Structural Model of the Healthcare Information Security Behavior of Nurses Applying Protection Motivation Theory

被引:7
|
作者
Lee, EunWon [1 ]
Seomun, GyeongAe [2 ]
机构
[1] Gwangju Univ, Dept Nursing, Gwangju Si 61743, South Korea
[2] Korea Univ, Coll Nursing, BK21FOUR R&E Ctr Learning Hlth Syst, Seoul 02841, South Korea
关键词
nurse; healthcare information security; protection motivation theory; South Korea;
D O I
10.3390/ijerph18042084
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Background: Healthcare information includes sensitive data and, as such, must be secure; however, the risk of healthcare information leakage is increasing. Nurses manage healthcare information in hospitals; however, previous studies have either been conducted on medical workers from various other occupations or have not synthesized various factors. The purpose of this study was to create and prove a model of nurses' healthcare information security (HIS). The hypothetical model used in this study was constructed on the basis of the protection motivation theory (PMT) proposed by Rogers. Methods: A total of 252 questionnaires scored using a five-point Likert scale were analyzed, incorporating data from nurses who had been working for more than one month in general hospitals with more than 300 beds in South Korea. The survey was conducted over a total of 30 days, from 1 to 30 September 2019. Results: The results showed that coping appraisal significantly influence HIS intentions (estimate = -1.477, p < 0.01), whereas HIS intentions significantly influence HIS behavior (estimate = 0.515, p < 0.001). A moderating effect on the association between coping appraisal and HIS intentions was found in the group of nurses who had been working for <5 years (estimate = -1.820, p < 0.05). Moreover, a moderating effect on the association between HIS intentions and HIS behavior was found in the group of nurses who had been working for <5 years (estimate = 0.600, p < 0.001). Conclusion: The results of this study can be used to develop a management plan to strengthen nurses' HIS behavior and can be used by nursing managers as a basis for developing education programs.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 50 条
  • [11] Human-centric cyber security: Applying protection motivation theory to analyse micro business owners' security behaviours
    Jamil, Hassan
    Zia, Tanveer
    Nayeem, Tahmid
    Whitty, Monica T.
    D'Alessandro, Steven
    [J]. INFORMATION AND COMPUTER SECURITY, 2024,
  • [12] User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory
    Menard, Philip
    Bott, Gregory J.
    Crossler, Robert E.
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2017, 34 (04) : 1203 - 1230
  • [13] Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector
    Alanazi, Sultan T.
    Anbar, Mohammed
    A. Ebad, Shouki
    Karuppayah, Shankar
    Al-Ani, Hadeer A.
    [J]. SYMMETRY-BASEL, 2020, 12 (09):
  • [14] Analysis of the Weight Management Behavior of Chinese Pregnant Women: An Integration of the Protection Motivation Theory and the Information-Motivation-Behavioral Skills Model
    Ge, Jinjin
    Zhao, Shiqi
    Peng, Xueqing
    Walker, Anita Nyarkoa
    Yang, Ni
    Zhou, Hua
    Wang, Li
    Zhang, Chi
    Zhou, Meng
    You, Hua
    [J]. FRONTIERS IN PUBLIC HEALTH, 2022, 10
  • [15] Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future
    Haag, Steffi
    Siponen, Mikko
    Liu, Fufan
    [J]. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2021, 52 (02): : 25 - 67
  • [16] Understanding security behaviour among healthcare professionals by comparing results from technology threat avoidance theory and protection motivation theory
    Sreenath, Sanjana Sundara Raj
    Hewitt, Barbara
    Sreenath, Sahana
    [J]. BEHAVIOUR & INFORMATION TECHNOLOGY, 2024,
  • [17] The valued coexistence of protection motivation and stewardship in information security behaviors
    Ogbanufe, Obi
    Crossler, Robert E.
    Biros, David
    [J]. COMPUTERS & SECURITY, 2023, 124
  • [18] Behaviour model integrated by protection motivation theory and information-motivation-behavioural skills model applying in pregnancy weight management (PrInMAMa): a study protocol for a randomised controlled trial in China
    Ge, Jinjin
    Wang, Li
    Peng, Xueqing
    Zhang, Chi
    Zhao, Shiqi
    Zhou, Meng
    Tang, Shaowen
    You, Hua
    [J]. BMJ OPEN, 2022, 12 (01):
  • [19] Water management information campaigns and protection motivation theory
    Nelson K.
    Cismaru M.
    Cismaru R.
    Ono T.
    [J]. International Review on Public and Nonprofit Marketing, 2011, 8 (2) : 163 - 193
  • [20] Predicting Students' Security Behavior Using Information-Motivation-Behavioral Skills Model
    Farooq, Ali
    Jeske, Debora
    Isoaho, Jouni
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 238 - 252