Learn More
The damage due to computer security incidents is motivating organizations to adopt protective mechanisms. While technological controls are necessary, computer security also depends on individual's security behavior. It is thus important to investigate what influences a user to practice computer security. This study uses the Health Belief Model, adapted from(More)
Home computer users play a crucial role in securing the cyberspace, but the protection of home computers is left to the initiative of the users. In this study, we focus on the socio-behavioral perspective, as the behavior of home computer users on security issues is one of the most important factors in securing the cyberspace. The decomposed Theory of(More)
a r t i c l e i n f o Technological advancements have accelerated the deployment of healthcare information systems (HIS) with the potential to enhance productivity, lower costs, reduce medication errors, and ease the manpower strain on the healthcare industry. A recent development is the use of wireless vital signs monitoring systems for ubiquitous patient(More)
Healthcare information systems such as an Electronic Medication Administration System (EMAS) have the potential to enhance productivity, lower costs, and reduce medication errors. However, various issues have arisen from the use of these systems. A key issue relates to workarounds as a result of a misfit between the new information system (IS)(More)
Integrated healthcare information systems, such as a closed loop medication management system (CLMMS), have been developed to support the inter-linked work of multiple user groups including doctors, pharmacists, and nurses. With the challenges faced in assessing the use and impact of such systems, there is limited research on this topic that takes into(More)
The increasing number of security incidents is causing great concern to organizations. Information security awareness programs are an important approach towards educating users to prevent such incidents. However, it is unclear how to effectively design security programs and messages such that they can inform and change user behaviour. The role of individual(More)