Technology acceptance as an influencing factor of hospital employees’ compliance with data‐protection standards in Germany

Aim Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in daily work. However, these regulations are not always respected, as evidenced by the data-protection scandals in Germany of recent years. Subje...

Full description

Saved in:
Bibliographic Details
Published inJournal of public health Vol. 20; no. 3; pp. 253 - 268
Main Authors Foth, Michael, Schusterschitz, Claudia, Flatscher‐Thöni, Magdalena
Format Journal Article
LanguageEnglish
Published Berlin/Heidelberg Springer-Verlag 01.06.2012
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN0943-1853
2198-1833
1613-2238
DOI10.1007/s10389-011-0456-9

Cover

Abstract Aim Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in daily work. However, these regulations are not always respected, as evidenced by the data-protection scandals in Germany of recent years. Subjects and methods In a 2010 survey, data was collected from 557 individuals including administrative staff, nursing staff, physicians, physicians with scientific/research-based work and other health professionals of 26 hospitals in Germany to analyze the factors of relevance with regard to data-protection compliance. Results The acceptance of hospital staff concerning data-protection regulations is significantly influenced by subjective values and personal attitudes. Significant differences related to the acceptance of data-protection rules and regulations can be found in gender or type of hospital. The results show that employees consider rules and regulations to be necessary and important. However damage caused by data security breaches and the likelihood that they will occur, are considered to be less significant. A large impact on individual data-protection compliance can be reported in the subjective norm, which is influenced by the effect of close colleagues and superiors. Conclusion The underlying results of the study at hand demonstrate practical implications which can lead to a high degree of data-protection compliance in the future. The related aspects deserving future investigation of the possible explanations for differences in behavior related to data protection among various occupational groups in hospitals are discussed. Men and women exhibit very different levels of data-protection acceptance, so future efforts to increase sensitivity and awareness of data-protection issues in employees require gender-specific approaches. Another issue that merits investigation is the source of the influence of hospital type on data-protection compliance.
AbstractList Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in daily work. However, these regulations are not always respected, as evidenced by the data-protection scandals in Germany of recent years. In a 2010 survey, data was collected from 557 individuals including administrative staff, nursing staff, physicians, physicians with scientific/research-based work and other health professionals of 26 hospitals in Germany to analyze the factors of relevance with regard to data-protection compliance. The acceptance of hospital staff concerning data-protection regulations is significantly influenced by subjective values and personal attitudes. Significant differences related to the acceptance of data-protection rules and regulations can be found in gender or type of hospital. The results show that employees consider rules and regulations to be necessary and important. However damage caused by data security breaches and the likelihood that they will occur, are considered to be less significant. A large impact on individual data-protection compliance can be reported in the subjective norm, which is influenced by the effect of close colleagues and superiors. The underlying results of the study at hand demonstrate practical implications which can lead to a high degree of data-protection compliance in the future. The related aspects deserving future investigation of the possible explanations for differences in behavior related to data protection among various occupational groups in hospitals are discussed. Men and women exhibit very different levels of data-protection acceptance, so future efforts to increase sensitivity and awareness of data-protection issues in employees require gender-specific approaches. Another issue that merits investigation is the source of the influence of hospital type on data-protection compliance.[PUBLICATION ABSTRACT]
Aim: Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in daily work. However, these regulations are not always respected, as evidenced by the data-protection scandals in Germany of recent years. Subjects and methods: In a 2010 survey, data was collected from 557 individuals including administrative staff, nursing staff, physicians, physicians with scientific/research-based work and other health professionals of 26 hospitals in Germany to analyze the factors of relevance with regard to data-protection compliance. Results: The acceptance of hospital staff concerning data-protection regulations is significantly influenced by subjective values and personal attitudes. Significant differences related to the acceptance of data-protection rules and regulations can be found in gender or type of hospital. The results show that employees consider rules and regulations to be necessary and important. However damage caused by data security breaches and the likelihood that they will occur, are considered to be less significant. A large impact on individual data-protection compliance can be reported in the subjective norm, which is influenced by the effect of close colleagues and superiors. Conclusion: The underlying results of the study at hand demonstrate practical implications which can lead to a high degree of data-protection compliance in the future. The related aspects deserving future investigation of the possible explanations for differences in behavior related to data protection among various occupational groups in hospitals are discussed. Men and women exhibit very different levels of data-protection acceptance, so future efforts to increase sensitivity and awareness of data-protection issues in employees require gender-specific approaches. Another issue that merits investigation is the source of the influence of hospital type on data-protection compliance.
Aim Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in daily work. However, these regulations are not always respected, as evidenced by the data-protection scandals in Germany of recent years. Subjects and methods In a 2010 survey, data was collected from 557 individuals including administrative staff, nursing staff, physicians, physicians with scientific/research-based work and other health professionals of 26 hospitals in Germany to analyze the factors of relevance with regard to data-protection compliance. Results The acceptance of hospital staff concerning data-protection regulations is significantly influenced by subjective values and personal attitudes. Significant differences related to the acceptance of data-protection rules and regulations can be found in gender or type of hospital. The results show that employees consider rules and regulations to be necessary and important. However damage caused by data security breaches and the likelihood that they will occur, are considered to be less significant. A large impact on individual data-protection compliance can be reported in the subjective norm, which is influenced by the effect of close colleagues and superiors. Conclusion The underlying results of the study at hand demonstrate practical implications which can lead to a high degree of data-protection compliance in the future. The related aspects deserving future investigation of the possible explanations for differences in behavior related to data protection among various occupational groups in hospitals are discussed. Men and women exhibit very different levels of data-protection acceptance, so future efforts to increase sensitivity and awareness of data-protection issues in employees require gender-specific approaches. Another issue that merits investigation is the source of the influence of hospital type on data-protection compliance.
