DOI QR코드

DOI QR Code

Clinical Information Protection Behavior in a Medical Institution : Based on Health Psychology Theories

의료기관 종사자의 진료정보 보호행위분석: 건강심리이론관점을 중심으로

  • Son, Mi-Jung (Dept. of health policy and Management, Kyung Hee University) ;
  • Yoon, Tai-Young (Det. of medical record, Kyung Hee University Hospital at Gangdong) ;
  • Lee, Sang-Chul (Dept. of Business Administration, Korea Christian University)
  • 손미정 (경희대학교 의료관리학과) ;
  • 윤태영 (강동경희대학교병원 의무기록팀) ;
  • 이상철 (그리스도대학교 경영학부)
  • Received : 2014.01.15
  • Accepted : 2014.01.22
  • Published : 2014.06.30

Abstract

Purpose: This research aims to find out clinical information protection behavior within a medical institution in mandatory circumstance based on health psychology theories Methods: This research has developed the survey based on the variables from ealth psychology theories; and conducted the survey during the whole month in April 2013. In the end, 256 samples have been used for this research's analysis. Results: First of all, Empirical results has proved that perceived benefits, self-efficacy, and cues to action have an positive influence on clinical information protection behavior. Perceived barriers has an negative influence. Finally, it has proven from the research that perceived severity and perceived susceptibility do not have an impact on clinical inf ormation protection behavior Conclusion: These findings provide an enriched understanding about medical institution workers information protection behavior on patient's clinical information.

Keywords

References

  1. Anderson, C. L., and Agarwal, R. 2006. "Practicing Safe Computing: Message Framing, Self-View, and Home Computer User Security Behavior Intentions." in International Conference on Information Systems, 1543-1561.
  2. Bandura, A. 1977. "Self-efficacy: Toward a unifying theory of behavior change." Psychological Review 84:191-215. https://doi.org/10.1037/0033-295X.84.2.191
  3. Cha, D. P. 2007. "The Role of Threat and Efficacy in the Fear Appeal Messages: Multiplicative Relationship, or Additive Relationship?." Korean Journal of Advertising 9(2):339-363.
  4. Chin, W. W., Marcolin, B. L., and Newsted, P. R. 2003. "A partial least squares latent variable modeling approach for measuring interaction effects: Results from a monte carlo simulation study and an electronic-mail emotion/adoption study." Information Systems Research 14(2):189-217. https://doi.org/10.1287/isre.14.2.189.16018
  5. Choi, J. Y. 2007. "A Study on the Privacy Protection in Hospital Information System." M.S dissertations, University of Wonkwang.
  6. Claar, C. L. 2011. The adoption of computer security: An analysis of home personal computer user behavior using the health belief model. Utah: Utah State University Press.
  7. Compeau, D. R., Higgins, C. A., and Huff, S. 1999. "Social cognitive theory and individual reactions to computing technology: a longitudinal study." MIS Quarterly 23(2):145-158. https://doi.org/10.2307/249749
  8. Davis, F. D. 1989. "Perceived usefulness, perceived ease of use, and user acceptance of information technology." MIS Quarterly 13(3):319-338. https://doi.org/10.2307/249008
  9. Gurung, A., Luo, X., and Liao, Q. 2009. "Consumer motivation in taking action against spyware: An empirical investigation." Information Management and Computer Security 17(3):276-289. https://doi.org/10.1108/09685220910978112
  10. Jee, B. S., Fan, L., Lee, S. C., and Suh, Y. H. 2011. "Personal Information Protection Behavoir for Information Quality: Health Psychology Theory Perspectives." Journal of Korean Society for Quality Management 39(3):432-443.
  11. Ji, H. J. 2008. "A Study on the Patient Privacy Portection of Medical Information for Internet." The Journal of The Institute of Webcasting, Internet and Telecommunication 8(5):235-236.
  12. Lee, Y. 2011. "Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective." Decision Support Systems 50:361-369. https://doi.org/10.1016/j.dss.2010.07.009
  13. Liang, H., and Xue, Y. 2009. "Avoidance of information technology threats: A theoretical perspective." MIS Quarterly 33(1):71-90. https://doi.org/10.2307/20650279
  14. Liang, H., and Xue, Y. 2010. "Understanding Security Behaviors in Personal Computer Usage: A threat Avoidance Perspective." Journal of the Association for Information Systems 7(2):393-413.
  15. Maddus, J. E., and Rogers, R. W. 1983. "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change." Journal of Experimental Social Psychology 19:469-479. https://doi.org/10.1016/0022-1031(83)90023-9
  16. Ng, B. Y., Kankanhalli, A., and Xu, Y. C. 2009. "Studing users' computer security behavior: A health belief perspective." Decision Support System 46(4):815-825. https://doi.org/10.1016/j.dss.2008.11.010
  17. Oliver, R. L., and Berger, P. K. 1979. "A path analysis of preventive health care decision models." Journal of Consumer Research 6(2):113-122. https://doi.org/10.1086/208755
  18. Rhodes, K. 2001. "Operations security awareness: the mind has no firewall." Computer Security Journal 16(2):27-36.
  19. Rogers, R. W. 1975. "A protection motivation theory of fear appeals and attitude change." Journal of Psychology 91:93-114. https://doi.org/10.1080/00223980.1975.9915803
  20. Rogers, R. W., and Petty, R. 1983. Cognitive and physiological process in fear appeals and attitude change: A revised theory of protection motivation. Social Psychophysiology, A Source Book, 153-176. New York: Guilford Press.
  21. Rosenstock, I. M. 1974. "The health belief model and preventive health behavior." Health education Monographs 2:354-386. https://doi.org/10.1177/109019817400200405
  22. Rosenstock, I. M., Strecher, V., and Becker, M. 1994. "The Health Belief Model and HIV risk behavior change." In Preventing AIDS: Theories and methods of behavioral interventions, edited by DiClemente, R. J. & Peterson, J. L., 5-24. New York: Plenum Press.
  23. Venkatesh, V. 2000. "Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model." Information System Research 11(4):342-365. https://doi.org/10.1287/isre.11.4.342.11872
  24. Weinstein, N. D. 2000. "Perceived probability, perceived severity, and health-protective behavior." Health Psychology 19(1):65-74. https://doi.org/10.1037/0278-6133.19.1.65
  25. Workman, M., Bommer, W. H., and Straub, D. 2008. "Security lapses and the omission of information security measures: A threat control model and empirical test." Computers in Human Behavior 24(6):2799-2816. https://doi.org/10.1016/j.chb.2008.04.005
  26. Youn, S. 2005. "Teenagers' Perception of Online Privacy and Coping Behavior: A Risk-Benefit Appraisal Approach." Journal of Broadcasting & Electronic Media 49(1):86-110. https://doi.org/10.1207/s15506878jobem4901_6
  27. Youn, S. 2009. "Determinants of Online Privacy Concern and its Influence on Privacy Protection Behaviors Among Young Adolescents." The Journal of Consumer affairs 43(3):389-418. https://doi.org/10.1111/j.1745-6606.2009.01146.x