:::

詳目顯示

回上一頁
題名:醫師與非醫師對於電子病歷隱私保護行為意圖之比較研究
書刊名:臺灣公共衛生雜誌
作者:郭光明 引用關係馬震中 引用關係吳鑫瞬
作者(外文):Kuo, Kuang-mingMa, Chen-chungWu, Hsin-shun
出版日期:2014
卷期:33:2
頁次:頁162-173
主題關鍵詞:電子病歷隱私保護倫理教育訓練群組分析Electronic medical recordsEMRsPrivacy protectionEthics trainingMulti-group analysis
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:2
  • 點閱點閱:51
目標:本研究主要目的為探討醫院員工保護電子病歷隱私之影響因素,並進一步比較醫師以及醫院其他員工對於保護電子病歷隱私的認知。方法:以計畫行為理論為研究理論基礎,採橫斷性研究,並透過問卷調查法針對南部某大型軍醫院之員工進行立意調查。結果:共蒐集129份有效問卷,資料分析結果顯示態度(AT)、主觀規範(SN)與知覺行為控制(PBC)三個變數和電子病歷隱私保護行為意圖(I)間均呈現顯著正向相關;此外,醫師和醫院其他員工在態度(AT→I)、主觀規範(SN→I)與知覺行為控制(PBC→I)三個變數和保護電子病歷隱私行為意圖之關係呈現顯著差異,醫師在主觀規範(SN→I)和知覺行為控制(PBC→I)兩個變數與保護電子病歷隱私行為意圖之間的關係強度顯著高於其他員工。結論:依據分析結果,本研究建議醫院須積極舉辦電子病歷隱私保護相關教育訓練,並加強醫師的參與度;此外,亦可透過醫院中各單位主管或同儕的影響,並提供員工足夠的電子病歷隱私保護軟硬體,提高員工保護電子病歷隱私的行為意圖,藉由相關措施保護電子病歷隱私,降低民眾的隱私顧慮,將有益於電子病歷之推展。
Objectives: The aims of this study were to explore the factors that influenced hospital staff in protecting the privacy of the electronic medical record (EMR) and to conduct a multi-group analysis comparing perceptions about EMR privacy protection by physicians and other hospital staff. Methods: Based on the Theory of Planned Behavior, a cross-sectional survey was conducted to collect data from one military hospital in southern Taiwan. The study subjects were all hospital staff and were recruited via convenience sampling. Results: A total of 129 valid questionnaires was collected. Attitude (AT), subjective norm (SN), and perceived behavioral control (PBC) were positively related to hospital staffs' intention (I) to protect EMR privacy. Moreover, the relationships of AT→I, SN→I, and PBC→I varied significantly between physicians and other hospital staff. Physicians had stronger beliefs about the relationships between SN→I and PBC→I. Conclusions: This study suggested that the subject hospital should offer more training programs pertinent to the protection of EMR privacy. Physicians should also be reminded to engage in these training programs. The hospital could improve staff intention to protect EMR privacy through the influence of the director or their colleagues and also by providing sufficient software and hardware to protect EMR privacy. These measures could decrease patients' concerns about privacy of the EMR and be beneficial to the promotion of the EMR in the future.
期刊論文
1.Ayyagari, R.(2012)。An exploratory analysis of data breaches from 2005-2011: trends and insights。J Inform Privacy Secur,8,33-56。  new window
2.Bulgurcu, B.、Cavusoglu, H.、Benbasat, I.(2010)。Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness。MIS Quarterly,34(3),523-548。  new window
3.Elger, B.S.、Iavindrasana, J.、Lo, Iacono L.(2010)。Strategies for health data exchange for secondary, cross-institutional clinical research。Comput Methods Programs Biomed,99,230-251。  new window
4.Foltz, C.B.、Schwager, P.H.、Anderson, J.E.(2008)。Why users (fail to) read computer usage policies。Ind Manag Data Syst,108,701-702。  new window
5.Hazari, S.、Hargrave, W.、Clenney, B.(2008)。An empirical investigation of factors influencing information security behavior。J Inform Privacy Secur,4,3-20。  new window
6.Herath, T.、Rao, H.R.(2009)。Protection motivation and deterrence: a framework for security policy compliance in organisations。Eur J Inform Syst,18,106-125。  new window
7.Hung, S.Y.、Ku, Y.C.、Chien, J.C.(2012)。Understanding physicians' acceptance of the Medline system for practicing evidence-based medicine: a decomposed TPB model。Int J Med Inform,81,130-142。  new window
8.Iqbal, U.、Ho, C. H.、Li, Y. C.、Nguyen, P. A.、Jian, W. S.、Wen, H. C.(2013)。The relationship between usage intention and adoption of electronic health records at primary care clinics。Computer Methods and Programs in Biomedicine,112(3),731-737。  new window
