Search results

1 – 3 of 3
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 22 October 2019

Surma Mukhopadhyay, Ramsankar Basak, Darrell Carpenter and Brian J. Reithel

Little is known about factors that affect patient use of online medical records (OMR). Specifically, with rising vulnerability concerns associated with security and privacy…

525

Abstract

Purpose

Little is known about factors that affect patient use of online medical records (OMR). Specifically, with rising vulnerability concerns associated with security and privacy breaches, patient use of OMR requires further attention. This paper aims to investigate patient use of OMR. Using the Unified Theory of Acceptance and Use of Technology (UTAUT), factors affecting continued use of OMR were examined.

Design/methodology/approach

The Health Information National Trends Survey 5 (HINTS 5), Cycle 1 data were used. This is an ongoing nation-wide survey sponsored by the National Cancer Institute (NCI) of the USA. The subjects were 31-74 years old with access to the Internet. Descriptive information was projected to the US population.

Findings

In total, 765 respondents representing 48.7 million members of the US population were analyzed. Weighted regression results showed significant effects of perceived usefulness, visit frequency and provider encouragement on continued use of OMR while vulnerability perception was not significant. Moderating effects of these variables were also noted. Perceived usefulness and provider encouragement emerged as important predictors.

Practical implications

Insights may help design interventions by health-care providers and policymakers.

Social implications

Insights should help patient empowerment and developers with designing systems.

Originality/value

This is the first study to examine health-care consumers’ continued use of OMR using nationally representative data and real-world patients, many of who have one or more chronic diseases (e.g. diabetes, hypertension, asthma) or are cancer survivors. Results highlight factors helping or hindering continuing OMR use. As such, insights should help identify opportunities to increase the extent of use, project future OMR usage patterns and spread the benefits of OMR, including bringing forth positive health outcomes.

Details

Information & Computer Security, vol. 28 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Article
Publication date: 9 October 2009

Jie Zhang, Brian J. Reithel and Han Li

The purpose of this paper based on compensation theory, is to incorporate perceived technical security protection into the theory of planned behavior and examined factors…

2933

Abstract

Purpose

The purpose of this paper based on compensation theory, is to incorporate perceived technical security protection into the theory of planned behavior and examined factors affecting end‐user security behaviors, specifically, compliance with security policies.

Design/methodology/approach

An online survey is conducted to validate the proposed research model. The survey is sent out to an industrial panel. A total of 176 usable responses are received and used in the data analysis.

Findings

The results show that both perceived behavioral control (PBC) and attitude have significant impact on intention to comply with security policy. Perceived technical protection affects behavioral intentions both indirectly, through PBC, and directly. The negative direct effect (i.e. perceived high technical protection leads to low intention to comply with security policy) suggests possible risk compensation effects in the information security context.

Practical implications

This result should be of interest to practitioners. In practice (e.g. during security training), the power and capability of technical protection mechanisms should not be exaggerated. Instead, its limitations and drawbacks should be emphasized, so that end‐users will adopt more cautious security practices and adhere to the requirements of the organization's security policies.

Originality/value

This paper embeds risk compensation theory within the security policy compliance context and offers a useful starting point for further empirical examination of this theory in information security context.

Details

Information Management & Computer Security, vol. 17 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 11 November 2014

Benedikt Lebek, Jörg Uffen, Markus Neumann, Bernd Hohler and Michael H. Breitner

This paper aims to provide an overview of theories used in the field of employees’ information systems (IS) security behavior over the past decade. Research gaps and implications…

7868

Abstract

Purpose

This paper aims to provide an overview of theories used in the field of employees’ information systems (IS) security behavior over the past decade. Research gaps and implications for future research are worked out by analyzing and synthesizing existing literature.

Design/methodology/approach

This paper presents the results of a literature review comprising 113 publications. The literature review was designed to identify applied theories and to understand the cognitive determinants in the research field. A meta-model that explains employees’ IS security behavior is introduced by assembling the core constructs of the used theories.

Findings

The paper identified 54 used theories, but four behavioral theories were primarily used: Theory of Planned Behavior (TPB), General Deterrence Theory (GDT), Protection Motivation Theory (PMT) and Technology Acceptance Model (TAM). By synthesizing results of empirically tested research models, a survey of factors proven to have a significant influence on employees’ security behavior is presented.

Research limitations/implications

Some relevant publications might be missing within this literature review due to the selection of search terms and/or databases. However, by conduction a forward and a backward search, this paper has limited this error source to a minimum.

Practical implications

This study presents an overview of determinants that have been proven to influence employees’ behavioral intention. Based thereon, concrete training and awareness measures can be developed. This is valuable for practitioners in the process of designing Security Education, Training and Awareness (SETA) programs.

Originality/value

This paper presents a comprehensive up-to-date overview of existing academic literature in the field of employees’ security awareness and behavior research. Based on a developed meta-model, research gaps are identified and implications for future research are worked out.

Details

Management Research Review, vol. 37 no. 12
Type: Research Article
ISSN: 2040-8269

Keywords

1 – 3 of 3
Per page
102050