Author Foth, Michael
Schusterschitz, Claudia
Flatscher‐Thöni, Magdalena
Author_xml – sequence: 1
  givenname: Michael
  surname: Foth
  fullname: Foth, Michael
  email: michael.foth@umit.at
  organization: Department of Public Health and Health Technology Assessment, UMIT - The Health & Life Sciences University
– sequence: 2
  givenname: Claudia
  surname: Schusterschitz
  fullname: Schusterschitz, Claudia
  organization: Department of Medical Sciences and Management – Institute of Applied Psychology, UMIT - The Health & Life Sciences University
– sequence: 3
  givenname: Magdalena
  surname: Flatscher‐Thöni
  fullname: Flatscher‐Thöni, Magdalena
  organization: Department of Public Health and Health Technology Assessment, UMIT - The Health & Life Sciences University
BookMark eNp9kctqGzEUhkVJoI6TB8hO0E03k-oyF2lZQpsEAt0k60E-c2TLjKWJJFO8KXmEbvt6eZLKcRbF0KzEge87-jn_GTnxwSMhl5xdcca6L4kzqXTFOK9Y3bSV_kBmvOWyEkKqEzJjupYVV438SM5SWjMmpRR6Rn49IKx8GMNyRw0ATtl4QGoSNZ46b8ctenB-Sa2BHCINlq5Cmlw2I8XNNIYdYnp5_kMhlMm9yj9dXtHBZPPy_HuKISNkFzxNZfVg4pDKXnqDcWP87pycWjMmvHh75-Tx-7eH69vq_sfN3fXX-wpKzlwJLjqFC647BaJlrbQLDXaopZFCKS0arQQb1KJuubXQCFwYW_OuhoGJzgLIOfl82FvyPG0x5X7jEuA4Go9hm3rOtKw71ta8oJ-O0HXYRl_SFYq3rGubAs8JP1AQQ0oRbT9FtzFxV6B-30h_aKQvjfT7Rvq90x05UO64v02Oxo3vmuJgpvKLX2L8N9P_pL90j6VD
CitedBy_id crossref_primary_10_1007_s10639_022_11294_z
crossref_primary_10_1057_ejis_2015_9
crossref_primary_10_1177_14604582241296398
crossref_primary_10_1108_IJBM_07_2021_0291
crossref_primary_10_1108_JEIM_02_2020_0052
crossref_primary_10_3390_healthcare10122531
crossref_primary_10_1088_1742_6596_1339_1_012100
crossref_primary_10_2196_17334
crossref_primary_10_1109_TEM_2023_3237789
crossref_primary_10_1007_s10916_017_0833_1
Cites_doi 10.1016/0022-1031(86)90045-4
10.2307/25750694
10.1111/j.1559-1816.2002.tb00236.x
10.1016/S1071-5819(03)00111-3
10.17705/1jais.00133
10.1016/j.im.2003.08.011
10.1287/isre.11.4.342.11872
10.1287/isre.6.2.144
10.1111/j.1540-5915.1996.tb01822.x
10.1007/978-3-322-91094-3_2
10.1016/S0378-7206(01)00143-4
10.2307/249008
10.1016/S0378-7206(97)00026-8
10.1177/074391569101000206
10.2307/249751
10.2307/30036540
10.2307/25750690
10.1111/j.1365-2575.2007.00289.x
10.1016/S0167-9236(03)00062-9
10.1111/j.2044-8325.1990.tb00506.x
10.1287/mnsc.46.2.186.11926
10.1007/978-3-322-83345-7_15
10.1080/15536548.2005.10855772
10.1348/096317905X52607
10.17705/1jais.00008
10.1287/isre.2.3.173
10.1057/ejis.2009.6
10.2307/255742
10.1016/0749-5978(91)90020-T
10.1037/0021-9010.75.4.378
10.1016/S0378-7206(02)00010-1
10.1002/mar.20024
10.1080/00223980.1975.9915803
10.1207/S15327663JCP1202_08
10.1016/0022-1031(83)90023-9
10.1287/mnsc.35.8.982
ContentType Journal Article
Copyright Springer-Verlag 2011
Springer-Verlag 2012
Copyright_xml – notice: Springer-Verlag 2011
– notice: Springer-Verlag 2012
DBID AAYXX
CITATION
3V.
7T2
7X7
7XB
88E
8C1
8FE
8FG
8FI
8FJ
8FK
ABJCF
ABUWG
AEUYN
AFKRA
ATCPS
AZQEC
BENPR
BGLVJ
BHPHI
C1K
CCPQU
DWQXO
FYUFA
GHDGH
GNUQQ
HCIFZ
K9.
L6V
M0S
M1P
M7S
PATMY
PHGZM
PHGZT
PJZUB
PKEHL
PPXIY
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
PYCSY
DOI 10.1007/s10389-011-0456-9
DatabaseName CrossRef
ProQuest Central (Corporate)
Health and Safety Science Abstracts (Full archive)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Public Health Database (ProQuest)
ProQuest SciTech Collection
ProQuest Technology Collection
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest One Sustainability
ProQuest Central UK/Ireland
Agricultural & Environmental Science Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
Natural Science Collection
Environmental Sciences and Pollution Management
ProQuest One Community College
ProQuest Central
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Central Student
SciTech Premium Collection
ProQuest Health & Medical Complete (Alumni)
ProQuest Engineering Collection
ProQuest Health & Medical Collection
Proquest Medical Database
Engineering Database
Environmental Science Database
Proquest Central Premium
ProQuest One Academic (New)
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
Environmental Science Collection
DatabaseTitle CrossRef
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central China
Environmental Sciences and Pollution Management
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest One Sustainability
ProQuest Health & Medical Research Collection
ProQuest Engineering Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
Natural Science Collection
ProQuest Central Korea
Health & Medical Research Collection
Agricultural & Environmental Science Collection
Health & Safety Science Abstracts
ProQuest Central (New)
ProQuest Medical Library (Alumni)
Engineering Collection
Engineering Database
ProQuest Public Health
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
ProQuest Technology Collection
Health Research Premium Collection (Alumni)
ProQuest SciTech Collection
ProQuest Hospital Collection (Alumni)
Environmental Science Collection
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Environmental Science Database
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList ProQuest Central Student
Health & Safety Science Abstracts

Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Public Health
EISSN 1613-2238
EndPage 268
ExternalDocumentID 2669694231
10_1007_s10389_011_0456_9
Genre Feature
GeographicLocations Germany
GeographicLocations_xml – name: Germany
GroupedDBID ---
-53
-5E
-5G
-BR
-EM
-Y2
-~C
.86
.VR
04C
06C
06D
0R~
0VY
1N0
1SB
2.D
203
28-
29L
29~
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2Z-
2~H
30V
3V.
4.4
406
408
409
40D
40E
44B
53G
5GY
5QI
5VS
67Z
6NX
7X7
7XC
88E
8C1
8FE
8FG
8FH
8FI
8FJ
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJJC
AAJKR
AANXM
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABIVO
ABJCF
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABPLI
ABQBU
ABQSL
ABSXP
ABTEG
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACPRK
ACSNA
ACUDM
ACYUM
ACZOJ
ADBBV
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AEOHA
AEPYU
AESKC
AETLH
AEUYN
AEVLU
AEXYK
AFEXP
AFKRA
AFLOW
AFQWF
AFRAH
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHMBA
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
AKMHD
ALIPV
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
ASPBG
ATCPS
AVWKF
AXYYD
AZFZN
B-.
BA0
BBWZM
BDATZ
BENPR
BGLVJ
BGNMA
BHPHI
BMSDO
BPHCQ
BSONS
BVXVI
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
EBLON
EBS
EIHBH
EIOEI
EJD
EN4
ESBYG
F5P
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
FYUFA
G-Y
G-Z
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GRRUI
GXS
H13
HCIFZ
HF~
HG5
HG6
HMCUK
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
KPH
L6V
LAS
LLZTM
M1P
M4Y
M7S
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O-J
O9-
O93
O9G
O9I
O9J
OAM
P19
P9S
PATMY
PF0
PQQKQ
PROAC
PSQYO
PT4
PT5
PTHSS
PYCSY
Q2X
QF4
QN7
QO5
QOK
QOR
QOS
R-Y
R4E
R89
R9I
RHV
RNI
ROL
RPX
RSV
RZK
S16
S1Z
S26
S27
S28
S37
S3B
SAP
SCLPG
SDE
SDH
SDM
SHX
SISQX
SJYHP
SMD
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
SSXJD
STPWE
SZ9
SZN
T13
T16
TSG
TSK
TSV
TT1
TUC
U2A
U9L
UG4
UKHRP
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WJK
WK6
WK8
YLTOR
Z45
Z7W
ZMTXR
ZMU
ZOVNA
AAPKM
AAYXX
ABBRH
ABDBE
ABRTQ
ADHKG
AFDZB
AFOHR
AGQPQ
AHPBZ
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PJZUB
PPXIY
PQGLB
PUEGO
7T2
7XB
8FK
AZQEC
C1K
DWQXO
GNUQQ
K9.
