<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR Human Factors</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Hum Factors</journal-id>
      <journal-title>JMIR Human Factors</journal-title>
      <issn pub-type="epub">2292-9495</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v8i2e17604</article-id>
      <article-id pub-id-type="pmid">34106077</article-id>
      <article-id pub-id-type="doi">10.2196/17604</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>McCarthy</surname>
            <given-names>Stephen</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Melillo</surname>
            <given-names>Christine</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>McMahon-Grenz</surname>
            <given-names>Julie</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Kujala</surname>
            <given-names>Sari</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Yeng</surname>
            <given-names>Prosper Kandabongee</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Information Security and Communication Technology</institution>
            <institution>Norwegian University of Science and Technology</institution>
            <addr-line>Teknologivegen 22</addr-line>
            <addr-line>Gjøvik</addr-line>
            <country>Norway</country>
            <phone>47 61135400</phone>
            <email>prosper.yeng@ntnu.no</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2553-5936</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Szekeres</surname>
            <given-names>Adam</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-0715-5382</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Yang</surname>
            <given-names>Bian</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6189-1976</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Snekkenes</surname>
            <given-names>Einar Arthur</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-2277-6964</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Information Security and Communication Technology</institution>
        <institution>Norwegian University of Science and Technology</institution>
        <addr-line>Gjøvik</addr-line>
        <country>Norway</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Prosper Kandabongee Yeng <email>prosper.yeng@ntnu.no</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <season>Apr-Jun</season>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>9</day>
        <month>6</month>
        <year>2021</year>
      </pub-date>
      <volume>8</volume>
      <issue>2</issue>
      <elocation-id>e17604</elocation-id>
      <history>
        <date date-type="received">
          <day>24</day>
          <month>12</month>
          <year>2019</year>
        </date>
        <date date-type="rev-request">
          <day>8</day>
          <month>6</month>
          <year>2020</year>
        </date>
        <date date-type="rev-recd">
          <day>25</day>
          <month>7</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>4</day>
          <month>4</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Prosper Kandabongee Yeng, Adam Szekeres, Bian Yang, Einar Arthur Snekkenes. Originally published in JMIR Human Factors (https://humanfactors.jmir.org), 09.06.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Human Factors, is properly cited. The complete bibliographic information, a link to the original publication on https://humanfactors.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://humanfactors.jmir.org/2021/2/e17604" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Data breaches in health care are on the rise, emphasizing the need for a holistic approach to mitigation efforts.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The purpose of this study was to develop a comprehensive framework for modeling and analyzing health care professionals’ information security practices related to their individual characteristics, such as their psychological, social, and cultural traits.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>The study area was a hospital setting under an ongoing project called the Healthcare Security Practice Analysis, Modeling, and Incentivization (HSPAMI) project. A literature review was conducted for relevant theories and information security practices. The theories and security practices were used to develop an ontology and a comprehensive framework consisting of psychological, social, cultural, and demographic variables.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>In the review, a number of psychological, social, and cultural theories were identified, including the health belief model, protection motivation theory, theory of planned behavior, and social control theory, in addition to some social demographic variables, to form a comprehensive set of health care professionals’ characteristics. Furthermore, an ontology was developed from these theories to systematically organize the concepts. The framework, called the psychosociocultural (PSC) framework, was then developed from the various combined psychological and sociocultural attributes of the ontology. The Human Aspect of Information Security Questionnaire was adopted as a comprehensive tool for gathering staff security practices as mediating variables in the framework.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Data breaches occur often in health care today. This frequency has been attributed to the lack of experience of health care professionals in information security, the lack of development of conscious care security practices, and the lack of motivation to incentivize health care professionals. The frequent data breaches in health care threaten the mutual trust between health care professionals and patients, which implicitly impacts the quality of the health care service. The modeling and analysis of health care professionals’ security practices can be conducted with the PSC framework by combining methods of statistical survey, observations, and interviews in relation to PSC variables, such as perceptions (perceived benefits, perceived threats, and perceived barriers) or psychological traits, social factors, cultural factors, and social demographics.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>information security</kwd>
