Privacy in the digital age: a review of information privacy research in information systems

F Bélanger, RE Crossler - MIS quarterly, 2011 - JSTOR
Information privacy refers to the desire of individuals to control or have some influence over
data about themselves. Advances in information technology have raised concerns about …

[HTML][HTML] Information security behavior in health information systems: A review of research trends and antecedent factors

PK Sari, PW Handayani, AN Hidayanto, S Yazid, RF Aji - Healthcare, 2022 - mdpi.com
This study aims to review the literature on antecedent factors of information security related
to the protection of health information systems (HISs) in the healthcare organization. We …

Healthcare Technology Self-Efficacy (HTSE) and its influence on individual attitude: An empirical study

MS Rahman, M Ko, J Warren, D Carpenter - Computers in Human Behavior, 2016 - Elsevier
Previous research on technology acceptance and adoption has established perceived self-
efficacy as an important factor influencing user acceptance of information technologies …

Managing compliance with privacy regulations through translation guardrails: A health information exchange case study

C Anderson, R Baskerville, M Kaul - Information and Organization, 2023 - Elsevier
Abstract Information privacy is increasingly important in our digitally connected world,
particularly in healthcare, and privacy regulations are ramping up to promote appropriate …

Organizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditions of strain and excess

J Wall, PB Lowry, JB Barlow - Journal of the Association for …, 2015 - papers.ssrn.com
Privacy and security concerns are pervasive because of the ease of access to information.
Recurrent negative cases in the popular press attest to the failure of current privacy …

Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics

JD Wall, M Warkentin - Information & Management, 2019 - Elsevier
Persuasion is key to encourage compliance with information security policies through fear
appeals, though research has not examined how the perceived quality of their arguments …

Indirect effect of management support on users' compliance behaviour towards information security policies

N Humaidi, V Balakrishnan - Health Information …, 2018 - journals.sagepub.com
Background: Health information systems are innovative products designed to improve the
delivery of effective healthcare, but they are also vulnerable to breaches of information …

In a 'trusting'environment, everyone is responsible for information security

PAH Williams - Information Security Technical Report, 2008 - Elsevier
Information security is important in any organisation and particularly where personal and
medical information is routinely recorded. Further, where the organisational culture revolves …

Information security governance: Integrating security into the organizational culture

L Corriss - Proceedings of the 2010 Workshop on Governance of …, 2010 - dl.acm.org
We finally got what we wished for: executive managers are aware of the need to protect their
organizational data. However, we still have problems; for example, database breaches …

The moderating effect of working experience on health information system security policies compliance behaviour

N Humaidi, V Balakrishnan - Malaysian Journal of Computer …, 2015 - mjs.um.edu.my
This study was conducted to investigate the moderating effect of health professional's
working experience on the relationship between factors of Health Information System …