{"id":773,"date":"2016-11-29T14:43:43","date_gmt":"2016-11-29T06:43:43","guid":{"rendered":"http:\/\/people.utm.my\/norzairah\/?page_id=773"},"modified":"2016-11-29T15:55:59","modified_gmt":"2016-11-29T07:55:59","slug":"security-culture-and-security-awareness-as-the-basic-factors-for-security-effectiveness-in-health-information-systems","status":"publish","type":"page","link":"https:\/\/people.utm.my\/norzairah\/security-culture-and-security-awareness-as-the-basic-factors-for-security-effectiveness-in-health-information-systems\/","title":{"rendered":"Security Culture and Security Awareness as the Basic Factors for Security Effectiveness in Health Information Systems"},"content":{"rendered":"<p>ABSTRACT<\/p>\n<p>The use of Information and Communications Technology (ICT) in healthcare domains contributes to an increased complexity of the problems related to the security of Health Information Systems (HIS). This is primarily may be due to the introduction of human behaviors. In spite of many attempts in providing security for HIS, security incidents remain to continue due to human factors. The key to achieve security effectiveness of information systems is through the nurturing of HIS users security awareness and culture towards patients\u2019 data. Hence, addressing the role of human behavior is the main focus for this study. Based on the secondary data resources, a theoretical model is proposed according to users\u2019 awareness and users\u2019 culture for HIS security. This work-in-progress study attempts to highlight the HIS users\u2019 behaviors in enhancing the security effectiveness for HIS.<\/p>\n<p>&nbsp;<\/p>\n<p>Shahri, A. B., Ismail, Z., &amp; <strong>Rahim, N. Z. A.<\/strong> (2013). <a href=\"https:\/\/scholar.google.com\/scholar?hl=en&amp;q=Security+Culture+and+Security+Awareness+as+the+Basic+Factors+for+Security+Effectiveness+in+Health+Information+Systems&amp;btnG=&amp;as_sdt=1%2C5&amp;as_sdtp=\">Security Culture and Security Awareness as the Basic Factors for Security Effectiveness in Health Information Systems<\/a>. <em>Jurnal Teknologi<\/em>, 64(2). (Scopus Indexed)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ABSTRACT The use of Information and Communications Technology (ICT) in healthcare domains contributes to an increased complexity of the problems related to the security of Health Information Systems (HIS). This is primarily may be due to the introduction of human behaviors. In spite of many attempts in providing security for HIS, security incidents remain to [&hellip;]<\/p>\n","protected":false},"author":6513,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-773","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/people.utm.my\/norzairah\/wp-json\/wp\/v2\/pages\/773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/norzairah\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/people.utm.my\/norzairah\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/norzairah\/wp-json\/wp\/v2\/users\/6513"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/norzairah\/wp-json\/wp\/v2\/comments?post=773"}],"version-history":[{"count":0,"href":"https:\/\/people.utm.my\/norzairah\/wp-json\/wp\/v2\/pages\/773\/revisions"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/norzairah\/wp-json\/wp\/v2\/media?parent=773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}