Literature DB >> 34179533

Information security cultural differences among health care facilities in Indonesia.

Puspita Kencana Sari1,2, Adhi Prasetio1, Putu Wuri Handayani2, Achmad Nizar Hidayanto2, Syaza Syauqina1, Eka Fuji Astuti1, Farisha Pratami Tallei1.   

Abstract

BACKGROUND: Health information security (IS) breaches are increasing with the use of information technology for health care services, and a strong security culture is important for driving employees' information asset protection behavior.
OBJECTIVE: This study aimed to analyze differences in information security cultures (ISCs) across health care providers based on factors drawn from the ISC model.
METHODS: We used twelve factors to measure the ISCs of health care providers. This research applied a survey method with the Kruskal-Wallis H Test and the Mann-Whitney U Test as data analysis techniques. We collected the data through a questionnaire distributed to 470 employees of health care facilities (i.e. hospitals, community health centers, and primary care clinics) in Indonesia.
RESULTS: The results revealed the differences between health care provider types for 9 of the 12 security culture factors. Top management support, change management, and knowledge were the differentiating factors between all types of health care providers. Organizational culture and security compliance only differed in primary care clinics. Meanwhile, security behavior, soft issues and workplace independence, information security policies, training, and awareness only differed in hospitals.
CONCLUSION: The results indicated that each type of health care provider required different approaches to develop an ISC considering the above factors. They provided insight for top management to design suitable programs for cultivating ISCs in their institutions.
© 2021 The Author(s).

Entities:  

Keywords:  Health care; Health care facilities; Health information management; Health information system; Information security culture

Year:  2021        PMID: 34179533      PMCID: PMC8214091          DOI: 10.1016/j.heliyon.2021.e07248

Source DB:  PubMed          Journal:  Heliyon        ISSN: 2405-8440


Introduction

Health information is one of the most important factors for providing good health services. To administer medical treatment, medical personnel must refer to the patient's medical history, which includes information about the patient's condition, such as allergies and previous treatment history. The patient's medical history must be kept confidential according to the regulations governing the protection of personal data; therefore, health care providers have a responsibility to maintain the confidentiality, availability, and integrity of patient health information [1, 2, 3]. The health industry has recently experienced more data breaches than other sectors [4] and increased risk due to the use of cloud, big data, Internet of things (IoT), and other technologies [5]. According to Statista, there were 525 data breaches in the United States in 2019 for the medical/health care industry—more than for the educational (113), banking/financial (108), and government/military sectors (83) [6]. Technical incidents are the main cause of data breaches in health care, followed by unauthorized access or disclosure incidents [7, 8]. A major reason for security breaches in health care systems is the fact that personal health information (PHI) is more valuable than other personal identification information [4]. PHI is health information in any form, including health records (physical, electronic, or verbal), health histories, laboratory test results, and medical bills with individual identifiers [9]. PHI can be used to profit from the victims' medical conditions and make fake insurance claims, allowing the purchase and resale of medical equipment [10], threatening data confidentiality. Data availability can be compromised by malware attacks [5], causing problems for critical hospital procedures. The main purpose of PHI data security is patient safety and privacy [11]. Data security is important for increasing patients' trust [2, 12] and is also an influential factor for user acceptance of health referral systems that facilitate communication and standardization between health facilities [13]. Since data security is crucial, an organization needs to manage its information security (IS) effectively. The objective of IS management is to ensure organizational sustainability and minimize losses [14] by protecting the confidentiality, integrity, and availability of information [15, 16] through various controls. One of the most important security controls is the delivery of IS awareness programs, which ensure that system users are aware of security risks and understand related information security policies (ISPs) and procedures [17]. An organization, as a system owner, is responsible for providing qualified IS personnel and general controls [18]. Supported by security knowledge, information systems can foster good security behavior. IS behavior evolves to become an organizational behavior that fosters an ISC as an expansion of the organizational culture [19]. Previous research [19] addressed the determinants and consequences of controlling user security behavior and reviewed the development of an IS awareness culture that changed the organizational culture and strengthened it through ISPs. Significant security gains were accomplished by enhancing the organization's security culture [20], including improving the patient care delivered by health care providers [3]. The aim of establishing an ISC is to encourage employees' and stakeholders' adherence to the organization's ISPs [1]. ISC can be defined as the perceptions, attitudes, assumptions, beliefs, values, and knowledge of employees or stakeholders when interacting with organizational systems and processes, with the aim of protecting information assets and influencing security behavior to ensure compliance with policies and controls [20, 21]. Since ISC is an expansion of an organization's culture [19, 20], embedding the expected culture depends on each organization's condition, which is influenced by many factors; therefore, it is vital to understand the factors that can contribute to the success of ISC. This research investigated health care providers in Indonesia. Health care organizations have specific cultures that make IS implementation more challenging, such as communication and trust issues [22], data ownership issues [23], and the different professional values and norms of employees [24]. The Indonesian government has promoted health and medical data integrity through a national referral system [13]; hence, IS focuses on ensuring the confidentiality, integrity, and availability of data managed by various health care organizations. A health care facility is a place that carries out individual promotive, preventive, curative, and rehabilitative health care interventions mandated by the government and/or society as defined in the Ministry of Health Regulation (No. 71 of 2013) regarding health services and national health insurance. Article 2 in this Regulation divides health care facilities into two types: first-level health facilities and advanced referral health facilities. First-level facilities include community health centers, private practitioners, dentists, primary care clinics or equivalent, and small hospitals. Advanced referral facilities include main clinics or their equivalents, general hospitals, and special hospitals. Health care is carried out in stages according to medical needs, starting with the first-level facilities. If a patient requires advanced treatment based on medical indications, the patient must be referred to the closest referral facility. Empirical studies relating specifically to ISC in health care facilities are still rare. More studies have discussed IS behavior and compliance, which are the expected results of ISC. A literature review [25] concluded that a research gap regarding IS in a health care context necessitates further studies to determine what creates an ISC in organizations. Recent studies compared IS climates among four categories of health care professionals [26], but they did not conduct the comparison at an institutional level. This research aims to fill the gap in the empirical research concerning IS cultures in a health care context. Moreover, organizational influences are significant factors in security protection, since a data security culture, combined with organizational policies, procedures, and management, can act as a powerful defense against data breaches [27]. Previous research on ISCs in health care contexts [28] only took hospitals as their study subjects and did not cover other types of health care organizations, which might have different approaches to ISC. Therefore, the goal of this study was to enhance understanding of ISCs and their contributing factors in many types of health care organizations with different characteristics. Furthermore, by identifying the different factors influencing ISCs in health care facilities, the study highlighted different ways of enhancing ISCs to protect health information for each institution. This research contributes to the literature by investigating ISCs in the three types of health care institutions that have not yet been covered by previous research. Based on these problems, the research question for this study was: “How do IS cultures differ across different types of health care facilities?” For health care facilities as system owners, this research is expected to provide insights for developing an ISP and program to cultivate ISC. For the Indonesian government as the regulator, the outcomes of this research are expected to provide lessons learned for the development of supporting regulations for nationwide e-health establishments. After presenting the research problems, objectives, and motivations in the Introduction, this paper is organized into the following six sections. The first section discusses the research hypotheses. The second section describes the research method. The third and fourth sections sequentially explain the research results and the interpretation of our findings. The fifth section considers the research limitations, and the last section provides the conclusions of our research.

