Learn More
The purpose of this article is to examine the passwords selected by health care professionals and the security and privacy standards in relationship to those passwords as addressed by the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Examinations of these passwords have illustrated the connectivity between password length and strength(More)
Privacy risk is increasingly entering the public consciousness when it comes to use of information technology (IT). To gain insight into the role of risk in the technology adoption process, we studied the use of information systems for student registration and schedule management at two major U.S. universities. We extended the Technology Acceptance Model(More)
The adoption and diffusion of electronic technologies into the higher education are complex processes. This study was formulated to see which factors might influence faculty members' motivation and inclination to adopt new electronic technologies in their delivery of instruction. The following research questions were addressed in this study: a) What social(More)
AbstrAct This study examines corporate performance effects when banks outsource noncore business processes. Additionally, the article proposes that knowledge management process plays a significant role in determining the outcomes of outsourcing. Drawing from resource theory and knowledge management literature, the authors develop the concept of managerial(More)
For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive(More)