The current health information systems have many challenges such as lack of standard user interfaces,data security and privacy issues,inability to uniquely identify patients across multiple hospital information system...The current health information systems have many challenges such as lack of standard user interfaces,data security and privacy issues,inability to uniquely identify patients across multiple hospital information systems,probable misuse of patient data,high technological costs,resistance to technology deployments in hospital management,lack of data gathering,processing and analysis standardization.All these challenges,among others hamper either the acceptance of the health information systems,operational efficiency or expose patient information to cyber attacks.In this paper,an enhanced information systems success model for patient information assurance is developed using an amalgamation of Technology Acceptance Model(TAM)and Information Systems Success Model(ISS).This involved the usage of Linear Structured Relationship(LISREL)software to model a combination of ISS and Intention to Use(ITU),TAM and ITU,ISS and user satisfaction(US),and finally TAM and US.The sample size of 110 respondents was obtained based on the total population of 221 using the Conhrans formula.Thereafter,simple random sampling was employed to select members within each category of employees to take part in the study.The questionnaire as a research tool was checked for reliability via Cronbach’s Alpha.The results obtained showed that for ISS and ITU modeling,only perceived ease of use,system features,response time,flexibility,timeliness,accuracy,responsiveness and user training positively influenced the intention to use.However,for the TAM and ITU modeling,only TAM’s measures such as timely information,efficiency,increased transparency,and proper patient identification had a positive effect on intension to use.The ISS and US modeling revealed that perceived ease of use had the greatest impact on user satisfaction while response time had the least effect on user satisfaction.On its part,the TAM and US modeling showed that timely information,effectiveness,consistency,enhanced communication,and proper patients identification had a positive influence on user satisfaction.展开更多
Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical ...Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical to organizational business process. Strategic planning and managing IT security risks play an important role in the business and government planning process. Deploying defense in depth security measures can ensure that organizations continue to function in times of crisis. This quantitative study explores whether the Latin Square Design (LSD) model can be effectively applied to the prioritization of cybersecurity threats and to the linking of information assurance defense in-depth measures to those threats. The methods used in this study consisted of scanning 10 Cybersecurity Websites such as the Department of Homeland Security US CERT (United States-Computer Emergency Readiness Team [1]) and the SANS Institute (SysAdmin, Audit, Network and Security [2]) using the Likert Scale Model for the Website’s top ten list of cyber threats facing organizations and the network defense in depth measures to fight those threats. A comparison of each cybersecurity threats was then made using LSD to determine whether the Likert scale and the LSD model could be effectively applied to prioritize information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that LSD does not affect the relationship between the ranking of 10 Cybersecurity websites top ten cybersecurity threats dependent variables and the independent variables of defense in depth measures used in protecting organizational devices against cyber-attacks.展开更多
文摘The current health information systems have many challenges such as lack of standard user interfaces,data security and privacy issues,inability to uniquely identify patients across multiple hospital information systems,probable misuse of patient data,high technological costs,resistance to technology deployments in hospital management,lack of data gathering,processing and analysis standardization.All these challenges,among others hamper either the acceptance of the health information systems,operational efficiency or expose patient information to cyber attacks.In this paper,an enhanced information systems success model for patient information assurance is developed using an amalgamation of Technology Acceptance Model(TAM)and Information Systems Success Model(ISS).This involved the usage of Linear Structured Relationship(LISREL)software to model a combination of ISS and Intention to Use(ITU),TAM and ITU,ISS and user satisfaction(US),and finally TAM and US.The sample size of 110 respondents was obtained based on the total population of 221 using the Conhrans formula.Thereafter,simple random sampling was employed to select members within each category of employees to take part in the study.The questionnaire as a research tool was checked for reliability via Cronbach’s Alpha.The results obtained showed that for ISS and ITU modeling,only perceived ease of use,system features,response time,flexibility,timeliness,accuracy,responsiveness and user training positively influenced the intention to use.However,for the TAM and ITU modeling,only TAM’s measures such as timely information,efficiency,increased transparency,and proper patient identification had a positive effect on intension to use.The ISS and US modeling revealed that perceived ease of use had the greatest impact on user satisfaction while response time had the least effect on user satisfaction.On its part,the TAM and US modeling showed that timely information,effectiveness,consistency,enhanced communication,and proper patients identification had a positive influence on user satisfaction.
文摘Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical to organizational business process. Strategic planning and managing IT security risks play an important role in the business and government planning process. Deploying defense in depth security measures can ensure that organizations continue to function in times of crisis. This quantitative study explores whether the Latin Square Design (LSD) model can be effectively applied to the prioritization of cybersecurity threats and to the linking of information assurance defense in-depth measures to those threats. The methods used in this study consisted of scanning 10 Cybersecurity Websites such as the Department of Homeland Security US CERT (United States-Computer Emergency Readiness Team [1]) and the SANS Institute (SysAdmin, Audit, Network and Security [2]) using the Likert Scale Model for the Website’s top ten list of cyber threats facing organizations and the network defense in depth measures to fight those threats. A comparison of each cybersecurity threats was then made using LSD to determine whether the Likert scale and the LSD model could be effectively applied to prioritize information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that LSD does not affect the relationship between the ranking of 10 Cybersecurity websites top ten cybersecurity threats dependent variables and the independent variables of defense in depth measures used in protecting organizational devices against cyber-attacks.