PKEHL
PQEST
PQUKI
PRINS
ID FETCH-LOGICAL-c333t-21278eb1978c26063fb9cfd43a32889259820d8b461ffc52ebaf4174cd027fcc3
IEDL.DBID U2A
ISSN 0943-1853
2198-1833
IngestDate Mon Oct 06 17:59:20 EDT 2025
Tue Oct 07 06:13:59 EDT 2025
Wed Oct 01 04:57:17 EDT 2025
Thu Apr 24 23:00:47 EDT 2025
Fri Feb 21 02:35:00 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Technology acceptance
Hospital
Workplace
Compliance
Security
Data protection
Language English
License http://www.springer.com/tdm
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c333t-21278eb1978c26063fb9cfd43a32889259820d8b461ffc52ebaf4174cd027fcc3
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
PQID 1016076509
PQPubID 326243
PageCount 16
ParticipantIDs proquest_miscellaneous_1093470641
proquest_journals_1016076509
crossref_primary_10_1007_s10389_011_0456_9
crossref_citationtrail_10_1007_s10389_011_0456_9
springer_journals_10_1007_s10389_011_0456_9
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2012-06-01
PublicationDateYYYYMMDD 2012-06-01
PublicationDate_xml – month: 06
  year: 2012
  text: 2012-06-01
  day: 01
PublicationDecade 2010
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
– name: Heidelberg
PublicationSubtitle Zeitschrift für Gesundheitswissenschaften
PublicationTitle Journal of public health
PublicationTitleAbbrev J Public Health
PublicationYear 2012
Publisher Springer-Verlag
Springer Nature B.V
Publisher_xml – name: Springer-Verlag
– name: Springer Nature B.V
References RiemenschneiderCKHarrissonDMykytynPPUnderstanding IT adoption decision in small business: integrating current theoriesInform Manage20034026928510.1016/S0378-7206(02)00010-1
AndersonCAgarwalRPracticing safe computing: a multi-method empirical examination of home computer user security behavioural intentionsMIS Quart2005343613643
VijanyanJPrivacy rules may slow e-health use, study saysComputerworld200943156
WürtenbergerTAkzeptanz von GesetzenKölner Z Soziol Soz1999513938039710.1007/978-3-322-83345-7_15
Hamburger Morgenpost (2009b) Patient documents in the Internet. http://www.dradio.de/dlf/sendungen/wib/1310932/. Cited 19 February 2011
Augsburger Allgemeine (2009) Health insurance companies sold obviously patient data, http://www.augsburger-allgemeine.de/politik/Krankenkassen-verkauften-offensichtlich-Patienten-Daten-id5803031.html. Cited 19 February 2011
Hamburger Morgenpost (2009a) UKE scandal around patient documents. http://archiv.mopo.de/archiv/2009/20090228/hamburg/uke_skandal_um_kranken_daten.html. Cited 19 February 2011
Dinev T, Hu Q (2007) The centrality of awareness in the formation of user behavioral intention toward protective information technologies. J Assoc Inform Syst 8(4):386–408. http://aisel.aisnet.org/jais/vol8/iss7/23. Cited 6 June 2011
FeathermanMSPavlouPAPredicting e-services adoption: a perceived risk facets perspectiveInt J Hum-Comput St200359445147410.1016/S1071-5819(03)00111-3
VenkateshVDavisFA theoretical extension of the technology acceptance model: four longitudinal field studiesManage Sci200046218620410.1287/mnsc.46.2.186.11926
Der Westen (2009) Patient data missing. http://www.derwesten.de/nachrichten/wr/2009/6/3/news-121712344/detail.html. Cited 19 February 2011
MathiesonKPredicting user intentions: comparing the technology-acceptance-model with the theory of planned behaviourInform Syst Res1991217319110.1287/isre.2.3.173
VenkateshVDavisFDA model of the perceived ease of use development and testDecision Sci199627345148110.1111/j.1540-5915.1996.tb01822.x
RobeyDUser attitudes and management information system useAcad Manage J19792252753810.2307/255742
TrevinoLKYoungbloodSABad apples in bad barrels: a causal analysis of ethical decision-making behaviourJ Appl Psychol199075437838510.1037/0021-9010.75.4.378
MalhotraYGallettaDFExtending the technology acceptance model to account for social influence: theoretical bases and empirical validation. 32nd Hawaii International Conference on System Science1999Maui, HawaiIEEE
PavlouPAChaiLWhat drives electronic commerce across cultures? A cross-cultural empirical investigation of the theory of planned behaviorJ Elect Com Res200234240253
VenkateshVMorrisMGDavisGBDavisFDUser acceptance of information technology: toward a unified viewMIS Quart2003273425478
Fishbein M, Ajzen I (1975) Belief, attitude, intention and behaviour: an introduction to theory and research. Series in Social Psychology, Addison-Wesley, Boston, MA
Karahanna E, Straub DW, Chervany NL (1999) Information technology adoption across time: a cross-sectional comparson of pre-adoption and post-adoption beliefs. MIS Quart 23(2):183–213. http://www.jstor.org/stable/249751. Cited 6 June 2011
AjzenITheory of planned behaviourOrgan Behav Hum Dec199150217921110.1016/0749-5978(91)90020-T
GefenDStraubDWThe relative importance of perceived ease of use in IS adoption: a study of e-commerce adoptionJ Assoc Inform Syst200011128
YangHYooYIt’s all about attitude: revisiting the technology acceptance modelDecis Support Syst2003381193110.1016/S0167-9236(03)00062-9
HerathTRaoHRProtection motivation and deterrence: a framework for security policy compliance in organisationsEur J Inform Syst200918210612510.1057/ejis.2009.6
Bulgurcu B (2008) The antecedents of information security policy compliance. MSc Thesis, The University of British Columbia, Canada
VenkateshVDeterminants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance modelInform Syst Res200011434236510.1287/isre.11.4.342.11872
Culnan M (2004) Bentley survey on consumers and internet security: summary of findings. www.bentley.edu/events/iscw2004/survey_findings.pdf. Cited 6 June 2011
DinevTGooJHuQNamKUser behaviour towards protective information technologies: the role of national cultural differencesInform Syst J200919439141210.1111/j.1365-2575.2007.00289.x
