The Security Risk Perception Model for the Adoption of Mobile Devices in the Healthcare Industry Alex Alexandrou

Slides:



Advertisements
Similar presentations
The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects.
Advertisements

Bakheet Aldosari, Ph.D. Health 305 Health Information Management Bakheet Aldosari, Ph.D.
Redefining the H Survey Responses by Region Total649 Region 1 57 Region 2 61 Region 3 62 Region 4 54 Region 5 92 Region Region 7 77 Region 8 57 Region.
The Health Belief Model: An Overview
How to Write a Research Proposal Detroit Medical Center Nursing Research Council.
Arizona Adult Tobacco Survey Response to Health Professional Query Behavior Richard S. Porter, MS Bob Leischow, MPH Arizona Department of Health Services.
Attitudes toward Hearing Aids and Cochlear Implants for Older Adults among Ear, Nose and Throat (ENT) Physicians Patthida Maroongroge, D.D.S.*, Rose L.
Impact and User Satisfaction of a Clinical Information Portal Embedded in an Electronic Medical Record Nancy Tannery, MLS Health Sciences Library System.
The Health Belief Model
Center for Education and Research in Information Assurance and Security Second Annual Research Symposium April 2002 The Changing.
PAPER PRESENTATION Dr. Bhavna Mittal MBA (HHC) Symbiosis Institute Of Health Sciences.
2015 Impact of the Informatics Nurse Survey
Health Workforce Pilot Projects Program Overview.
ETIM-1 CSE 5810 CSE5810: Intro to Biomedical Informatics Mobile Computing to Impact Patient Health and Data Exchange and Statistical Analysis Presenter:
Is this Research? Exempt? Expedited?
Adoption of Health Information Technology among U.S. Ambulatory and Long-term Care Providers by Esther Hing, M.P.H., and Anita Bercovitz, Ph.D National.
University of Arizona Physician Study October 2012.
© 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Career Education Computers in the Medical Office Chapter 2: Information Technology.
Advisor: 謝焸君 教授 Student: 賴千惠
METHODS Setting Kansas Study population Kansas Physician Assistants Study design Cross-sectional Measurements / Data points collected A survey consisting.
Identifying key beliefs of self medication with antibiotics in Yogyakarta City Indonesia (by applying the Theory of Planned Behavior) Aris Widayati 1,3,4,
Consent2Share Linking Cohort Discovery to Consent David R Nelson MD Assistant Vice President for Research Professor of Medicine Director, Clinical and.
Exam 1 Review MIS 4243.
Outcomes based approach to measuring the impact of new technology Vikas Arya HSCI 740 Spring 2004 May 22,2004.
IRONY….  Some doctors and dentists are smokers  they are supposed to be a role model on healthy behavior.  They are well known to have good understanding.
Consumer Perceptions of the Adoption of Electronic Personal Health Records: An Empirical Investigation Collaborative Research Forum March 30, 2012 Mihail.
What is your Acronym IQ? ASC DOC DOS FYS SACS NEH NIH OSHA IRB TGIF.
Use of Community Based Participatory Research (CBPR) to Develop Nutrition Programs for Chronic Disease Prevention Elena Carbone, Dr.P.H., R.D., L.D.N.
Healthcare Institutions
What is your Acronym IQ? ASC DOC DOS FYS SACS NEH NIH OSHA IRB TGIF.
Security and Privacy Practices for Electronic Health Records Joseph W. Hales, PhD, FACMI Intermountain Healthcare Salt Lake City, UT.
Security Issues of Cloud Computing in Healthcare.
Legal & Ethical Issues. Objectives At the completion of this session the participant will be able to: ◦ Describe the ethical principles associated with.
Exploring Challenges and Potentials of Personal Health Records in Diabetes Self-Management: Implementation and Initial Assessment Telemedicine journal.
How Much Would A Medicare Prescription Drug Benefit Cost? Offsets in Medicare Part A Cost by Increased Drug Use Zhou Yang, Ph.D. Assistant Professor Department.
Health Management Information Systems Unit 4 Computerized Provider Order Entry (CPOE) Component 6/Unit41 Health IT Workforce Curriculum Version 1.0/Fall.