9.Kerr, P.(2009)。Protecting patient information in an electronic age: a sacred trust。Urol Nurs,29,315-318。  new window
10.Medlin, B.D.、Cazier, J.A.、Foulk, D.P.(2008)。Analyzing the vulnerability of US hospitals to social engineering attacks: how many of your employees would share their password?。Int J Inform Secur Privacy,2,71-83。  new window
11.Perera, G.、Holbrook, A.、Thabane, L.、Foster, G.、Willison, D.J.(2011)。Views on health information sharing and privacy from primary care practices using electronic medical records。Int J Med Inform,80,94-101。  new window
12.Yan, H.、Gardner, R.、Baier, R.(2012)。Beyond the focus group: understanding physicians' barriers to electronic medical records。Jt Comm J Qual Patient Saf,38,184-191。  new window
13.Zhang, J.、Reithel, B.J.、Li, H.(2009)。Impact of perceived technical protection on security behaviors。Inform Manag Comput Secur,17,330-340。  new window
14.楊沛墩、陳彥臣、黃援傑(20111200)。電子病歷推動現況及檢討建言。病歷資訊管理期刊,10(2),1-11。  延伸查詢new window
15.楊漢湶(20120100)。電子病歷與病人隱私權保護。澄清醫護管理雜誌,8(1),4-8。  延伸查詢new window
16.溫信財、何政勳、王臻稜(2013)。影響基層診所醫師使用電子病歷滿意度之研究。醫療資訊雜誌,22,1-14。new window  延伸查詢new window
17.Baron, R. M.、Kenny, D. A.(198612)。The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations。Journal of Personality and Social Psychology,51(6),1173-1182。  new window
18.Keil, Mark、Tan, Bernard C. Y.、Wei, Kwok-Kee、Saarinen, T.、Tuunainen, Virpi、Wassenaar, Arjen(2000)。A Cross-cultural Study on Escalation of Commitment Behavior in Software Projects。MIS Quarterly,24(2),299-325。  new window
19.Taylor, Shirley、Todd, Peter A.(1995)。Understanding information technology usage: A test of competing models。Information Systems Research,6(2),144-176。  new window
20.Venkatesh, Viswanath、Morris, Michael G.、Davis, Gordon B.、Davis, Fred D.(2003)。User Acceptance of Information Technology: Toward a Unified View。Management Information Systems Quarterly,27(3),425-478。  new window
21.Fornell, Claes、Larcker, David F.(1981)。Evaluating Structural Equation Models with Unobservable Variables and Measurement Error。Journal of Marketing Research,18(1),39-50。  new window
22.Mathieson, Kieran(1991)。Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior。Information Systems Research,2(3),173-191。  new window
23.Davis, Fred D.(1989)。Perceived Usefulness, Perceived Ease of Use, & User Acceptance of Information Technology。MIS Quarterly,13(3),319-340。  new window
圖書
1.Hair, J.F.、Hult, G.T.M.、Ringle, C.M.、Sarstedt, M.(2013)。A Primer on Partial Least Squares Structural Equation Modeling。Thousand Oaks:Sage。  new window
2.衛生福利部(2005)。九十四年度醫療院所病歷電子化現況調查案。台北:衛生福利部。  延伸查詢new window
其他
1.U.S. Department of Health and Human Services。Clinical Research and the HIPAA Privacy Rule,http://privacyruleandresearch.nih.gov/clin_research.asp, 2013/01/09。  new window
2.U.S. Department of Health and Human Services(2002)。Standards for Privacy of Individually Identifiable Health Information,Washington, DC:U.S. Department of Health and Human Services。  new window
3.中華民國法務部(2013)。個人資料保護法,http://law.moj.gov.tw/LawClass/LawAll.aspx?PCode=I0050021, 2013/01/09。  延伸查詢new window
4.衛生福利部(2013)。推動電子病歷專區,http://emr.mohw.gov.tw/news.aspx, 2013/09/22。  延伸查詢new window
5.Ringle, C. M.,Wende, S.,Will, A.(2005)。Smart PLS-Version 2.0. Germany: University at Hamburg,http://www.smartpls.de/, 2012/12/23。  new window
圖書論文
1.Medlin, B.D.、Cazier, J.(2011)。Obtaining patient's information from hospital employees through social engineering techniques: an investigative study。Pervasive Information Security and Privacy Developments: Trends and Advancements。New York:Information Science Reference。  new window
2.Ajzen, I.(1985)。From intentions to actins: A theory of planned behavior。Action-control: From cognition to behavior。Springer-Verlag。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE