Factors Influencing Information Security Policy Compliance Behavior “A Case – Study Healthcare Workers in a Private Hospital in Mogadishu – Somalia”


Authors : Zakarie Abukar Aweis; Mohamed Adam Isak Abdirahman; Abdulkadir Jeilani Mohamud

Volume/Issue : Volume 9 - 2024, Issue 7 - July


Google Scholar : https://shorturl.at/dqKGW

Scribd : https://shorturl.at/n3kfo

DOI : https://doi.org/10.38124/ijisrt/IJISRT24JUL1238

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : Information security policy compliance is crucial for safeguarding sensitive data in healthcare settings. This study investigates the factors influencing information security policy compliance behavior among healthcare workers at a private hospital in Mogadishu, Somalia. Findings reveal that beliefs in the importance of information security, effectiveness of communication and training programs, usability of security tools, and socio- cultural factors significantly impact compliance behavior. The study provides insights for healthcare administrators and policymakers to enhance compliance strategies in healthcare organizations.

Keywords : Information Security Policy Compliance; Healthcare Workers; Private Hospital.

References :

  1. Adan Damey, M., & Dhaka,  in. (2019). Article in International Health.
  2. Ahmed, Y., Naqvi, S., & Josephs, M. (2019). Cybersecurity Metrics for Enhanced Protection of Healthcare IT Systems. International Symposium on Medical Information and Communication Technology, ISMICT, 2019-May. https://doi.org/10.1109/ISMICT.2019.8744003
  3. Alanazi, S. T., Anbar, M., Ebad, S. A., Karuppayah, S., & Al-Ani, H. A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1–21. https://doi.org/10.3390/SYM12091544
  4. Ali, B. J., Saleh, P. F., Akoi, S., Abdulrahman, A. A., Muhamed, A. S., Noori, H. N., & Anwar, G. (2021). Impact of Service Quality on the Customer Satisfaction: Case study at Online Meeting Platforms. International Journal of Engineering, Business and Management, 5(2), 65–77. https://doi.org/10.22161/ijebm.5.2.6
  5. AlKalbani, A., Deng, H., Kam, B., & Zhang, X. (2017). Information Security Compliance in Organizations: An Institutional Perspective. Data and Information Management, 1(2), 104–114. https://doi.org/10.1515/dim-2017-0006
  6. Alotaibi, F., Furnell, S., Stengel, I., & Papadaki, M. (2019). A Review of Using Gaming Technology for Cyber-Security Awareness University of Applied Sciences Karlsruhe , Germany. 6(2), 660–666.
  7. Approach, S. (2016). pdf Research Methods For Business : A Skill-Building Approach Uma Sekaran , Roger Bougie - download pdf free CLICK HERE TO DOWNLOAD. Sekaran Dan Bougie.
  8. Bidwell, P., Laxmikanth, P., Blacklock, C., Hayward, G., Willcox, M., Peersman, W., Moosa, S., & Mant, D. (2014). Security and skills: The two key issues in health worker migration. Global Health Action, 7(1). https://doi.org/10.3402/gha.v7.24194
  9. Bosnjak, M., Ajzen, I., & Schmidt, P. (2020). The theory of planned behavior: Selected recent advances and applications. Europe’s Journal of Psychology, 16(3), 352–356. https://doi.org/10.5964/ejop.v16i3.3107
  10. Chin, Amita; Jones, Beth; Little, P. (2021). A Comparative Analysis of Smartphone Security Behaviors and Practices Amita Chin Virginia Commonwealth University , United States Beth Jones Western Carolina University , United States Philip Little. 17(3), 57–80.
  11. Christofidis, M. J., Hill, A., Horswill, M. S., & Watson, M. O. (2013). A human factors approach to observation chart design can trump health professionals’ prior chart experience. Resuscitation, 84(5), 657–665. https://doi.org/10.1016/j.resuscitation.2012.09.023
  12. Cooper, D. R., Schindler, P. S., & Sun, J. (2006). Business research methods (Vol 9). In Business Research Methods (Issue 2000, p. 38). http://130.209.236.149/headocs/31businessresearch.pdf
  13. Cooper, D. R., & Schindler, P. S. (2014). EBOOK: Business Research Methods - Boris Blumberg, Donald Cooper, Pamela Schindler - Google Books. https://books.google.so/books?hl=en&lr=&id=9sovEAAAQBAJ&oi=fnd&pg=PA1&dq=Cooper+and+Schindler+(2014)+&ots=2C131-IcqA&sig=u68AGDK84g_lAJkC2gQ4OF7_jl4&redir_esc=y#v=onepage&q=Cooper and Schindler (2014)&f=false
  14. Grandgirard, J., Poinsot, D., Krespi, L., Nénon, J. P., & Cortesero, A. M. (2002). Costs of secondary parasitism in the facultative hyperparasitoid Pachycrepoideus dubius: Does host size matter? Entomologia Experimentalis et Applicata, 103(3), 239–248. https://doi.org/10.1023/A