Research hypotheses

This study used some factors drawn from the ISC model developed by previous researches [28, 29, 30, 31, 32]. Those studies were selected due to their completeness in defining ISC factors. Furthermore, literature reviews conducted by Alnatheer [29], Sherif et al. [30] and Nasir et al. [32] identified some success factors for ISC cultivation extracted from many previous studies. The main factors were senior management support, effective ISPs, IS awareness, IS training and education, IS risk analysis and assessment, IS compliance, organizational culture, IS behavior, information asset management, change management, trust, user security management, leadership, and governance. The empirical research conducted by Da Veiga and Martins [31] revealed some factors of ISCs and IS subcultures in various types of organizations in Australia and South Africa, including health care providers. Those factors were information asset management, IS management, change, user management, ISPs, trust, IS leadership, training and awareness, privacy, and IS programs. Meanwhile, a study by Hassan and Ismail [28] focused specifically on health care organizations (including hospitals) in Malaysia and found some success factors for ISC, namely security behavior, security awareness, security value, and the enforcement of ISPs. For this research, we adopted 12 variables for ISC factors from Da Veiga and Martins [31] since this was the most complete and current empirical research we found during the research period. Figure 1 shows the conceptual framework that we adopted from Da Veiga and Martins. Their study took as its research subject a global bank operating in various countries; however, most respondents came from South Africa, which is a developing country like Indonesia. Based on the country's characteristics, Da Veiga and Martins' study resembled the current research. IS in health care has the same level of urgency as in banking, where the value of confidentiality, availability, and data integrity is extremely high. Health care organizations contain various subcultures [33], as do global banks; therefore, the results of Da Veiga and Martins' research were adopted for this study. This research used 12 variables drawn from Da Veiga and Martins as shown in Figure 1.
Figure 1

Conceptual Framework adapted from Da Veiga and Martins [31].

Conceptual Framework adapted from Da Veiga and Martins [31]. Top management roles in organizations are critical for shaping a desired culture [31], and such roles were frequently mentioned in previous studies as success factors for cultivating organizational cultures, including security cultures [32]. Top management support refers to the degree to which top management understands the significance of IS and its involvement in IS operations [29]. A corporate ISP should define the leadership's IS vision and objectives [30]. Since different types of organizations may have different security visions and objectives, top management support may also differ: There are differences in top management support across different types of health care providers. The security requirements of an organization influence the strength of controls over policies and procedures in the workplace regarding how the organization tolerates actions by individuals [34]. Such tolerance is reflected in some organizational capacities, including system usability, employee turnover, employees' skills and tracking procedures, task importance, security practices, disciplinary procedures, achievements, and rewards, and these capacities can affect security culture [31]. They also influence employees' personalities and further affect their security behavior [35]. Since different types of organizations can have different procedures and practices for managing employees, workplace capabilities can also vary: There are differences in workplace capabilities across different types of health care providers. ISC is recognized as an efficient means of promoting an organization's safe conduct and managing safety hazards [32]. The way in which organizations identify, prevent, detect, and react to safety events affects the ISC [31]. By conducting security risk analysis and evaluation, organizations and employees can be made aware of the damage they can do to security and develop a security-conscious culture [29]. Since different types of organizations can implement risk analysis and mitigation in different ways, risk response factors may also vary: There are differences in risk response factors across different types of health care providers. Based on a risk assessment strategy, organizations can take a thorough approach to managing and governing IS and ensure proper leadership, reviews, auditing, and tracking to help maintain a positive ISC [31]. Security management and operations have also been mentioned in previous research as important for fostering an ISC [32]. Since different organizations might have different approaches to managing their IS, security operational management approaches may also differ: There are differences in operational management across different types of health care providers. Change management procedures should support technology changes and help the staff to integrate and accept the changes so that they become part of the culture. Changing an organization's technology can improve security, quality, effectiveness, and reliability, which have important effects on information functionality, usability, privacy, and security [31]. Change management has often been mentioned in previous studies as a success factor for IS along with management commitment and leadership [32], and different organizations might have different approaches to managing technology changes in their organizations: There are differences in change management across different types of health care providers. Organizational cultural factors affect how information is processed and protected and how they ultimately affect the ISC, since the free flow of information, openness, and transparency are maintained in some organizations but restricted in others [31]. Organizational culture refers to shared trends in employee conduct in companies, and the connection between the organizational culture and ISC is comparable to other notions of culture, but varies in practice (in terms of symbols, heroes, and rituals) [30]. The development of an ISC includes social, cultural, and ethical interventions meant to enhance organizational members' security-related conduct and is regarded as an organizational subculture [29]. Since different organizations can have different codes of conduct for managing their employees' behavior, their organizational cultures may also differ: There are differences in organizational culture across different types of health care providers. Individuals have certain IS knowledge, developed implicitly and explicitly, enabling them to comply with security regulations, and that knowledge affects how data is processed and IS controls are used [31]. IS knowledge is usually required when work tasks have to be performed in accordance with excellent data security practices [30]. An efficient ISC relies on employees understanding IS [20, 32]. Since each employee may have different knowledge and each organization has unique security practices, security knowledge (KNW) may also differ: There are differences in security knowledge across different types of health care providers. The workforce's understanding of ISPs and procedures has a beneficial effect on their attitude toward ISPs and compliance, resulting in adherence as a noticeable characteristic in an organization with a strong and healthy ISC [31]. A powerful connection between employees' security culture, compliance with security, and extra-role security behavior demonstrates the importance of complying with security policies for establishing ISCs and improving security in organizations [29]. Since each organization can have a different ISP and their employees have different intentions to follow it, security compliance (SCP) might also differ: There are differences in security compliance across different types of health care providers. Security controls affect employees' interaction with data resources, and they consequently display security behavior, the goal of which is to protect data assets based on the policies of the organization [31]. An ISC stimulates employees' appropriate security conduct and compliance, and the cultivation of an ISC can therefore help to minimize or prevent security breaches [30]. Security behavior is the key criterion to be highlighted in an ISC, and the employees' behavior, although important, can differ because they tend to do what they feel good about [28]. Since each employee can behave differently, their security behavior can also be different: There are differences in security behavior across different types of health care providers. Soft employee problems, such as real-life exposure to threat, security-related incidents, media coverage, private interests, group/community interests and consciousness, policy recognition, skills, etiquette, engagement, obedience, self-disapproval, and morality, can affect the ISC [31]. Employees' personalities, including their experiences of security incidents, affect their behavior toward security policies and practices inside an organization and further influence the security culture [30, 36]. Since every employee might have different personality problems, soft issues and workplace independence (SIW) can also differ: There are differences in soft issues and workplace independence across different types of health care providers. To have a beneficial effect, IS awareness and training must be undertaken to inform employees about data risks, the appropriate checks to use, and the policies to follow in an ISC [31]. Concerning hospital information system users, training should highlight the awareness that needs to be creatively embedded in the staff [28]. Based on previous research, security training and awareness have become important factors for organizations in cultivating their ISCs [29, 30, 32]. Since organizations often have different training programs and their employees have different awareness, training and awareness may also differ: There are differences in training and awareness across different types of health care providers. An ISP is a critical cornerstone for directing an ISC and creating a base of shared values and beliefs [31]. Previous studies have defined it as a key factor in cultivating a security culture [29, 30, 32]. IS in health care systems must distinguish between the privacy and security controls that the organization must emphasize, such as the security policy [28]. Since health care providers can have different viewpoints regarding security controls, their ISPs can also differ: There are differences in information security policies across different types of health care providers. Each variable we used consisted of three indicators, so there were 36 indicators in total. The 12 variables, their definitions, and their indicators are summarized in Table 1. A questionnaire was developed based on the indicators drawn from previous studies as adopted in the hypotheses.
Table 1

List of research variables, definitions, and indicators.

