Technology acceptance as an influencing factor of hospital employees’ compliance with data‐protection standards in Germany
Aim Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in daily work. However, these regulations are not always respected, as evidenced by the data-protection scandals in Germany of recent years. Subje...
Saved in:
| Published in | Journal of public health Vol. 20; no. 3; pp. 253 - 268 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
Berlin/Heidelberg
Springer-Verlag
01.06.2012
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0943-1853 2198-1833 1613-2238 |
| DOI | 10.1007/s10389-011-0456-9 |
Cover
| Abstract | Aim
Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in daily work. However, these regulations are not always respected, as evidenced by the data-protection scandals in Germany of recent years.
Subjects and methods
In a 2010 survey, data was collected from 557 individuals including administrative staff, nursing staff, physicians, physicians with scientific/research-based work and other health professionals of 26 hospitals in Germany to analyze the factors of relevance with regard to data-protection compliance.
Results
The acceptance of hospital staff concerning data-protection regulations is significantly influenced by subjective values and personal attitudes. Significant differences related to the acceptance of data-protection rules and regulations can be found in gender or type of hospital. The results show that employees consider rules and regulations to be necessary and important. However damage caused by data security breaches and the likelihood that they will occur, are considered to be less significant. A large impact on individual data-protection compliance can be reported in the subjective norm, which is influenced by the effect of close colleagues and superiors.
Conclusion
The underlying results of the study at hand demonstrate practical implications which can lead to a high degree of data-protection compliance in the future. The related aspects deserving future investigation of the possible explanations for differences in behavior related to data protection among various occupational groups in hospitals are discussed. Men and women exhibit very different levels of data-protection acceptance, so future efforts to increase sensitivity and awareness of data-protection issues in employees require gender-specific approaches. Another issue that merits investigation is the source of the influence of hospital type on data-protection compliance. |
|---|---|
| AbstractList | Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in daily work. However, these regulations are not always respected, as evidenced by the data-protection scandals in Germany of recent years. In a 2010 survey, data was collected from 557 individuals including administrative staff, nursing staff, physicians, physicians with scientific/research-based work and other health professionals of 26 hospitals in Germany to analyze the factors of relevance with regard to data-protection compliance. The acceptance of hospital staff concerning data-protection regulations is significantly influenced by subjective values and personal attitudes. Significant differences related to the acceptance of data-protection rules and regulations can be found in gender or type of hospital. The results show that employees consider rules and regulations to be necessary and important. However damage caused by data security breaches and the likelihood that they will occur, are considered to be less significant. A large impact on individual data-protection compliance can be reported in the subjective norm, which is influenced by the effect of close colleagues and superiors. The underlying results of the study at hand demonstrate practical implications which can lead to a high degree of data-protection compliance in the future. The related aspects deserving future investigation of the possible explanations for differences in behavior related to data protection among various occupational groups in hospitals are discussed. Men and women exhibit very different levels of data-protection acceptance, so future efforts to increase sensitivity and awareness of data-protection issues in employees require gender-specific approaches. Another issue that merits investigation is the source of the influence of hospital type on data-protection compliance.[PUBLICATION ABSTRACT] Aim: Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in daily work. However, these regulations are not always respected, as evidenced by the data-protection scandals in Germany of recent years. Subjects and methods: In a 2010 survey, data was collected from 557 individuals including administrative staff, nursing staff, physicians, physicians with scientific/research-based work and other health professionals of 26 hospitals in Germany to analyze the factors of relevance with regard to data-protection compliance. Results: The acceptance of hospital staff concerning data-protection regulations is significantly influenced by subjective values and personal attitudes. Significant differences related to the acceptance of data-protection rules and regulations can be found in gender or type of hospital. The results show that employees consider rules and regulations to be necessary and important. However damage caused by data security breaches and the likelihood that they will occur, are considered to be less significant. A large impact on individual data-protection compliance can be reported in the subjective norm, which is influenced by the effect of close colleagues and superiors. Conclusion: The underlying results of the study at hand demonstrate practical implications which can lead to a high degree of data-protection compliance in the future. The related aspects deserving future investigation of the possible explanations for differences in behavior related to data protection among various occupational groups in hospitals are discussed. Men and women exhibit very different levels of data-protection acceptance, so future efforts to increase sensitivity and awareness of data-protection issues in employees require gender-specific approaches. Another issue that merits