메뉴 건너뛰기




Volumn 20, Issue 4, 2012, Pages 296-311

Health service employees and information security policies: An uneasy partnership?

Author keywords

Data security; Employees behaviour; Information governance; Information management; National Health Service; Perceptions; Policies; United Kingdom

Indexed keywords

DESIGN/METHODOLOGY/APPROACH; HEALTH SERVICES; INCIDENT RESPONSE; INFORMATION GOVERNANCE; INFORMATION SECURITY POLICIES; NATIONAL HEALTH SERVICES; PHENOMENOLOGICAL APPROACH; SOCIAL IMPLICATION; UNITED KINGDOM; UPWARD COMMUNICATIONS;

EID: 84867013249     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685221211267666     Document Type: Article
Times cited : (23)

References (54)
  • 2
    • 67649708310 scopus 로고    scopus 로고
    • The information security digital divide between information security managers and users
    • Albrechtsen, E., Hovden, J. The information security digital divide between information security managers and users Computers & Security 28 6 2009 476-90
    • (2009) Computers & Security , vol.28 , Issue.6 , pp. 476-490
    • Albrechtsen, E.1    Hovden, J.2
  • 3
    • 0037314121 scopus 로고    scopus 로고
    • Risk in rural development: Challenges for managers and policy makers
    • Anderson, J.R. Risk in rural development: challenges for managers and policy makers Agricultural Systems 75 2/3 2003 161-97
    • (2003) Agricultural Systems , vol.75 , Issue.2-3 , pp. 161-197
    • Anderson, J.R.1
  • 4
    • 12244306739 scopus 로고    scopus 로고
    • An information security meta-policy for emergent organisations
    • Baskerville, R., Siponen, M. An information security meta-policy for emergent organisations Logistics Information Management 15 5/6 2002 337-46
    • (2002) Logistics Information Management , vol.15 , Issue.5-6 , pp. 337-346
    • Baskerville, R.1    Siponen, M.2
  • 9
    • 2342598277 scopus 로고    scopus 로고
    • Computer security impaired by legitimate users
    • Besnard, D., Arief, B. Computer security impaired by legitimate users Computers & Security 23 3 2004 253-64
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 253-264
    • Besnard, D.1    Arief, B.2
  • 11
    • 33847010583 scopus 로고    scopus 로고
    • Breaching the security of the kaiser permanente internet patient portal: The organizational foundations of information security
    • Collman, J., Cooper, T. Breaching the security of the kaiser permanente internet patient portal: the organizational foundations of information security Journal of the American Medical Informatics Association 14 2 2007 239-43
    • (2007) Journal of the American Medical Informatics Association , vol.14 , Issue.2 , pp. 239-243
    • Collman, J.1    Cooper, T.2
  • 13
    • 33847280457 scopus 로고    scopus 로고
    • The roles of policy and professionalism in the protection of processed clinical data: A literature review
    • de Lusignan, S., Chan, T., Dhoul, N. The roles of policy and professionalism in the protection of processed clinical data: a literature review International Journal of Medical Informatics 76 4 2007 261-8
    • (2007) International Journal of Medical Informatics , vol.76 , Issue.4 , pp. 261-268
    • De Lusignan, S.1    Chan, T.2    Dhoul, N.3
  • 14
    • 0035063716 scopus 로고    scopus 로고
    • Violation of safeguards by trusted personnel and understanding related information security concerns
    • Dhillon, G. Violation of safeguards by trusted personnel and understanding related information security concerns Computers & Security 20 2 2001 165-72
    • (2001) Computers & Security , vol.20 , Issue.2 , pp. 165-172
    • Dhillon, G.1
  • 15
    • 70449596008 scopus 로고    scopus 로고
    • The information security policy unpacked: A critical study of the content of university policies
    • Doherty, N.F., Anastasakis, L., Fulford, H. The information security policy unpacked: a critical study of the content of university policies International Journal of Information Management 29 6 2009 449-57
    • (2009) International Journal of Information Management , vol.29 , Issue.6 , pp. 449-457
    • Doherty, N.F.1    Anastasakis, L.2    Fulford, H.3
  • 19
    • 23344437282 scopus 로고    scopus 로고
    • Why organizations continue to create patient information leaflets with readability and usability problems: An exploratory study
