Structural Model of the Healthcare Information Security Behavior of Nurses Applying Protection Motivation Theory

被引:7
|
作者
Lee, EunWon [1 ]
Seomun, GyeongAe [2 ]
机构
[1] Gwangju Univ, Dept Nursing, Gwangju Si 61743, South Korea
[2] Korea Univ, Coll Nursing, BK21FOUR R&E Ctr Learning Hlth Syst, Seoul 02841, South Korea
关键词
nurse; healthcare information security; protection motivation theory; South Korea;
D O I
10.3390/ijerph18042084
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Background: Healthcare information includes sensitive data and, as such, must be secure; however, the risk of healthcare information leakage is increasing. Nurses manage healthcare information in hospitals; however, previous studies have either been conducted on medical workers from various other occupations or have not synthesized various factors. The purpose of this study was to create and prove a model of nurses' healthcare information security (HIS). The hypothetical model used in this study was constructed on the basis of the protection motivation theory (PMT) proposed by Rogers. Methods: A total of 252 questionnaires scored using a five-point Likert scale were analyzed, incorporating data from nurses who had been working for more than one month in general hospitals with more than 300 beds in South Korea. The survey was conducted over a total of 30 days, from 1 to 30 September 2019. Results: The results showed that coping appraisal significantly influence HIS intentions (estimate = -1.477, p < 0.01), whereas HIS intentions significantly influence HIS behavior (estimate = 0.515, p < 0.001). A moderating effect on the association between coping appraisal and HIS intentions was found in the group of nurses who had been working for <5 years (estimate = -1.820, p < 0.05). Moreover, a moderating effect on the association between HIS intentions and HIS behavior was found in the group of nurses who had been working for <5 years (estimate = 0.600, p < 0.001). Conclusion: The results of this study can be used to develop a management plan to strengthen nurses' HIS behavior and can be used by nursing managers as a basis for developing education programs.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 50 条
  • [1] Vaccination hesitancy: Applying the protection motivation theory on parents' information behavior
    Alwreikat, Asma
    [J]. INFORMATION DEVELOPMENT, 2024,
  • [2] Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals
    Siponen, Mikko
    Ronkko, Mikko
    Fufan, Liu
    Haag, Steffi
    Laatikainen, Gabriella
    [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2023, 53
  • [3] Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
    Ifinedo, Princely
    [J]. COMPUTERS & SECURITY, 2012, 31 (01) : 83 - 95
  • [4] Using the ARCS model to improve undergraduates' perceived information security protection motivation and behavior
    Tsai, Chun-Yen
    Shih, Wen-Ling
    Hsieh, Fu-Pei
    Chen, Yun-An
    Lin, Chien-Liang
    Wu, Hui-Ju
    [J]. COMPUTERS & EDUCATION, 2022, 181
  • [5] Impact of Users' Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective
    Hanus, Bartlomiej
    Wu, Yu Andy
    [J]. INFORMATION SYSTEMS MANAGEMENT, 2016, 33 (01) : 2 - 16
  • [6] A Test of Protection Motivation Theory in the Information Security Literature: A Meta-Analytic Structural Equation Modeling Approach
    Mou, Jian
    Cohen, Jason
    Bhattacherjee, Anol
    Kim, Jongki
    [J]. JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2022, 23 (01): : 196 - 236
  • [7] Factors Affecting Security Behavior of Kenyan Students: An Integration of Protection Motivation Theory and Theory of Planned Behavior
    Farooq, Ali
    Ndiege, Joshua Rumo A.
    Isoaho, Jouni
    [J]. 2019 IEEE AFRICON, 2019,
  • [8] A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2015, 9 (01) : 26 - 46
  • [9] Using protection motivation theory in the design of nudges to improve online security behavior
    van Bavel, Rene
    Rodriguez-Priego, Nuria
    Vila, Jose
    Briggs, Pam
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 123 : 29 - 39
  • [10] Empirical assessment of mobile device users' information security behavior towards data breach Leveraging protection motivation theory
    Giwah, Anthony Duke
    Wang, Ling
    Levy, Yair
    Hur, Inkyoung
    [J]. JOURNAL OF INTELLECTUAL CAPITAL, 2020, 21 (02) : 215 - 233