Variables/FactorsDefinitionCodeIndicators
Top management support (TPM)[29, 30, 31, 32]Top management commits to supporting IS in the organization and communicating its views to the employees.TPM1Top management demonstrates its commitment to IS.
TPM2Top management considers IS to be important.
TPM3Top management explains what is expected of employees regarding IS.
Workplace capabilities (WPC)[31]The organization has the capability to foster an ISC for all stakeholders by establishing policies, procedures, and practices as IS controls.WPC1There is a non-disclosure agreement in the employment contract to prevent information leaks.
WPC2Disciplinary action is taken against anyone who does not follow the ISP.
WPC3IS systems are maintained regularly so that system outages can be avoided.
Risk and response factors (RRF) [29, 31, 32]The organization applies risk management to IS management, including risk analysis, risk mitigation, risk evaluation, and communication.RRF1The organization conducts a risk analysis to provide a risk evaluation before deciding an action.
RRF2The organization mitigates risks to reduce the impact of an event that has the potential to or has been harmful.
RRF3The organization provides information about regulations relating to IS along with their sanctions.
Operational management (OPM)[31, 32]The organization conducts adequate management, reviews, auditing, and tracking to help guide a favorable ISC.OPM1The organization periodically reviews the information system used.
OPM2The organization conducts external/internal audits of the information system used.
OPM3Every contract with third parties, especially relating to IT, includes items regarding IS.
Change management (CHM)[31, 32]Change management procedures are integrated into information system changes to help staff integrate and accept change and become part of the ISC.CHM1The organization changes work practices to ensure the security of information assets.
CHM2Changes to IS systems (for example, regularly changing passwords, making backup files) secure important information.
CHM3Employees are willing to improve work practices and protect information assets.
Organizational culture (ORC)[29, 30, 31]The organization ensures its employees have the knowledge, skills, and commitment to support information asset protection.ORC1Employees have knowledge of IS.
ORC2Employees have the required skills to keep information safe.
ORC3Employees demonstrate a commitment to IS.
Knowledge (KNW)[20, 30, 31, 32]The organization's employees have the appropriate knowledge to ensure IS.KNW1Employees understand the importance of protecting personal, sensitive, and confidential information.
KNW2Employees understand the negative consequences of IS problems.
KNW3Employees know the IS authorities in the organization.
Security compliance (SCP) [29, 31]The organization encourages its employees to follow security policies and procedures.SCP1The leader communicates clear directions about protecting information to employees or third parties.
SCP2Employees follow the IS procedures/policies established by the organization.
SCP3Employees are aware of their role in IS, but do not necessarily fully follow current practices.
Security behavior (SBV) [28, 30, 31]The organization's employees exhibit behavior that supports good security controls.SBV1Employees do not leave sensitive/confidential information in unsecured places.
SBV2Employees regularly check documents for malware infections.
SBV3Employees consider the negative consequences of their work before posting anything on social network sites.
Soft issues and workplace independence (SIW)[30, 31, 37]The organization's employees understand the consequences of security breaches since they have personal experience.SIW1Employees realize that if an IS problem occurs, it can have adverse effects.
SIW2Employees use antivirus software because they know the consequences of not using it.
SIW3Employees are aware that outside interference can change orientation and commitment regarding ISPs.
Training and awareness (TNA)[28, 29, 30, 31, 32]The organization's staff know that IS training can improve their awareness to prevent security incidents.TNA1Employees believe there is a need for additional training in using IS controls to protect information.
TNA2Employees believe in effective IS awareness initiatives.
TNA3Employees are aware that training in recognizing and reacting to social attacks gives good results.
Information Security Policies (ISPs)[28, 29, 30, 31, 32]The organization establishes security policies applicable to and understandable by its employeesISP1ISPs in the organization can be applied in daily work.
ISP2Employees fully understand the ISPs of the organization.
ISP3Employees believe practical ISPs should be implemented.
List of research variables, definitions, and indicators.

Research methods

The sample for this study consisted of employees of health care providers in Indonesia, especially in Bandung city, which is the capital of the West Java Province and has the biggest total population of all the provinces (48.68 million people in 2018) [38,39]. Health care providers as research subjects were limited to state-owned community health centers (CHCs) and privately owned primary care clinics (PCCs) as representatives of first-level health care facilities, and hospitals as representatives of advanced referral health care facilities. According to the Indonesian National Health Insurance System, health facilities can be classified into first-level health facilities and advanced referral health facilities. First-level health facilities consist of PCCs, CHCs, private doctors' clinics, and private dental clinics, while referral health facilities consist of main clinics, hospitals, pharmacies, and opticians. However, according to the Regulation of the Minister of Health No. 9 of 2014, main clinics and PCCs are classified as clinics. Based on their service scopes, PCCs only provide basic medical services, while main clinics can provide both basic and specialist medical services. Both types of clinics have similar service scopes: providing outpatient, inpatient, one-day care, and emergency services. According to Regulation of the Minister of Health No 43 of 2019, CHCs only provide basic medical services and focus on public health services in a specified community. Hospitals can provide a wider range of services, including basic and specialist medical services and medical support services (such as radiology, laboratory analysis, rehabilitation, etc.) and non-medical services such as the disposal of corpses. We distinguished CHCs and PCCs as different types of research subjects since they have different characteristics. CHCs are owned by the district government, so they are more strictly regulated and their employees are civil servants with long-term work contracts. Meanwhile, PCCs are mostly owned by private organizations that develop their own policies, are less strictly regulated, and usually give their employees short-term work contracts. Therefore, in this research, we only considered hospitals, PCCs, and CHCs as research subjects. The sample consisted of 100 PCCs, 78 CHCs, and 30 hospitals operating in Bandung city. All those providers were initially invited to participate in this research, but not all of them responded. A purposive sampling technique was used, with the sampling of data sources conducted according to certain criteria. The criteria specified health facilities that had implemented information systems in their operational activities and had given their permission to be used as research subjects. The data collection process took about three months from December 2018 to February 2019. First, we requested a research permission letter from the government office that had the appropriate authority (i.e., Bakesbangpol). We then obtained licenses from related government offices with license numbers as follow: 070/034/Bakesbangpol (for hospitals); 070/2444/Bakesbangpol (for CHCs); 070/2443/Bakesbangpol (for PCCs). Initially, we targeted at least five respondents from each health care facility—a specialist, a general practitioner (doctor/dentist), a nurse/midwife, an administrator, and the IT manager. We submitted our proposal to all PCCs, CHCs, and hospitals in Bandung, of which only 25 PCCs (with a response rate of 25%), 22 CHCs (28%), and 9 hospitals (30%) met the criteria and agreed to participate in the research. Since only nine hospitals responded to our proposal, we contacted more respondents from each health care facility. Data collection was conducted through hard-copy questionnaires distributed directly to the respondents in the selected health care providers. The questionnaire used closed questions with five alternative answers, scored using a 5-point Likert scale ranging across levels of agreement and disagreement (1 = totally disagree to 5 = totally agree). The items in the questionnaire (Appendix A) were derived from indicators used in previous research [28, 29, 30, 31], as seen in Table 1. Each indicator became one item in the questionnaire, which had a total of 36 items consisting of three items per variable. Also, seven demographic questions and one filter question asking about the existence of an ISP were included in the questionnaire. Before the questionnaire was used, validity and reliability tests were conducted to confirm that all the statements in the questionnaire could be easily understood by the respondents and that the questionnaire could be used as a research instrument. The tests were conducted using IBM SPSS Statistics 25 for Windows software. Validity and reliability tests were carried out for 30 health care provider employees in Indonesia (from random areas). The validity test used the Pearson product-moment correlation to consider the correlation score and compare it with the score from the r critical value table. Table 2 summarizes the correlation scores for the validity test and the Cronbach's alphas for the reliability test. It shows that all the items in the questionnaire were valid because each item had an r product moment greater than the r table (0.361); therefore, all the items could be used to measure the research variables. The reliability test for all the variables in Table 2 showed that all the Cronbach's alpha values were approximately 0.7, thus indicating that all the items were reliable.
Table 2