Pommerening K (1995) Datenschutz in Krankenhausinformationssystemen. Johannes-Gutenberg-Universität, Institut für Medizinische Statistik und Dokumentation, Mainz, Germany. http://www.staff.uni-mainz.de/pommeren/Artikel/vis95.pdf. Cited 6 June 2011
Hayn B (2005) Datenschutz: Anwendungsorientierte Aspekte—Anspruch und Wirklichkeit, am Beispiel des LKH-Univ. Klinikum Graz, Hall in Tyrol. MSc Thesis, LKH-Univ. Klinikum Graz, Austria
SchmidtKHHollmannSSodenkampDPsychometrische Eigenschaften und Validität einer deutschen Fassung des “Commitment-Fragebogens” von Allen und Meyer (1990)Z Differ Diag Psychol1998293106
AjzenIFishbeinMUnderstanding attitudes and predicting social behavior1980Englewood Cliffs, NJPrentice Hall
VijayasarathyLRPredicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance modelInform Manage200341674776210.1016/j.im.2003.08.011
Bandura A (1977) Social learning theory. Prentice Hall, Englewood Cliffs, NJ
AllenNJMeyerJPThe measurement and antecedents of affective, continuance and normative commitment to the organizationJ Occup Psychol19901111810.1111/j.2044-8325.1990.tb00506.x
LegrisPInghamJCollerettePWhy do people use information technology? A critical review of technology acceptance modelInform Manage20034019120410.1016/S0378-7206(01)00143-4
MadduxJERogersRWProtection motivation theory and self-efficacy: a revised theory of fear appeals and attitude changeJ Exp Soc Psychol19831946947910.1016/0022-1031(83)90023-9
TaylorSToddPAUnderstanding information technology usage: a test of competing modelsInform Syst Res19956314417610.1287/isre.6.2.144
Zakour AB (2004) Cultural differences and information technology acceptance. Seventh Annual Conference of the Southern Association for Information Systems (SAIS), http://sais.aisnet.org/sais2004/Zakour.pdf. Cited 6 June 2011
Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart 13(3):319–339. http://www.jstor.org/stable/249008. Cited 6 June 2011
StraubDKeilMBrennerWTesting the technology acceptance model across culture: a three country studyInform Manage199733111110.1016/S0378-7206(97)00026-8
Statistisches Bundesamt Deutschland (2008): Gesundheit: Grunddaten der Krankenhäuser 2008. Fachserie 12 Reihe 6.1.1. Statistisches Bundesamt Deutschland, Berlin
SpitzmüllerCStantonJMExamining employee compliance with organizational surveillance and monitoringJ Occup Organ Psych200679224527210.1348/096317905X52607
ArthurDQuesterPWho’s afraid of that ad? Applying segmentation to the protection motivation modelPsychol Market20042167169610.1002/mar.20024
ChanMWoonIKankanhalliAPerceptions of information security at the workplace: linking information security climate to compliant behaviourJ Inf Priv Security2005131841
KacenJJLeeJAThe influence of culture on consumer impulsive buying behaviourJ Consum Psychol200212216317610.1207/S15327663JCP1202_08
Focus online (2008) Illegal passing on of sensitive patient data. http://www.focus.de/finanzen/versicherungen/krankenversicherung/krankenkasse-dak-gibt-patientendaten-weiter_aid_325837.html. Cited 19 February 2011
Tan FB, Urquhart C, Yan S (2004) A conceptual model for online shopping behaviour: trust and national culture. Proceedings of the 5th International Business Research Forum, Temple University, Philadelphia, PA. http://www.fox.temple.edu/conferences/ibrf/2004/Session%203-C,%20Tan,%20Felix.ppt. Cited 6 June 2011
AjzenIMaddenTJPrediction of goal directed behaviour: attitude, intentions and perceived behavioural controlJ Exp Soc Psychol19862245347410.1016/0022-1031(86)90045-4
DavisFDBagozziRPWarshawPRUser acceptance of computer technology: a comparison of two theoretical modelsManage Sci198935982100310.1287/mnsc.35.8.982
Knapp KJ, Marshall TE, Rainer RK, Ford FN (2005) Managerial dimensions in information security: a theoretical model of organizational effectiveness. . ISC2, Framingham, MA and Auburn University, Auburn, AL
Peissl W (2003) Prinzipien des Datenschutzes und ihre Verwirklichung im medizinischen Bereich. Vortrag im Rahmen des Seminars „Datenschutz und Biomedizin“, 23.–24.6., University of Vienna, Austria. www.oeaw.ac.at/ita/ebene5/WPgendatenWien.pdf. Cited 6 June 2011
EllenPSWienerJLCobb-WalgrenCThe role of perceived consumer effectiveness in motivating environmentally conscious behaviorsJ Public Policy Mark1991102102117
AjzenIPerceived behavioral control, self-efficacy, locus of control, and the theory of planned behaviorJ Appl Soc Psychol20023266568310.1111/j.1559-1816.2002.tb00236.x
RogersRWA protection motivation theory of fear appeals and attitude changeJ Psychol19759119311410.1080/00223980.1975.9915803
BulgurcuBCavusogluHBenbasatIInformation security policy compliance: an empirical study of rationality-based beliefs and information security awarenessMIS Quart2010343523548
PeaceAGGalettaDThongJSoftware piracy in the workplace: a model and empirical testJ Manage Inform Syst2003201153177
Anderson C (2005) Creating the conscientious cybercitizen: an examination of home computer user attitudes and intentions towards security. IN: Tenth INFORMS Conference on Information Systems and Technology (CIST), San Francisco, 2005
Zinnbauer M, Eberl M (2004) Die Überprüfung von Spezifikation und Güte von Strukturgleichungsmodellen: Verfahren und Anwendung. In: Schriftenreihe zur Empirischen Forschung und Quantitativen Unternehmensplanung, vol 21. Ludwig-Maximillans University, Munich, Germany
Ajzen I (1988) Attitudes, personality, and behaviour. Dorsey, Chicago, IL, pp 151–166
B Bulgurcu (456_CR13) 2010; 34
RW Rogers (456_CR43) 1975; 91
PA Pavlou (456_CR37) 2002; 3
D Robey (456_CR42) 1979; 22
LK Trevino (456_CR50) 1990; 75
I Ajzen (456_CR3) 2002; 32
K Mathieson (456_CR36) 1991; 2
