Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 2 of 2
Full-Text Articles in Databases and Information Systems
Foundations Of Health Information Technology (Undergraduate) Course Materials, Chi Zhang
Foundations Of Health Information Technology (Undergraduate) Course Materials, Chi Zhang
Computer Science and Information Technology Ancillary Materials
This is a collection of all materials used in Health Information Technology by Dr. Chi Zhang at Kennesaw State University, including lecture slides, assignments, and assessments, including a question bank.
Topics covered include:
- Clinical Financial Records
- Evidence-Based Medicine
- e-Prescribing
- Patient Bedside Systems
- Telemedicine
- Health Information Networks
- Cryptography
- Accreditation
- HIPAA Privacy and Security
Can Ego Defense Mechanism Help Explain Is Security Dysfunctional Behavior, Abhijit Chaudhury, Debasish Mallick
Can Ego Defense Mechanism Help Explain Is Security Dysfunctional Behavior, Abhijit Chaudhury, Debasish Mallick
Information Systems and Analytics Department Faculty Conference Proceedings
IS security behavior studies are becoming popular. To date, much of the research has been based on theories such as the Theory of Planned Behavior, Technology Adoption Model, Rational Choice theory and Theory of Reasoned Action. They view users as rational individuals making conscious utilitarian decisions when there is increasing evidence that security breaches are the result of human behavior such as carelessness, malicious intent, bad habits, and hostility. We propose the ego defense mechanism model, taken from the psychoanalytical world. This model makes no assumption of rationality and has been developed to help understand the roots of dysfunctional behavior …