Indirect effect of management support on users’ compliance behaviour towards information security policies

2017 ◽  
Vol 47 (1) ◽  
pp. 17-27 ◽  
Author(s):  
Norshima Humaidi ◽  
Vimala Balakrishnan

Background: Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modification or destruction, and duplication of passwords. Greater openness and multi-connectedness between heterogeneous stakeholders within health networks increase the security risk. Objective: The focus of this research was on the indirect effects of management support (MS) on user compliance behaviour (UCB) towards information security policies (ISPs) among health professionals in selected Malaysian public hospitals. The aim was to identify significant factors and provide a clearer understanding of the nature of compliance behaviour in the health sector environment. Method: Using a survey design and stratified random sampling method, self-administered questionnaires were distributed to 454 healthcare professionals in three hospitals. Drawing on theories of planned behaviour, perceived behavioural control (self-efficacy (SE) and MS components) and the trust factor, an information system security policies compliance model was developed to test three related constructs (MS, SE and perceived trust (PT)) and their relationship to UCB towards ISPs. Results: Results showed a 52.8% variation in UCB through significant factors. Partial least squares structural equation modelling demonstrated that all factors were significant and that MS had an indirect effect on UCB through both PT and SE among respondents to this study. Conclusion: The research model based on the theory of planned behaviour in combination with other human and organisational factors has made a useful contribution towards explaining compliance behaviour in relation to organisational ISPs, with trust being the most significant factor. In adopting a multidimensional approach to management–user interactions via multidisciplinary concepts and theories to evaluate the association between the integrated management–user values and the nature of compliance towards ISPs among selected health professionals, this study has made a unique contribution to the literature.

2018 ◽  
Vol 24 (11) ◽  
pp. 8600-8605
Author(s):  
Norshima Humaidi ◽  
Erne Suzila Kassim ◽  
Norol Hamiza Zamzuri ◽  
Melissa Shahrom

2015 ◽  
Vol 14 (02) ◽  
pp. 1550015 ◽  
Author(s):  
Saori Ohkubo ◽  
Sarah V. Harlan ◽  
Naheed Ahmed ◽  
Ruwaida M. Salem

Over the past few decades, knowledge management (KM) has become well-established in many fields, particularly in business. Several KM models have been at the forefront of promoting KM in businesses and organisations. However, the applicability of these traditional KM models to the global health field is limited by their focus on KM processes and activities with few linkages to intended outcomes. This paper presents the new Knowledge Management for Global Health (KM4GH) Logic Model, a practical tool that helps global health professionals plan ways in which resources and specific KM activities can work together to achieve desired health program outcomes. We test the validity of this model through three case studies of global and field-level health initiatives: an SMS-based mobile phone network among community health workers (CHWs) and their supervisors in Malawi, a global electronic Toolkits platform that provides health professionals access to health information resources, and a netbook-based eHealth pilot among CHWs and their clients in Bangladesh. The case studies demonstrate the flexibility of the KM4GH Logic Model in designing various KM activities while defining a common set of metrics to measure their outcomes, providing global health organisations with a tool to select the most appropriate KM activities to meet specific knowledge needs of an audience. The three levels of outcomes depicted in the model, which are grounded in behavioural theory, show the progression in the behaviour change process, or in this case, the knowledge use process, from raising awareness of and using the new knowledge to contributing to better health systems and behaviours of the public, and ultimately to improving the health status of communities and individuals. The KM4GH Logic Model makes a unique contribution to the global health field by helping health professionals plan KM activities with the end goal in mind.


2020 ◽  
Vol 15 (16) ◽  
pp. 128-132
Author(s):  
V. V. Shapovalov ◽  
◽  
A. A. Gudzenko ◽  
V. A. Shapovalova ◽  
V. V. Shapovalov ◽  
...  

Introduction. Modern turbulent state of society actualizes need for scientifically based methods and technological solutions to improve the information security system not only for the state, but also for society and the person in particular. Objective. To highlight the significant factors of information security of social development and to study the role of public admini-stration in the context of the actualization of information threats and risks. Study results. The article considers the essence of state management approaches to information security based on interpretation in terms of risk management. Information security is presented as a dynamic system that needs balance. Balance can be disturbed by external and internal factors. The 8 most significant factors that need to be taken into account to develop effective models of public administration in the field of information security are identified. 4 paradigms of information security management (systemic, synergetic, phenomenological and cognitive) which can be involved are considered. However, they are not universal and separate in any particular case, that is they are systemic in nature, and security management should be based on their integrated application depending on the situation and the specifics of the management process. Based on the analysis of the classical model of maintaining the state balance of a dynamic system, it is concluded that it can be used to ensure information security. A model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Conclusion. The model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Key words: Information security; Information security factors; Society; Public administration; Information security model.