D Arthur (456_CR9) 2004; 21
I Ajzen (456_CR4) 1980
V Venkatesh (456_CR52) 1996; 27
H Yang (456_CR59) 2003; 38
456_CR16
456_CR15
V Venkatesh (456_CR51) 2000; 11
456_CR12
456_CR11
456_CR55
456_CR10
T Dinev (456_CR20) 2009; 19
D Straub (456_CR47) 1997; 33
456_CR40
S Taylor (456_CR49) 1995; 6
456_CR48
JJ Kacen (456_CR30) 2002; 12
456_CR46
FD Davis (456_CR17) 1989; 35
T Herath (456_CR29) 2009; 18
MS Featherman (456_CR22) 2003; 59
456_CR31
T Würtenberger (456_CR58) 1999; 51
C Spitzmüller (456_CR45) 2006; 79
J Vijanyan (456_CR56) 2009; 43
456_CR39
456_CR38
456_CR32
LR Vijayasarathy (456_CR57) 2003; 41
JE Maddux (456_CR34) 1983; 19
456_CR1
456_CR7
456_CR8
KH Schmidt (456_CR44) 1998; 2
456_CR19
456_CR18
I Ajzen (456_CR2) 1991; 50
Y Malhotra (456_CR35) 1999
M Chan (456_CR14) 2005; 1
V Venkatesh (456_CR54) 2000; 46
V Venkatesh (456_CR53) 1996; 27
456_CR61
456_CR60
456_CR28
NJ Allen (456_CR6) 1990; 1
456_CR27
456_CR26
CK Riemenschneider (456_CR41) 2003; 40
456_CR25
456_CR24
456_CR23
I Ajzen (456_CR5) 1986; 22
456_CR21
P Legris (456_CR33) 2003; 40
References_xml – reference: LegrisPInghamJCollerettePWhy do people use information technology? A critical review of technology acceptance modelInform Manage20034019120410.1016/S0378-7206(01)00143-4
– reference: MathiesonKPredicting user intentions: comparing the technology-acceptance-model with the theory of planned behaviourInform Syst Res1991217319110.1287/isre.2.3.173
– reference: TaylorSToddPAUnderstanding information technology usage: a test of competing modelsInform Syst Res19956314417610.1287/isre.6.2.144
– reference: AndersonCAgarwalRPracticing safe computing: a multi-method empirical examination of home computer user security behavioural intentionsMIS Quart2005343613643
– reference: KacenJJLeeJAThe influence of culture on consumer impulsive buying behaviourJ Consum Psychol200212216317610.1207/S15327663JCP1202_08
– reference: StraubDKeilMBrennerWTesting the technology acceptance model across culture: a three country studyInform Manage199733111110.1016/S0378-7206(97)00026-8
– reference: VenkateshVDavisFA theoretical extension of the technology acceptance model: four longitudinal field studiesManage Sci200046218620410.1287/mnsc.46.2.186.11926
– reference: RobeyDUser attitudes and management information system useAcad Manage J19792252753810.2307/255742
– reference: VenkateshVDavisFDA model of the perceived ease of use development and testDecision Sci199627345148110.1111/j.1540-5915.1996.tb01822.x
– reference: Focus online (2008) Illegal passing on of sensitive patient data. http://www.focus.de/finanzen/versicherungen/krankenversicherung/krankenkasse-dak-gibt-patientendaten-weiter_aid_325837.html. Cited 19 February 2011
– reference: Bulgurcu B (2008) The antecedents of information security policy compliance. MSc Thesis, The University of British Columbia, Canada
– reference: EllenPSWienerJLCobb-WalgrenCThe role of perceived consumer effectiveness in motivating environmentally conscious behaviorsJ Public Policy Mark1991102102117
– reference: Ajzen I (1988) Attitudes, personality, and behaviour. Dorsey, Chicago, IL, pp 151–166
– reference: AjzenIMaddenTJPrediction of goal directed behaviour: attitude, intentions and perceived behavioural controlJ Exp Soc Psychol19862245347410.1016/0022-1031(86)90045-4
– reference: ArthurDQuesterPWho’s afraid of that ad? Applying segmentation to the protection motivation modelPsychol Market20042167169610.1002/mar.20024
– reference: MadduxJERogersRWProtection motivation theory and self-efficacy: a revised theory of fear appeals and attitude changeJ Exp Soc Psychol19831946947910.1016/0022-1031(83)90023-9
– reference: AllenNJMeyerJPThe measurement and antecedents of affective, continuance and normative commitment to the organizationJ Occup Psychol19901111810.1111/j.2044-8325.1990.tb00506.x
– reference: BulgurcuBCavusogluHBenbasatIInformation security policy compliance: an empirical study of rationality-based beliefs and information security awarenessMIS Quart2010343523548
– reference: AjzenIPerceived behavioral control, self-efficacy, locus of control, and the theory of planned behaviorJ Appl Soc Psychol20023266568310.1111/j.1559-1816.2002.tb00236.x
– reference: PeaceAGGalettaDThongJSoftware piracy in the workplace: a model and empirical testJ Manage Inform Syst2003201153177
– reference: Karahanna E, Straub DW, Chervany NL (1999) Information technology adoption across time: a cross-sectional comparson of pre-adoption and post-adoption beliefs. MIS Quart 23(2):183–213. http://www.jstor.org/stable/249751. Cited 6 June 2011
– reference: Peissl W (2003) Prinzipien des Datenschutzes und ihre Verwirklichung im medizinischen Bereich. Vortrag im Rahmen des Seminars „Datenschutz und Biomedizin“, 23.–24.6., University of Vienna, Austria. www.oeaw.ac.at/ita/ebene5/WPgendatenWien.pdf. Cited 6 June 2011
– reference: Fishbein M, Ajzen I (1975) Belief, attitude, intention and behaviour: an introduction to theory and research. Series in Social Psychology, Addison-Wesley, Boston, MA
– reference: RogersRWA protection motivation theory of fear appeals and attitude changeJ Psychol19759119311410.1080/00223980.1975.9915803
– reference: WürtenbergerTAkzeptanz von GesetzenKölner Z Soziol Soz1999513938039710.1007/978-3-322-83345-7_15
– reference: DinevTGooJHuQNamKUser behaviour towards protective information technologies: the role of national cultural differencesInform Syst J200919439141210.1111/j.1365-2575.2007.00289.x
– reference: Hamburger Morgenpost (2009b) Patient documents in the Internet. http://www.dradio.de/dlf/sendungen/wib/1310932/. Cited 19 February 2011
– reference: Statistisches Bundesamt Deutschland (2008): Gesundheit: Grunddaten der Krankenhäuser 2008. Fachserie 12 Reihe 6.1.1. Statistisches Bundesamt Deutschland, Berlin