investigation is the source of the influence of hospital type on data-protection compliance. Aim Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in daily work. However, these regulations are not always respected, as evidenced by the data-protection scandals in Germany of recent years. Subjects and methods In a 2010 survey, data was collected from 557 individuals including administrative staff, nursing staff, physicians, physicians with scientific/research-based work and other health professionals of 26 hospitals in Germany to analyze the factors of relevance with regard to data-protection compliance. Results The acceptance of hospital staff concerning data-protection regulations is significantly influenced by subjective values and personal attitudes. Significant differences related to the acceptance of data-protection rules and regulations can be found in gender or type of hospital. The results show that employees consider rules and regulations to be necessary and important. However damage caused by data security breaches and the likelihood that they will occur, are considered to be less significant. A large impact on individual data-protection compliance can be reported in the subjective norm, which is influenced by the effect of close colleagues and superiors. Conclusion The underlying results of the study at hand demonstrate practical implications which can lead to a high degree of data-protection compliance in the future. The related aspects deserving future investigation of the possible explanations for differences in behavior related to data protection among various occupational groups in hospitals are discussed. Men and women exhibit very different levels of data-protection acceptance, so future efforts to increase sensitivity and awareness of data-protection issues in employees require gender-specific approaches. Another issue that merits investigation is the source of the influence of hospital type on data-protection compliance. |
| Author | Foth, Michael Schusterschitz, Claudia Flatscher‐Thöni, Magdalena |
| Author_xml | – sequence: 1 givenname: Michael surname: Foth fullname: Foth, Michael email: michael.foth@umit.at organization: Department of Public Health and Health Technology Assessment, UMIT - The Health & Life Sciences University – sequence: 2 givenname: Claudia surname: Schusterschitz fullname: Schusterschitz, Claudia organization: Department of Medical Sciences and Management – Institute of Applied Psychology, UMIT - The Health & Life Sciences University – sequence: 3 givenname: Magdalena surname: Flatscher‐Thöni fullname: Flatscher‐Thöni, Magdalena organization: Department of Public Health and Health Technology Assessment, UMIT - The Health & Life Sciences University |
| BookMark | eNp9kctqGzEUhkVJoI6TB8hO0E03k-oyF2lZQpsEAt0k60E-c2TLjKWJJFO8KXmEbvt6eZLKcRbF0KzEge87-jn_GTnxwSMhl5xdcca6L4kzqXTFOK9Y3bSV_kBmvOWyEkKqEzJjupYVV438SM5SWjMmpRR6Rn49IKx8GMNyRw0ATtl4QGoSNZ46b8ctenB-Sa2BHCINlq5Cmlw2I8XNNIYdYnp5_kMhlMm9yj9dXtHBZPPy_HuKISNkFzxNZfVg4pDKXnqDcWP87pycWjMmvHh75-Tx-7eH69vq_sfN3fXX-wpKzlwJLjqFC647BaJlrbQLDXaopZFCKS0arQQb1KJuubXQCFwYW_OuhoGJzgLIOfl82FvyPG0x5X7jEuA4Go9hm3rOtKw71ta8oJ-O0HXYRl_SFYq3rGubAs8JP1AQQ0oRbT9FtzFxV6B-30h_aKQvjfT7Rvq90x05UO64v02Oxo3vmuJgpvKLX2L8N9P_pL90j6VD |
| CitedBy_id | crossref_primary_10_1007_s10639_022_11294_z crossref_primary_10_1057_ejis_2015_9 crossref_primary_10_1177_14604582241296398 crossref_primary_10_1108_IJBM_07_2021_0291 crossref_primary_10_1108_JEIM_02_2020_0052 crossref_primary_10_3390_healthcare10122531 crossref_primary_10_1088_1742_6596_1339_1_012100 crossref_primary_10_2196_17334 crossref_primary_10_1109_TEM_2023_3237789 crossref_primary_10_1007_s10916_017_0833_1 |
| Cites_doi | 10.1016/0022-1031(86)90045-4 10.2307/25750694 10.1111/j.1559-1816.2002.tb00236.x 10.1016/S1071-5819(03)00111-3 10.17705/1jais.00133 10.1016/j.im.2003.08.011 10.1287/isre.11.4.342.11872 10.1287/isre.6.2.144 10.1111/j.1540-5915.1996.tb01822.x 10.1007/978-3-322-91094-3_2 10.1016/S0378-7206(01)00143-4 10.2307/249008 10.1016/S0378-7206(97)00026-8 10.1177/074391569101000206 10.2307/249751 10.2307/30036540 10.2307/25750690 10.1111/j.1365-2575.2007.00289.x 10.1016/S0167-9236(03)00062-9 10.1111/j.2044-8325.1990.tb00506.x 10.1287/mnsc.46.2.186.11926 10.1007/978-3-322-83345-7_15 10.1080/15536548.2005.10855772 10.1348/096317905X52607 10.17705/1jais.00008 10.1287/isre.2.3.173 10.1057/ejis.2009.6 10.2307/255742 10.1016/0749-5978(91)90020-T 10.1037/0021-9010.75.4.378 10.1016/S0378-7206(02)00010-1 10.1002/mar.20024 10.1080/00223980.1975.9915803 10.1207/S15327663JCP1202_08 10.1016/0022-1031(83)90023-9 10.1287/mnsc.35.8.982 |
| ContentType | Journal Article |
| Copyright | Springer-Verlag 2011 Springer-Verlag 2012 |
| Copyright_xml | – notice: Springer-Verlag 2011 – notice: Springer-Verlag 2012 |
| DBID | AAYXX CITATION 3V. 7T2 7X7 7XB 88E 8C1 8FE 8FG 8FI 8FJ 8FK ABJCF ABUWG AEUYN AFKRA ATCPS AZQEC BENPR BGLVJ BHPHI C1K CCPQU DWQXO FYUFA GHDGH GNUQQ HCIFZ K9. L6V M0S M1P M7S PATMY PHGZM PHGZT PJZUB PKEHL PPXIY PQEST PQGLB PQQKQ PQUKI PRINS PTHSS PYCSY |
| DOI | 10.1007/s10389-011-0456-9 |
| DatabaseName | CrossRef ProQuest Central (Corporate) Health and Safety Science Abstracts (Full archive) Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Public Health Database (ProQuest) ProQuest SciTech Collection ProQuest Technology Collection Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest One Sustainability ProQuest Central UK/Ireland Agricultural & Environmental Science Collection ProQuest Central Essentials ProQuest Central Technology Collection Natural Science Collection Environmental Sciences and Pollution Management ProQuest One Community College ProQuest Central Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Central Student SciTech Premium Collection ProQuest Health & Medical Complete (Alumni) ProQuest Engineering Collection ProQuest Health & Medical Collection Proquest Medical Database Engineering Database Environmental Science Database Proquest Central Premium ProQuest One Academic (New) ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection Environmental Science Collection |