    • Gal, I., Prigat, A. Why organizations continue to create patient information leaflets with readability and usability problems: an exploratory study Health Education Research 20 4 2004 485-93
    • (2004) Health Education Research , vol.20 , Issue.4 , pp. 485-493
    • Gal, I.1    Prigat, A.2
  • 20
  • 21
  • 22
    • 33646507814 scopus 로고    scopus 로고
    • The role of learning and risk perception in compliance
    • Gonzalez, J.J. Norwegian Academic Press Kristiansand Forskningsserien
    • Gonzalez, J.J., Sawicka, A. Gonzalez, J.J. The role of learning and risk perception in compliance From Modeling to Managing Security: A System Dynamics Approach 35 Norwegian Academic Press Kristiansand 2003 Forskningsserien
    • (2003) From Modeling to Managing Security: A System Dynamics Approach , vol.35
    • Gonzalez, J.J.1    Sawicka, A.2
  • 25
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors: Role of penalties, pressures and perceived effectiveness
    • Herath, T., Rao, H.R. Encouraging information security behaviors: role of penalties, pressures and perceived effectiveness Decision Support Systems 47 2 2009 154-65
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 27
    • 0036613095 scopus 로고    scopus 로고
    • What makes an effective information security policy?
    • Hone, K., Eloff, J. What makes an effective information security policy? Network Security 6 1 2002 14-16
    • (2002) Network Security , vol.6 , Issue.1 , pp. 14-16
    • Hone, K.1    Eloff, J.2
  • 29
    • 84867030324 scopus 로고    scopus 로고
    • Identity Theft Resource Centre San Diego, CA 26 March
    • Identity Theft Resource Centre Breaches 2008 Identity Theft Resource Centre San Diego, CA 2009 26 March, available at: www.idtheftcenter.org/artman2/ publish/lib-survey/Breaches-2008.shtml
    • (2009) Breaches 2008
  • 30
    • 18844431067 scopus 로고    scopus 로고
    • Information systems security policies: A contextual perspective
    • Karyda, M., Kiountouzis, E., Kokolakis, S. Information systems security policies: a contextual perspective Computers & Security 24 3 2005 246-60
    • (2005) Computers & Security , vol.24 , Issue.3 , pp. 246-260
    • Karyda, M.1    Kiountouzis, E.2    Kokolakis, S.3
  • 31
    • 3242778734 scopus 로고    scopus 로고
    • Attitudes of doctors and nurses towards incident reporting: A qualitative analysis
    • Kingston, M.J., Evans, A.M., Smith, B.J., Berry, J.G. Attitudes of doctors and nurses towards incident reporting: a qualitative analysis The Medical Journal of Australia 181 1 2004 36-9
    • (2004) The Medical Journal of Australia , vol.181 , Issue.1 , pp. 36-39
    • Kingston, M.J.1    Evans, A.M.2    Smith, B.J.3    Berry, J.G.4
  • 34
    • 84925924591 scopus 로고
    • Rewards and punishments as selective incentives for collective action: Theoretical investigations
    • Oliver, P. Rewards and punishments as selective incentives for collective action: theoretical investigations American Journal of Sociology 85 6 1980 1356-75
    • (1980) American Journal of Sociology , vol.85 , Issue.6 , pp. 1356-1375
    • Oliver, P.1
  • 35
    • 0034316956 scopus 로고    scopus 로고
    • Cognitive models in training health professionals to protect patients' confidential information
    • Patel, V.L., Arocha, J.F., Shortcliffe, E.H. Cognitive models in training health professionals to protect patients' confidential information International Journal of Medical Informatics 60 2 2000 143-50
    • (2000) International Journal of Medical Informatics , vol.60 , Issue.2 , pp. 143-150
    • Patel, V.L.1    Arocha, J.F.2    Shortcliffe, E.H.3
  • 36
    • 84867030325 scopus 로고    scopus 로고
    • Plymouth Herald 7 February
    • Plymouth Herald Man's Outrage as Jobcentre Gives Personal Details to Another Claimant Plymouth Herald 2012 7 February, available at: www.thisisplymouth.co.uk/Man-s-outrage-Jobcentre-gives-personal-details/ story-15155581-detail/story.html
    • (2012) Man's Outrage As Jobcentre Gives Personal Details to Another Claimant
  • 37
    • 34248334263 scopus 로고    scopus 로고
    • Evaluating information security tradeoffs: Restricting access can interfere with user tasks
    • Post, G.-V., Kagan, A. Evaluating information security tradeoffs: restricting access can interfere with user tasks Computers & Security 26 3 2007 229-37