– reference: VijayasarathyLRPredicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance modelInform Manage200341674776210.1016/j.im.2003.08.011
– reference: Dinev T, Hu Q (2007) The centrality of awareness in the formation of user behavioral intention toward protective information technologies. J Assoc Inform Syst 8(4):386–408. http://aisel.aisnet.org/jais/vol8/iss7/23. Cited 6 June 2011
– reference: MalhotraYGallettaDFExtending the technology acceptance model to account for social influence: theoretical bases and empirical validation. 32nd Hawaii International Conference on System Science1999Maui, HawaiIEEE
– reference: PavlouPAChaiLWhat drives electronic commerce across cultures? A cross-cultural empirical investigation of the theory of planned behaviorJ Elect Com Res200234240253
– reference: VenkateshVDeterminants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance modelInform Syst Res200011434236510.1287/isre.11.4.342.11872
– reference: Augsburger Allgemeine (2009) Health insurance companies sold obviously patient data, http://www.augsburger-allgemeine.de/politik/Krankenkassen-verkauften-offensichtlich-Patienten-Daten-id5803031.html. Cited 19 February 2011
– reference: Hayn B (2005) Datenschutz: Anwendungsorientierte Aspekte—Anspruch und Wirklichkeit, am Beispiel des LKH-Univ. Klinikum Graz, Hall in Tyrol. MSc Thesis, LKH-Univ. Klinikum Graz, Austria
– reference: VenkateshVMorrisMGDavisGBDavisFDUser acceptance of information technology: toward a unified viewMIS Quart2003273425478
– reference: FeathermanMSPavlouPAPredicting e-services adoption: a perceived risk facets perspectiveInt J Hum-Comput St200359445147410.1016/S1071-5819(03)00111-3
– reference: Pommerening K (1995) Datenschutz in Krankenhausinformationssystemen. Johannes-Gutenberg-Universität, Institut für Medizinische Statistik und Dokumentation, Mainz, Germany. http://www.staff.uni-mainz.de/pommeren/Artikel/vis95.pdf. Cited 6 June 2011
– reference: HerathTRaoHRProtection motivation and deterrence: a framework for security policy compliance in organisationsEur J Inform Syst200918210612510.1057/ejis.2009.6
– reference: SpitzmüllerCStantonJMExamining employee compliance with organizational surveillance and monitoringJ Occup Organ Psych200679224527210.1348/096317905X52607
– reference: DavisFDBagozziRPWarshawPRUser acceptance of computer technology: a comparison of two theoretical modelsManage Sci198935982100310.1287/mnsc.35.8.982
– reference: Knapp KJ, Marshall TE, Rainer RK, Ford FN (2005) Managerial dimensions in information security: a theoretical model of organizational effectiveness. . ISC2, Framingham, MA and Auburn University, Auburn, AL
– reference: SchmidtKHHollmannSSodenkampDPsychometrische Eigenschaften und Validität einer deutschen Fassung des “Commitment-Fragebogens” von Allen und Meyer (1990)Z Differ Diag Psychol1998293106
– reference: AjzenIFishbeinMUnderstanding attitudes and predicting social behavior1980Englewood Cliffs, NJPrentice Hall
– reference: AjzenITheory of planned behaviourOrgan Behav Hum Dec199150217921110.1016/0749-5978(91)90020-T
– reference: VijanyanJPrivacy rules may slow e-health use, study saysComputerworld200943156
– reference: Anderson C (2005) Creating the conscientious cybercitizen: an examination of home computer user attitudes and intentions towards security. IN: Tenth INFORMS Conference on Information Systems and Technology (CIST), San Francisco, 2005
– reference: GefenDStraubDWThe relative importance of perceived ease of use in IS adoption: a study of e-commerce adoptionJ Assoc Inform Syst200011128
– reference: RiemenschneiderCKHarrissonDMykytynPPUnderstanding IT adoption decision in small business: integrating current theoriesInform Manage20034026928510.1016/S0378-7206(02)00010-1
– reference: Zinnbauer M, Eberl M (2004) Die Überprüfung von Spezifikation und Güte von Strukturgleichungsmodellen: Verfahren und Anwendung. In: Schriftenreihe zur Empirischen Forschung und Quantitativen Unternehmensplanung, vol 21. Ludwig-Maximillans University, Munich, Germany
– reference: TrevinoLKYoungbloodSABad apples in bad barrels: a causal analysis of ethical decision-making behaviourJ Appl Psychol199075437838510.1037/0021-9010.75.4.378
– reference: YangHYooYIt’s all about attitude: revisiting the technology acceptance modelDecis Support Syst2003381193110.1016/S0167-9236(03)00062-9
– reference: ChanMWoonIKankanhalliAPerceptions of information security at the workplace: linking information security climate to compliant behaviourJ Inf Priv Security2005131841
– reference: Der Westen (2009) Patient data missing. http://www.derwesten.de/nachrichten/wr/2009/6/3/news-121712344/detail.html. Cited 19 February 2011
– reference: Bandura A (1977) Social learning theory. Prentice Hall, Englewood Cliffs, NJ
– reference: Tan FB, Urquhart C, Yan S (2004) A conceptual model for online shopping behaviour: trust and national culture. Proceedings of the 5th International Business Research Forum, Temple University, Philadelphia, PA. http://www.fox.temple.edu/conferences/ibrf/2004/Session%203-C,%20Tan,%20Felix.ppt. Cited 6 June 2011
– reference: Culnan M (2004) Bentley survey on consumers and internet security: summary of findings. www.bentley.edu/events/iscw2004/survey_findings.pdf. Cited 6 June 2011
– reference: Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart 13(3):319–339. http://www.jstor.org/stable/249008. Cited 6 June 2011
– reference: Zakour AB (2004) Cultural differences and information technology acceptance. Seventh Annual Conference of the Southern Association for Information Systems (SAIS), http://sais.aisnet.org/sais2004/Zakour.pdf. Cited 6 June 2011
– reference: Hamburger Morgenpost (2009a) UKE scandal around patient documents. http://archiv.mopo.de/archiv/2009/20090228/hamburg/uke_skandal_um_kranken_daten.html. Cited 19 February 2011
– volume: 22
  start-page: 453
  year: 1986
  ident: 456_CR5
  publication-title: J Exp Soc Psychol
  doi: 10.1016/0022-1031(86)90045-4
– ident: 456_CR39
– ident: 456_CR8
  doi: 10.2307/25750694
– volume: 32
  start-page: 665
  year: 2002
  ident: 456_CR3
  publication-title: J Appl Soc Psychol
  doi: 10.1111/j.1559-1816.2002.tb00236.x
– ident: 456_CR26
– ident: 456_CR60
– volume: 59
  start-page: 451
  issue: 4
  year: 2003
  ident: 456_CR22
  publication-title: Int J Hum-Comput St
  doi: 10.1016/S1071-5819(03)00111-3
– volume-title: Understanding attitudes and predicting social behavior
  year: 1980
  ident: 456_CR4
– ident: 456_CR19
  doi: 10.17705/1jais.00133
– volume: 41
  start-page: 747
  issue: 6
  year: 2003
  ident: 456_CR57
  publication-title: Inform Manage
  doi: 10.1016/j.im.2003.08.011
– ident: 456_CR12
– volume: 11
  start-page: 342
  issue: 4
  year: 2000
  ident: 456_CR51
  publication-title: Inform Syst Res
  doi: 10.1287/isre.11.4.342.11872
– volume: 6
  start-page: 144
  issue: 3
  year: 1995
  ident: 456_CR49
  publication-title: Inform Syst Res
  doi: 10.1287/isre.6.2.144
– volume: 27
  start-page: 451
  issue: 3
  year: 1996
  ident: 456_CR53
  publication-title: Decision Sci
  doi: 10.1111/j.1540-5915.1996.tb01822.x
– volume-title: Extending the technology acceptance model to account for social influence: theoretical bases and empirical validation. 32nd Hawaii International Conference on System Science
  year: 1999
  ident: 456_CR35
– ident: 456_CR38
– ident: 456_CR48
– volume: 3
  start-page: 240
  issue: 4
  year: 2002
  ident: 456_CR37
  publication-title: J Elect Com Res
– ident: 456_CR40
  doi: 10.1007/978-3-322-91094-3_2
– ident: 456_CR61
– ident: 456_CR23
– volume: 40
  start-page: 191
  year: 2003
  ident: 456_CR33
  publication-title: Inform Manage
  doi: 10.1016/S0378-7206(01)00143-4
– ident: 456_CR7
– ident: 456_CR16
  doi: 10.2307/249008
– volume: 2
  start-page: 93
  year: 1998
  ident: 456_CR44
  publication-title: Z Differ Diag Psychol
– volume: 33
  start-page: 1
  issue: 1
  year: 1997
  ident: 456_CR47
  publication-title: Inform Manage
  doi: 10.1016/S0378-7206(97)00026-8
– ident: 456_CR21
  doi: 10.1177/074391569101000206
– ident: 456_CR27
– volume: 27
  start-page: 451
  issue: 3
  year: 1996
  ident: 456_CR52
  publication-title: Decision Sci
  doi: 10.1111/j.1540-5915.1996.tb01822.x
– ident: 456_CR31
  doi: 10.2307/249751
– ident: 456_CR18
– ident: 456_CR55
  doi: 10.2307/30036540
– volume: 34
  start-page: 523
  issue: 3
  year: 2010
  ident: 456_CR13
  publication-title: MIS Quart
  doi: 10.2307/25750690
– volume: 19
  start-page: 391
  issue: 4
  year: 2009
  ident: 456_CR20
  publication-title: Inform Syst J
  doi: 10.1111/j.1365-2575.2007.00289.x
– volume: 38
  start-page: 19
  issue: 1
  year: 2003
  ident: 456_CR59
  publication-title: Decis Support Syst
  doi: 10.1016/S0167-9236(03)00062-9
– ident: 456_CR24
– volume: 1
  start-page: 1
  issue: 1
  year: 1990
  ident: 456_CR6
  publication-title: J Occup Psychol
  doi: 10.1111/j.2044-8325.1990.tb00506.x
– volume: 46
  start-page: 186
  issue: 2
  year: 2000
  ident: 456_CR54
  publication-title: Manage Sci
  doi: 10.1287/mnsc.46.2.186.11926
– ident: 456_CR28
– volume: 51
  start-page: 380
  issue: 39
  year: 1999
  ident: 456_CR58
  publication-title: Kölner Z Soziol Soz
  doi: 10.1007/978-3-322-83345-7_15
– volume: 1
  start-page: 18
  issue: 3
  year: 2005
  ident: 456_CR14
  publication-title: J Inf Priv Security
  doi: 10.1080/15536548.2005.10855772
– volume: 79
  start-page: 245
  issue: 2
  year: 2006
  ident: 456_CR45
  publication-title: J Occup Organ Psych
  doi: 10.1348/096317905X52607
– ident: 456_CR25
  doi: 10.17705/1jais.00008
– volume: 2
  start-page: 173
  year: 1991
  ident: 456_CR36
  publication-title: Inform Syst Res
  doi: 10.1287/isre.2.3.173
– volume: 18
  start-page: 106
  issue: 2
  year: 2009
  ident: 456_CR29
  publication-title: Eur J Inform Syst
  doi: 10.1057/ejis.2009.6
– volume: 22
  start-page: 527
  year: 1979
  ident: 456_CR42
  publication-title: Acad Manage J
  doi: 10.2307/255742
– volume: 50
  start-page: 179
  issue: 2
  year: 1991
  ident: 456_CR2
  publication-title: Organ Behav Hum Dec
  doi: 10.1016/0749-5978(91)90020-T
– ident: 456_CR10
– volume: 75
  start-page: 378
  issue: 4
  year: 1990
  ident: 456_CR50
  publication-title: J Appl Psychol
  doi: 10.1037/0021-9010.75.4.378
– volume: 40
  start-page: 269
  year: 2003
  ident: 456_CR41
  publication-title: Inform Manage
  doi: 10.1016/S0378-7206(02)00010-1
– ident: 456_CR1
– volume: 21
  start-page: 671
  year: 2004
  ident: 456_CR9
  publication-title: Psychol Market
  doi: 10.1002/mar.20024
– ident: 456_CR46
– volume: 43
  start-page: 6
  issue: 15
  year: 2009
  ident: 456_CR56
  publication-title: Computerworld
– volume: 91
  start-page: 93
  issue: 1
  year: 1975
  ident: 456_CR43
  publication-title: J Psychol
  doi: 10.1080/00223980.1975.9915803
– volume: 12
  start-page: 163
  issue: 2
  year: 2002
  ident: 456_CR30
  publication-title: J Consum Psychol
  doi: 10.1207/S15327663JCP1202_08
– ident: 456_CR32
– volume: 19
  start-page: 469
  year: 1983
  ident: 456_CR34
  publication-title: J Exp Soc Psychol
  doi: 10.1016/0022-1031(83)90023-9
– ident: 456_CR15
– ident: 456_CR11
– volume: 35
  start-page: 982
  year: 1989
  ident: 456_CR17
  publication-title: Manage Sci
  doi: 10.1287/mnsc.35.8.982
SSID ssj0033329
ssib060165803
Score 1.958931
Snippet Aim Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in...
Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in daily...
