ORIGINAL PAPER
Does nationality affect nurses’ information security participation? A comparative study in Iran and Poland
 
More details
Hide details
1
Institute of Psychology, University of Gdansk, Gdansk, Poland
2
University of Bojnord, Bojnord, Iran
CORRESPONDING AUTHOR
Andrzej Piotrowski   

Uniwersytet Gdański
Submission date: 2022-01-31
Final revision date: 2022-03-25
Acceptance date: 2022-03-31
Online publication date: 2022-06-01
Publication date: 2022-05-05
 
Health Psychology Report 2022;10(3):203–211
 
KEYWORDS
TOPICS
ABSTRACT
Background:
Confidential personal data breaches are a serious problem for medical service providers. They may result in high financial costs for medical care facilities and unnecessary stress for patients. Research on information security (IS) in healthcare has been insufficient thus far. International studies may add a new perspective on this issue.

Participants and procedure:
A quantitative approach was assumed to analyse relationships between IS climate and IS indicators in countries with dif-ferent cultures (Iran and Poland). The Information Security Climate Index was used in the study. The software PLS3 and SPSS 22 was used for data analysis.

Results:
The results showed that the predicted factors of nurses’ IS participation were different in Iran and Poland. In both coun-tries, nurses’ perception of the importance of IS had an effect on IS participation, but in Poland, IS compliance had an addi-tional positive effect. In addition, IS compliance moderated the relationship between IS motivation and IS participation.

Conclusions:
Components of IS climate have a significant effect on nurses’ IS participation in both Iran and Poland, though nationality can modify this relation. However, in both countries, by linking IS policies with human resource management activities such as performance appraisal and training, nurses’ perception of IS importance can be increased and IS participation can be facilitated.

 
REFERENCES (49)
1.
Alnatheer, M. A. (2014). A conceptual model to understand information security culture. Inter International Jour-nal of Social Science and Humanity, 4, 104–107. https://doi.org/10.7763/IJSSH.....
 
2.
Ameen, N., Tarhini, A., Shah, M. H., Madichie, N., Paul, J., & Choudrie, J. (2021). Keeping customers’ data secure: a cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. Computers in Human Behavior, 114, 106531. https://doi.org/10.1016/j.chb.....
 
3.
Anderson, C., Baskerville, R. L., & Kaul, M. (2017). Information security control theory: Achieving a sustainable reconciliation between sharing and protecting the privacy of information. Journal of Management Infor-mation Systems, 34, 1082–1112. https://doi.org/10.1080/074212....
 
4.
Apkan, N. (2016). Hacking health care records reaches epidemic proportions. Retrieved from https://www.scientificamerican....
 
5.
Bond, C. S. (2007). Nurses’ requirements for information technology: a challenge for educators. International Journal of Nursing Studies, 44, 1075–1078. https://doi.org/10.1016/j.ijnu....
 
6.
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2009). Roles of information security awareness and perceived fairness in information security policy compliance. Proceedings of the 15th Americas Conference on Information Sys-tems, San Francisco, CA, USA.
 
7.
Chin, W. W. (2010). How to write up and report PLS analyses. In V. E. Vinzi, W. W. Chin, J. Henseler, & H. Wang (Eds.), Handbook of partial least squares (pp. 655–690). Springer.
 
8.
Chin, W. W., Marcelin, B. L., & Newsted, P. R. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emo-tion/adoption study. Information Systems Research, 14, 189–217. https://doi.org/10.1287/isre.1....
 
9.
Coppock, D., Zambo, D., Moyo, D., Tanthuma, G., Chapman, J., Re III, V. L., Graziani, A., Lowenthal, E., Hanrahan, N., Littman-Quinn, R., Kovarik, C., Albarracin, D., Holmes, J. H., & Gross, R. (2017). Development and usability of a smartphone application for tracking antiretroviral medication refill data for human immunodeficiency vi-rus. Methods of Information in Medicine, 56, 351–359. https://doi.org/10.1055/s-0040....
 
10.
Elst, T., Cavents, C., Daneels, K., Johannik, K., Baillien, E., Van den Broeck, A., & Godderis, L. (2016). Job demands-resources predicting burnout and work engagement among Belgian home health care nurses: a cross-sectional study. Nursing Outlook, 64, 542–556. https://doi.org/10.1016/j.outl....
 
11.
Fardoun, H. M., Alghazzawi, D. M., & De la Guia, M. E. (2020). Using information and communication technologies to enhance patient rehabilitation research techniques. Methods of Information in Medicine, 59, 59–60. https://doi.org/10.1055/s-0040....
 
12.
Fernández-Alemán, J. L., Sánchez-Henarejos, A., Toval, A., Sánchez-García, A. B., Hernández-Hernández, I., & Fernandez-Luque, L. (2015). Analysis of health professional security behaviors in a real clinical setting: an empirical study. International Journal of Medical Informatics, 84, 454–467. https://doi.org/10.1016/j.ijme....
 
13.
Greenslade, J. H., & Jimmieson, N. L. (2011). Organizational factors impacting on patient satisfaction: a cross sec-tional examination of service climate and linkages to nurses’ effort and performance. International Journal of Nursing Studies, 48, 1188–1198. https://doi.org/10.1016/j.ijnu....
 
14.
Grover, S., Shah, S., Bhatia, R., Urusaro, S., Monare, B., Ralefala, T., Seiphetlheng, A., Singh, S. P., & Dhaliwal, G. (2020). Development and usability of a smartphone application for tracking oncology patients in Gaborone, Botswana. Methods of Information in Medicine, 59, 31–40. https://doi.org/10.1055/s-0040....
 
15.
Guhr, N., Lebek, B., & Breitner, M. H. (2019). The impact of leadership on employees’ intended information security behav-iour: an examination of the full‐range leadership theory. Information Systems Journal, 29, 340–362. https://doi.org/10.1111/isj.12....
 
16.
Gülkesen, K. H., & Haux, R. (2019). Research subjects and research trends in medical informatics. Methods of In-formation in Medicine, 58, e1–e13. https://doi.org/10.1055/s-0039....
 
17.
Hallett, N., Huber, J., Sixsmith, J., & Dickens, G. L. (2018). Measuring the violence prevention climate: Develop-ment and evaluation of the VPC-14. International Journal of Nursing Studies, 88, 97–103. https://doi.org/10.1016/j.ijnu....
 
18.
Huang, D. L., Patrick Rau, P. L., Salvendy, G., Gao, F., & Zhou, J. (2011). Factors affecting perception of information security and their impacts on IT adoption and security practices. International Journal of Human – Computer Studies, 69, 870–883. https://doi.org/10.1016/j.ijhc....
 
19.
Humaidi, N., & Balakrishnan, V. (2015). Leadership styles and information security compliance behavior: The me-diator effect of information security awareness. International Journal of Information and Education Technolo-gy, 5, 311–318. https://doi.org/10.7763/IJIET.....
 
20.
Human Development Report 2019 Team (2019). Human Development Report 2019. Beyond income, beyond av-erages, beyond today: Inequalities in human development in the 21st century (United Nations Development Programme). Retrieved from http://www.hdr.undp.org/sites/....
 
21.
Jackowski, M. (2018). Medical data protection. GDPR in health protection. Wolters Kluwer.
 
22.
Karjalainen, M., Siponen, M., & Sarker, S. (2020). Toward a stage theory of the development of employees’ infor-mation security behavior. Computers & Security, 93, 101782. https://doi.org/10.1016/j.cose....
 
23.
Kessler, S. R., Pindek, S., Kleinman, G., Andel, S. A., & Spector, P. E. (2019). Information security climate and the assessment of information security risk among healthcare employees. Health Informatics Journal, 26, 461–473. https://doi.org/10.1177/146045....
 
24.
Kirsch, L., & Boss, S. (2007). The last line of defense: Motivating employees to follow corporate security guide-lines. Proceedings of the 28th International Conference on Information Systems, Montreal, Quebec, Canada.
 
25.
Kopanitsa, G. (2017). Integration of hospital information and clinical decision support systems to enable the reuse of electronic health record data. Methods of Information in Medicine, 56, 238–247. https://doi.org/10.3414/ME16-0....
 
26.
Lee, C., Lee, C. C., & Kim, S. (2016). Understanding information security stress: Focusing on the type of infor-mation security compliance activity. Computers & Security, 59, 60–70. https://doi.org/10.1016/j.cose....
 
27.
Liu, V., Musen, M. A., & Chou, T. (2015). Data breaches of protected health information in the United States. JA-MA, 313, 1471–1473. https://doi.org/10.1001/jama.2....
 
28.
Lowry, P. B., & Moody, G. D. (2013). Explaining opposing compliance motivations towards organizational infor-mation security policies. Proceedings of the 46th Hawaii International Conference on System Sciences, Wailea, HI, USA. https://doi.org/10.1109/HICSS.....
 
29.
Madera, J. M., Dawson, M., & Guchait, P. (2016). Psychological diversity climate: Justice, racioethnic minority status and job satisfaction. International Journal of Contemporary Hospitality Management, 28, 2514–2532. https://doi.org/10.1108/IJCHM-....
 