        <kwd>psychological</kwd>
        <kwd>sociocultural</kwd>
        <kwd>health care professionals</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Data breaches in health care are on the rise, emphasizing the need for a holistic approach to risk mitigation. According to IBM’s 2019 report [<xref ref-type="bibr" rid="ref1">1</xref>], the cost of data breaches in the health care sector has remained the highest among all other sectors for the past 9 years. As of 2019, health care organizations registered the highest cost of data breaches (approximately US $6.5 million), which was 60% more than the cost reported by other industries [<xref ref-type="bibr" rid="ref1">1</xref>]. Moreover, cyberattacks in health care are believed to represent a global phenomenon. In 2018, through the aid of a staff member, the health care records of about half the total population of Norway (3 million) were compromised [<xref ref-type="bibr" rid="ref2">2</xref>]. The attack, which was considered as one of the biggest data breaches to have occurred in Norway, was described as a targeted method to access patient data at the Health South East Hospital. As a result, Norwegian citizens wondered whether health care data controllers were adopting reliable measures to secure the massive amount of sensitive health information collected from patients. In another incident, according to HealthCare IT News [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>], a phishing attack compromised 38,000 patient records from Legacy Health based in Portland, Oregon in the United States. Personal data, such as patients’ email accounts, demographic information, dates of birth, health insurance data, billing details, medical data, social security numbers, and driver’s license information, were stolen. In a similar incident [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>], about 1.5 million patient records, including data of the prime minister of Singapore, were breached. It was noted that the cybercriminals began by compromising front-end workstations, giving the attackers access to privileged user credentials. The attackers then escalated privileges to obtain access to the database. The breached data included demographic information, patient identification numbers, and medical information, such as diagnoses and test results. In the United States, about 365 breaches were reported in 2018, and hacking was the leading cause of health care data breaches, followed by other unauthorized access and disclosure incidents [<xref ref-type="bibr" rid="ref5">5</xref>].</p>
        <p>The use of information technology (IT) in health care (like in other sectors) has become indispensable [<xref ref-type="bibr" rid="ref6">6</xref>]. Electronic health records now have multiple connections to health care professionals, patients, insurers, devices, and researchers [<xref ref-type="bibr" rid="ref6">6</xref>]. The multiple points of access available to a larger number of stakeholders translates to multiple entry points and an increased attack surface. Additionally, health care professionals are usually busy with their core roles of restoring patients’ health, so little attention remains for focusing on information security [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref8">8</xref>]. Information security is instead often ignored to allow health care professionals to focus heavily on patients’ timely health restoration, especially in emergency care situations. This trade-off creates opportunities for adversaries to attack and gain access to health care systems [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref9">9</xref>-<xref ref-type="bibr" rid="ref11">11</xref>].</p>
        <p>Perimeter defenses have long been the default mechanism for providing information and network security and have therefore matured over the years. Perimeter defenses refer to securing the boundary between a company’s intranet and the public network (the internet) with physical security systems and technological countermeasures, such as firewalls, intrusion detection and prevention systems, security policy configurations, and antivirus systems [<xref ref-type="bibr" rid="ref12">12</xref>]. Penetration through these perimeter measures is deemed more difficult and requires significant resources. Hackers therefore turn to explore easy entry points. With humans being the most vulnerable link in the security chain, attackers tend to exploit the human element to gain access to systems [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref14">14</xref>].</p>
