Behavioral Security: Investigating the Attitude of Nursing Students Toward Security Concepts and Practices

Behavioral Security: Investigating the Attitude of Nursing Students Toward Security Concepts and Practices

Stelios Daskalakis (National and Kapodistrian University of Athens, Greece), Maria Katharaki (National and Kapodistrian University of Athens, Greece), Joseph Liaskos (National and Kapodistrian University of Athens, Greece), and John Mantas (National and Kapodistrian University of Athens, Greece)
DOI: 10.4018/978-1-61692-895-7.ch014
OnDemand PDF Download:
No Current Special Offers


Information and computer security are gaining continuous attention in the context of modern organizations across all domains of human activities. Emphasizing on behavioral factors toward the applicability of security measures and practices is an area under research, aiming to look beyond the strict technical peculiarities and investigate human attitudes in regards to security consciousness and familiarity. The aim of this chapter is to shed light on those aspects in relation with healthcare, by empirically assessing the intention of undergraduate nursing students to apply security concepts and practices. A research theoretical framework is proposed based on an empirical synthesis of constructs adopted from well established theories as the Health Belief Model and the Protection Motivation Theory along with a variety of previous research works. The model is then empirically tested and validated against a sample of 149 undergraduate nursing students. Data analysis was performed using partial least squares. The research findings highlighted the significant effects of perceived benefits, general security orientation and self-efficacy to behavioral intention along with the positive effect of general controllability to self-efficacy of nursing students in applying security concepts and practices, whereas a series of other constructs did not prove to be significant. The study outcomes contribute to further observations related with behavioral security. Despite the fact that the current empirical study was conducted under a specific context and settings, implications are discussed, regarding the security readiness of nursing students prior their engagement to a real healthcare environment.
Chapter Preview


In today’s knowledge-based economy, Information and Communication Technology (ICT) is no longer an optional ‘add-on’ or a ‘nice to have’ supporting tool for existing organizational practices. Instead, it tends to be a necessity for every organization that struggles to remain competitive in its corresponding marketplace and expand its scope of business influence. The same necessity applies not only to business-oriented organizations, but to every institutional entity that provides services of any kind. This evolution of ICT in organizations acts as a framework for promoting the quality of services provided, and consequently achieving operational excellence.

Despite the obvious direct and indirect advantages, there are also several security related concerns in current information-oriented organizations (Herath & Rao, 2009). Ensuring information integrity requires continuous monitoring and the protection of information assets is a first class priority within modern organizational structures. Information Systems (IS) are playing a key role in information security, as they are the actual medium for data handling (Ng & Xu, 2007). With regards to IS software applications, they are mainly classified either as “preventive/protective” or “beneficial”, depending on their operational use (Chenoweth, Minch, & Gattiker, 2009; Dinev & Hu, 2005). Typical examples of beneficial applications include word processing, spreadsheets and other similar software. On the contrary, preventive software includes a diversity of applications that provide protection over certain types of threats (Chenoweth et al., 2009; Dinev & Hu, 2005). Typical examples of such software include firewalls, intrusion prevention or detection systems, anti malware (ad-aware, spyware, virus, worm, etc.) software and other.

Complete Chapter List

Search this Book: