Learn More
The damage due to computer security incidents is motivating organizations to adopt protective mechanisms. While technological controls are necessary, computer security also depends on individual's security behavior. It is thus important to investigate what influences a user to practice computer security. This study uses the Health Belief Model, adapted from(More)
Home computer users play a crucial role in securing the cyberspace, but the protection of home computers is left to the initiative of the users. In this study, we focus on the socio-behavioral perspective, as the behavior of home computer users on security issues is one of the most important factors in securing the cyberspace. The decomposed Theory of(More)
Healthcare information systems such as an Electronic Medication Administration System (EMAS) have the potential to enhance productivity, lower costs, and reduce medication errors. However, various issues have arisen from the use of these systems. A key issue relates to workarounds as a result of a misfit between the new information system (IS)(More)
a r t i c l e i n f o Technological advancements have accelerated the deployment of healthcare information systems (HIS) with the potential to enhance productivity, lower costs, reduce medication errors, and ease the manpower strain on the healthcare industry. A recent development is the use of wireless vital signs monitoring systems for ubiquitous patient(More)
Integrated healthcare information systems, such as a closed loop medication management system (CLMMS), have been developed to support the inter-linked work of multiple user groups including doctors, pharmacists, and nurses. With the challenges faced in assessing the use and impact of such systems, there is limited research on this topic that takes into(More)
The increasing number of security incidents is causing great concern to organizations. Information security awareness programs are an important approach towards educating users to prevent such incidents. However, it is unclear how to effectively design security programs and messages such that they can inform and change user behaviour. The role of individual(More)
The increasing frequency of security incidents is a major concern to organizations, and it is therefore important for organizations to protect themselves against security threats. Technological controls are important but not adequate, as the success of security also depends on the effective security behavior of individuals. Information security awareness(More)
The use of IT has considerable potential to impact the healthcare industry. Recent applications such as electronic medication administration systems (EMAS) are expected to improve medication safety and delivery. However, the impact of such systems on users' job performance is unclear and under-researched. This study develops a model to understand the(More)