資料載入處理中...
臺灣人文及社會科學引文索引資料庫系統
:::
網站導覽
國圖首頁
聯絡我們
操作說明
English
行動版
(18.221.149.134)
登入
字型:
**字體大小變更功能,需開啟瀏覽器的JAVASCRIPT,如您的瀏覽器不支援,
IE6請利用鍵盤按住ALT鍵 + V → X → (G)最大(L)較大(M)中(S)較小(A)小,來選擇適合您的文字大小,
如為IE7以上、Firefoxy或Chrome瀏覽器則可利用鍵盤 Ctrl + (+)放大 (-)縮小來改變字型大小。
來源文獻查詢
引文查詢
瀏覽查詢
作者權威檔
引用/點閱統計
我的研究室
資料庫說明
相關網站
來源文獻查詢
/
簡易查詢
/
查詢結果列表
/
詳目列表
:::
詳目顯示
第 1 筆 / 總合 1 筆
/1
頁
來源文獻資料
摘要
外文摘要
引文資料
題名:
醫師與非醫師對於電子病歷隱私保護行為意圖之比較研究
書刊名:
臺灣公共衛生雜誌
作者:
郭光明
/
馬震中
/
吳鑫瞬
作者(外文):
Kuo, Kuang-ming
/
Ma, Chen-chung
/
Wu, Hsin-shun
出版日期:
2014
卷期:
33:2
頁次:
頁162-173
主題關鍵詞:
電子病歷
;
隱私保護
;
倫理教育訓練
;
群組分析
;
Electronic medical records
;
EMRs
;
Privacy protection
;
Ethics training
;
Multi-group analysis
原始連結:
連回原系統網址
相關次數:
被引用次數:期刊(
1
) 博士論文(0) 專書(0) 專書論文(0)
排除自我引用:
1
共同引用:
2
點閱:51
目標:本研究主要目的為探討醫院員工保護電子病歷隱私之影響因素,並進一步比較醫師以及醫院其他員工對於保護電子病歷隱私的認知。方法:以計畫行為理論為研究理論基礎,採橫斷性研究,並透過問卷調查法針對南部某大型軍醫院之員工進行立意調查。結果:共蒐集129份有效問卷,資料分析結果顯示態度(AT)、主觀規範(SN)與知覺行為控制(PBC)三個變數和電子病歷隱私保護行為意圖(I)間均呈現顯著正向相關;此外,醫師和醫院其他員工在態度(AT→I)、主觀規範(SN→I)與知覺行為控制(PBC→I)三個變數和保護電子病歷隱私行為意圖之關係呈現顯著差異,醫師在主觀規範(SN→I)和知覺行為控制(PBC→I)兩個變數與保護電子病歷隱私行為意圖之間的關係強度顯著高於其他員工。結論:依據分析結果,本研究建議醫院須積極舉辦電子病歷隱私保護相關教育訓練,並加強醫師的參與度;此外,亦可透過醫院中各單位主管或同儕的影響,並提供員工足夠的電子病歷隱私保護軟硬體,提高員工保護電子病歷隱私的行為意圖,藉由相關措施保護電子病歷隱私,降低民眾的隱私顧慮,將有益於電子病歷之推展。
以文找文
Objectives: The aims of this study were to explore the factors that influenced hospital staff in protecting the privacy of the electronic medical record (EMR) and to conduct a multi-group analysis comparing perceptions about EMR privacy protection by physicians and other hospital staff. Methods: Based on the Theory of Planned Behavior, a cross-sectional survey was conducted to collect data from one military hospital in southern Taiwan. The study subjects were all hospital staff and were recruited via convenience sampling. Results: A total of 129 valid questionnaires was collected. Attitude (AT), subjective norm (SN), and perceived behavioral control (PBC) were positively related to hospital staffs' intention (I) to protect EMR privacy. Moreover, the relationships of AT→I, SN→I, and PBC→I varied significantly between physicians and other hospital staff. Physicians had stronger beliefs about the relationships between SN→I and PBC→I. Conclusions: This study suggested that the subject hospital should offer more training programs pertinent to the protection of EMR privacy. Physicians should also be reminded to engage in these training programs. The hospital could improve staff intention to protect EMR privacy through the influence of the director or their colleagues and also by providing sufficient software and hardware to protect EMR privacy. These measures could decrease patients' concerns about privacy of the EMR and be beneficial to the promotion of the EMR in the future.