Validity test and reliability test results.

VariableCronbach's AlphaIndicatorPearson Correlation
TPM0.856TPM10.607
TPM20.369
TPM30.505
WPC0.774WPC10.424
WPC20.666
WPC30.656
RRF0.882RRF10.593
RRF20.617
RRF30.666
OPM0.719OPM10.649
OPM20.691
OPM30.627
CHM0.704CHM10.534
CHM20.714
CHM30.473
ORC0.919ORC10.637
ORC20.698
ORC30.698
KNW0.725KNW10.446
KNW20.754
KNW30.633
SCP0.719SCP10.503
SCP20.467
SCP30.681
SBV0.789SBV10.741
SBV20.623
SBV30.698
SIW0.770SIW10.74
SIW20.537
SIW30.662
TNA0.825TNA10.41
TNA20.636
TNA30.608
ISP0.832ISP10.641
ISP20.827
ISP30.655
Validity test and reliability test results. The measurement tool for this research used factors adapted from Da Veiga and Martins [31]. The research employed a quantitative method with multivariate data analysis. Since no variable was described as independent or dependent, we used interdependence techniques to analyze the data, such as variance analysis [40]. We employed two statistical procedures to compare unrelated samples: the t-test for independent samples for parametric testing and its non-parametric testing equivalent Mann–Whitney test. We tested the data normality first to decide which method should be used to analyze the data. If the data followed a normal distribution, we would use the parametric procedure; otherwise, we would use a non-parametric procedure [41] that was not based solely on parameterized families of probability distribution [42]. The normality test using Kolmogorov–Smirnov analysis showed that not all the data were normally distributed, as shown in Table 3. Since some data did not meet the normality assumption test (asymptotic significance value less than 0.05), we used a non-parametric statistical procedure—the Kruskal–Wallis test—to compare more than two independent samples, followed by Mann–Whitney post-hoc testing to spot the differences in the perceptions of ISC factors across the three types of health facilities. We referred to previous research by Alimohammadi et al. [43] and Fernández-Alemán et al. [44], who used the same statistical methods (i.e., the Kruskal–Wallis test and the Mann–Whitney U test). The Kruskal–Wallis test is a ranking-based non-parametric test that aims to determine whether there are statistically significant differences between two or more groups of independent variables affecting the dependent variables [41]. The Kruskal–Wallis test was not able to tell us which group was significantly different; only that there were at least two groups that differed significantly. Since we had three groups, further post-hoc tests were performed using the Mann-Whitney U test to explore which groups were different.
Table 3

Asymptotic significance values (Kolmogorov-Smirnov).

VariablesPCCCHCHOS
TPM0.0000.0000.000
WPC0.0000.0010.000
RRF0.0000.0000.000
OPM0.0000.0010.001
CHM0.0000.0010.000
ORC0.0000.0000.002
KNW0.0000.0010.000
SCP0.0000.0000.000
SBV0.0000.0000.000
SIW0.0000.0000.000
TNA0.0000.0000.002
ISP0.0000.0000.000
Asymptotic significance values (Kolmogorov-Smirnov).

Results

Data were collected from 470 respondents (150 from PCCs, 154 from CHCs, and 166 from hospitals). The respondents were mainly female (67%), aged 19 to 29 (49%), and with undergraduate degrees (44%). Most respondents (60%) were health workers (general practitioners, specialists, dentists, nurses, midwives, and pharmacists), and the rest were non-health workers (managers, administrators, receptionists, and IT staff). This distribution aligned with the data from the Central Bureau of Statistics [45], according to which the health care sector is dominated by female workers and most workers (75%) are health workers [46]. All the health care facilities that became research subjects had established policies relating to IS. Figure 2 depicts the demographics of the study respondents.
Figure 2

Respondent demographics.

Respondent demographics. Table 4 depicts the descriptive statistics for each factor in each health care provider. Across all types of providers, the variable with the highest value was knowledge. This also applied to primary health care facilities, namely PCCs and CHCs. Meanwhile, the variables with the highest scores in hospitals were soft issues and workplace independence. The average score for ISC factors was highest in PCCs, followed by CHCs and hospitals in that order. The Kruskal–Wallis test results can be seen in Table 5. The next step was the Mann–Whitney U test to identify further differences in the results of the Kruskal–Wallis test for each factor that had an asymptotic significance value < 0.05. Table 6 shows the asymptotic significance values for the results of the Mann-Whitney U test across health facilities. If the value was <0.05, there was a difference between the first and second facility types.
Table 4

Descriptive statistics test.

VariablesMean Value
PCC(N = 150)CHC(N = 154)Hospital(N = 166)Total(N = 470)
TPM12,56012,84411,84312,400
WPC11,90011,78611,80111,828
RRF12,02711,52611,50611,679
OPM12,02011,87711,54811,806
CHM12,21312,46811,47612,036
ORC12,30011,68211,13311,685
KNW12,76013,16911,92212,598
SCP12,31311,83811,27711,791
SBV12,49312,70111,73512,294
SIW12,66012,71411,97612,436
TNA12,57312,60411,89812,345
ISP
12,480
12,097
11,596
12,043
Total12,35812,27511,64312,078
Table 5

Results of the kruskal–wallis test.

NoInformation Security FactorsAsymp. SigConclusion
1Top Management (TPM)0.000Different among healthcare provider types
2Workplace Capabilities (WPC)0.999No-difference among healthcare provider types
3Risk Response Factors (RRF)0.239No-difference among healthcare provider types
4Operational Management (OPM)0.220No-difference among healthcare provider types
5Change Management (CHM)0.000Different among healthcare provider types
6Organizational Culture (ORC)0.000Different among healthcare provider types
7Knowledge (KNW)0.000Different among healthcare provider types
8Security Compliance (SCP)0.000Different among healthcare provider types
9Security Behaviour (SBV)0.003Different among healthcare provider types
10Soft Issue–workplace independent (SIW)0.018Different among healthcare provider types
11Training and Awareness (TNA)0.009Different among healthcare provider types
12Information Security Policies (ISP)0.003Different among healthcare provider types

Asymp. Sig. > 0.05 indicates that there were differences across health care provider types.

Table 6

Results of the mann-whitney U test.

ISC FactorsMean Rank
Asymp. Sig.Conclusion
PCCCHCHospital
TPM142.19162.54-0.037Each type of facility is different.
170.87-147.320.019
-182.40140.180.000
CHM141.26163.44-0.023Each type of facility is different.
169.20-148.830.042
-181.22141.270.000
ORC167.23138.15-0.003Hospital and CHC are same, but PCC is different.
179.95-139.120.000
-169.13152.490.102
KNW137.54167.07-0.002Each type of facility is different.
173.65-144.810.004
-189.84133.280.000
SCP165.61139.73-0.007Hospital and CHC are same, but PCC is different.
178.39-140.530.000
-169.77151.900.078
SBV146.59158.25-0.229PCC and CHC are same, but hospital is different.
169.14-148.880.043
-178.37143.920.001
SIW149.81155.12-0.585PCC and CHC are same, but hospital is different.
169.72-148.360.033
-174.31147.690.009
TNA149.42155.50-0.525PCC and CHC are same, but hospital is different.
171.04-147.170.018
-174.96147.080.006
ISP158.70146.46-0.200PCC and CHC are same, but hospital is different.
176.02-142.670.001
-171.00150.760.046

Asymp. Sig. < 0.05 indicates that the ISC factor differed.

Descriptive statistics test. Results of the kruskal–wallis test. Asymp. Sig. > 0.05 indicates that there were differences across health care provider types. Results of the mann-whitney U test. Asymp. Sig. < 0.05 indicates that the ISC factor differed.

