| Literature DB >> 32012071 |
Mohammad S Jalali1,2, Maike Bruckes3, Daniel Westmattelmann3, Gerhard Schewe3.
Abstract
BACKGROUND: Hospitals have been one of the major targets for phishing attacks. Despite efforts to improve information security compliance, hospitals still significantly suffer from such attacks, impacting the quality of care and the safety of patients.Entities:
Keywords: compliance; information security management; phishing emails; theory of planned behavior; trust
Mesh:
Year: 2020 PMID: 32012071 PMCID: PMC7005690 DOI: 10.2196/16775
Source DB: PubMed Journal: J Med Internet Res ISSN: 1438-8871 Impact factor: 5.428
Figure 1Proposed research model. H: hypothesis.
Survey items.
| Construct and items | Loadings | Cronbach alpha | |
|
| .86 | ||
|
| I believe it is beneficial for our organization to establish clear information security policies, practices, and technologies.a | 0.891 |
|
|
| I believe it is useful for our organization to enforce its information security policies, practices, and technologies.a | 0.756 |
|
|
| I believe it is a good idea for our organization to establish clear information security policies, practices, and technologies.a | 0.884 |
|
|
| .93 | ||
|
| People who influenced my behavior would think that I should follow the policies and procedures and use the cybersecurity technologies.a | 0.844 |
|
|
| People whose opinions are important to me would think that I should follow the policies and procedures and use the cybersecurity technologies.a | 0.955 |
|
|
| People whom I respect would think that I should follow the policies and procedures and use the cybersecurity technologies.a | 0.952 |
|
|
| .79 | ||
|
| I am able to follow the cybersecurity policies and procedures and technologies (eg, antivirus, or other products).a | 0.665 |
|
|
| I have the resources and knowledge to follow the policies and procedures and use the cybersecurity technologies.a | 0.917 |
|
|
| I have adequate training to follow the policies and procedures and use cybersecurity technologies.a | 0.850 |
|
|
|
| 1 | |
|
| I intend to follow the information security policies and practices at work.c | 1 |
|
|
| .77 | ||
|
| Management lets me have an impact on issues they find important.a | Dropped |
|
|
| Management does not feel the need to | 0.773 |
|
|
| Management would be comfortable assigning me a critical task, even if they cannot monitor my actions.a | 0.735 |
|
|
| Management believes that employees can be trusted.a | 0.688 |
|
|
| .95 | ||
|
| The cybersecurity software at my workplace (eg, antivirus and firewall) is reliable.a | 0.897 |
|
|
| The cybersecurity software at my workplace does not fail me.a | 0.939 |
|
|
| The cybersecurity software at my workplace provides accurate service.a | 0.893 |
|
|
| .95 | ||
|
| The cybersecurity software at my workplace has the functionality I need.a | 0.946 |
|
|
| The cybersecurity software at my workplace has the features required for my tasks.a | 0.929 |
|
|
| The cybersecurity software at my workplace has the ability to do what I want it to do.a | 0.909 |
|
|
| .93 | ||
|
| At my workplace, the risk to my computer and data from Internet security breaches isd: | 0.704 |
|
|
| At my workplace, the likelihood that my computer will be disrupted due to Internet security breaches within the next 12 months isd: | 0.918 |
|
|
| At my workplace, the chance that my computer will fall a victim to an Internet security breach isd: | 0.967 |
|
|
| At my workplace, the vulnerability of my computer and data to Internet security risks isd: | 0.910 |
|
|
| .82 | ||
|
| I feel that the number of requests, problems, or complaints I deal with at work is more than expected.a | Dropped |
|
|
| I feel that the amount of work I do interferes with how well it is done.a | 0.588 |
|
|
| I feel busy or rushed at work. (R)e | 0.916 |
|
|
| I feel pressured at work. (R)e | 0.818 |
|
aStrongly agree, somewhat agree, neither agree nor disagree, somewhat disagree, strongly disagree.
bNot applicable.
cSingle-item measurement; strongly agree, agree, somewhat agree, neither agree nor disagree, somewhat disagree, disagree, strongly disagree.
dExtremely high, somewhat high, neither high nor low, somewhat low, or extremely low.
e(R): Reverse coded item; always, most of the time, about half the time, sometimes, never.
Response rates.
| Hospital network and target group | Employees who received the questionnaire (N) | Responses included in the analysis, n (%) | |
|
|
|
| |
|
| Total | 2100 | 172 (8.20) |
|
| Clicker | 1600 | 122 (7.63) |
|
| Nonclicker | 500 | 50 (10.0) |
|
|
|
| |
|
| Total | 1000 | 225 (22.50) |
|
| Clicker | 500 | 109 (21.8) |
|
| Nonclicker | 500 | 116 (23.2) |
| Overall sample total | 3100 | 397 (12.80) | |
Respondent characteristics (N=397).
| Category | Count, n (%) | |
|
| ||
|
| Male | 82 (22.09) |
|
| Female | 309 (76.28) |
|
| Nonbinary | 2 (0.47) |
|
| Unanswered | 4 (1.16) |
|
| ||
|
| 18-24 | 28 (7.05) |
|
| 25-34 | 108 (27.20) |
|
| 35-44 | 70 (17.63) |
|
| 45-54 | 78 (19.65) |
|
| 55-64 | 86 (21.66) |
|
| 65-74 | 19 (4.79) |
|
| ≥75 | 2 (0.50) |
|
| Unanswered | 6 (1.51) |
|
| ||
|
| Clinical | 221 (55.67) |
|
| Nonclinical | 172 (43.32) |
|
| Unanswered | 4 (1.01) |
|
| ||
|
| Less than high school | 28 (7.30) |
|
| High school graduate | 47 (11.84) |
|
| Some college | 111 (27.96) |
|
| 2-year degree | 43 (10.83) |
|
| 4-year degree | 120 (30.23) |
|
| Professional degree | 41 (10.33) |
|
| Unanswered | 6 (1.51) |
|
| ||
|
| <10 | 87 (21.91) |
|
| 11-20 | 133 (33.50) |
|
| 21-30 | 72 (18.14) |
|
| >31 | 101 (25.44) |
|
| Unanswered | 4 (1.01) |
|
| ||
|
| Clicker | 231 (58.19) |
|
| Nonclicker | 166 (41.81) |
Reliability and validity of measurement model.