        <p>The health care context is characterized by high levels of trust between various social and peer groups [<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref16">16</xref>]. This trust exists largely due to the identification of health care personnel through their professional training and socialization process [<xref ref-type="bibr" rid="ref8">8</xref>]. Additionally, all health care practitioners typically value confidentiality as a result of the ethical principles and oaths, such as the Hippocratic Oath, that are core elements in health care professions [<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref16">16</xref>]. This social and cultural bonding of health care professionals was identified as problematic for information security [<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref16">16</xref>]. Health care professionals’ practices can also deliberately or inadvertently cause internal security breaches [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref17">17</xref>]. Furthermore, health care professionals have subtle variant behaviors in the usage of information communication technology in health care, which can threaten the confidentiality, integrity, and availability of personal health information [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>]. The model of confidentiality, integrity, and availability is an information security model, which was developed to provide guidance for developing security policies to meet the availability, integrity, and confidentiality requirements of the assets of organizations [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>]. Various researchers found that two-thirds of employees have contributed to data breaches [<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref20">20</xref>] through mistakes or deliberate actions.</p>
        <p>Security issues in health care have serious consequences [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>]. Besides the potential loss of dignity, patients’ suffering may range from fraud to patient injury or death in health care–related data breaches [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>]. Hospitals also experience a loss of trust and confidence from patients and other users if they experience data breaches. When hospital operations are interrupted, the cost of recovery from breaches is very high, especially in hacking related to ransomware [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. Health care organizations can also face stringent sanctions from regulatory bodies, such as the General Data Protection Regulation (GDPR), or as a result of violating the Health Insurance Portability and Accountability Act (HIPAA) [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref27">27</xref>]. Violations of privacy and security regulations, such as the GDPR, by organizations in Europe could result in fines up to 4% of their annual global turnover or 20 million euros [<xref ref-type="bibr" rid="ref28">28</xref>]. According to the International Organization for Standardization (ISO), the annual estimated losses from cybercrime could reach US $2 trillion in the near future, with countless daily additions of new breaches [<xref ref-type="bibr" rid="ref29">29</xref>].</p>
        <p>To this end, there is a need to assess the security practices of the human element in order to control data breaches in health care. Good security practices have been defined in regulations, policies, standards, guidelines, and codes of conduct, which are required to be implemented with both technical and nontechnical measures. However, to what extent do users comply with the established security policies? What are the challenges often faced by health care workers in their effort to comply with the prescribed security practices while doing their work? Are these security measures in conflict with the health care professionals’ health-related practices? How can the security requirements be improved for effective compliance while improving security effectiveness? How can health care workers be incentivized to better comply with security requirements while conducting their primary work? To protect the very sensitive nature of health care data, the health care domain needs to be properly modeled, assessed, and analyzed from the perspective of all possible entry points to mitigate attacks that are often associated with the psychological, social, cultural, and demographic characteristics of system users [<xref ref-type="bibr" rid="ref30">30</xref>]. We therefore developed a comprehensive framework to uncover security issues caused by the human element termed in this paper as “health care professionals’ security practices.” This paper has been organized as follows. The <italic>Theoretical Background</italic> section provides details of the project, theories, and security practices used in the study, while the <italic>Methods</italic> section describes our adopted method. This is followed by a presentation of the results, followed by discussion of the results.</p>
      </sec>
      <sec>
        <title>Theoretical Background: Psychosociocultural Context</title>
        <p>Amid the increasing frequency of data breaches in health care, all possible methods that can be used to model and analyze health care professionals’ security activities for security metrics should be considered. To this end, the Healthcare Security Practice Analysis, Modeling, and Incentivization (HSPAMI) project was introduced to model and analyze the security practices of health care professionals with the objective of assessing the gap between required security practices and current health care security practices [<xref ref-type="bibr" rid="ref12">12</xref>]. The findings will support the development of solutions or incentives to improve health care professionals’ security behaviors.</p>
        <p>The security practices of health care professionals are influenced by their personal characteristics, such as social demographics, perceptions, and other social and cultural factors. Psychological theories have been used in studies focusing on human behavior where the results could predict human information security practices [<xref ref-type="bibr" rid="ref31">31</xref>]. Individual health care professionals’ security-related behavior can also be linked to their unique activities for constructing unique profiles in access control–related logs, such as browser histories, access logs, and network and operating system logs, in the context of big data [<xref ref-type="bibr" rid="ref32">32</xref>]. Attack and defense simulations can also reveal health care professionals’ security behavioral risk levels. In using health care information systems, employees’ practices, induced by their characteristics, can have a positive or negative impact on information security [<xref ref-type="bibr" rid="ref33">33</xref>]. Password management, physical security measures, users’ responses to phishing attacks, and users’ handling of resources entrusted to them by virtue of their user credentials are all examples of employee security practices [<xref ref-type="bibr" rid="ref4">4</xref>]. The psychosociocultural (PSC) framework discussed in this paper focuses on perception and social, cultural, and sociodemographic variables. Therefore, the PSC framework depends on human behavioral theories, and individual- and work-related demographics [<xref ref-type="bibr" rid="ref13">13</xref>] for assessing behavioral gaps in health care professionals’ security practices. Information security issues in health care can no longer be mitigated by technological countermeasures alone because the problem stems from health care professionals’ security practices, so enhancing “human firewalls” is necessary to mitigate the problem [<xref ref-type="bibr" rid="ref11">11</xref>]. A human firewall involves strengthening the conscious security behaviors of health care workers in order to avoid security malpractices, such as falling victim to social engineering tricks. Strengthening the conscious security behaviors would augment the technological countermeasures, which would then enhance the overall security situation in health care. Frameworks for modeling and analyzing users’ security practices require comprehensive behavioral theories to study health care professionals’ practices for related security metrics and to identify potential mitigation strategies. Significant information security issues relating to psychological, sociocultural, and demographic factors could undermine information security policies and regulations, which could lead to information security violations [<xref ref-type="bibr" rid="ref15">15</xref>].</p>
        <p>PSC characteristics in this study refer to personal aspects, such as perceptions, attitudes, norms, and beliefs, as well as social and cultural factors that can influence the security practice of health care professionals [<xref ref-type="bibr" rid="ref23">23</xref>]. Sociodemographic characteristics in this study include age, gender, education, workload level, work emergency situation, and security experience, while psychological, social, and cultural characteristics as a whole refer to health professionals’ security behaviors that are influenced by their psychological, social, and cultural factors, such as perceptions, workplace peer pressure, attitudes, norms, social bonding, and beliefs [<xref ref-type="bibr" rid="ref23">23</xref>].</p>
        <p>In a security practice analysis, the identified theories are usually related with various security practices. Peasons et al identified internet use, email use, social media use, password management, incident reporting, information handling, and mobile computing as comprehensive security practices in their survey work [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. These security practices encompass a comprehensive list of the security practices that are most prone to security violations and compliance, and represent all sections of an information security policy that are essential to safeguard the confidentiality, integrity, and availability of information [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. These security practices were compiled from the Human Aspect of Information Security Questionnaire (HAIS-Q) and from security standards and policies [<xref ref-type="bibr" rid="ref35">35</xref>]. Other security practices were identified in previous studies [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref36">36</xref>], but the security practices in these studies were less comprehensive as compared to the HAIS-Q. Prior to usage, the HAIS-Q must always be updated to reflect current information security standards and policies [<xref ref-type="bibr" rid="ref37">37</xref>].</p>
      </sec>
      <sec>
        <title>Security Practices</title>
