Authors :
Zakarie Abukar Aweis; Mohamed Adam Isak Abdirahman; Abdulkadir Jeilani Mohamud
Volume/Issue :
Volume 9 - 2024, Issue 7 - July
Google Scholar :
https://shorturl.at/dqKGW
Scribd :
https://shorturl.at/n3kfo
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24JUL1238
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Information security policy compliance is
crucial for safeguarding sensitive data in healthcare
settings. This study investigates the factors influencing
information security policy compliance behavior among
healthcare workers at a private hospital in Mogadishu,
Somalia. Findings reveal that beliefs in the importance of
information security, effectiveness of communication and
training programs, usability of security tools, and socio-
cultural factors significantly impact compliance behavior.
The study provides insights for healthcare administrators
and policymakers to enhance compliance strategies in
healthcare organizations.
Keywords :
Information Security Policy Compliance; Healthcare Workers; Private Hospital.
References :
- Adan Damey, M., & Dhaka, in. (2019). Article in International Health.
- Ahmed, Y., Naqvi, S., & Josephs, M. (2019). Cybersecurity Metrics for Enhanced Protection of Healthcare IT Systems. International Symposium on Medical Information and Communication Technology, ISMICT, 2019-May. https://doi.org/10.1109/ISMICT.2019.8744003
- Alanazi, S. T., Anbar, M., Ebad, S. A., Karuppayah, S., & Al-Ani, H. A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1–21. https://doi.org/10.3390/SYM12091544
- Ali, B. J., Saleh, P. F., Akoi, S., Abdulrahman, A. A., Muhamed, A. S., Noori, H. N., & Anwar, G. (2021). Impact of Service Quality on the Customer Satisfaction: Case study at Online Meeting Platforms. International Journal of Engineering, Business and Management, 5(2), 65–77. https://doi.org/10.22161/ijebm.5.2.6
- AlKalbani, A., Deng, H., Kam, B., & Zhang, X. (2017). Information Security Compliance in Organizations: An Institutional Perspective. Data and Information Management, 1(2), 104–114. https://doi.org/10.1515/dim-2017-0006
- Alotaibi, F., Furnell, S., Stengel, I., & Papadaki, M. (2019). A Review of Using Gaming Technology for Cyber-Security Awareness University of Applied Sciences Karlsruhe , Germany. 6(2), 660–666.
- Approach, S. (2016). pdf Research Methods For Business : A Skill-Building Approach Uma Sekaran , Roger Bougie - download pdf free CLICK HERE TO DOWNLOAD. Sekaran Dan Bougie.
- Bidwell, P., Laxmikanth, P., Blacklock, C., Hayward, G., Willcox, M., Peersman, W., Moosa, S., & Mant, D. (2014). Security and skills: The two key issues in health worker migration. Global Health Action, 7(1). https://doi.org/10.3402/gha.v7.24194
- Bosnjak, M., Ajzen, I., & Schmidt, P. (2020). The theory of planned behavior: Selected recent advances and applications. Europe’s Journal of Psychology, 16(3), 352–356. https://doi.org/10.5964/ejop.v16i3.3107
- Chin, Amita; Jones, Beth; Little, P. (2021). A Comparative Analysis of Smartphone Security Behaviors and Practices Amita Chin Virginia Commonwealth University , United States Beth Jones Western Carolina University , United States Philip Little. 17(3), 57–80.
- Christofidis, M. J., Hill, A., Horswill, M. S., & Watson, M. O. (2013). A human factors approach to observation chart design can trump health professionals’ prior chart experience. Resuscitation, 84(5), 657–665. https://doi.org/10.1016/j.resuscitation.2012.09.023
- Cooper, D. R., Schindler, P. S., & Sun, J. (2006). Business research methods (Vol 9). In Business Research Methods (Issue 2000, p. 38). http://130.209.236.149/headocs/31businessresearch.pdf
- Cooper, D. R., & Schindler, P. S. (2014). EBOOK: Business Research Methods - Boris Blumberg, Donald Cooper, Pamela Schindler - Google Books. https://books.google.so/books?hl=en&lr=&id=9sovEAAAQBAJ&oi=fnd&pg=PA1&dq=Cooper+and+Schindler+(2014)+&ots=2C131-IcqA&sig=u68AGDK84g_lAJkC2gQ4OF7_jl4&redir_esc=y#v=onepage&q=Cooper and Schindler (2014)&f=false
- Grandgirard, J., Poinsot, D., Krespi, L., Nénon, J. P., & Cortesero, A. M. (2002). Costs of secondary parasitism in the facultative hyperparasitoid Pachycrepoideus dubius: Does host size matter? Entomologia Experimentalis et Applicata, 103(3), 239–248. https://doi.org/10.1023/A
- Hartnell, C. A., Ou, A. Y., & Kinicki, A. (2011). Organizational Culture and Organizational Effectiveness: A Meta-Analytic Investigation of the Competing Values Framework’s Theoretical Suppositions. Journal of Applied Psychology, 96(4), 677–694. https://doi.org/10.1037/a0021987
- Hashi, M. J., & Isa, K. (2015). Community Participation and Health Service Delivery in Mogadishu Municipality- Somalia. 100–111.