| DatabaseTitle | CrossRef ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest One Health & Nursing ProQuest Central China Environmental Sciences and Pollution Management ProQuest Central ProQuest One Applied & Life Sciences ProQuest One Sustainability ProQuest Health & Medical Research Collection ProQuest Engineering Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) Natural Science Collection ProQuest Central Korea Health & Medical Research Collection Agricultural & Environmental Science Collection Health & Safety Science Abstracts ProQuest Central (New) ProQuest Medical Library (Alumni) Engineering Collection Engineering Database ProQuest Public Health ProQuest One Academic Eastern Edition ProQuest Hospital Collection ProQuest Technology Collection Health Research Premium Collection (Alumni) ProQuest SciTech Collection ProQuest Hospital Collection (Alumni) Environmental Science Collection ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition Materials Science & Engineering Collection Environmental Science Database ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
| DatabaseTitleList | ProQuest Central Student Health & Safety Science Abstracts |
| Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Medicine Public Health |
| EISSN | 1613-2238 |
| EndPage | 268 |
| ExternalDocumentID | 2669694231 10_1007_s10389_011_0456_9 |
| Genre | Feature |
| GeographicLocations | Germany |
| GeographicLocations_xml | – name: Germany |
| GroupedDBID | --- -53 -5E -5G -BR -EM -Y2 -~C .86 .VR 04C 06C 06D 0R~ 0VY 1N0 1SB 2.D 203 28- 29L 29~ 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2Z- 2~H 30V 3V. 4.4 406 408 409 40D 40E 44B 53G 5GY 5QI 5VS 67Z 6NX 7X7 7XC 88E 8C1 8FE 8FG 8FH 8FI 8FJ 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJJC AAJKR AANXM AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABIVO ABJCF ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABPLI ABQBU ABQSL ABSXP ABTEG ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACPRK ACSNA ACUDM ACYUM ACZOJ ADBBV ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AEOHA AEPYU AESKC AETLH AEUYN AEVLU AEXYK AFEXP AFKRA AFLOW AFQWF AFRAH AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWZB AGYKE AHAVH AHBYD AHKAY AHMBA AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ AKMHD ALIPV ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ ASPBG ATCPS AVWKF AXYYD AZFZN B-. BA0 BBWZM BDATZ BENPR BGLVJ BGNMA BHPHI BMSDO BPHCQ BSONS BVXVI CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP EBLON EBS EIHBH EIOEI EJD EN4 ESBYG F5P FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC FYUFA G-Y G-Z GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GRRUI GXS H13 HCIFZ HF~ HG5 HG6 HMCUK HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW KPH L6V LAS LLZTM M1P M4Y M7S MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O-J O9- O93 O9G O9I O9J OAM P19 P9S PATMY PF0 PQQKQ PROAC PSQYO PT4 PT5 PTHSS PYCSY Q2X QF4 QN7 QO5 QOK QOR QOS R-Y R4E R89 R9I RHV RNI ROL RPX RSV RZK S16 S1Z S26 S27 S28 S37 S3B SAP SCLPG SDE SDH SDM SHX SISQX SJYHP SMD SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW SSXJD STPWE SZ9 SZN T13 T16 TSG TSK TSV TT1 TUC U2A U9L UG4 UKHRP UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WJK WK6 WK8 YLTOR Z45 Z7W ZMTXR ZMU ZOVNA AAPKM AAYXX ABBRH ABDBE ABRTQ ADHKG AFDZB AFOHR AGQPQ AHPBZ ATHPR AYFIA CITATION PHGZM PHGZT PJZUB PPXIY PQGLB PUEGO 7T2 7XB 8FK AZQEC C1K DWQXO GNUQQ K9. PKEHL PQEST PQUKI PRINS |
| ID | FETCH-LOGICAL-c333t-21278eb1978c26063fb9cfd43a32889259820d8b461ffc52ebaf4174cd027fcc3 |
| IEDL.DBID | U2A |
| ISSN | 0943-1853 2198-1833 |
| IngestDate | Mon Oct 06 17:59:20 EDT 2025 Tue Oct 07 06:13:59 EDT 2025 Wed Oct 01 04:57:17 EDT 2025 Thu Apr 24 23:00:47 EDT 2025 Fri Feb 21 02:35:00 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Keywords | Technology acceptance Hospital Workplace Compliance Security Data protection |
| Language | English |
| License | http://www.springer.com/tdm |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c333t-21278eb1978c26063fb9cfd43a32889259820d8b461ffc52ebaf4174cd027fcc3 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
| PQID | 1016076509 |
| PQPubID | 326243 |
| PageCount | 16 |
| ParticipantIDs | proquest_miscellaneous_1093470641 proquest_journals_1016076509 crossref_primary_10_1007_s10389_011_0456_9 crossref_citationtrail_10_1007_s10389_011_0456_9 springer_journals_10_1007_s10389_011_0456_9 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2012-06-01 |
| PublicationDateYYYYMMDD | 2012-06-01 |
| PublicationDate_xml | – month: 06 year: 2012 text: 2012-06-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Berlin/Heidelberg |
| PublicationPlace_xml | – name: Berlin/Heidelberg – name: Heidelberg |
| PublicationSubtitle | Zeitschrift für Gesundheitswissenschaften |
| PublicationTitle | Journal of public health |
| PublicationTitleAbbrev | J Public Health |
| PublicationYear | 2012 |
| Publisher | Springer-Verlag Springer Nature B.V |
| Publisher_xml | – name: Springer-Verlag – name: Springer Nature B.V |
| References | RiemenschneiderCKHarrissonDMykytynPPUnderstanding IT adoption decision in small business: integrating current theoriesInform Manage20034026928510.1016/S0378-7206(02)00010-1 AndersonCAgarwalRPracticing safe computing: a multi-method empirical examination of home computer user security behavioural intentionsMIS Quart2005343613643 VijanyanJPrivacy rules may slow e-health use, study saysComputerworld200943156 WürtenbergerTAkzeptanz von GesetzenKölner Z Soziol Soz1999513938039710.1007/978-3-322-83345-7_15 Hamburger Morgenpost (2009b) Patient documents in the Internet. http://www.dradio.de/dlf/sendungen/wib/1310932/. Cited 19 February 2011 Augsburger Allgemeine (2009) Health insurance companies sold obviously patient data, http://www.augsburger-allgemeine.de/politik/Krankenkassen-verkauften-offensichtlich-Patienten-Daten-id5803031.html. Cited 19 February 2011 Hamburger Morgenpost (2009a) UKE scandal around patient documents. http://archiv.mopo.de/archiv/2009/20090228/hamburg/uke_skandal_um_kranken_daten.html. Cited 19 February 2011 Dinev T, Hu Q (2007) The centrality of awareness in the formation of user behavioral intention toward protective information technologies. J Assoc Inform Syst 8(4):386–408. http://aisel.aisnet.org/jais/vol8/iss7/23. Cited 