the process of designing Security Education, Training and Awareness (SETA) programs.
Originality/value
This paper presents a comprehensive up-to-date overview of existing academic literature in the field of employees’ security awareness and behavior research. Based on a developed meta-model, research gaps are identified and implications for future research are worked out.