Open Access. Powered by Scholars. Published by Universities.®

Medicine and Health Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Walden University

Computer Sciences

Information Security

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Medicine and Health Sciences

Medical Practitioners’ Intention To Use Secure Electronic Medical Records In Healthcare Organizations, Omar Enrique Sangurima Jan 2021

Medical Practitioners’ Intention To Use Secure Electronic Medical Records In Healthcare Organizations, Omar Enrique Sangurima

Walden Dissertations and Doctoral Studies

Medical practitioners have difficulty fully implementing secure electronic medical records (EMRs). Clinicians and medical technologists alike need to identify motivational factors behind secure EMR implementation to assure the safety of patient data. Grounded in the unified theory of acceptance and use of technology model, the purpose of this quantitative, correlational study was to examine the relationship between medical practitioners’ perceptions of performance expectancy, effort expectancy, social influence, facilitating conditions, and the intention to use secure EMRs in healthcare organizations. Survey data (N = 126) were collected from medical practitioners from the northeastern United States. The results of the multiple regression …


Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson Jan 2020

Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson

Walden Dissertations and Doctoral Studies

Seismic data loss attributed to cybersecurity attacks has been an epidemic-level threat currently plaguing the U.S. healthcare system. Addressing cyber attacks is important to information technology (IT) security managers to minimize organizational risks and effectively safeguard data from associated security breaches. Grounded in the protection motivation theory, the purpose of this qualitative multiple case study was to explore risk-based strategies used by IT security managers to safeguard data effectively. Data were derived from interviews of eight IT security managers of four U.S. government health institutions and a review of relevant organizational documentation. The research data were coded and organized to …