2020 ◽  
Vol 15 (16) ◽  
pp. 121-128
Author(s):  
O. A. Panchenko ◽  

Introduction. Modern turbulent state of society actualizes need for scientifically based methods and technological solutions to improve the information security system not only for the state, but also for society and the person in particular. Objective. To highlight the significant factors of information security of social development and to study the role of public admini-stration in the context of the actualization of information threats and risks. Study results. The article considers the essence of state management approaches to information security based on interpretation in terms of risk management. Information security is presented as a dynamic system that needs balance. Balance can be disturbed by external and internal factors. The 8 most significant factors that need to be taken into account to develop effective models of public administration in the field of information security are identified. 4 paradigms of information security management (systemic, synergetic, phenomenological and cognitive) which can be involved are considered. However, they are not universal and separate in any particular case, that is they are systemic in nature, and security management should be based on their integrated application depending on the situation and the specifics of the management process. Based on the analysis of the classical model of maintaining the state balance of a dynamic system, it is concluded that it can be used to ensure information security. A model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Conclusion. The model is proposed to explain the reasons for the imbalance of the dynamic system of information security under the action of factors of influence and the risks that accompany them, and to determine the measures of public administration to ensure it. Key words: Information security; Information security factors; Society; Public administration; Information security model.


2013 ◽  
Vol 25 (3) ◽  
pp. 32-51 ◽  
Author(s):  
Salvatore Aurigemma

To combat potential security threats, organizations rely upon information security policies to guide employee actions. Unfortunately, employee violations of such policies are common and costly enough that users are often considered the weakest link in information security. This paper presents a composite theoretical framework for understanding employee behavioral compliance with organizational information security policies. Building off of the theory of planned behavior, a composite model is presented that incorporates the strengths of previous studies while minimizing theoretical gaps present in other behavioral compliance models. In building the framework, related operational constructs are examined and normalized to allow better comparison of past studies and help focus future research efforts.


2017 ◽  
Vol 41 (S1) ◽  
pp. S105-S105
Author(s):  
M. Barrios ◽  
G. Guilera ◽  
O. Pino ◽  
E. Rojo ◽  
S. Wright ◽  
...  

IntroductionIn 2001, the World Health Organization (WHO) created the International Classification of Functioning, Disability and Health (ICF) to offer a comprehensive and universally accepted framework to describe functioning, disability and health. The ICF Core Sets (ICF-CS) are a selection of categories that serve as a minimal standard for the assessment of functioning and disability in a specific health condition. The ICF-CS for schizophrenia was created in 2015 based on four preliminary studies that intend to capture different perspectives.ObjectivesThe aim of this study is to describe the similarities (i.e. overlap) and discrepancies (i.e. unique contribution) between the clinical, patient and expert perspectives on the most relevant problems in functioning of individuals with schizophrenia, being focused on the European WHO region.MethodsForty-four experts from 14 European countries participated in an expert survey, patients with schizophrenia were involved in four focus groups, and health professionals assessed 127 patients in relation to daily life functioning. Information gathered from these three preliminary studies was linked to the ICF.ResultsData showed that although a considerable number of second-level ICF categories agreed on the three preparatory studies (n = 54, 27.7%), each perspective provided a unique set of ICF categories. Specifically, experts reported 65 unique ICF categories, patients 23 and health professionals 11.ConclusionsEven though there were similarities between perspectives, each one underlined different areas of functioning, showing the importance of including different perspectives in order to get a complete view of functioning and disability in individuals with schizophrenia.Disclosure of interestThe authors have not supplied their declaration of competing interest.


2018 ◽  
Vol 11 (1) ◽  
Author(s):  
Tsige Tadesse ◽  
Tadis Berhane ◽  
Teklehaymanot Huluf Abraha ◽  
Berihu Gidey ◽  
Elsa Hagos ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document