CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

The Role and Impact of Cultural Dimensions on Information Systems Security in Saudi Arabia National Health Service

by Saleh Alumaran, Giampaolo Bella, Feng Chen
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 2
Year of Publication: 2015
Authors: Saleh Alumaran, Giampaolo Bella, Feng Chen
10.5120/19639-1217

Saleh Alumaran, Giampaolo Bella, Feng Chen . The Role and Impact of Cultural Dimensions on Information Systems Security in Saudi Arabia National Health Service. International Journal of Computer Applications. 112, 2 ( February 2015), 21-28. DOI=10.5120/19639-1217

@article{ 10.5120/19639-1217,
author = { Saleh Alumaran, Giampaolo Bella, Feng Chen },
title = { The Role and Impact of Cultural Dimensions on Information Systems Security in Saudi Arabia National Health Service },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 2 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 21-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number2/19639-1217/ },
doi = { 10.5120/19639-1217 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:48:23.161167+05:30
%A Saleh Alumaran
%A Giampaolo Bella
%A Feng Chen
%T The Role and Impact of Cultural Dimensions on Information Systems Security in Saudi Arabia National Health Service
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 2
%P 21-28
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Organisation culture has become an important part of an organisation's strategy to promote its performance and productivity. The study of organisation culture's role on information security has attracted scholars as well as industry leaders to research the topic and find appropriate tools and approaches to develop positive information about security culture. Information security is one of the main concerns of organisation management and has become one of the information management strategies. Healthcare service providers manage, control and transmit large amounts of information in traditional, hardcopy, and electronic records and health service information security has become one of the main challenges of the health services authorities worldwide. Health services in Saudi Arabia have expanded in the last few decades, and the implementation of information security systems has become an essential part of health services. However, the health services lack any framework for the information security culture that the healthcare authority can use and adopt. This study is the first research in the field measuring the role and impact of culture on information management in Saudi Arabia. The research investigated and analysed the role and impact of cultural dimensions on information security in Saudi Arabia health service. Hypotheses were tested and two surveys were carried out in order to collect data and information from three major hospitals in Saudi Arabia (SA). The first survey identified the main cultural-dimension problems in SA health services and developed an initial information security culture framework model. The second survey evaluated and tested the developed framework model to test its usefulness, reliability and applicability. The framework can be used as part of the authority's strategic planning on information security policies, employees' training and the structure and activities of health services.

References
  1. Marchibroda, J. M. (2007). "Health Information Exchange Policy and Evaluation, Journal of Biomedical Informatics", vol. 40, No 6, pp. 11-16.
  2. Eloff, J. H. P and Eloff, M. (2003). "Information Security Management-A New Paradigm", in proc. of The 2003 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on Enablement through Technology (SAICSIST 2003), pp. 130-136.
  3. Da Veiga, A. and Eloff, J. H. P. (2010). "A framework and assessment instrument for information security culture", Computers & Security, vol. 29, no 2, pp. 196-207, 2010.
  4. Hofstede, G. (1980) "Culture's Consequences: International Differences in Work-Related Values. London: Sage Publications.
  5. Hofstede, G. (2001). "Culture's Consequences: Comparing Values, Behaviors, Institutions, and Organisations across Nations. London: Sage Publications.
  6. Stedham, Y. and Yamamura, J. (2004). "Measuring national culture: Does gender matter?" Women in Management Review, 19(5), pp. 233-243.
  7. Huang, D. , Rau, P. P. and Salvendy, G. (2007). "A survey of factors influencing people's perception of information security". In J. Jacko (Ed. ), Human-Computer Interaction, Part IV. Heidelberg: Springer.
  8. Schultz, E. (2005). "The human factor in security". Computers and Security, 24, 42-426.
  9. Lacohee, H. , Phippen, A. D. and Furnell, S. M. (2006). "Risk and restitution: Assessing how users establish online trust". Computers and Security, 25, 486-493.
  10. Chan, M. , Woon, I. & Kankanhalli, A. (2005). "Perceptions of information security at the workplace: Linking information security climate to compliant behavior". Journal of Information Privacy and Security, 1(3), 18-42.
  11. Rotvold, G. (2008). "How to Create a Security Culture in Your Organization?" The Information Management Journal, 33-38.
  12. Thomson, K. , and von Solms, R. (2005). "Information Security Obedience: A Definition". Computers & Security, 24(1), 69-75.
  13. Siponen, M. , & Oinas-Kukkonen, H. (2007). "A Review of Information Security Issues and Respective Research Contributions. SIGMIS Database, 38(1), 60-80.
  14. Workman, M. , Bommer, W. , and Straub, D. (2008). "Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test". Computers in Human Behavior.
  15. Henderson A. , Briggs, J. , Schoonbeek, S. and Paterson, K. (2011). "A framework to develop a clinical learning culture in health facilities: Ideas from the literature". International Nursing Review, 196-202.
  16. Pearcey, P. (2007). "Tasks and routines in 21st century nursing: Student -nurses' perceptions". British Journal of Nursing, 16(5), 296-300.
  17. Ruighaver, A. B. , Maynard, S. B. and Chang M. (2007). "Organisational security culture: Extending the end-user perspective". Computers and Security, 26, 56-62.
  18. Aldajani,M. (2012). "Electronic Patient Record Security Policy in Saudi Arabia National Health Services", PhD Thesis, De Montfort University UK.
Index Terms

Computer Science
Information Sciences

Keywords

Culture Dimension Information Security Electronic Health Records Information Management