A security risk perception model for the adoption of mobile devices in the healthcare industry

被引:23
作者
Alexandrou, Alex [1 ]
Chen, Li-Chiou [1 ]
机构
[1] John Jay Coll Criminal Justice, Dept Secur Fire & Emergency Management, 524 W 59th St, New York, NY 10019 USA
关键词
Mobile devices; Healthcare; Bring-your-own-devices (BYOD); Security risk perception; Behavioral intention; Security controls; Electronic medical records (EMR); INFORMATION SECURITY; TECHNOLOGY ACCEPTANCE; SYSTEMS; AVOIDANCE; ATTITUDE; BELIEFS;
D O I
10.1057/s41284-019-00170-0
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Within the past few years, we have seen increasing use of mobile devices in the healthcare environment. It is crucial to understand healthcare practitioners' attitudes and behaviors towards adopting mobile devices and to interacting with security controls, while understanding their risks and stringent regulations in healthcare. This paper aims to understand how healthcare practitioners perceive the security risks of using mobile devices, and how this risk perception affects their intention to use the devices, and to adopt the security controls that are required. To facilitate such understanding, we propose a theory-grounded conceptual model that incorporates subjective beliefs, perception of security risk, and behavioral intentions to both use mobile devices and comply with security controls. Furthermore, we studied the behavioral intentions under two scenarios among practitioners, when healthcare institutions provided the mobile devices, called hospital-provided devices, or when practitioners used their own devices, bring-your-own-devices. Based upon our conceptual model, we conducted an empirical study, recruiting 264 healthcare practitioners from three hospitals and their affiliated clinics. Our study provided several practical implications. First, we confirmed that it is critical in healthcare institutions to have safeguards on mobile devices that are convenient for practitioners to adopt. Second, to promote security policy compliance in mobile devices and safeguard medical information, healthcare administrators must take different approaches to security depending on how they provide mobile devices to practitioners. Third, the security training for devices should deliver different messages to different occupational groups. Last but not the least, our proposed model offers new perspectives towards a better understanding of integrating perceived security risk, behavioral intention to adopt a technology, and behavioral intention to comply with security control in the healthcare industry.
引用
收藏
页码:410 / 434
页数:25
相关论文
共 53 条
[1]   THE THEORY OF PLANNED BEHAVIOR [J].
AJZEN, I .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 50 (02) :179-211
[2]  
Ajzen I., 1985, Action-control: From cognition to behavior, pl
[3]  
[Anonymous], 2013, Information Systems
[4]  
[Anonymous], ELECTRON COMMER R A
[5]  
[Anonymous], DETERRENCE INCAPACIT
[6]  
[Anonymous], P INT C SEC CRYPT SE
[7]  
[Anonymous], 2012, MIS QUART
[8]  
[Anonymous], 1985, TECHNOLOGY ACCEPTANC
[9]  
[Anonymous], 1975, Psychological Bulletin
[10]  
[Anonymous], PREDICTING HLTH BEHA