Discussion

Based on the results of the Kruskal–Wallis test (Table 6), the three types of health care facilities had the same characteristics for workplace capabilities, risk response factors, and operational management. This indicated that CHCs, PCCs, and hospitals had similar capabilities to foster ISC for all their stakeholders by establishing policies, procedures, and practices as IS controls. Risk management, including risk analysis, risk mitigation, risk evaluation, and communication, were applied by health care facilities to IS controls. Risk analysis and assessment had a strong influence on the ISCs because they helped organizations to become aware of losses and damage [29]. Furthermore, adequate management, reviews, auditing, and tracking based on the risk assessment helped to ensure a favorable ISC [31] across all the health care facilities. This result meant that our hypotheses about workplace capabilities, risk response factors, and operational management were not supported. As mentioned in Section 2, workplace capabilities relate to how organizations deal with their employees' actions [33]. Since most health care facilities focus on patient treatment practices, they were expected to tolerate their employees' IS errors similarly. This could affect risk response factors in the health care facility itself, since the ways in which they identify, prevent, detect, and react to security events [31] affect their tolerance of security threats. Meanwhile, an organization's operational management is also affected by a risk assessment strategy that helps to maintain a positive security culture [31]. Nowadays, risk management is considered in international standards, such as quality management standards (e.g., ISO 9001:2015) or IS management standards (ISO 27001:2018). This factor could be influenced by other factors, particularly workplace capabilities and operational management; for example, if an organization had conducted risk analysis and risk evaluation before deciding on a risk response (RRF1), it involved a non-disclosure agreement in employment contracts to prevent information leaks (WPC1). It also depended on contracts with third parties, primarily IT contracts, always including IS provisions (OPM3). Furthermore, based on risk assessment, all the PCCs, CHCs, and hospitals could accept the same level of risk because they had the same levels of tolerance. This relationship implied that risk response factors, workplace capabilities, and operational management had the same characteristics. Based on this consideration, we determined that all risk response factors, workplace capabilities, and operational management indicators had a significant relationship and the same features for these health care facilities. These three types of health care facilities had different characteristics for other factors. Top management support, change management, and knowledge differed across health care facilities, proving the hypotheses of this study (i.e H1, H5, and H7) as illustrated in the previous section. Based on the post-hoc Mann-Whitney U test, top management support in PCCs, CHCs, and hospitals had different ways of demonstrating their commitment to IS due to consideration of different levels of importance. Most previous studies agreed that top management has a great influence on the establishment of ISCs in organizations [29]. This was comparable to change management factors, which also had different properties for modifying and improving work procedures to ensure the security of data resources and improve data asset security in PCCs, CHCs, and hospitals. It is important to consider the integration of change management and knowledge management in cultivating an ISC [20]. The current research showed that each type of health care facility had a different level of knowledge. PCCs, CHCs, and hospitals varied in understanding the importance of protecting personal, sensitive, and confidential information and the negative consequences of IS problems. Hospitals and CHCs had the same characteristics in terms of organizational culture and security compliance. In state-owned health facilities, operational and managerial policies in CHCs are strongly regulated by the government. Hospitals can be state- or privately owned, but their establishment and operations are also strictly controlled by government regulations. CHCs and hospitals provide more services, including outpatient, inpatient, surgery, pharmacy, laboratory, and other services. Since PCCs do not provide inpatient, surgery, or laboratory services, this might have caused them to have different organizational cultures. Since their top management support and security knowledge also had different characteristics, it affected their security compliance. This aligned with previous research conducted by Humaidi and Balakrishnan [47] revealing that, in Malaysian public hospitals, management support had an indirect effect on user security compliance. PCCs and CHCs had the same characteristics in terms of security behavior, soft issues, training and awareness, and ISPs, but they differed from the ones in hospitals. Based on the size of the organization, PCCs and CHCs were similar to one another but not to hospitals. Because of PCCs' and CHCs' smaller size, their employees might have more homogeneous behavior than those in hospitals. Employees have different behaviors when dealing with sensitive information, malware infections, and the sharing of information on social network sites. Since security behaviors are influenced by organizational security policies and awareness programs [19], those two groups of health care facilities had different characteristics for both factors. Hospitals might have more complex IS threats and vulnerabilities due to their health care service coverage; for example, hospitals provide more services than other health care facilities, including medical support services (such as radiology, laboratory, and rehabilitation services) and non-medical services. Some of these services require additional medical devices and systems that need to be integrated with other systems, which increases security threats, such as interference with the radiology/laboratory system's bridging to the hospital information system. Also, possible vulnerabilities include backdoors in the systems or devices. Hospitals therefore have more extensive ISPs and programs for training and awareness. In terms of soft issues and workplace independence, the employees have different understandings of what it means in case of an IS issue, which can cause adverse effects, and they may use antivirus software because they understand the implications of not using it. Additionally, employees are conscious that external interference can alter the direction and application of ISPs. Figure 3 illustrates the IS factor difference model. This model shows the overall position of each ISC factor derived from the results regarding PCCs, CHCs, and hospitals. Based on Table 5, workplace capabilities, risk response factors, and operational management had significant values of 0.999, 0.239, and 0.220, respectively. These findings suggested that those factors did not have significant differences according to health care organization types. The other factors had significant differences across health care organization types based on the following significant values in Table 5: top management support (0.000), change management (0.000), organizational culture (0.000), knowledge (0.000), security compliance (0.000), security behaviors (0.003), soft issues and workplace independence (0.018), training and awareness (0.009), and ISPs (0.003). Furthermore, based on the significant values from the Mann-Whitney U test in Table 6, we found that:
Figure 3

ISC factors difference model.

Top management support, change management, and knowledge exhibited significant differences across the three organization types. Security behaviors, soft issues and workplace independence, training and awareness, and ISPs exhibited no differences between CHCs and PCC, but significant differences between CHCs and hospitals, and between PCCs and hospitals. Organizational culture and security compliance exhibited no differences between CHCs and hospitals, but significant differences between hospitals and PCCs and between CHCs and PCCs. ISC factors difference model. This study has some implications. In terms of theoretical implications, these results complete the Da Veiga and Martins [31] study by comparing ISCs in different organization types. They also enrich the Nasir et al. [32] literature review with other factors, such as soft issues, workplace independence, and organizational culture. This study enhances research on ISCs in health care provider organizations dominated by hospitals by exploring ISC factors in small health care facilities such as clinics. We found that some factors were similar for every type of health care facility, but others were different for every type. The study also revealed that hospitals and CHCs were similar for some factors, but they were not similar to PCCs. Further study is needed to determine whether the factors of ISC are influenced by the scale of services offered and the levels of regulation governing the organizations. In terms of practical implications, the results of this study are expected to provide information to help managers of health facilities determine the right IS protection programs, specifically for ISC. Health care facilities with similar ISC factors can follow ISPs and practices adopted by other facilities as best practices. However, for other factors, health facilities need to develop different procedures and guidelines so that ISCs can be successfully cultivated. The government could also consider these factors in the formulation of IS policies for health care provider organizations, according to their respective conditions. As seen in the ISC factor different model (Figure 3), each factor that influences an ISC can be different for one health care facility, but the same for another. This implies that the enhancement of ISCs may need a similar or different approach depending on the factor; for example, based on previous research [44] in health care facilities, factors that remained low were workplace capabilities, training and awareness, security behaviors, and ISPs. The current study implies that every health care facility can use a similar approach for workplace capabilities, such as non-disclosure agreements in employment contracts, disciplinary action, and regular IS systems maintenance. According to Soomro et al. [48], IS management has a more important role than IT professionals regarding IS responsibility. Based on our research, the top management and change management factors had different influences on ISC for each type of health care facility. This implies that a different approach should be used for each health care facility. However, operational management was similar across health care facilities, so we believe that a similar approach could be adopted, such as reviewing the IS used, conducting internal/external audits, and maintaining IS systems regularly. Furthermore, according to Deursen et al. [49], traditional IS risks such as sharing passwords and losing assets were more frequent occurrences than outsourcing or new technology such as cloud computing. Based on our research, there was no difference between health care provider types for the risk response function factor. This implied that all health care provider types can use similar approaches for risk analysis, mitigating risks, and providing information about IS, along with relevant sanctions for breaches.

