{"title":"The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information.","authors":"Eun Hee Park, Jongwoo Kim, Lynn Wiles","doi":"10.1007/s10799-022-00362-y","DOIUrl":null,"url":null,"abstract":"<p><p>This paper aims to identify and understand factors affecting insiders' intention to disclose patients' medical information and to investigate how these factors affect the intention to disclose. Based on the literature review on deterrence theory and health information security awareness (HISA), we identify relevant factors and develop a research model explaining insiders' intention to disclose patients' health information. We collect data (N = 105) through scenario-based experiments. Results show that two personal factors, collectivism, and IT proficiency, play a significant role in the model. While collectivism affects two components (health information security regulation awareness and punishment severity awareness) of HISA which influences intention to disclose, IT proficiency moderates the relationship between HISA and intention to disclose. In addition, HISA negatively affects reporting assessment and intention to disclose. This paper aims to fill a research gap in understanding factors affecting insiders' intentions to disclose protected health information. We identify and investigate factors (e.g., collectivism, HISA, reporting assessment, and IT proficiency) that may affect insiders' disclosing intentions. We find that collectivism affects two components of HISA which influence reporting assessment and disclosing intention. We also discover that IT proficiency moderates the relationship between HISA and intention to disclose. Our findings suggest that we need to carefully consider personal factors such as collectivistic nature and IT proficiency in managing insiders' security breaches.</p>","PeriodicalId":46884,"journal":{"name":"Information Technology & Management","volume":"24 2","pages":"177-193"},"PeriodicalIF":2.3000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8926092/pdf/","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Technology & Management","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.1007/s10799-022-00362-y","RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 2
Abstract
This paper aims to identify and understand factors affecting insiders' intention to disclose patients' medical information and to investigate how these factors affect the intention to disclose. Based on the literature review on deterrence theory and health information security awareness (HISA), we identify relevant factors and develop a research model explaining insiders' intention to disclose patients' health information. We collect data (N = 105) through scenario-based experiments. Results show that two personal factors, collectivism, and IT proficiency, play a significant role in the model. While collectivism affects two components (health information security regulation awareness and punishment severity awareness) of HISA which influences intention to disclose, IT proficiency moderates the relationship between HISA and intention to disclose. In addition, HISA negatively affects reporting assessment and intention to disclose. This paper aims to fill a research gap in understanding factors affecting insiders' intentions to disclose protected health information. We identify and investigate factors (e.g., collectivism, HISA, reporting assessment, and IT proficiency) that may affect insiders' disclosing intentions. We find that collectivism affects two components of HISA which influence reporting assessment and disclosing intention. We also discover that IT proficiency moderates the relationship between HISA and intention to disclose. Our findings suggest that we need to carefully consider personal factors such as collectivistic nature and IT proficiency in managing insiders' security breaches.
期刊介绍:
Changes in the hardware, software and telecommunication technologies play a major role in the way our society is evolving. During the last decade, the rate of change in information technology has increased. Indeed it is clear that we are now entering an era where explosive change in telecommunication technology combined with ever increasing computing power will lead to profound changes in information systems that support our organizations. These changes will affect the way our organizations function, will lead to new business opportunities and will create a need for new non-profit organizations. Governments and international organizations do and will have to scramble to create policies and laws for control of public goods and services such as airwaves and public networks. Educational institutions will continue to change the content of educational materials they deliver to include new knowledge and skills. In addition these institutions will change the delivery mechanisms for disseminating these materials. By definition, information technology is very wide. There are a number of journals that address different technologies such as databases, knowledge bases, multimedia, group-ware, telecommunications, etc. This current trend is understandable because these technologies are indeed complex and often have a multitude of technical issues requiring in-depth study. On the other hand, business solutions almost always require integration of a number of these technologies. Therefore it is important to have a journal where the readers will be exposed not only to different technologies but also to their impact on information system design, functionality, operations and management. It should be emphasized that information systems include not only machines but also humans; therefore, the journal will be an outlet for studies dealing with man/machine interface, human factors and organizational issues. Furthermore, managerial issues arising from and dealing with managem ent of information technology and systems including strategic issues are included in the domain of coverage. The topics of coverage will include but will not be limited to the following list: Managing with Information Technology;Management of Information Technology and Systems;Introduction and Diffusion of IT;Strategic Impact of IT;Economics of IS and IT;New Information Technologies and Their Impact on Organizations;Human Factors in Information Systems;Man/Machine Interface, GUI;IS and Organizational Research Issues;Graphical Problem Solving;Multimedia Applications;Knowledge Acquisition and Representation;Knowledge Bases;Data Modeling;Database Management Systems;Data Mining;Model Management Systems;Systems Analysis, Design and Development; Case Technologies;Object Oriented Design Methodologies;System Design Methodologies;System Development Environments;Performance Modeling and Analysis; Software Engineering;Artificial Intelligence Applications to Organizational/Business Problems;Expert Systems;Decision Support Systems;Machine Learning;Neural Network Applications;Meta-Heuristics and Business Problem Solving;Distributed Computer Systems, Legacy Systems, Client - Server Computing;End User Computing;Information Systems for Virtual Organizations;IS and IT for Business Process Re-engineering;IS for Total Quality Control;IS for Supporting Team Work;Negotiation Support Systems;Group Decision Support Systems;EDI;Internet/WWW Applications;Telecommunication Networks;IT and International Information Systems;Security in Networks and Systems;Public Policy Issues dealing with Telecommunica tion;Networks and Airways;IS and IT Training;GIS;IS and IT Applications, e.g., in logistics, marketing, accounting, finance and operations.
Officially cited as: Inf Technol Manag