  15. Hartnell, C. A., Ou, A. Y., & Kinicki, A. (2011). Organizational Culture and Organizational Effectiveness: A Meta-Analytic Investigation of the Competing Values Framework’s Theoretical Suppositions. Journal of Applied Psychology, 96(4), 677–694. https://doi.org/10.1037/a0021987
  16. Hashi, M. J., & Isa, K. (2015). Community Participation and Health Service Delivery in Mogadishu Municipality- Somalia. 100–111.
  17. Hodgkinson, G. P., & Clarke, I. (2007). Conceptual note Exploring the cognitive significance of organizational strategizing: A dual-process framework and research agenda. https://doi.org/10.1177/0018726707075297
  18. Houghton, C., Meskell, P., Delaney, H., Smalle, M., Glenton, C., Booth, A., Xhs, C., Devane, D., Lm, B., Houghton, C., Meskell, P., Delaney, H., Smalle, M., Glenton, C., Booth, A., Xhs, C., Devane, D., & Lm, B. (2020). Infectious diseases : a rapid qualitative evidence synthesis. Cochrane Database of Systematic Reviews, 4, CD013582. https://doi.org/10.1002/14651858.CD013582.www.cochranelibrary.com
  19. Humaidi, N., & Balakrishnan, V. (2015a). Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness. International Journal of Information and Education Technology, 5(4), 311–318. https://doi.org/10.7763/ijiet.2015.v5.522
  20. Humaidi, N., & Balakrishnan, V. (2015b). The Moderating effect of working experience on health information system security policies compliance behaviour. Malaysian Journal of Computer Science, 28(2), 70–92.
  21. Hussein, R., Karim, N. S. A., & Hasan Selamat, M. (2007). The impact of technological factors on information systems success in the electronic-government context. Business Process Management Journal, 13(5), 613–627. https://doi.org/10.1108/14637150710823110
  22. Kim, S. S., & Kim, Y. J. (2017). The effect of compliance knowledge and compliance support systems on information security compliance behavior. Journal of Knowledge Management, 21(4), 986–1010. https://doi.org/10.1108/JKM-08-2016-0353
  23. Mars, M., & Scott, R. E. (2010). Global e-health policy: A work in progress. Health Affairs, 29(2), 239–245. https://doi.org/10.1377/hlthaff.2009.0945
  24. Mburu Kimani, J., & Moi, E. (2022). DETERMINANTS OF QUALITY OF HEALTHCARE DELIVERY IN DEVOLVED SYSTEMS: CASE STUDY OF LAMU COUNTY, KENYA. International Academic Journal of Arts and Humanities |, 1(3), 85–101. https://iajournals.org/articles/iajah_v1_i3_85_101.pdf
  25. Narayana Samy, G., Ahmad, R., & Ismail, Z. (2010). Security threats categories in healthcare information systems. Health Informatics Journal, 16(3), 201–209. https://doi.org/10.1177/1460458210377468
  26. Number, W. H. O. R. (2014). Somali Community Health Strategy. https://www.somalimedicalarchives.org/archive/publications/429-somali-community-health-strategy-2015
  27. Ranta, P. (2010). Information and Communications Technology in Health.
  28. Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information and Management, 49(3–4), 190–198. https://doi.org/10.1016/j.im.2012.04.002
  29. Warsame, A., Handuleh, J., & Patel, P. (2015). Prioritization in Somali health system strengthening: a qualitative study. https://doi.org/10.1093/inthealth/ihv060
  30. Wiederhold, B. K., & Reality, V. (2015). Journal of CyberTherapy & Rehabilitation, Volume 1, Issue 2, 2008. 1(2).
  31. Yusoff, M. S. B., Arifin, W. N., & Hadie, S. N. H. (2021). ABC of questionnaire development and validation for survey research. Education in Medicine Journal, 13(1), 97–108. https://doi.org/10.21315/EIMJ2021.13.1.10
  32. Zomboko, F. E., Tripathi, S. K., & Kamuzora, F. K. (2012). Challenges in Procurement and Use of Donated Medical-Equipments: Study of a Selected Referral Hospital in Tanzania. Journal of Arts, Science & Commerce, 4(4), 41–48. https://doi.org/10.13140/RG.2.2.25895.09125

Information security policy compliance is crucial for safeguarding sensitive data in healthcare settings. This study investigates the factors influencing information security policy compliance behavior among healthcare workers at a private hospital in Mogadishu, Somalia. Findings reveal that beliefs in the importance of information security, effectiveness of communication and training programs, usability of security tools, and socio- cultural factors significantly impact compliance behavior. The study provides insights for healthcare administrators and policymakers to enhance compliance strategies in healthcare organizations.

Keywords : Information Security Policy Compliance; Healthcare Workers; Private Hospital.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe