Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Physical Sciences and Mathematics
Creating An Information Systems Security Culture Through An Integrated Model Of Employees Compliance, Mohammad I. Merhi
Creating An Information Systems Security Culture Through An Integrated Model Of Employees Compliance, Mohammad I. Merhi
Theses and Dissertations - UTB/UTPA
Employees’ non-compliance with information systems security policies has been identified as a major threat to organizational data and information systems. This dissertation investigates the process underlying information systems security compliance in organizations with the focus on employees. The process model is complex, comprising many normative, attitudinal, psychological, environmental, and organizational factors. Therefore, the study of information security compliance requires a holistic assessment of all these factors. This dissertation seeks to achieve this objective by offering a comprehensive and integrated model of employee behavior especially focused towards information security compliance. The research framework is influenced by the Reciprocal Determinism Theory which …
Understanding User Resistance To Information Technology: Toward A Comprehensive Model In Health Information Technology, Madison N. Ngafeeson
Understanding User Resistance To Information Technology: Toward A Comprehensive Model In Health Information Technology, Madison N. Ngafeeson
Theses and Dissertations - UTB/UTPA
The successful implementation of health information systems is expected to increase legibility, reduce medical errors, boost the quality of healthcare and shrink costs. Yet, evidence points to the fact that healthcare professionals resist the full use of these systems. Physicians and nurses have been reported to resist the system. Even though resistance to technology has always been identified as key issue in the successful implementation of information technology, the subject remains largely under-theorized and deficient of empirical testing. Only two proposed model have been tested so far. Hence, though user resistance is clearly identified and defined in literature, not very …