Influence Of User’s Perception on Security of Electronic Health Records in Tanzania Public Hospitals

Authors

  • Ernest Godson Information Systems Department, Institute of Accountancy Arusha
  • Thadei Kiwango Information Systems Department, Institute of Accountancy Arusha

DOI:

https://doi.org/10.59645/abr.v16i1.174

Keywords:

User’s perceptions, Electronic health records, Security

Abstract

Human factor is an important component in the security of information in organizations, as human factor determine the behavior of the users of information toward information security controls in organizations. This paper attempt to assess the influence of user’s perception of security on the security of electronic health records. The study adopted a descriptive research design. Data were collected at Mount Meru Regional Referral Hospital in Arusha. Quantitative research approach were used. A purposive non-probability sampling technique was applied to select a total number of 75 participants, out of 75 participants who were contacted 72 respondents participated which is 96%. Data were collected using questionnaires. All questions were closed-end questions to fit into quantitative analysis. Findings revealed that user’s perception of security had a strong influence the security of electronic health records. Therefore, the study recommended that for effective security controls of electronic health records there must a regular users’ training and awareness to create a positive user’s perceptions of security.

Downloads

Download data is not yet available.

References

Adams, A. and Sasse, A. (1999). “User are not the enemy”, Communications of the ACM, Vol 42 N0.12,pp.41-46.

Abawajy, J. User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 2014, 33, 237–248

Albrechtsen, E. A qualitative study of users’ view on information security. Comput. Secur. 2007, 26, 276–289.

Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes , 50(2), 179-211.

Anwar, M.; He, W.; Ash, I.; Yuan, X.; Li, L.; Xu, L. Gender difference and employees’ cybersecurity behaviors. Comput. Hum. Behav. 2017, 69, 437–443.

Belanger, F & Crossler, R.E (2011). “Privacy in the digital age: A review of information privacy research in information systems”, MIS Quarterly, Vol. 35 No. 4 pp.1017-1041.

Beautement, A., Sasse, M.A & Wonham, M (2008). The compliance budget managing security behavior in the organizations” Security.

Furnell, S., Tsaganidi, V & Phippen, A (2008). "Security beliefs and barriers for novice internet users", Computers & security, Elsevier Ltd, Vol. 27 No.7-8,pp. 235-240

Grassegger, T.; Nedbal, D. The Role of Employees’ Information Security Awareness on the Intention to Resist Social Engineering. Procedia Comput. Sci. 2021, 181, 59–66.

Hadlington L., (2018). The Human Factor in cybersecurity: Exploring the Accidental insider, IGIGLOBAL, UK

Ifinedo, P. (2012), “Understanding information systems security policy compliance: integration of the theory of planned behavior and the protection motivation theory’, computers & security, Elsevier ltd, Vol.31 No 1,pp. 83-95.

Leonard L,N & Ccronan T.P; Kreie J. What influences technical behavior intentions, planned behavior reason education, perceived importance or individual characteristics? Inf manag. 2004,42, 143-158

Pahnila, S., Siponen, M & Mahmood, A (2007). “Employees behavior towards IS Security policy compliance”, 40th Hawaii International Conference on system sciences

Parsons, K.; Calic, D.; Pattinson, M.; Butavicius, M.; McCormac, A.; Zwaans, T. The human aspects of information security questionnaire (HAIS-Q): Two further validation studies. Comput. Secur. 2017, 66, 40–51

Pollock T., (2017). Reducing human error in cyber security using the Human Factors Analysis Classification System (HFACS), KSU Proceedings on Cybersecurity Education, Research and practice, Kennesaw State University

Puhakainen, P & Siponen, M (2010), Improving employess compliance through information system security training: an action research stsudy. MIS Quarterly Vol. 34 No. 4, pp. 757-778

Safa, N.S.; Sookhak, M.; Von Solms, R.; Furnell, S.; Ghani, N.A.; Herawan, T. Information security conscious care behaviour formation in organizations. Comput. Secur. 2015, 53, 65–78

Thirumalai, C; Chandhini, S.A; Vaishnavi, M.A (2017). Analyzing the concrete compressive strength using Pearson and Spearman. In Proceedings of the 2017 International Conference of Electronics Communication and Aerospace Technology (ICECA), Coimbatore, India, 20-22 April 2017; IEEE: Piscataway, NJ, USA, 2017; Volume 2, pp.215-218

Uffen, J.; Guhr, N.; Breitner, M.H. Personality Traits and Information Security Management: An Empirical Study of Information Security Executives. In Proceedings of the International Conference on Information Systems, ICIS 2012, Orlando, FL, USA, 16–19 December 2012.

Downloads

Published

2024-06-21

How to Cite

Godson, E. ., & Kiwango, T. (2024). Influence Of User’s Perception on Security of Electronic Health Records in Tanzania Public Hospitals. The Accountancy and Business Review, 16(1). https://doi.org/10.59645/abr.v16i1.174

Issue

Section

Articles