    • (2007) Computers & Security , vol.26 , Issue.3 , pp. 229-237
    • Post, G.-V.1    Kagan, A.2
  • 39
    • 84866972714 scopus 로고    scopus 로고
    • Hospital foundation: A SWOT analysis
    • Rego, G., Nunes, R. Hospital foundation: a SWOT analysis iBusiness 2 2010 210-17
    • (2010) IBusiness , vol.2 , pp. 210-217
    • Rego, G.1    Nunes, R.2
  • 40
    • 0037652052 scopus 로고    scopus 로고
    • Organisational justice, trust and the management of change: An exploration
    • Saunders, M.N.K., Thornhill, A. Organisational justice, trust and the management of change: an exploration Personnel Review 32 3 2003 360-75
    • (2003) Personnel Review , vol.32 , Issue.3 , pp. 360-375
    • Saunders, M.N.K.1    Thornhill, A.2
  • 42
    • 79952504145 scopus 로고    scopus 로고
    • The role of the corporate information security steering committee
    • Scholtz, T. The role of the corporate information security steering committee SC Magazine 2003 available at: www.scmagazineus.com/the-role-of-the- corporate-information-security-steering-committee/article/30595/
    • (2003) SC Magazine
    • Scholtz, T.1
  • 43
    • 0002212518 scopus 로고
    • The science of learning and the art of teaching
    • Skinner, B.F. The science of learning and the art of teaching Harvard Educational Review 24 2 1954 86-97
    • (1954) Harvard Educational Review , vol.24 , Issue.2 , pp. 86-97
    • Skinner, B.F.1
  • 44
    • 0025420772 scopus 로고
    • Computer integrated manufacturing and the society
    • Sohlenius, G. Computer integrated manufacturing and the society Computers in Industry 14 1-3 1990 213-24
    • (1990) Computers in Industry , vol.14 , Issue.13 , pp. 213-224
    • Sohlenius, G.1
  • 45
    • 84866983627 scopus 로고    scopus 로고
    • Missing: Laptop with 8.6 million medical records
    • 15 June (accessed 23 November)
    • Sullivan, M. Missing: Laptop with 8.6 million medical records The Sun 2011 15 June, available at: www.thesun.co.uk/sol/homepage/news/3637704/Missing- Laptop-with-86million-medical-records.html (accessed 23 November)
    • (2011) The Sun
    • Sullivan, M.1
  • 46
    • 15744368808 scopus 로고    scopus 로고
    • Information security obedience: A definition
    • Thomson, K.-L., von Solms, R. Information security obedience: a definition Computers & Security 24 1 2005 69-75
    • (2005) Computers & Security , vol.24 , Issue.1 , pp. 69-75
    • Thomson, K.-L.1    Von Solms, R.2
  • 47
    • 84993102389 scopus 로고    scopus 로고
    • Critical upward feedback in organisations: Processes, problems and implications for communication management
    • Tourish, D., Robson, P. Critical upward feedback in organisations: processes, problems and implications for communication management Journal of Communication Management 8 2 2004 150-67
    • (2004) Journal of Communication Management , vol.8 , Issue.2 , pp. 150-167
    • Tourish, D.1    Robson, P.2
  • 48
    • 34547810494 scopus 로고    scopus 로고
    • Danger is in the eye of the beholders: Social representations in information systems security in healthcare
    • Vaast, E. Danger is in the eye of the beholders: social representations in information systems security in healthcare Journal of Strategic Information Systems 16 2 2007 130-52
    • (2007) Journal of Strategic Information Systems , vol.16 , Issue.2 , pp. 130-152
    • Vaast, E.1
  • 51
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioural compliance
    • Vroom, C., von Solms, R. Towards information security behavioural compliance Computers & Security 23 3 2004 191-8
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 191-198
    • Vroom, C.1    Von Solms, R.2
  • 52
    • 18844458431 scopus 로고    scopus 로고
    • An unappreciated reason why information security policies fail
    • Wood, C. An unappreciated reason why information security policies fail Computer Fraud & Security 10 2000 13-14
    • (2000) Computer Fraud & Security , vol.10 , pp. 13-14
    • Wood, C.1
  • 54
    • 84866994040 scopus 로고    scopus 로고
    • Ross, S., Masters, R. Creating a Culture of Security ISACA 2011 available at: www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/ Creating-a-Culture-of-Security.aspx
    • (2011) Creating A Culture of Security
    • Ross, S.1    Masters, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.