| Construct | Cronbach alpha | Average variance extracted | Composite reliability | Heterotrait-Monotrait ratio | |||||||
|
|
|
|
| Attitudes | Subjective norm | Perceived behavioral control | Intention to comply | Collective felt trust | Reliability | Functionality | Perceived risk |
| Attitudes | .88 | 0.80 | 0.92 | —a | — | — | — | — | — | — | — |
| Subjective norm | .94 | 0.89 | 0.96 | 0.391 | — | — | — | — | — | — | — |
| Perceived behavioral control | .84 | 0.76 | 0.90 | 0.419 | 0.381 | — | — | — | — | — | — |
| Intention to comply | N/Ab | N/A | N/A | 0.486 | 0.337 | 0.621 | — | — | — | — | — |
| Collective felt trust | .76 | 0.69 | 0.87 | 0.270 | 0.208 | 0.270 | 0.289 | — | — | — | — |
| Reliability | .94 | 0.89 | 0.96 | 0.298 | 0.251 | 0.320 | 0.466 | 0.324 | — | — | — |
| Functionality | .95 | 0.91 | 0.97 | 0.289 | 0.231 | 0.510 | 0.382 | 0.351 | 0.871 | — | — |
| Perceived risk | .93 | 0.83 | 0.95 | 0.117 | 0.165 | 0.252 | 0.270 | 0.299 | 0.320 | 0.196 | — |
| Workload | .81 | 0.73 | 0.89 | 0.122 | 0.032 | 0.224 | 0.146 | 0.219 | 0.161 | 0.188 | 0.178 |
aTable is symmetric, only the lower triangle is presented.
bN/A: not applicable.
Zero-order correlations and descriptive statistics.
| Construct | Value, mean (SD) | Zero-order correlations | |||||||
|
|
| Attitudes | Subjective norm | Perceived behavioral control | Intention to comply | Collective felt trust | Reliability | Functionality | Perceived risk |
| Attitudes | 4.79 (0.42) | —a | — | — | — | — | — | — | — |
| Subjective norm | 4.42 (0.72) | .38b | — | — | — | — | — | — | — |
| Perceived behavioral control | 4.46 (0.38) | .34b | .34b | — | — | — | — | — | — |
| Intention to comply | 6.69 (0.572) | .47b | .34b | .58b | — | — | — | — | — |
| Collective felt trust | 4.81 (0.88) | .26b | .21b | .23b | .29b | — | — | — | — |
| Reliability | 4.09 (0.75) | .28b | .25b | .55b | .46b | .32b | — | — | — |
| Functionality | 4.05 (0.92) | .27b | .22b | .49b | .38b | .34b | .87b | — | — |
| Perceived risk | 2.46 (0.84) | −.10 | −.16c | −.24b | −.26b | −.29b | −.32b | −.20b |
|
| Workload | 2.76 (0.72) | −.11 | .01 | −.18c | −.12d | −.19c | −.14d | −.17c | .16c |
aTable is symmetric, only the lower triangle is presented.
bP<.001, 2-tailed.
cP<.01, 2-tailed.
dP<.05, 2-tailed.
Figure 2Results of structural equation model.
Results of structural equation model and its multi-group analysis.
| Hypotheses | Overall sample | Hospital A | Hospital B | Multigroup analysis | Assessment of hypotheses | |||||
|
| Betaa | Beta | Beta | |Difference| |
| |||||
| H1a | .268 | <.001 | .367 | <.001 | .172 | .047 | .195 | .11 | Supported | |
| H1b | .083 | .04 | .105 | .09 | .053 | .32 | .052 | .52 | Partly supported | |
| H1c | .444 | <.001 | .403 | <.001 | .490 | <.001 | .087 | .40 | Supported | |
| H2 | −.037 | .45 | −.041 | .58 | −.021 | .76 | .020 | .85 | Rejected | |
| H3a | .229 | <.001 | .238 | <.001 | .234 | <.001 | .004 | .97 | Supported | |
| H3b | .178 | <.001 | .179 | .02 | .178 | .02 | .001 | .99 | Supported | |
| H4a | .421 | <.001 | .424 | <.001 | .435 | <.001 | .011 | .95 | Supported | |
| H4b | .112 | .15 | .144 | .20 | .087 | .41 | .057 | .71 | Rejected | |
| H5 | .099 | .05 | .051 | .58 | .091 | .22 | .040 | .73 | Rejected | |
| H6 | .157 | <.001 | .242 | <.001 | .137 | .04 | .105 | .26 | Supported | |
|
| ||||||||||
|
| Emails | .063 | .26 | −.071 | .39 | .112 | .10 | .183 | .93 | —b |
|
| Age | .013 | .81 | −.070 | .36 | .027 | .72 | .097 | .82 | —b |
|
| Position | .076 | .14 | −.083 | .10 | .133 | <.001 | .216 | >.99 | —b |
|
| Education | .018 | .74 | −.108 | .01 | .076 | .25 | .184 | .99 | —b |
aBeta=effect size.
bNot applicable.