Investigators’ Responsibilities in Conducting Human Subjects Research Dept. of Regulatory Affairs April 18, 2012.
Health Belief Model PHCL 436. Outline Introduction. Model constructs. Relationship among model constructs. Limitations. Applications.
Institutional Review Board Procedures and Implications After the applied dissertation committee has approved the proposal and the IRB package, the student.
Cleveland Clinic Science Internship Program for Nursing How do Families of Surgical Patients Perceive Communication of their Family Members’ Surgical Status?
CONFIDENTIAL AND PROPRIETARY © Epocrates, Inc. All rights reserved. To learn more about Epocrates, please visit us at Epocrates Online.
1 Patient Safety In China Gao Xinqiang 23 June 2014.
Regulations 201: Thorny Issues What is Research? Exempt and Expedited Reviews.
By Anna Cunningham, Michelle Klochack, and Stephanie Wietecha Ferris State University.
Evaluating the Need for Electronic Learning in Classrooms Tarleton State University Social Work Program Abstract: In this study, the researchers sought.
ADOPTION OF HHC’S  Adoption of mobile technologies is a process of social interaction between users, environment and organizations.  Organizational,
Behavioral Science HEALTH BELIEF MODEL (HBM) Dr. G.U Ahsan, Ph.D.
Theories of Health Behaviors Gero 302. Health Belief Model Has intuitive Logic and clearly stated central tenents Behind the HBM values and expectancy.
Acceptance of health services on mobile phones: A study of consumer perceptions.
© 2015 Marketo, Inc. Marketo Proprietary and Confidential Page 1 Investigators’ Responsibilities in Conducting Human Subjects Research Office of the Vice.
THE COMMONWEALTH FUND Figure 1. Only 28 Percent of U.S. Primary Care Physicians Have Electronic Medical Records; Only 19 Percent Have Advanced IT Capacity.
MedMid Working Group Steve Olshansky, Internet2 28 October 2002 Medical Middleware.
INTERNATIONAL SCIENCE AND ENGINEERING FAIR Rules and Guidelines 2016.
Physician Adoption of HIT AHRQ 2007 Annual Meeting September 26, 2007 Melissa M. Goldstein, JD Department of Health Policy School of Public Health and.
Session 1.05 Social and Behavioral Research Ivor Pritchard, Ph.D. Institute of Education Sciences U.S. Department of Education
1 Administrative Simplification: The Last Word National HIPAA Summit 8 Baltimore, MD March 9, 2004 William R. Braithwaite, MD, PhD “Doctor HIPAA”
Health Belief Model Health Communication Theories.
Management Information System In Healthcare
Health Management Information Systems Unit 3 Electronic Health Records Component 6/Unit31 Health IT Workforce Curriculum Version 1.0/Fall 2010.
Mobile Technology Improves Patient Outcomes JULIE POPE COLUMBUS STATE UNIVERSITY.
The IRB and Human Subjects Research Protection Eric Felde, CIP Research Compliance Consultant Office of Research Compliance Indiana University.
 Proposed Rule by the Centers for Medicare & Medicaid Services on 11/03/2015Centers for Medicare & Medicaid Services11/03/2015  Revises the discharge.
HCS 483 PAPERS Expert Level /hcs483papers.com
We gratefully acknowledge the support of the AMDA Foundation and Pfizer for an unrestricted Quality Improvement Award.
Corporate Overview CPSI Founded 1979 Executive Office - Mobile, AL.
Research amongst Physical Therapists in the State of Kuwait: Participation, Perception, Attitude and Barriers Presented by Sameera Aljadi, PT, PhD Assistant.
Lesson 1- Introduction to Health Information Technology
Conclusions/ Future Directions
Collaborative Smart House Environment Computer Science Department University of Cyprus Contact: Christodoulou Eleni.
Presentation transcript:

The Security Risk Perception Model for the Adoption of Mobile Devices in the Healthcare Industry Alex Alexandrou Li-Chiou Chen Seidenberg School of Computer Science and Information Systems Pace University 1