30.
McCoy, T. H., & Perlis, R. H. (2018). Temporal trends and characteristics of reportable health data breaches, 2010-2017. JAMA, 320, 1282–1284. https://doi.org/10.1001/jama.2....
 
31.
Mehraeen, E., Ayatollahi, H., & Ahmadi, M. (2014). A study of information security in hospital information sys-tems. Health Information Management, 10, 779–788.
 
32.
Olds, D. M., Aiken, L. H., Cimiotti, J. P., & Lake, E. T. (2017). Association of nurse work environment and safety climate on patient mortality: a cross-sectional study. International Journal of Nursing Studies, 74, 155–161. https://doi.org/10.1016/j.ijnu....
 
33.
Peikari, H. R., Ramayah, T., Shah, M. H., & Lo, M. C. (2018). Patients’ perception of the information security man-agement in health centers: The role of organizational and human factors. BMC Medical Informatics and Deci-sion Making, 18, 1–13. https://doi.org/10.1186/s12911....
 
34.
Piotrowski, A., & Jurek, P. (2019). A preliminary adaptation and validation of the Overwork Climate Scale by Mazzetti, Schaufeli, Guglielmi and Depolo. Medycyna Pracy, 70, 177–188. https://doi.org/10.13075/mp.58....
 
35.
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral re-search: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 879–903. https://doi.org/10.1037/0021-9....
 
36.
Pulverman, C. S., & Meston, C. M. (2020). Sexual dysfunction in women with a history of childhood sexual abuse: The role of sexual shame. Psychological Trauma: Theory, Research, Practice & Policy, 12, 291–299. https://doi.org/10.1037/tra000....
 
37.
Querstret, D., O’Brien, K., Skene, D. J., & Maben, J. (2020). Improving fatigue risk management in healthcare: a systematic scoping review of sleep-related/fatigue-management interventions for nurses and midwives. In-ternational Journal of Nursing Studies, 106, 103513. https://doi.org/10.1016/j.ijnu....
 
38.
Reichers, A. E., & Schneider, B. (1990). Climate and culture: an evolution of constructs. In B. Schneider (Ed.), Or-ganizational climate and culture (pp. 5–39). Jossey-Bass.
 
39.
Schatz, D., & Bashroush, R. (2019). Security predictions – a way to reduce uncertainty. Journal of Information Security and Applications, 45, 107–116. https://doi.org/10.1016/j.jisa....
 
40.
Schneider, B., Ehrhart, M., & Macey, W. (2013). Organizational climate and culture. Annual Review of Psychology, 64, 361–388. https://doi.org/10.1146/annure....
 
41.
Simmonds, M. (2018). Instilling a culture of data security throughout the organisation. Network Security, 2018, 9–12. https://doi.org/10.1016/S1353-....
 
42.
Sołtysik-Piorunkiewicz, A. (2014). The recent ideas and trends in health care information systems in Poland. Studia Ekonomiczne, 188, 218–225.
 
43.
Thye, J., Esdar, M., Liebe, J. D., Jahn, F., Winter, A., & Hübner, U. (2020). Professionalism of information manage-ment in health care: Development and validation of the construct and its measurement. Methods of Infor-mation in Medicine, 59, e1–e12. https://doi.org/10.1055/s-0040....
 
44.
Toode, K., Routasalo, P., & Suominen, T. (2011). Work motivation of nurses: a literature review. International Journal of Nursing Studies, 48, 246–257. https://doi.org/10.1016/j.ijnu....
 
45.
Urbach, N., & Ahlemann, F. (2010). Structural equation modeling in information systems research using partial least squares. Journal of Information Technology Theory and Application, 11, 5–40.
 
46.
Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49, 190–198. https://doi.org/10.1016/j.im.2....
 
47.
Verizon Risk Team (2018). Data breach investigations report (11th edition). Retrieved from https://enterprise.verizon.com... 2018 Report.pdf.
 
48.
Vinzi, V. E., Trinchera, L., & Amato, S. (2010). PLS path modeling: From foundations to recent developments and open issues for model assessment and improvement. In V. E. Vinzi, W. W. Chin, J. Henseler, & H. Wang (Eds.), Handbook of partial least squares (pp. 47–82). Springer.
 
49.
Wagg, A. J., Callanan, M. M., & Hassett, A. (2018). The use of computer mediated communication in providing patient support: a review of the research literature. International Journal of Nursing Studies, 82, 68–78. https://doi.org/10.1016/j.ijnu....
 
eISSN:2353-5571
ISSN:2353-4184