Limitations

This research has some limitations since the influence of the ISC factors on IS effectiveness in health care provider organizations was not measured and compared. The study also did not measure the importance of those factors for ISCs in organizations. Furthermore, the indicators of ISC in this research were not specific to any particular technology implementation. New or future technology utilization in health care facilities, such as the Internet of Things, big data, or robotics, might result in different security cultures.

Conclusion

Some ISC factors differed across CHCs, PCCs, and hospitals, and some did not. Workplace capabilities, risk response factors, and operational management were similar for all health care facilities. Top management, change management, and knowledge were the factors that differed for each type of facility. Organizational culture and security compliance only differed for PCCs, while the remaining factors only differed for hospitals. This indicated the importance of employing different approaches for each type of health care to enable them to develop ISCs that consider those different influential factors.

Declarations

Author contribution statement

P. K. Sari, A. Prasetio, Candiwan: Conceived and designed the experiments; Analyzed and interpreted the data; Contributed reagents, materials, analysis tools or data; Wrote the paper. P. W. Handayani, A. N. Hidayanto: Analyzed and interpreted the data; Wrote the paper. S. Syauqina, E. F. Astuti, F. P. Tallei: Performed the experiments.

Funding statement

This work was supported by the Basic and Applied Research Grant Scheme (grant number No. 052/PNLT3/PPM/2018), Telkom University, Indonesia.

Data availability statement

Data will be made available on request.

Declaration of interests statement

The authors declare no conflict of interest.

Additional information

No additional information is available for this paper.
  10 in total

1.  Legal, ethical, and financial dilemmas in electronic health record adoption and use.

Authors:  Dean F Sittig; Hardeep Singh
Journal:  Pediatrics       Date:  2011-03-21       Impact factor: 7.124

2.  Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers.

Authors:  Israel T Agaku; Akinyele O Adisa; Olalekan A Ayo-Yusuf; Gregory N Connolly
Journal:  J Am Med Inform Assoc       Date:  2013-08-23       Impact factor: 4.497

3.  Analysis of health professional security behaviors in a real clinical setting: an empirical study.

Authors:  José Luis Fernández-Alemán; Ana Sánchez-Henarejos; Ambrosio Toval; Ana Belén Sánchez-García; Isabel Hernández-Hernández; Luis Fernandez-Luque
Journal:  Int J Med Inform       Date:  2015-01-23       Impact factor: 4.046

4.  Information security climate and the assessment of information security risk among healthcare employees.

Authors:  Stacey R Kessler; Shani Pindek; Gary Kleinman; Stephanie A Andel; Paul E Spector
Journal:  Health Informatics J       Date:  2019-03-14       Impact factor: 2.681

5.  Indirect effect of management support on users' compliance behaviour towards information security policies.

Authors:  Norshima Humaidi; Vimala Balakrishnan
Journal:  Health Inf Manag       Date:  2017-03-30       Impact factor: 3.185

Review 6.  Cybersecurity in healthcare: A narrative review of trends, threats and ways forward.

Authors:  Lynne Coventry; Dawn Branley
Journal:  Maturitas       Date:  2018-04-22       Impact factor: 4.342

Review 7.  Privacy in the digital world: medical and health data outside of HIPAA protections.

Authors:  Tasha Glenn; Scott Monteith
Journal:  Curr Psychiatry Rep       Date:  2014-11       Impact factor: 5.285

8.  Dataset on the knowledge, attitude and practices of biomedical wastes management among Neyshabur hospital's healthcare personnel.

Authors:  Mahmood Alimohammadi; Mahmood Yousefi; Fatemeh Azizi Mayvan; Vahid Taghavimanesh; Hossein Navai; Ali Akbar Mohammadi
Journal:  Data Brief       Date:  2018-02-15

9.  Understanding organisational culture for healthcare quality improvement.

Authors:  Russell Mannion; Huw Davies
Journal:  BMJ       Date:  2018-11-28

10.  Health referral system user acceptance model in Indonesia.

Authors:  Putu Wuri Handayani; Ibad Rahadian Saladdin; Ave Adriana Pinem; Fatimah Azzahro; Achmad Nizar Hidayanto; Dumilah Ayuningtyas
Journal:  Heliyon       Date:  2018-12-19
  10 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.