以文找文
期刊論文
1.
Ayyagari, R.(2012)。An exploratory analysis of data breaches from 2005-2011: trends and insights。J Inform Privacy Secur,8,33-56。
2.
Bulgurcu, B.、Cavusoglu, H.、Benbasat, I.(2010)。Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness。MIS Quarterly,34(3),523-548。
3.
Elger, B.S.、Iavindrasana, J.、Lo, Iacono L.(2010)。Strategies for health data exchange for secondary, cross-institutional clinical research。Comput Methods Programs Biomed,99,230-251。
4.
Foltz, C.B.、Schwager, P.H.、Anderson, J.E.(2008)。Why users (fail to) read computer usage policies。Ind Manag Data Syst,108,701-702。
5.
Hazari, S.、Hargrave, W.、Clenney, B.(2008)。An empirical investigation of factors influencing information security behavior。J Inform Privacy Secur,4,3-20。
6.
Herath, T.、Rao, H.R.(2009)。Protection motivation and deterrence: a framework for security policy compliance in organisations。Eur J Inform Syst,18,106-125。
7.
Hung, S.Y.、Ku, Y.C.、Chien, J.C.(2012)。Understanding physicians' acceptance of the Medline system for practicing evidence-based medicine: a decomposed TPB model。Int J Med Inform,81,130-142。
8.
Iqbal, U.、Ho, C. H.、Li, Y. C.、Nguyen, P. A.、Jian, W. S.、Wen, H. C.(2013)。The relationship between usage intention and adoption of electronic health records at primary care clinics。Computer Methods and Programs in Biomedicine,112(3),731-737。
9.
Kerr, P.(2009)。Protecting patient information in an electronic age: a sacred trust。Urol Nurs,29,315-318。
10.
Medlin, B.D.、Cazier, J.A.、Foulk, D.P.(2008)。Analyzing the vulnerability of US hospitals to social engineering attacks: how many of your employees would share their password?。Int J Inform Secur Privacy,2,71-83。
11.
Perera, G.、Holbrook, A.、Thabane, L.、Foster, G.、Willison, D.J.(2011)。Views on health information sharing and privacy from primary care practices using electronic medical records。Int J Med Inform,80,94-101。
12.
Yan, H.、Gardner, R.、Baier, R.(2012)。Beyond the focus group: understanding physicians' barriers to electronic medical records。Jt Comm J Qual Patient Saf,38,184-191。
13.
Zhang, J.、Reithel, B.J.、Li, H.(2009)。Impact of perceived technical protection on security behaviors。Inform Manag Comput Secur,17,330-340。
14.
楊沛墩、陳彥臣、黃援傑(20111200)。電子病歷推動現況及檢討建言。病歷資訊管理期刊,10(2),1-11。
延伸查詢
15.
楊漢湶(20120100)。電子病歷與病人隱私權保護。澄清醫護管理雜誌,8(1),4-8。
延伸查詢
16.
溫信財、何政勳、王臻稜(2013)。影響基層診所醫師使用電子病歷滿意度之研究。醫療資訊雜誌,22,1-14。
延伸查詢
17.
Baron, R. M.、Kenny, D. A.(198612)。The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations。Journal of Personality and Social Psychology,51(6),1173-1182。
18.
Keil, Mark、Tan, Bernard C. Y.、Wei, Kwok-Kee、Saarinen, T.、Tuunainen, Virpi、Wassenaar, Arjen(2000)。A Cross-cultural Study on Escalation of Commitment Behavior in Software Projects。MIS Quarterly,24(2),299-325。
19.
Taylor, Shirley、Todd, Peter A.(1995)。Understanding information technology usage: A test of competing models。Information Systems Research,6(2),144-176。
20.
