Browse > Article
http://dx.doi.org/10.7469/JKSQM.2014.42.2.153

Clinical Information Protection Behavior in a Medical Institution : Based on Health Psychology Theories  

Son, Mi-Jung (Dept. of health policy and Management, Kyung Hee University)
Yoon, Tai-Young (Det. of medical record, Kyung Hee University Hospital at Gangdong)
Lee, Sang-Chul (Dept. of Business Administration, Korea Christian University)
Publication Information
Abstract
Purpose: This research aims to find out clinical information protection behavior within a medical institution in mandatory circumstance based on health psychology theories Methods: This research has developed the survey based on the variables from ealth psychology theories; and conducted the survey during the whole month in April 2013. In the end, 256 samples have been used for this research's analysis. Results: First of all, Empirical results has proved that perceived benefits, self-efficacy, and cues to action have an positive influence on clinical information protection behavior. Perceived barriers has an negative influence. Finally, it has proven from the research that perceived severity and perceived susceptibility do not have an impact on clinical inf ormation protection behavior Conclusion: These findings provide an enriched understanding about medical institution workers information protection behavior on patient's clinical information.
Keywords
Protection Motivation Theory; Patient's Clinical Information Security; Threat; Behavior Theory;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Venkatesh, V. 2000. "Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model." Information System Research 11(4):342-365.   DOI   ScienceOn
2 Rogers, R. W. 1975. "A protection motivation theory of fear appeals and attitude change." Journal of Psychology 91:93-114.   DOI   ScienceOn
3 Rogers, R. W., and Petty, R. 1983. Cognitive and physiological process in fear appeals and attitude change: A revised theory of protection motivation. Social Psychophysiology, A Source Book, 153-176. New York: Guilford Press.
4 Rosenstock, I. M. 1974. "The health belief model and preventive health behavior." Health education Monographs 2:354-386.   DOI
5 Rosenstock, I. M., Strecher, V., and Becker, M. 1994. "The Health Belief Model and HIV risk behavior change." In Preventing AIDS: Theories and methods of behavioral interventions, edited by DiClemente, R. J. & Peterson, J. L., 5-24. New York: Plenum Press.
6 Weinstein, N. D. 2000. "Perceived probability, perceived severity, and health-protective behavior." Health Psychology 19(1):65-74.   DOI   ScienceOn
7 Workman, M., Bommer, W. H., and Straub, D. 2008. "Security lapses and the omission of information security measures: A threat control model and empirical test." Computers in Human Behavior 24(6):2799-2816.   DOI   ScienceOn
8 Youn, S. 2005. "Teenagers' Perception of Online Privacy and Coping Behavior: A Risk-Benefit Appraisal Approach." Journal of Broadcasting & Electronic Media 49(1):86-110.   DOI   ScienceOn
9 Lee, Y. 2011. "Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective." Decision Support Systems 50:361-369.   DOI   ScienceOn
10 Gurung, A., Luo, X., and Liao, Q. 2009. "Consumer motivation in taking action against spyware: An empirical investigation." Information Management and Computer Security 17(3):276-289.   DOI   ScienceOn
11 Jee, B. S., Fan, L., Lee, S. C., and Suh, Y. H. 2011. "Personal Information Protection Behavoir for Information Quality: Health Psychology Theory Perspectives." Journal of Korean Society for Quality Management 39(3):432-443.
12 Ji, H. J. 2008. "A Study on the Patient Privacy Portection of Medical Information for Internet." The Journal of The Institute of Webcasting, Internet and Telecommunication 8(5):235-236.
13 Liang, H., and Xue, Y. 2009. "Avoidance of information technology threats: A theoretical perspective." MIS Quarterly 33(1):71-90.   DOI
14 Liang, H., and Xue, Y. 2010. "Understanding Security Behaviors in Personal Computer Usage: A threat Avoidance Perspective." Journal of the Association for Information Systems 7(2):393-413.
15 Rhodes, K. 2001. "Operations security awareness: the mind has no firewall." Computer Security Journal 16(2):27-36.
16 Maddus, J. E., and Rogers, R. W. 1983. "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change." Journal of Experimental Social Psychology 19:469-479.   DOI
17 Ng, B. Y., Kankanhalli, A., and Xu, Y. C. 2009. "Studing users' computer security behavior: A health belief perspective." Decision Support System 46(4):815-825.   DOI   ScienceOn
18 Oliver, R. L., and Berger, P. K. 1979. "A path analysis of preventive health care decision models." Journal of Consumer Research 6(2):113-122.   DOI   ScienceOn
19 Anderson, C. L., and Agarwal, R. 2006. "Practicing Safe Computing: Message Framing, Self-View, and Home Computer User Security Behavior Intentions." in International Conference on Information Systems, 1543-1561.
20 Cha, D. P. 2007. "The Role of Threat and Efficacy in the Fear Appeal Messages: Multiplicative Relationship, or Additive Relationship?." Korean Journal of Advertising 9(2):339-363.
21 Chin, W. W., Marcolin, B. L., and Newsted, P. R. 2003. "A partial least squares latent variable modeling approach for measuring interaction effects: Results from a monte carlo simulation study and an electronic-mail emotion/adoption study." Information Systems Research 14(2):189-217.   DOI   ScienceOn
22 Choi, J. Y. 2007. "A Study on the Privacy Protection in Hospital Information System." M.S dissertations, University of Wonkwang.
23 Claar, C. L. 2011. The adoption of computer security: An analysis of home personal computer user behavior using the health belief model. Utah: Utah State University Press.
24 Bandura, A. 1977. "Self-efficacy: Toward a unifying theory of behavior change." Psychological Review 84:191-215.   DOI   ScienceOn
25 Compeau, D. R., Higgins, C. A., and Huff, S. 1999. "Social cognitive theory and individual reactions to computing technology: a longitudinal study." MIS Quarterly 23(2):145-158.   DOI   ScienceOn
26 Davis, F. D. 1989. "Perceived usefulness, perceived ease of use, and user acceptance of information technology." MIS Quarterly 13(3):319-338.   DOI   ScienceOn
27 Youn, S. 2009. "Determinants of Online Privacy Concern and its Influence on Privacy Protection Behaviors Among Young Adolescents." The Journal of Consumer affairs 43(3):389-418.   DOI   ScienceOn