6 June 2011 FeathermanMSPavlouPAPredicting e-services adoption: a perceived risk facets perspectiveInt J Hum-Comput St200359445147410.1016/S1071-5819(03)00111-3 VenkateshVDavisFA theoretical extension of the technology acceptance model: four longitudinal field studiesManage Sci200046218620410.1287/mnsc.46.2.186.11926 Der Westen (2009) Patient data missing. http://www.derwesten.de/nachrichten/wr/2009/6/3/news-121712344/detail.html. Cited 19 February 2011 MathiesonKPredicting user intentions: comparing the technology-acceptance-model with the theory of planned behaviourInform Syst Res1991217319110.1287/isre.2.3.173 VenkateshVDavisFDA model of the perceived ease of use development and testDecision Sci199627345148110.1111/j.1540-5915.1996.tb01822.x RobeyDUser attitudes and management information system useAcad Manage J19792252753810.2307/255742 TrevinoLKYoungbloodSABad apples in bad barrels: a causal analysis of ethical decision-making behaviourJ Appl Psychol199075437838510.1037/0021-9010.75.4.378 MalhotraYGallettaDFExtending the technology acceptance model to account for social influence: theoretical bases and empirical validation. 32nd Hawaii International Conference on System Science1999Maui, HawaiIEEE PavlouPAChaiLWhat drives electronic commerce across cultures? A cross-cultural empirical investigation of the theory of planned behaviorJ Elect Com Res200234240253 VenkateshVMorrisMGDavisGBDavisFDUser acceptance of information technology: toward a unified viewMIS Quart2003273425478 Fishbein M, Ajzen I (1975) Belief, attitude, intention and behaviour: an introduction to theory and research. Series in Social Psychology, Addison-Wesley, Boston, MA Karahanna E, Straub DW, Chervany NL (1999) Information technology adoption across time: a cross-sectional comparson of pre-adoption and post-adoption beliefs. MIS Quart 23(2):183–213. http://www.jstor.org/stable/249751. Cited 6 June 2011 AjzenITheory of planned behaviourOrgan Behav Hum Dec199150217921110.1016/0749-5978(91)90020-T GefenDStraubDWThe relative importance of perceived ease of use in IS adoption: a study of e-commerce adoptionJ Assoc Inform Syst200011128 YangHYooYIt’s all about attitude: revisiting the technology acceptance modelDecis Support Syst2003381193110.1016/S0167-9236(03)00062-9 HerathTRaoHRProtection motivation and deterrence: a framework for security policy compliance in organisationsEur J Inform Syst200918210612510.1057/ejis.2009.6 Bulgurcu B (2008) The antecedents of information security policy compliance. MSc Thesis, The University of British Columbia, Canada VenkateshVDeterminants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance modelInform Syst Res200011434236510.1287/isre.11.4.342.11872 Culnan M (2004) Bentley survey on consumers and internet security: summary of findings. www.bentley.edu/events/iscw2004/survey_findings.pdf. Cited 6 June 2011 DinevTGooJHuQNamKUser behaviour towards protective information technologies: the role of national cultural differencesInform Syst J200919439141210.1111/j.1365-2575.2007.00289.x Pommerening K (1995) Datenschutz in Krankenhausinformationssystemen. Johannes-Gutenberg-Universität, Institut für Medizinische Statistik und Dokumentation, Mainz, Germany. http://www.staff.uni-mainz.de/pommeren/Artikel/vis95.pdf. Cited 6 June 2011 Hayn B (2005) Datenschutz: Anwendungsorientierte Aspekte—Anspruch und Wirklichkeit, am Beispiel des LKH-Univ. Klinikum Graz, Hall in Tyrol. MSc Thesis, LKH-Univ. Klinikum Graz, Austria SchmidtKHHollmannSSodenkampDPsychometrische Eigenschaften und Validität einer deutschen Fassung des “Commitment-Fragebogens” von Allen und Meyer (1990)Z Differ Diag Psychol1998293106 AjzenIFishbeinMUnderstanding attitudes and predicting social behavior1980Englewood Cliffs, NJPrentice Hall VijayasarathyLRPredicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance modelInform Manage200341674776210.1016/j.im.2003.08.011 Bandura A (1977) Social learning theory. Prentice Hall, Englewood Cliffs, NJ AllenNJMeyerJPThe measurement and antecedents of affective, continuance and normative commitment to the organizationJ Occup Psychol19901111810.1111/j.2044-8325.1990.tb00506.x LegrisPInghamJCollerettePWhy do people use information technology? A critical review of technology acceptance modelInform Manage20034019120410.1016/S0378-7206(01)00143-4 MadduxJERogersRWProtection motivation theory and self-efficacy: a revised theory of fear appeals and attitude changeJ Exp Soc Psychol19831946947910.1016/0022-1031(83)90023-9 TaylorSToddPAUnderstanding information technology usage: a test of competing modelsInform Syst Res19956314417610.1287/isre.6.2.144 Zakour AB (2004) Cultural differences and information technology acceptance. Seventh Annual Conference of the Southern Association for Information Systems (SAIS), http://sais.aisnet.org/sais2004/Zakour.pdf. Cited 6 June 2011 Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart 13(3):319–339. http://www.jstor.org/stable/249008. Cited 6 June 2011 StraubDKeilMBrennerWTesting the technology acceptance model across culture: a three country studyInform Manage199733111110.1016/S0378-7206(97)00026-8 Statistisches Bundesamt Deutschland (2008): Gesundheit: Grunddaten der Krankenhäuser 2008. Fachserie 12 Reihe 6.1.1. Statistisches Bundesamt Deutschland, Berlin SpitzmüllerCStantonJMExamining employee compliance with organizational surveillance and monitoringJ Occup Organ Psych200679224527210.1348/096317905X52607 ArthurDQuesterPWho’s afraid of that ad? Applying segmentation to the protection motivation modelPsychol Market20042167169610.1002/mar.20024 ChanMWoonIKankanhalliAPerceptions of information security at the workplace: linking information security climate to compliant behaviourJ Inf Priv Security2005131841 KacenJJLeeJAThe influence of culture on consumer impulsive buying behaviourJ Consum Psychol200212216317610.1207/S15327663JCP1202_08 Focus online (2008) Illegal passing on of sensitive patient data. http://www.focus.de/finanzen/versicherungen/krankenversicherung/krankenkasse-dak-gibt-patientendaten-weiter_aid_325837.html. Cited 19 February 2011 Tan FB, Urquhart C, Yan S (2004) A conceptual model for online shopping behaviour: trust and national culture. Proceedings of the 5th International Business Research Forum, Temple University, Philadelphia, PA. http://www.fox.temple.edu/conferences/ibrf/2004/Session%203-C,%20Tan,%20Felix.ppt. Cited 6 June 2011 AjzenIMaddenTJPrediction of goal directed behaviour: attitude, intentions and perceived behavioural controlJ Exp Soc Psychol19862245347410.1016/0022-1031(86)90045-4 DavisFDBagozziRPWarshawPRUser acceptance of computer technology: a comparison of two theoretical modelsManage Sci198935982100310.1287/mnsc.35.8.982 Knapp KJ, Marshall TE, Rainer RK, Ford FN (2005) Managerial dimensions in information security: a theoretical model of organizational effectiveness. . ISC2, Framingham, MA and Auburn University, Auburn, AL Peissl W (2003) Prinzipien des Datenschutzes und ihre Verwirklichung im medizinischen Bereich. Vortrag im Rahmen des Seminars „Datenschutz und Biomedizin“, 23.