Goals Understand the security risk perception of medical practitioners regarding the use of mobile devices to access electronic medical records How security risk perception and other factors would affect their behavior intention in both using the devices and in adopting security controls required for the devices Compare the difference in security risk perception between BYOD (Bring Your Own Device) and HPD (Hospital Provided Device) 2

Research Model Intention to Use Mobile Devices (INU) Perceived Susceptibility (PSU) Perceived Severity (PSE) Self-Efficacy (SEF) Perceived Security Risk (PSR) Security Measure Efficacy (SME) Safeguard Cost (SAF) Intention to Comply with Security Control (INC) Perceived Easiness of User (PEU) Perceived Usefulness (PUS) Regulatory Concern (RC) H10+ H1+ H6- H7+ H3+ H4+ H5- H8+H9+ H2+ 3

Empirical Study We visited three inpatient hospitals and their outpatient clinics to conduct the interviews and the web survey An institutional review board (IRB) review exemption is approved for each institution A total of 264 medical practitioners participated in our study, including nurses, physician assistants, physicians, health care administrators, medical and nursing students, as well as information technology technicians 4

Data Collection For each interview, we provided the subject with an iPad4 ◦ We first showed the subjects the EMR application (Citrix) used in each hospital and then asked them to use it Using the iPad4, each subject filled up the web survey ◦ demographic information and quantifiable data for the constructs in the proposed research model Every construct in the model is measured by three to four 5-point Likert scale questions Two scenarios of using mobile devices, BYOD and HPD, are given to the subjects 5

Data Analysis ANOVA ◦ Compare risk perception among different subject groups and two scenarios Structured Equation Modeling using SmartPLS ◦ Measurement Validity ◦ Hypotheses Testing for the Research Model 6

Comparison among groups Group 1: doctors & medical school students; Group 2: nurses, nursing students and medical technician; Group 3: IT administrators. Scale: 1-5 7

Hypotheses Testing - HPD Intention to Use Mobile Devices (INU) Perceived Susceptibility (PSU) Perceived Severity (PSE) Self-Efficacy (SEF) Perceived Security Risk (PSR) Security Measure Efficacy (SME) Safeguard Cost (SAF) Intention to Comply with Security Control (INC) Perceived Easiness of User (PEU) Perceived Usefulness (PUS) Regulatory Concern (RC) 0.11*0.43*** -0.13** *** *** model parameter is statistically significant at 99%; ** model parameter is statistically significant at 95%; * model parameter is statistically significant at 95%; 8

Hypotheses Testing -BYOD *** model parameter is statistically significant at 99%; ** model parameter is statistically significant at 95%; * model parameter is statistically significant at 95%; Intention to Use Mobile Devices (INU) Perceived Susceptibility (PSU) Perceived Severity (PSE) Self-Efficacy (SEF) Perceived Security Risk (PSR) Security Measure Efficacy (SME) Safeguard Cost (SAF) Intention to Comply with Security Control (INC) Perceived Easiness of User (PEU) Perceived Usefulness (PUS) Regulatory Concern (RC) *** *** ** 0.12*0.15* 0.17*** 9

Implications – HPD only Medical practitioners will be less willing to use the mobile devices at work ◦ if they are more concern with regulations and ◦ if they think security threat on mobile devices is more likely to occur Security awareness education that emphasizes on the likelihood of security threats and the negative consequences of regulatory violation ◦ will only deter practitioners from adopting the mobile devices at work ◦ will not encourage them to adopt security controls 10

Implications – BOYD only Factors that encourage medical practitioners to use their own device at work ◦ Ease of use; usefulness of the devices Increasing the perceived security risk of medical practitioners ◦ will increase their intention to follow up security controls ◦ IT administrators should focus on awareness campaign that can increase practitioners’ perceived security risk ◦ the potential security threats to mobile devices ◦ the consequences of successful security attacks 11

Implications – both cases The more medical practitioners think the security control is costly or inconvenient, the less likely they will adopt security controls. IT administrators should design security controls that are convenient and time- saving for medical practitioners to implement 12