- Hodgkinson, G. P., & Clarke, I. (2007). Conceptual note Exploring the cognitive significance of organizational strategizing: A dual-process framework and research agenda. https://doi.org/10.1177/0018726707075297
- Houghton, C., Meskell, P., Delaney, H., Smalle, M., Glenton, C., Booth, A., Xhs, C., Devane, D., Lm, B., Houghton, C., Meskell, P., Delaney, H., Smalle, M., Glenton, C., Booth, A., Xhs, C., Devane, D., & Lm, B. (2020). Infectious diseases : a rapid qualitative evidence synthesis. Cochrane Database of Systematic Reviews, 4, CD013582. https://doi.org/10.1002/14651858.CD013582.www.cochranelibrary.com
- Humaidi, N., & Balakrishnan, V. (2015a). Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness. International Journal of Information and Education Technology, 5(4), 311–318. https://doi.org/10.7763/ijiet.2015.v5.522
- Humaidi, N., & Balakrishnan, V. (2015b). The Moderating effect of working experience on health information system security policies compliance behaviour. Malaysian Journal of Computer Science, 28(2), 70–92.
- Hussein, R., Karim, N. S. A., & Hasan Selamat, M. (2007). The impact of technological factors on information systems success in the electronic-government context. Business Process Management Journal, 13(5), 613–627. https://doi.org/10.1108/14637150710823110
- Kim, S. S., & Kim, Y. J. (2017). The effect of compliance knowledge and compliance support systems on information security compliance behavior. Journal of Knowledge Management, 21(4), 986–1010. https://doi.org/10.1108/JKM-08-2016-0353
- Mars, M., & Scott, R. E. (2010). Global e-health policy: A work in progress. Health Affairs, 29(2), 239–245. https://doi.org/10.1377/hlthaff.2009.0945
- Mburu Kimani, J., & Moi, E. (2022). DETERMINANTS OF QUALITY OF HEALTHCARE DELIVERY IN DEVOLVED SYSTEMS: CASE STUDY OF LAMU COUNTY, KENYA. International Academic Journal of Arts and Humanities |, 1(3), 85–101. https://iajournals.org/articles/iajah_v1_i3_85_101.pdf
- Narayana Samy, G., Ahmad, R., & Ismail, Z. (2010). Security threats categories in healthcare information systems. Health Informatics Journal, 16(3), 201–209. https://doi.org/10.1177/1460458210377468
- Number, W. H. O. R. (2014). Somali Community Health Strategy. https://www.somalimedicalarchives.org/archive/publications/429-somali-community-health-strategy-2015
- Ranta, P. (2010). Information and Communications Technology in Health.
- Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information and Management, 49(3–4), 190–198. https://doi.org/10.1016/j.im.2012.04.002
- Warsame, A., Handuleh, J., & Patel, P. (2015). Prioritization in Somali health system strengthening: a qualitative study. https://doi.org/10.1093/inthealth/ihv060
- Wiederhold, B. K., & Reality, V. (2015). Journal of CyberTherapy & Rehabilitation, Volume 1, Issue 2, 2008. 1(2).
- Yusoff, M. S. B., Arifin, W. N., & Hadie, S. N. H. (2021). ABC of questionnaire development and validation for survey research. Education in Medicine Journal, 13(1), 97–108. https://doi.org/10.21315/EIMJ2021.13.1.10
- Zomboko, F. E., Tripathi, S. K., & Kamuzora, F. K. (2012). Challenges in Procurement and Use of Donated Medical-Equipments: Study of a Selected Referral Hospital in Tanzania. Journal of Arts, Science & Commerce, 4(4), 41–48. https://doi.org/10.13140/RG.2.2.25895.09125
Information security policy compliance is
crucial for safeguarding sensitive data in healthcare
settings. This study investigates the factors influencing
information security policy compliance behavior among
healthcare workers at a private hospital in Mogadishu,
Somalia. Findings reveal that beliefs in the importance of
information security, effectiveness of communication and
training programs, usability of security tools, and socio-
cultural factors significantly impact compliance behavior.
The study provides insights for healthcare administrators
and policymakers to enhance compliance strategies in
healthcare organizations.
Keywords :
Information Security Policy Compliance; Healthcare Workers; Private Hospital.