Aim: Data-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 253
SubjectTerms Attitudes
Compliance
Cybersecurity
Employee attitude
Epidemiology
Gender
Health Promotion and Disease Prevention
Hospitals
Medical personnel
Medicine
Medicine & Public Health
Original Article
Personal information
Public Health
Regulation
Security
Sensitivity
Technology
Technology adoption
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bSxwxFD7o-iKI9CZua0sKBaES3E2yM8lDKW3RSsGlFAXfhiSToFBmt93dB_vre84kcatQnycXJic5Obd8H8A7HUYmVMpxV9WRq6AVN7Wc8BZVn6u1E7Gix8nn0-rsUn27mlxtwLS8haGyyqITe0XdzjzFyI8TFBrhvX2c_-LEGkXZ1UKhYTO1QvuhhxjbhC1ByFgD2Pp8Mv3-o-wwwh6Z9HRMSVdLKXseMzy26EtpKUveMz2uk1RORCFEtDK4uX9zrc3RBxnU_mI6fQK72aJkn9IWeAoboXsGOykcx9Iro-fwZx1CZ_gXYb4kaTO7YLZjN5moBIdniX-HzSK7zowiLGRS4MUhSwXofVcK4DKqL-UZ6gEFzEpgYoFjsq-k9LvbF3B5enLx5Yxn2gXucT2WnDDfNapw9C89ejuVjM742CpppdDaCIL8G7XaqWoco5-I4GxU6Nj4Fl3c6L3cg0E368I-MElgPgKtuDp45X3txtpW1pgYhRM2yCGMypI2PmOSEzXGz2aNpkxSaFAKDUmhMUN4f9dlngA5Hmt8UOTU5LO5aNY7aQhv7z7jqaJUie3CbEVtjFQ1mmvjIRwV-f47xH8mfPn4hK9gGw0ukUrNDmCw_L0Kr9GoWbo3eaf-BThl8fE
  priority: 102
  providerName: ProQuest
Title Technology acceptance as an influencing factor of hospital employees’ compliance with data‐protection standards in Germany
URI https://link.springer.com/article/10.1007/s10389-011-0456-9
https://www.proquest.com/docview/1016076509
https://www.proquest.com/docview/1093470641
Volume 20
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1613-2238
  dateEnd: 20171231
  omitProxy: true
  ssIdentifier: ssj0033329
  issn: 0943-1853
  databaseCode: 7X7
  dateStart: 19970301
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1613-2238
  dateEnd: 20171231
  omitProxy: true
  ssIdentifier: ssj0033329
  issn: 0943-1853
  databaseCode: BENPR
  dateStart: 19970301
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1613-2238
  dateEnd: 20241028
  omitProxy: true
  ssIdentifier: ssj0033329
  issn: 0943-1853
  databaseCode: 8FG
  dateStart: 19970301
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Public Health Database
  customDbUrl:
  eissn: 1613-2238
  dateEnd: 20171231
  omitProxy: true
  ssIdentifier: ssj0033329
  issn: 0943-1853
  databaseCode: 8C1
  dateStart: 19970301
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/publichealth
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1613-2238
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0033329
  issn: 0943-1853
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1613-2238
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0033329
  issn: 0943-1853
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NahsxEB6aBEoglDRNiNvEqNBTy4ItybvS0Q22Q0tCKTW4p0WSJRII65C1D7mUPEKueb08SWcsbZyWJtCL9rD6AY00M5qfbwA-KN_RPpc2s3kRMumVzHQhetkUWZ8tlOUhp-Tkk9P8eCy_THqTlMddN9HujUtyyakfJbsJCu8hkx5K_UyvwUaP0LzwEI95v2G_QggeAfYIexOFUePK_NcUfwqjlYb5l1N0KWuG2_AqKYmsH6n6Gl74agdeniQ3-A5sRWMbizlEb-DXykDOjKNAFaIlMzUzFTtPZUhwJRar67BZYGepXgjzqeRvfX9zx2KA-XIwGWgZxY_e39wmMAckIWtMDzXOy0bE1qvrXRgPBz-OjrNUWCFzuD3zjFDdFTJpfEE6fM_kIljtwlQKI7hSmhOoX2eqrMy7Ibge99YEiU8XN8VHbHBO7MF6Nav8PjBBcD0c9bTCO-lcYbvK5EbrELjlxosWdJodLl1CHafiFxflCi-ZiFIiUUoiSqlb8PFhyGWE3Hiu80FDtjLdvrqMsHmEDdiC9w-_8d6QM8RUfragPlrIAhWybgs-NeR-PMUTC779r97vYBM1LB5jyw5gfX618IeoxcxtG9aKSYGtOupSOxy1YaM_-vl1gN_Pg9Nv39vLc_0bhVfxEQ
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3fTxQxEJ4gPmBCjKKGQ8SaQEgwDXdtb7d9MIaoePx8guTe1rbbBhOzB-wRg3-Uf6Mz2907MZE3nne3TXamM1-n0-8D2NShb0KmHHdZHrkKWnGTyyEvMfS5XDsRM7qcfHKajc7V4Xg4XoDf3V0YaqvsYmITqMuJpxr5bqJCI763j5dXnFSj6HS1k9BIbnEUbn_ilq3-cPAZ7bslxP6Xs08j3qoKcC-lnHKiNNcYoXD75BHMZzI642OppJVCayOI0a5faqeyQYx-KIKzUSFu9yXu4KL3Esd9BI-VxFiC6ycfz9I3MZsMG7GnlAlwukYlDYMC7tS0lN2parq6J6lZiQqUiGG4uZsX52D3n_PZJu3tP4OnLV5le8nBnsNCqFZgORX7WLrD9AJ-zQv0zHpqlCFfYrZmtmLfWxkUHJ4ldR82ieyi1SthoZUcrrdZam9vPqXyMKPuVd4SSaD7sK7sUeOY7CullOr2JZw_yO9_BYvVpAqrwCRRBQnEiHnwyvvcDbTNrDExCidskD3od7-08C3jOQlv_CjmXM1khQKtUJAVCtODndknl4nu476X1zs7Fe3Kr4u5n_bg3ewxrlk6iLFVmNzQO0aqHMHgoAfvO_v-PcR_Jly7f8K3sDQ6Ozkujg9Oj17DE4R2IjW1rcPi9PomvEH4NHUbjc8y-PbQi-QPkJUnww
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3faxQxEB5qBRGkWH_Q02ojKIISepfkdpMHEbGerdXig4V7W5NsgoLsVfdKaf80_7rObLJ3rWDf-ry7CexMZr5MJt8H8FyHoQmFctwVZeQqaMVNKce8xtDnSu1ELOhy8peDYvdQfZqOpyvwt78LQ22VfUzsAnU981Qj305UaMT3th1zW8TXncnbo9-cFKTopLWX00gush9OT3D71r7Z20FbvxBi8uHb-12eFQa4l1LOOdGba4xWuJXyCOwLGZ3xsVbSSqG1EcRuN6y1U8UoRj8WwdmoEMP7Gndz0XuJ496Am6WUhtoJy-kilRPLybgTfkpZAafrFNMwQOCuTUvZn7Cma3ySGpeoWIl4hpvLOXIJfP85q-1S4OQurGXsyt4lZ1uHldDcgzup8MfSfab7cLYs1jPrqWmG_IrZltmG_cySKDg8S0o_bBbZj6xdwkKWH25fstTq3n1KpWJGnaw8k0qgK7G-BNLimOwjpZfm9AEcXsvvfwirzawJG8Ak0QYJxItl8Mr70o20LawxMQonbJADGPa_tPKZ_ZxEOH5VS95mskKFVqjICpUZwKvFJ0eJ-uOqlzd7O1U5CrTV0mcH8GzxGNcvHcrYJsyO6R0jVYnAcDSA1719Lw7xnwkfXT3hFtzC5VF93jvYfwy3EeWJ1N-2CavzP8fhCSKpuXvauSyD79e9Rs4BnpksBg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Technology+acceptance+as+an+influencing+factor+of+hospital+employees%E2%80%99+compliance+with+data%E2%80%90protection+standards+in+Germany&rft.jtitle=Journal+of+public+health&rft.au=Foth%2C+Michael&rft.au=Schusterschitz%2C+Claudia&rft.au=Flatscher%E2%80%90Th%C3%B6ni%2C+Magdalena&rft.date=2012-06-01&rft.pub=Springer-Verlag&rft.issn=0943-1853&rft.eissn=1613-2238&rft.volume=20&rft.issue=3&rft.spage=253&rft.epage=268&rft_id=info:doi/10.1007%2Fs10389-011-0456-9&rft.externalDocID=10_1007_s10389_011_0456_9
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0943-1853&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0943-1853&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0943-1853&client=summon