–24.6., University of Vienna, Austria. www.oeaw.ac.at/ita/ebene5/WPgendatenWien.pdf. Cited 6 June 2011 EllenPSWienerJLCobb-WalgrenCThe role of perceived consumer effectiveness in motivating environmentally conscious behaviorsJ Public Policy Mark1991102102117 AjzenIPerceived behavioral control, self-efficacy, locus of control, and the theory of planned behaviorJ Appl Soc Psychol20023266568310.1111/j.1559-1816.2002.tb00236.x RogersRWA protection motivation theory of fear appeals and attitude changeJ Psychol19759119311410.1080/00223980.1975.9915803 BulgurcuBCavusogluHBenbasatIInformation security policy compliance: an empirical study of rationality-based beliefs and information security awarenessMIS Quart2010343523548 PeaceAGGalettaDThongJSoftware piracy in the workplace: a model and empirical testJ Manage Inform Syst2003201153177 Anderson C (2005) Creating the conscientious cybercitizen: an examination of home computer user attitudes and intentions towards security. IN: Tenth INFORMS Conference on Information Systems and Technology (CIST), San Francisco, 2005 Zinnbauer M, Eberl M (2004) Die Überprüfung von Spezifikation und Güte von Strukturgleichungsmodellen: Verfahren und Anwendung. In: Schriftenreihe zur Empirischen Forschung und Quantitativen Unternehmensplanung, vol 21. Ludwig-Maximillans University, Munich, Germany Ajzen I (1988) Attitudes, personality, and behaviour. Dorsey, Chicago, IL, pp 151–166 B Bulgurcu (456_CR13) 2010; 34 RW Rogers (456_CR43) 1975; 91 PA Pavlou (456_CR37) 2002; 3 D Robey (456_CR42) 1979; 22 LK Trevino (456_CR50) 1990; 75 I Ajzen (456_CR3) 2002; 32 K Mathieson (456_CR36) 1991; 2 D Arthur (456_CR9) 2004; 21 I Ajzen (456_CR4) 1980 V Venkatesh (456_CR52) 1996; 27 H Yang (456_CR59) 2003; 38 456_CR16 456_CR15 V Venkatesh (456_CR51) 2000; 11 456_CR12 456_CR11 456_CR55 456_CR10 T Dinev (456_CR20) 2009; 19 D Straub (456_CR47) 1997; 33 456_CR40 S Taylor (456_CR49) 1995; 6 456_CR48 JJ Kacen (456_CR30) 2002; 12 456_CR46 FD Davis (456_CR17) 1989; 35 T Herath (456_CR29) 2009; 18 MS Featherman (456_CR22) 2003; 59 456_CR31 T Würtenberger (456_CR58) 1999; 51 C Spitzmüller (456_CR45) 2006; 79 J Vijanyan (456_CR56) 2009; 43 456_CR39 456_CR38 456_CR32 LR Vijayasarathy (456_CR57) 2003; 41 JE Maddux (456_CR34) 1983; 19 456_CR1 456_CR7 456_CR8 KH Schmidt (456_CR44) 1998; 2 456_CR19 456_CR18 I Ajzen (456_CR2) 1991; 50 Y Malhotra (456_CR35) 1999 M Chan (456_CR14) 2005; 1 V Venkatesh (456_CR54) 2000; 46 V Venkatesh (456_CR53) 1996; 27 456_CR61 456_CR60 456_CR28 NJ Allen (456_CR6) 1990; 1 456_CR27 456_CR26 CK Riemenschneider (456_CR41) 2003; 40 456_CR25 456_CR24 456_CR23 I Ajzen (456_CR5) 1986; 22 456_CR21 P Legris (456_CR33) 2003; 40 |
| References_xml | – reference: LegrisPInghamJCollerettePWhy do people use information technology? A critical review of technology acceptance modelInform Manage20034019120410.1016/S0378-7206(01)00143-4 – reference: MathiesonKPredicting user intentions: comparing the technology-acceptance-model with the theory of planned behaviourInform Syst Res1991217319110.1287/isre.2.3.173 – reference: TaylorSToddPAUnderstanding information technology usage: a test of competing modelsInform Syst Res19956314417610.1287/isre.6.2.144 – reference: AndersonCAgarwalRPracticing safe computing: a multi-method empirical examination of home computer user security behavioural intentionsMIS Quart2005343613643 – reference: KacenJJLeeJAThe influence of culture on consumer impulsive buying behaviourJ Consum Psychol200212216317610.1207/S15327663JCP1202_08 – reference: StraubDKeilMBrennerWTesting the technology acceptance model across culture: a three country studyInform Manage199733111110.1016/S0378-7206(97)00026-8 – reference: VenkateshVDavisFA theoretical extension of the technology acceptance model: four longitudinal field studiesManage Sci200046218620410.1287/mnsc.46.2.186.11926 – reference: RobeyDUser attitudes and management information system useAcad Manage J19792252753810.2307/255742 – reference: VenkateshVDavisFDA model of the perceived ease of use development and testDecision Sci199627345148110.1111/j.1540-5915.1996.tb01822.x – reference: Focus online (2008) Illegal passing on of sensitive patient data. http://www.focus.de/finanzen/versicherungen/krankenversicherung/krankenkasse-dak-gibt-patientendaten-weiter_aid_325837.html. Cited 19 February 2011 – reference: Bulgurcu B (2008) The antecedents of information security policy compliance. MSc Thesis, The University of British Columbia, Canada – reference: EllenPSWienerJLCobb-WalgrenCThe role of perceived consumer effectiveness in motivating environmentally conscious behaviorsJ Public Policy Mark1991102102117 – reference: Ajzen I (1988) Attitudes, personality, and behaviour. Dorsey, Chicago, IL, pp 151–166 – reference: AjzenIMaddenTJPrediction of goal directed behaviour: attitude, intentions and perceived behavioural controlJ Exp Soc Psychol19862245347410.1016/0022-1031(86)90045-4 – reference: ArthurDQuesterPWho’s afraid of that ad? Applying segmentation to the protection motivation modelPsychol Market20042167169610.1002/mar.20024 – reference: MadduxJERogersRWProtection motivation theory and self-efficacy: a revised theory of fear appeals and attitude changeJ Exp Soc Psychol19831946947910.1016/0022-1031(83)90023-9 – reference: AllenNJMeyerJPThe measurement and antecedents of affective, continuance and normative commitment to the organizationJ Occup Psychol19901111810.1111/j.2044-8325.1990.tb00506.x – reference: BulgurcuBCavusogluHBenbasatIInformation security policy compliance: an empirical study of rationality-based beliefs and information security awarenessMIS Quart2010343523548 – reference: AjzenIPerceived behavioral control, self-efficacy, locus of control, and the theory of planned behaviorJ Appl Soc Psychol20023266568310.1111/j.1559-1816.2002.tb00236.x – reference: PeaceAGGalettaDThongJSoftware piracy in the workplace: a model and empirical testJ Manage Inform Syst2003201153177 – reference: Karahanna E, Straub DW, Chervany NL (1999) Information technology adoption across time: a cross-sectional comparson of pre-adoption and post-adoption beliefs. MIS Quart 23(2):183–213. http://www.jstor.org/stable/249751. Cited 6 June 2011 – reference: Peissl W (2003) Prinzipien des Datenschutzes und ihre Verwirklichung im medizinischen Bereich. Vortrag im Rahmen des Seminars „Datenschutz und Biomedizin“, 23.–24.6., University of Vienna, Austria. www.oeaw.ac.at/ita/ebene5/WPgendatenWien.pdf. Cited 6 June 2011 – reference: Fishbein M, Ajzen I (1975) Belief, attitude, intention and behaviour: an introduction to theory and research. Series in Social Psychology, Addison-Wesley, Boston, MA – reference: RogersRWA protection motivation theory of fear appeals and attitude changeJ Psychol19759119311410.1080/00223980.1975.9915803 – reference: WürtenbergerTAkzeptanz von GesetzenKölner Z Soziol Soz1999513938039710.1007/978-3-322-83345-7_15 – reference: DinevTGooJHuQNamKUser behaviour towards protective information technologies: the role of national cultural differencesInform Syst J200919439141210.1111/j.1365-2575.2007.00289.x – reference: Hamburger Morgenpost (2009b) Patient documents in the Internet. http://www.dradio.de/dlf/sendungen/wib/1310932/. Cited 19 February 2011 – reference: Statistisches Bundesamt Deutschland (2008): Gesundheit: Grunddaten der Krankenhäuser 2008. Fachserie 12 Reihe 6.1.1. Statistisches Bundesamt Deutschland, Berlin – reference: VijayasarathyLRPredicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance modelInform Manage200341674776210.1016/j.im.2003.08.011 – reference: Dinev T, Hu Q (2007) The centrality of awareness in the formation of user behavioral intention toward protective information technologies. J Assoc Inform Syst 8(4):386–408. http://aisel.aisnet.org/jais/vol8/iss7/23. Cited 6 June 2011 – reference: MalhotraYGallettaDFExtending the technology acceptance model to account for social influence: theoretical bases and empirical validation. 32nd Hawaii International Conference on System Science1999Maui, HawaiIEEE – reference: PavlouPAChaiLWhat drives electronic commerce across cultures? A cross-cultural empirical investigation of the theory of planned behaviorJ Elect Com Res200234240253 – reference: VenkateshVDeterminants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance modelInform Syst Res200011434236510.1287/isre.11.4.342.11872 – reference: Augsburger Allgemeine (2009) Health insurance companies sold obviously patient data, http://www.augsburger-allgemeine.de/politik/Krankenkassen-verkauften-offensichtlich-Patienten-Daten-id5803031.html. Cited 19 February 2011 – reference: Hayn B (2005) Datenschutz: Anwendungsorientierte Aspekte—Anspruch und Wirklichkeit, am Beispiel des LKH-Univ. Klinikum Graz, Hall in Tyrol. MSc Thesis, LKH-Univ. Klinikum Graz, Austria – reference: VenkateshVMorrisMGDavisGBDavisFDUser acceptance of information technology: toward a unified viewMIS Quart2003273425478 – reference: FeathermanMSPavlouPAPredicting e-services adoption: a perceived risk facets perspectiveInt J Hum-Comput St200359445147410.1016/S1071-5819(03)00111-3 – reference: Pommerening K (1995) Datenschutz in Krankenhausinformationssystemen. Johannes-Gutenberg-Universität, Institut für Medizinische Statistik und Dokumentation, Mainz, Germany. http://www.staff.uni-mainz.de/pommeren/Artikel/vis95.pdf. Cited 6 June 2011 – reference: HerathTRaoHRProtection motivation and deterrence: a framework for security policy compliance in organisationsEur J Inform Syst200918210612510.1057/ejis.2009.6 – reference: SpitzmüllerCStantonJMExamining employee compliance with organizational surveillance and monitoringJ Occup Organ Psych200679224527210.1348/096317905X52607 – reference: DavisFDBagozziRPWarshawPRUser acceptance of computer technology: a comparison of two theoretical modelsManage Sci198935982100310.1287/mnsc.35.8.982 – reference: Knapp KJ, Marshall TE, Rainer RK, Ford FN (2005) Managerial dimensions in information security: a theoretical model of organizational effectiveness. . ISC2, Framingham, MA and Auburn University, Auburn, AL – reference: SchmidtKHHollmannSSodenkampDPsychometrische Eigenschaften und Validität einer deutschen Fassung des “Commitment-Fragebogens” von Allen und Meyer (1990)Z Differ Diag Psychol1998293106 – reference: AjzenIFishbeinMUnderstanding attitudes and predicting social behavior1980Englewood Cliffs, NJPrentice Hall – reference: AjzenITheory of planned behaviourOrgan Behav Hum Dec199150217921110.1016/0749-5978(91)90020-T – reference: VijanyanJPrivacy rules may slow e-health use, study saysComputerworld200943156 – reference: Anderson C (2005) Creating the conscientious cybercitizen: an examination of home computer user attitudes and intentions towards security. IN: Tenth INFORMS Conference on Information Systems and Technology (CIST), San Francisco, 2005 – reference: GefenDStraubDWThe relative importance of perceived ease of use in IS adoption: a study of e-commerce adoptionJ Assoc Inform Syst200011128 – reference: RiemenschneiderCKHarrissonDMykytynPPUnderstanding IT adoption decision in small business: integrating current theoriesInform Manage20034026928510.1016/S0378-7206(02)00010-1 – reference: Zinnbauer M, Eberl M (2004) Die Überprüfung von Spezifikation und Güte von Strukturgleichungsmodellen: Verfahren und Anwendung. In: Schriftenreihe zur Empirischen Forschung und Quantitativen Unternehmensplanung, vol 21. Ludwig-Maximillans University, Munich, Germany – reference: TrevinoLKYoungbloodSABad apples in bad barrels: a causal analysis of ethical