期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles 被引量:1
1
作者 joe mutebi Margaret Kareyo +1 位作者 Umezuruike Chinecherem Akampurira Paul 《Journal of Computer and Communications》 2022年第8期41-63,共23页
The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security ... The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security principles. The study followed literature search techniques, as well as theoretical and empirical methods of factor validation. The strategy used in literature search includes Boolean keywords search, and citation guides, using mainly web of science databases. As guided by study objectives, 9 SM socio-technical factors were identified, verified and validated. Both theoretical and empirical validation processes were followed. Thus, a theoretical validity test was conducted on 45 Likert scale items, involving 10 subject experts. From the score ratings of the experts, Content Validity Index (CVI) was calculated to determine the degree to which the identified factors exhibit appropriate items for the construct being measured, and 7 factors attained an adequate level of validity index. However, for reliability test, 32 respondents and 45 Likert scale items were used. Whereby, Cronbach’s alpha coefficient (α-values) were generated using SPSS. Subsequently, 8 factors attained an adequate level of reliability. Overall, the validated factors include;1) usability—visibility, learnability, and satisfaction;2) education and training—help and documentation;3) SM technology development—error handling, and revocability;4) information security —security, privacy, and expressiveness. In this case, the confirmed factors would add knowledge by providing a theoretical basis for rationalizing information security requirements on SM usage. 展开更多
关键词 Social Media Usage Information Security Factors Cyber Security Socio-Technical Usable-Security
下载PDF
Medical Information Breaches Occurrence with Respect to Social Media Usage, in Selected Medical Institutions in Uganda
2
作者 joe mutebi Margaret Kareyo +3 位作者 Umezuruike Chinecherem Hussein Muhaise Paul Akampurira Maxwell Okello 《Journal of Computer and Communications》 2022年第10期10-33,共24页
The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed... The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed online survey techniques. Altogether, 710 questionnaires (Google forms) were developed, and operationalized. The main respondents included 566 medical students, and 143 medical staff from Mbarara University of Science and Technology (MUST), and Kampala International University (KIU), accordingly. Using SPSS, the main statistical analysis tools employed include frequency distribution summary, and Chi-square (x<sup>2</sup>) test. According to the frequency distribution summary, 27% to 42% of the respondents within categorical divides acknowledged occurrence of medical information breaches due to SM usage. Notably, higher levels of the breaches were reported among male students (64%), age-group 18 to 35 years (68%), and WhatsApp users (63%). On the other hand, Chi-square results showed significant levels (p p > 0.05) between medical institutions and medical information breaches. Overall, the vulnerable areas of the breaches identified would serve as important reference points in the process of rationalizing SM usage in medical institutions. Nevertheless, further studies could focus on identification of the key SM usage factors associated with medical information breaches in medical institutions in Uganda. 展开更多
关键词 SM Usage Medical Information Breaches Medical Information Safety Electronic Healthcare Information Medical Institutions
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部