alexa Exploratory Factor Analysis of Userand#8217;s Compliance Behaviour towards Health Information Systemand#8217;s Security | OMICS International| Abstract
ISSN: 2157-7420

Journal of Health & Medical Informatics
Open Access

Like us on:

Our Group organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations
700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)
  • Research Article   
  • J Health Med Inform 2013, Vol 4(2)
  • DOI: 10.4172/2157-7420.1000123

Exploratory Factor Analysis of User’s Compliance Behaviour towards Health Information System’s Security

Norshima Humaidi1,2* and Vimala Balakrishnan2
1Faculty of Business and Management, University of technology MARA, Malaysia
2Faculty of Computer Science and Information Technology, University of Malaya, Malaysia
*Corresponding Author : Norshima Humaidi, Faculty of Business and Management, University of technology MARA, Malaysia, Tel: +60196421428, Email: [email protected]

Received Date: Oct 18, 2012 / Accepted Date: Jan 16, 2013 / Published Date: Jan 21, 2013


 One of the main problems in information security was human error due to improper human behaviour. Therefore, this preliminary study was conducted with aims to identify possible factors that can affect user’s compliance behaviour towards information security in terms of two aspects: management support and security technology. Two theories were integrated for development of research framework: I) Theory of Planned Behaviour; II) Theory of Acceptance Model. The respondents of this study were the health professionals and IT officers whereby 42 questionnaires were obtained and verified. Exploratory Factor Analysis (EFA) results revealed that the six factors were obtained: Transactional_Leadership_ Style, Transformational_Leadership_Style, ISP_Training_Support, PU_Security, PU_Security-Countermeasure and PEOU_ISPs. The higher loadings signalled the correlations of the indicated items with the factors on which they were loaded with each of the correspondence factors achieving score of alpha value above 0.80. According to the descriptive analysis, most of the respondents are agreed with all the indicated factors. The preliminary study facilitates researcher in developing new model that integrates TPB and TAM that can be used to increase knowledge of user’s compliance behaviour towards health information system’s security.

Keywords: Information security compliance behaviour; Exploratory factor analysis; Management support; Security technology; Information security effectiveness

Citation: Humaidi N, Balakrishnan V (2013) Exploratory Factor Analysis of User’s Compliance Behaviour towards Health Information System’s Security. J Health Med Inform 4:123. Doi: 10.4172/2157-7420.1000123

Copyright: © 2013 Humaidi N, et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Select your language of interest to view the total content in your interested language

Post Your Comment Citation
Share This Article
Article Usage
  • Total views: 12755
  • [From(publication date): 6-2013 - Dec 15, 2019]
  • Breakdown by view type
  • HTML page views: 8861
  • PDF downloads: 3894