decision-making behaviourJ Appl Psychol199075437838510.1037/0021-9010.75.4.378 – reference: YangHYooYIt’s all about attitude: revisiting the technology acceptance modelDecis Support Syst2003381193110.1016/S0167-9236(03)00062-9 – reference: ChanMWoonIKankanhalliAPerceptions of information security at the workplace: linking information security climate to compliant behaviourJ Inf Priv Security2005131841 – reference: Der Westen (2009) Patient data missing. http://www.derwesten.de/nachrichten/wr/2009/6/3/news-121712344/detail.html. Cited 19 February 2011 – reference: Bandura A (1977) Social learning theory. Prentice Hall, Englewood Cliffs, NJ – reference: Tan FB, Urquhart C, Yan S (2004) A conceptual model for online shopping behaviour: trust and national culture. Proceedings of the 5th International Business Research Forum, Temple University, Philadelphia, PA. http://www.fox.temple.edu/conferences/ibrf/2004/Session%203-C,%20Tan,%20Felix.ppt. Cited 6 June 2011 – reference: Culnan M (2004) Bentley survey on consumers and internet security: summary of findings. www.bentley.edu/events/iscw2004/survey_findings.pdf. Cited 6 June 2011 – reference: Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart 13(3):319–339. http://www.jstor.org/stable/249008. Cited 6 June 2011 – reference: Zakour AB (2004) Cultural differences and information technology acceptance. Seventh Annual Conference of the Southern Association for Information Systems (SAIS), http://sais.aisnet.org/sais2004/Zakour.pdf. Cited 6 June 2011 – reference: Hamburger Morgenpost (2009a) UKE scandal around patient documents. http://archiv.mopo.de/archiv/2009/20090228/hamburg/uke_skandal_um_kranken_daten.html. Cited 19 February 2011 – volume: 22 start-page: 453 year: 1986 ident: 456_CR5 publication-title: J Exp Soc Psychol doi: 10.1016/0022-1031(86)90045-4 – ident: 456_CR39 – ident: 456_CR8 doi: 10.2307/25750694 – volume: 32 start-page: 665 year: 2002 ident: 456_CR3 publication-title: J Appl Soc Psychol doi: 10.1111/j.1559-1816.2002.tb00236.x – ident: 456_CR26 – ident: 456_CR60 – volume: 59 start-page: 451 issue: 4 year: 2003 ident: 456_CR22 publication-title: Int J Hum-Comput St doi: 10.1016/S1071-5819(03)00111-3 – volume-title: Understanding attitudes and predicting social behavior year: 1980 ident: 456_CR4 – ident: 456_CR19 doi: 10.17705/1jais.00133 – volume: 41 start-page: 747 issue: 6 year: 2003 ident: 456_CR57 publication-title: Inform Manage doi: 10.1016/j.im.2003.08.011 – ident: 456_CR12 – volume: 11 start-page: 342 issue: 4 year: 2000 ident: 456_CR51 publication-title: Inform Syst Res doi: 10.1287/isre.11.4.342.11872 – volume: 6 start-page: 144 issue: 3 year: 1995 ident: 456_CR49 publication-title: Inform Syst Res doi: 10.1287/isre.6.2.144 – volume: 27 start-page: 451 issue: 3 year: 1996 ident: 456_CR53 publication-title: Decision Sci doi: 10.1111/j.1540-5915.1996.tb01822.x – volume-title: Extending the technology acceptance model to account for social influence: theoretical bases and empirical validation. 32nd Hawaii International Conference on System Science year: 1999 ident: 456_CR35 – ident: 456_CR38 – ident: 456_CR48 – volume: 3 start-page: 240 issue: 4 year: 2002 ident: 456_CR37 publication-title: J Elect Com Res – ident: 456_CR40 doi: 10.1007/978-3-322-91094-3_2 – ident: 456_CR61 – ident: 456_CR23 – volume: 40 start-page: 191 year: 2003 ident: 456_CR33 publication-title: Inform Manage doi: 10.1016/S0378-7206(01)00143-4 – ident: 456_CR7 – ident: 456_CR16 doi: 10.2307/249008 – volume: 2 start-page: 93 year: 1998 ident: 456_CR44 publication-title: Z Differ Diag Psychol – volume: 33 start-page: 1 issue: 1 year: 1997 ident: 456_CR47 publication-title: Inform Manage doi: 10.1016/S0378-7206(97)00026-8 – ident: 456_CR21 doi: 10.1177/074391569101000206 – ident: 456_CR27 – volume: 27 start-page: 451 issue: 3 year: 1996 ident: 456_CR52 publication-title: Decision Sci doi: 10.1111/j.1540-5915.1996.tb01822.x – ident: 456_CR31 doi: 10.2307/249751 – ident: 456_CR18 – ident: 456_CR55 doi: 10.2307/30036540 – volume: 34 start-page: 523 issue: 3 year: 2010 ident: 456_CR13 publication-title: MIS Quart doi: 10.2307/25750690 – volume: 19 start-page: 391 issue: 4 year: 2009 ident: 456_CR20 publication-title: Inform Syst J doi: 10.1111/j.1365-2575.2007.00289.x – volume: 38 start-page: 19 issue: 1 year: 2003 ident: 456_CR59 publication-title: Decis Support Syst doi: 10.1016/S0167-9236(03)00062-9 – ident: 456_CR24 – volume: 1 start-page: 1 issue: 1 year: 1990 ident: 456_CR6 publication-title: J Occup Psychol doi: 10.1111/j.2044-8325.1990.tb00506.x – volume: 46 start-page: 186 issue: 2 year: 2000 ident: 456_CR54 publication-title: Manage Sci doi: 10.1287/mnsc.46.2.186.11926 – ident: 456_CR28 – volume: 51 start-page: 380 issue: 39 year: 1999 ident: 456_CR58 publication-title: Kölner Z Soziol Soz doi: 10.1007/978-3-322-83345-7_15 – volume: 1 start-page: 18 issue: 3 year: 2005 ident: 456_CR14 publication-title: J Inf Priv Security doi: 10.1080/15536548.2005.10855772 – volume: 79 start-page: 245 issue: 2 year: 2006 ident: 456_CR45 publication-title: J Occup Organ Psych doi: 10.1348/096317905X52607 – ident: 456_CR25 doi: 10.17705/1jais.00008 – volume: 2 start-page: 173 year: 1991 ident: 456_CR36 publication-title: Inform Syst Res doi: 10.1287/isre.2.3.173 – volume: 18 start-page: 106 issue: 2 year: 2009 ident: 456_CR29 publication-title: Eur J Inform Syst doi: 10.1057/ejis.2009.6 – volume: 22 start-page: 527 year: 1979 ident: 456_CR42 publication-title: Acad Manage J doi: 10.2307/255742 – volume: 50 start-page: 179 issue: 2 year: 1991 ident: 456_CR2 publication-title: Organ Behav Hum Dec doi: 10.1016/0749-5978(91)90020-T – ident: 456_CR10 – volume: 75 start-page: 378 issue: 4 year: 1990 ident: 456_CR50 publication-title: J Appl Psychol doi: 10.1037/0021-9010.75.4.378 – volume: 40 start-page: 269 year: 2003 ident: 456_CR41 publication-title: Inform Manage doi: 10.1016/S0378-7206(02)00010-1 – ident: 456_CR1 – volume: 21 start-page: 671 year: 2004 ident: 456_CR9 publication-title: Psychol Market doi: 10.1002/mar.20024 – ident: 456_CR46 – volume: 43 start-page: 6 issue: 15 year: 2009 ident: 456_CR56 publication-title: Computerworld – volume: 91 start-page: 93 issue: 1 year: 1975 ident: 456_CR43 publication-title: J Psychol doi: 10.1080/00223980.1975.9915803 – volume: 12 start-page: 163 issue: 2 year: 2002 ident: 456_CR30 publication-title: J Consum Psychol doi: 10.1207/S15327663JCP1202_08 – ident: 456_CR32 – volume: 19 start-page: 469 year: 1983 ident: 456_CR34 publication-title: J Exp Soc Psychol doi: 10.1016/0022-1031(83)90023-9 – ident: 456_CR15 – ident: 456_CR11 – volume: 35 start-page: 982 year: 1989 ident: 456_CR17 publication-title: Manage Sci doi: 10.1287/mnsc.35.8.982 |
| SSID | ssj0033329 ssib060165803 |
| Score | 1.958931 |
| Snippet | Aim
Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in... Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in daily... Aim: Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 253 |
| SubjectTerms | Attitudes Compliance Cybersecurity Employee attitude Epidemiology Gender Health Promotion and Disease Prevention Hospitals Medical personnel Medicine Medicine & Public Health Original Article Personal information Public Health Regulation Security Sensitivity Technology Technology adoption |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bSxwxFD7o-iKI9CZua0sKBaES3E2yM8lDKW3RSsGlFAXfhiSToFBmt93dB_vre84kcatQnycXJic5Obd8H8A7HUYmVMpxV9WRq6AVN7Wc8BZVn6u1E7Gix8nn0-rsUn27mlxtwLS8haGyyqITe0XdzjzFyI8TFBrhvX2c_-LEGkXZ1UKhYTO1QvuhhxjbhC1ByFgD2Pp8Mv3-o-wwwh6Z9HRMSVdLKXseMzy26EtpKUveMz2uk1RORCFEtDK4uX9zrc3RBxnU_mI6fQK72aJkn9IWeAoboXsGOykcx9Iro-fwZx1CZ_gXYb4kaTO7YLZjN5moBIdniX-HzSK7zowiLGRS4MUhSwXofVcK4DKqL-UZ6gEFzEpgYoFjsq-k9LvbF3B5enLx5Yxn2gXucT2WnDDfNapw9C89ejuVjM742CpppdDaCIL8G7XaqWoco5-I4GxU6Nj4Fl3c6L3cg0E368I-MElgPgKtuDp45X3txtpW1pgYhRM2yCGMypI2PmOSEzXGz2aNpkxSaFAKDUmhMUN4f9dlngA5Hmt8UOTU5LO5aNY7aQhv7z7jqaJUie3CbEVtjFQ1mmvjIRwV-f47xH8mfPn4hK9gGw0ukUrNDmCw_L0Kr9GoWbo3eaf-BThl8fE priority: 102 providerName: ProQuest |
| Title | Technology acceptance as an influencing factor of hospital employees’ compliance with data‐protection standards in Germany |
| URI | https://link.springer.com/article/10.1007/s10389-011-0456-9 https://www.proquest.com/docview/1016076509 https://www.proquest.com/docview/1093470641 |
| Volume | 20 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 1613-2238 dateEnd: 20171231 omitProxy: true ssIdentifier: ssj0033329 issn: 0943-1853 databaseCode: 7X7 dateStart: 19970301 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1613-2238 dateEnd: 20171231 omitProxy: true ssIdentifier: ssj0033329 issn: 0943-1853 databaseCode: BENPR dateStart: 19970301 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1613-2238 dateEnd: 20241028 omitProxy: true ssIdentifier: ssj0033329 issn: 0943-1853 databaseCode: 8FG dateStart: 19970301 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVPQU databaseName: Public Health Database customDbUrl: eissn: 1613-2238 dateEnd: 20171231 omitProxy: true ssIdentifier: ssj0033329 issn: 0943-1853 databaseCode: 8C1 dateStart: 19970301 isFulltext: true titleUrlDefault: https://search.proquest.com/publichealth providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1613-2238 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0033329 issn: 0943-1853 databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1613-2238 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0033329 issn: 0943-1853 databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NahsxEB6aBEoglDRNiNvEqNBTy4ItybvS0Q22Q0tCKTW4p0WSJRII65C1D7mUPEKueb08SWcsbZyWJtCL9rD6AY00M5qfbwA-KN_RPpc2s3kRMumVzHQhetkUWZ8tlOUhp-Tkk9P8eCy_THqTlMddN9HujUtyyakfJbsJCu8hkx5K_UyvwUaP0LzwEI95v2G_QggeAfYIexOFUePK_NcUfwqjlYb5l1N0KWuG2_AqKYmsH6n6Gl74agdeniQ3-A5sRWMbizlEb-DXykDOjKNAFaIlMzUzFTtPZUhwJRar67BZYGepXgjzqeRvfX9zx2KA-XIwGWgZxY_e39wmMAckIWtMDzXOy0bE1qvrXRgPBz-OjrNUWCFzuD3zjFDdFTJpfEE6fM_kIljtwlQKI7hSmhOoX2eqrMy7Ibge99YEiU8XN8VHbHBO7MF6Nav8PjBBcD0c9bTCO-lcYbvK5EbrELjlxosWdJodLl1CHafiFxflCi-ZiFIiUUoiSqlb8PFhyGWE3Hiu80FDtjLdvrqMsHmEDdiC9w-_8d6QM8RUfragPlrIAhWybgs-NeR-PMUTC779r97vYBM1LB5jyw5gfX618IeoxcxtG9aKSYGtOupSOxy1YaM_-vl1gN_Pg9Nv39vLc_0bhVfxEQ |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3fTxQxEJ4gPmBCjKKGQ8SaQEgwDXdtb7d9MIaoePx8guTe1rbbBhOzB-wRg3-Uf6Mz2907MZE3nne3TXamM1-n0-8D2NShb0KmHHdZHrkKWnGTyyEvMfS5XDsRM7qcfHKajc7V4Xg4XoDf3V0YaqvsYmITqMuJpxr5bqJCI763j5dXnFSj6HS1k9BIbnEUbn_ilq3-cPAZ7bslxP6Xs08j3qoKcC-lnHKiNNcYoXD75BHMZzI642OppJVCayOI0a5faqeyQYx-KIKzUSFu9yXu4KL3Esd9BI-VxFiC6ycfz9I3MZsMG7GnlAlwukYlDYMC7tS0lN2parq6J6lZiQqUiGG4uZsX52D3n_PZJu3tP4OnLV5le8nBnsNCqFZgORX7WLrD9AJ-zQv0zHpqlCFfYrZmtmLfWxkUHJ4ldR82ieyi1SthoZUcrrdZam9vPqXyMKPuVd4SSaD7sK7sUeOY7CullOr2JZw_yO9_BYvVpAqrwCRRBQnEiHnwyvvcDbTNrDExCidskD3od7-08C3jOQlv_CjmXM1khQKtUJAVCtODndknl4nu476X1zs7Fe3Kr4u5n_bg3ewxrlk6iLFVmNzQO0aqHMHgoAfvO_v-PcR_Jly7f8K3sDQ6Ozkujg9Oj17DE4R2IjW1rcPi9PomvEH4NHUbjc8y-PbQi-QPkJUnww |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3faxQxEB5qBRGkWH_Q02ojKIISepfkdpMHEbGerdXig4V7W5NsgoLsVfdKaf80_7rObLJ3rWDf-ry7CexMZr5MJt8H8FyHoQmFctwVZeQqaMVNKce8xtDnSu1ELOhy8peDYvdQfZqOpyvwt78LQ22VfUzsAnU981Qj305UaMT3th1zW8TXncnbo9-cFKTopLWX00gush9OT3D71r7Z20FbvxBi8uHb-12eFQa4l1LOOdGba4xWuJXyCOwLGZ3xsVbSSqG1EcRuN6y1U8UoRj8WwdmoEMP7Gndz0XuJ496Am6WUhtoJy-kilRPLybgTfkpZAafrFNMwQOCuTUvZn7Cma3ySGpeoWIl4hpvLOXIJfP85q-1S4OQurGXsyt4lZ1uHldDcgzup8MfSfab7cLYs1jPrqWmG_IrZltmG_cySKDg8S0o_bBbZj6xdwkKWH25fstTq3n1KpWJGnaw8k0qgK7G-BNLimOwjpZfm9AEcXsvvfwirzawJG8Ak0QYJxItl8Mr70o20LawxMQonbJADGPa_tPKZ_ZxEOH5VS95mskKFVqjICpUZwKvFJ0eJ-uOqlzd7O1U5CrTV0mcH8GzxGNcvHcrYJsyO6R0jVYnAcDSA1719Lw7xnwkfXT3hFtzC5VF93jvYfwy3EeWJ1N-2CavzP8fhCSKpuXvauSyD79e9Rs4BnpksBg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Technology+acceptance+as+an+influencing+factor+of+hospital+employees%E2%80%99+compliance+with+data%E2%80%90protection+standards+in+Germany&rft.jtitle=Journal+of+public+health&rft.au=Foth%2C+Michael&rft.au=Schusterschitz%2C+Claudia&rft.au=Flatscher%E2%80%90Th%C3%B6ni%2C+Magdalena&rft.date=2012-06-01&rft.pub=Springer-Verlag&rft.issn=0943-1853&rft.eissn=1613-2238&rft.volume=20&rft.issue=3&rft.spage=253&rft.epage=268&rft_id=info:doi/10.1007%2Fs10389-011-0456-9&rft.externalDocID=10_1007_s10389_011_0456_9 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0943-1853&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0943-1853&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0943-1853&client=summon |