Venkatesh, Viswanath、Morris, Michael G.、Davis, Gordon B.、Davis, Fred D.(2003)。User Acceptance of Information Technology: Toward a Unified View。Management Information Systems Quarterly,27(3),425-478。
21.
Fornell, Claes、Larcker, David F.(1981)。Evaluating Structural Equation Models with Unobservable Variables and Measurement Error。Journal of Marketing Research,18(1),39-50。
22.
Mathieson, Kieran(1991)。Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior。Information Systems Research,2(3),173-191。
23.
Davis, Fred D.(1989)。Perceived Usefulness, Perceived Ease of Use, & User Acceptance of Information Technology。MIS Quarterly,13(3),319-340。
圖書
1.
Hair, J.F.、Hult, G.T.M.、Ringle, C.M.、Sarstedt, M.(2013)。A Primer on Partial Least Squares Structural Equation Modeling。Thousand Oaks:Sage。
2.
衛生福利部(2005)。九十四年度醫療院所病歷電子化現況調查案。台北:衛生福利部。
延伸查詢
其他
1.
U.S. Department of Health and Human Services。Clinical Research and the HIPAA Privacy Rule,http://privacyruleandresearch.nih.gov/clin_research.asp, 2013/01/09。
2.
U.S. Department of Health and Human Services(2002)。Standards for Privacy of Individually Identifiable Health Information,Washington, DC:U.S. Department of Health and Human Services。
3.
中華民國法務部(2013)。個人資料保護法,http://law.moj.gov.tw/LawClass/LawAll.aspx?PCode=I0050021, 2013/01/09。
延伸查詢
4.
衛生福利部(2013)。推動電子病歷專區,http://emr.mohw.gov.tw/news.aspx, 2013/09/22。
延伸查詢
5.
Ringle, C. M.,Wende, S.,Will, A.(2005)。Smart PLS-Version 2.0. Germany: University at Hamburg,http://www.smartpls.de/, 2012/12/23。
圖書論文
1.
Medlin, B.D.、Cazier, J.(2011)。Obtaining patient's information from hospital employees through social engineering techniques: an investigative study。Pervasive Information Security and Privacy Developments: Trends and Advancements。New York:Information Science Reference。
2.
Ajzen, I.(1985)。From intentions to actins: A theory of planned behavior。Action-control: From cognition to behavior。Springer-Verlag。
推文
當script無法執行時可按︰
推文
推薦
當script無法執行時可按︰
推薦
引用網址
當script無法執行時可按︰
引用網址
引用嵌入語法
當script無法執行時可按︰
引用嵌入語法
轉寄
當script無法執行時可按︰
轉寄
top
:::
相關期刊
相關論文
相關專書
相關著作
熱門點閱
1.
以資訊安全觀點探討影響醫師使用電子病歷之研究
2.
工業工程應用於健康事業與醫療照護之回顧與展望
3.
新進住院醫師對電子病歷的看法--以科技持續理論探討
4.
影響基層診所醫師使用電子病歷滿意度之研究
無相關博士論文
無相關書籍
無相關著作
1.
心理治療的隱私和守密
2.
金融人權導論--金融隱私權之法律保護與限制
3.
New Technology, New Information Privacy: Social-Value-Oriented Information Privacy Theory
4.
論資訊隱私:科技與商業發展脈絡下的觀察
5.
國小高年級學童使用社群網站Facebook動機、行為與隱私設置研究
6.
美國醫療資訊保護法規之初探--以HIPAA/HITECH之隱私規則與資安規則為中心
7.
我國健康資料雲端應用之隱私權爭議
8.
資訊隱私顧慮對社群網站使用者使用意圖影響之研究--以Facebook為例
9.
戴震以血氣心知詮釋《孟子》的生命哲學
10.
含基地臺位址之通聯紀錄是否屬合理期待之隱私?--美國第五巡迴上訴法院裁定(724 F.3d 600)
11.
應用延伸型整合科技接受模式探討線上購買意願--以雙媒介之觀點
12.
以自主隱私權之侵害評析我國通姦罪之處罰
13.
智慧電網運作之數據資料與隱私保護--以歐盟法制為例
QR Code