        <p>As outlined in the HAIS-Q, health care professionals’ security practices include the security measures being adopted in the information security usage activities in response to security policies to safeguard the confidentiality, integrity, and availability of health care information systems. The requirements for such practices are usually expressed in regulations, directives, legislations, and security policies and specified in standards, best practices, and codes of conduct. Health care professionals’ security practices include security measures being adopted in the usage of the internet, email, and social media; password management; incident reporting; information handling; and mobile computing [<xref ref-type="bibr" rid="ref24">24</xref>], as required by information security policies and standards. For instance, in password management, how do users respond to periodic password changes as required by some security policies? When modeling human behavior with these theories, independent variables (eg, professionals’ associated characteristics or constructs shown in <xref ref-type="table" rid="table1">Table 1</xref> [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref38">38</xref>-<xref ref-type="bibr" rid="ref40">40</xref>] and <xref rid="figure1" ref-type="fig">Figure 1</xref>) are often explored with mediating variables (<xref rid="figure1" ref-type="fig">Figure 1</xref>), such as the professionals’ security practices [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. Therefore, comprehensive security practices are needed to address those aspects most prone to security violations, to ensure compliance, and to represent all sections of an information security policy that are essential for safeguarding the confidentiality, integrity, and availability of health care resources [<xref ref-type="bibr" rid="ref27">27</xref>].</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Psychological, sociocultural, and demographic constructs.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="200"/>
            <col width="800"/>
            <thead>
              <tr valign="top">
                <td>Construct</td>
                <td>Definition, hypothesis, and the effect on security practice</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Social demographics</td>
                <td>Social demographics refer to professionals’ demographics and work-related factors that influence their security practices [<xref ref-type="bibr" rid="ref18">18</xref>]. Gender, workload, work emergency, role, department, and awareness or experience in information security all influence professionals’ security practices. During health care emergencies or some health care scenarios, health care professionals behave contrary to established security policies if the security measures obstruct health care or threaten patient privacy. Such behaviors adversely impact security [<xref ref-type="bibr" rid="ref8">8</xref>]. Individual differences also influence security practices [<xref ref-type="bibr" rid="ref38">38</xref>].</td>
              </tr>
              <tr valign="top">
                <td>Psychological characteristics</td>
                <td>Psychological characteristics in this study refer to an individual’s traits, perceptions, beliefs, thought processes, etc. These characteristics are influenced by various factors, including environmental factors [<xref ref-type="bibr" rid="ref21">21</xref>]. Perceived threat severity, perceived susceptibility, perceived barriers, perceived self-efficacy, cues to action, attitude or personality, and emotions are some of the psychological characteristics that influence health care professionals’ security practices. If health care professionals increase their awareness of the adverse impact on security, they tend to behave more consciously [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref38">38</xref>].</td>
              </tr>
              <tr valign="top">
                <td>Social factors</td>
                <td>Social factors refer to the influence of peers and other professional groups. Social bonding, peer pressure, and trust level impact health care professionals’ security practices [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. Due to trust and social bonding among health care professionals, conscious care behaviors tend to be adversely affected among them [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref16">16</xref>].</td>
              </tr>
              <tr valign="top">
                <td>Cultural characteristics</td>
                <td>Environmental norms, cultural beliefs, and assumptions impact security practices [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. This study mainly focuses on organizational culture and excludes the potential effect of national cultures. However individuals’ cultural backgrounds also impact security-related behavior [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref40">40</xref>].</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Relating independent variables with security practices.</p>
          </caption>
          <graphic xlink:href="humanfactors_v8i2e17604_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Related Frameworks</title>
        <p>In contributing to security conscious care behavior among health care workers, Humaidi et al developed a conceptual framework for determining the statistical significance of perceptions [<xref ref-type="bibr" rid="ref31">31</xref>]. The study focused on security awareness and security technology related to health care professionals’ security conscious behaviors. Protection motivation theory (PMT) and health belief model attributes were used as independent variables to determine their impact on security awareness and security technology mediating variables.</p>
        <p>Similarly, Cannoy et al employed the technology acceptance model (TAM), the theory of reasoned action (TRA), information assurance and security ethical behavior, organizational culture, and health information management [<xref ref-type="bibr" rid="ref7">7</xref>] to develop a related framework. In the same context, Fernandez-Aleman et al advocated for more security awareness training to enhance good security practices and called for preventive and corrective actions to curtail incidents attributed to health care professionals [<xref ref-type="bibr" rid="ref41">41</xref>]. The researchers studied the PSC context and some social demographic characteristics (age, gender, and experience). The security practices included password management, unauthorized access, disposal of sensitive information, and incidence reporting. The findings of the research provided some knowledge on the security gap between health care professionals’ required and actual information security practices.</p>
        <p>Furthermore, the PMT and theory of planned behavior (TPB) [<xref ref-type="bibr" rid="ref14">14</xref>] were adopted in a study to determine whether information security awareness, information security policy, and experience ultimately impact employee security practices. TPB relies on attitudes, subjective norms, and perceived behaviors to predict human behavior [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>]. The PMT deals with the ability to protect oneself from threats based on the perceived severity of a threat, perceived probability of occurrence or vulnerability, impact of the recommended preventive practices, and perceived self-efficacy [<xref ref-type="bibr" rid="ref14">14</xref>]. Additionally, Hassan et al proposed a conceptual model for determining the drivers of information security culture in the health care context [<xref ref-type="bibr" rid="ref44">44</xref>]. Secondary data were explored for the framework, and the researchers proposed that information security culture is influenced by behavioral change management, information security awareness, security requirements, and organizational systems and knowledge.</p>
        <p>Relatedly, Box et al reviewed the literature and proposed a model for information security compliant security practices within health care environments [<xref ref-type="bibr" rid="ref16">16</xref>]. The researchers aimed to provide an overview of factors that were influencing or discouraging information security compliance. The constructs used in the model included compliance-promoting and misuse-deterrence factors, body of knowledge, attitudes, skills, behavioral interventions, and security compliant behavior.</p>
        <p>In an effort to improve health care professionals’ conscious care behavior, van Deursen et al aimed to understand the sociotechnical risks of information security in the health care sector [<xref ref-type="bibr" rid="ref45">45</xref>]. The study excluded the technical aspects of information security risks but focused on information security risks related to human and organizational factors. The researchers explored security incidents recorded in a central database by the Freedom of Information officers of the Scottish Health Boards and English Care Trusts.</p>
        <p>Various theories are used to model and assess the security practices of users. Cheng et al identified such theories, including the TRA/TPB, general deterrence theory, PMT, and TAM, as the most widely used theories for studying human security practices in the PSC context [<xref ref-type="bibr" rid="ref33">33</xref>]. The systematic review provided knowledge in common theories, but guidelines were not provided on the selection and application of these theories.</p>
        <p>Similarly, Yeng et al surveyed for related theories, security practices, and evaluation methods [<xref ref-type="bibr" rid="ref4">4</xref>]. They found various theories that can be employed in modeling and analyzing health care security practices, as shown in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>; however, the approach was less systematic and lacked a framework.</p>
        <p>Health care security practices are not only impacted by social demographic traits (eg, age, gender, and experience) [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref47">47</xref>] or psychological traits, but also potentially influenced by other critical factors, such as emergency situations and workload, as shown in <xref rid="figure1" ref-type="fig">Figure 1</xref>.</p>
        <p>In view of the shortfall of the above framework to allow for the efficient study of health care professionals’ security practices, we proposed the PSC framework to create a holistic set of health care professionals’ characteristics for analyzing a wide range of security practices.</p>
      </sec>
      <sec>
        <title>Problem Specification, Scope, and Contribution of the Study</title>
        <p>Information security issues attributed to the human element have been recognized to be as important as technological security measures. Therefore, various frameworks have been developed in the PSC context, but none is comprehensive within this study scope. Some of the frameworks were developed to assess only perception variables [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref40">40</xref>]. Other frameworks adopted only social constructs [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>] or cultural factors [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref49">49</xref>]. However, in a scenario where a study must be conducted with the aim of comprehensively understanding and addressing the information security challenges often faced by health care professionals, it is important to know which of the existing frameworks will be adequate. The reviewed frameworks [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref44">44</xref>,<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref49">49</xref>-<xref ref-type="bibr" rid="ref66">66</xref>] were not fully comprehensive. Meanwhile, security issues are affected by all these aspects and not just psychological, social, cultural, or sociodemographic aspects alone [<xref ref-type="bibr" rid="ref38">38</xref>]. Therefore, a framework that can include all these aspects (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>) will be a comprehensive one. Furthermore, it is necessary to systematically structure the knowledge in a way that explicitly shows the connection between concepts in the study domain by using appropriate methods such as a domain ontology.</p>
        <p>This study proposes a holistic framework that consists of psychological, sociodemographic, and sociocultural variables, which can be used to analyze a comprehensive set of health care professionals’ security practices, as shown in <xref ref-type="table" rid="table1">Table 1</xref>.</p>
        <p>The framework builds on studies collected in a literature review, as shown in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>. In order to comprehensively and explicitly represent the domain of interest, we also produced a domain ontology for developing the PSC framework. The purpose of the ontology is to enable the creation of a common understanding among people or software agents within a domain to share, reuse, and analyze domain knowledge [<xref ref-type="bibr" rid="ref67">67</xref>,<xref ref-type="bibr" rid="ref68">68</xref>]. The security issues in health care organizations not only are attributed to health care workers’ behaviors, but also stem from security awareness and organizational factors, such as IT competence of business managers, environment uncertainty, industry type, organizational preparedness, organizational culture, top management support, and organizational size. Various studies identified that organizational factors, including organizational size and industry type, have strong influences on IT [<xref ref-type="bibr" rid="ref69">69</xref>-<xref ref-type="bibr" rid="ref71">71</xref>] and implementation of information security management [<xref ref-type="bibr" rid="ref72">72</xref>]. Notwithstanding, the scope of this study does not cover all organizational factors, but considers organizational factors and top management, with much focus on security issues directly involving health care workers, such as health care professionals who provide therapeutic measures (doctors, nurses, pharmacies, laboratory personnel, radiology officers, etc), IT personnel, health administrators, and finance personnel. The next section outlines the methods used in this study.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>General Approach</title>
        <p>We conducted a literature review of the state-of-the-art theories and security practices in health care in order to develop a holistic framework. According to previous reports [<xref ref-type="bibr" rid="ref73">73</xref>-<xref ref-type="bibr" rid="ref76">76</xref>], there are various types of systematic studies. These include systematic mapping studies and systematic literature reviews. Systematic mapping studies perform reviews of topics in a broader sense by categorizing basic research articles into specific areas of interest. Systematic mapping studies have general research questions aimed at determining research trends or state-of-the-art studies. Systematic literature reviews aim to aggregate evidence and therefore have a relatively specific research goal. To this end, a systematic mapping study was adopted in this work [<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref74">74</xref>]. Based on a review, we built and used an ontology to develop the PSC framework, which covers most of the dimensions of health care professionals’ security-related traits. This framework allows for holistically analyzing health care security practices.</p>
        <p>The literature search was conducted between June 2019 and December 2019 through Google Scholar, Science Direct, Elsevier, IEEE Explore, ACM Digital, PubMed, and Scopus. Different keywords, such as “healthcare,” “health,” “staff,” “employee,” “professional,” “information security,” “behavior,” and “practice” were used. To ensure a good-quality search strategy, the keywords were combined using the Boolean functions “AND,” “OR,” and “NOT.” Peer-reviewed journals and articles were considered. The inclusion and exclusion criteria were developed based on the study objective and through discussions among the authors. Initially, 337 articles were selected by skimming through the titles and keywords for articles that aligned with the inclusion and exclusion criteria. Screening was further applied by quickly reading the abstracts and keywords. Duplicates were then filtered out, and articles that appeared relevant, based on the inclusion and exclusion criteria, were read in their entirety and evaluated. Twenty-six articles were further removed from the study in the full reading and evaluation stage based on various reasons, including limited scope and articles not meeting the inclusion and exclusion criteria. For instance, a study [<xref ref-type="bibr" rid="ref77">77</xref>] looked into security issues in health care using a machine learning approach, but this was out of the scope of this study. Furthermore, another study [<xref ref-type="bibr" rid="ref78">78</xref>] looked into an assessment model for software quality issues in health care, but security was not the main focus. Based on these and other similar reasons, the number of articles included in this study reduced greatly. Other relevant articles were also retrieved through the reference lists found in the literature. <xref rid="figure2" ref-type="fig">Figure 2</xref> presents a Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) flow diagram that clarifies article selection and screening [<xref ref-type="bibr" rid="ref79">79</xref>].</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) flowchart.</p>
          </caption>
          <graphic xlink:href="humanfactors_v8i2e17604_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Inclusion and Exclusion Criteria</title>
        <p>Articles included in the review were required to be about security practices in the health care context and to pertain to health care professionals’ information security behaviors in relation to their work. Other articles, such as those that were not related to the health care context and did not focus on human behavior in health care, were excluded.</p>
      </sec>
      <sec>
        <title>Data Collection and Categorization</title>
        <p>Data collection and categorization were established from the study objective through completion of the literature review and based on discussions of the authors. In order to assess, analyze, and evaluate the study, these categories were exclusively defined as follows:</p>
        <list list-type="order">
          <list-item>
            <p>Theory used: This category included only theories (psychological, social, or cultural theories) used in the study to relate human characteristics to security practices.</p>
          </list-item>
          <list-item>
            <p>Security practice: This category included the security measures (eg, password management, incident reporting, and internet usage) used in the study.</p>
          </list-item>
          <list-item>
            <p>Study type: This category specified the type of study, whether theoretical or empirical. In this study, “empirical” refers to practical studies conducted in the health care context and “theoretical” refers to reviews and proposed frameworks for related studies.</p>
          </list-item>
          <list-item>
            <p>Study context: This category specified what area (eg, psychological, social, cultural, or demographic context) the study covered.</p>
          </list-item>
        </list>
        <p><xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref> presents the categorization of the included literature.</p>
      </sec>
      <sec>
        <title>Literature Evaluation and Analysis</title>
        <p>The selected articles were assessed, analyzed, and evaluated based on the above defined categories. We performed an analysis on each of the categories (theory used, security practice, study type, and study construct) to evaluate the state-of-the-art approaches. The percentages of the attributes for the categories were calculated based on the total number of counts (n) of each attribute type. Some studies used multiple categories; therefore, the number of counts for these categories exceeded the total number of articles in the study.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Literature Review Findings</title>
        <p>This section presents the findings of the literature review, the ontology, and the proposed theoretical framework.</p>
        <p>The searches in the aforementioned online databases resulted in a total of 337 records being initially identified by following the guidelines of the inclusion and exclusion criteria in the reading of titles, abstracts, and keywords. We further screened and selected articles by reading the objective, methods, and conclusion sections of each study, and this led to a further exclusion of 185 articles that did not meet the defined inclusion criteria. A total of 96 duplicates were also removed, and the remaining 56 articles were fully read and appraised. After the full-text reading, a total of 30 articles were included and analyzed in the study (<xref rid="figure2" ref-type="fig">Figure 2</xref>).</p>
        <p><xref ref-type="table" rid="table2">Table 2</xref> presents the theories identified in the literature review [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref53">53</xref>,<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref62">62</xref>,<xref ref-type="bibr" rid="ref65">65</xref>]. The theories that were most often used in analyzing the security practices of health care professionals included the health belief model (n=6), TPB (n=5), general deterrence theory (n=4), PMT (n=4), and technology acceptance theory (n=2), as shown in <xref ref-type="table" rid="table2">Table 2</xref>.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Psychological, social, and cultural theories.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="800"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td>Theory</td>
                <td>Count, n</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Health belief model [<xref ref-type="bibr" rid="ref49">49</xref>]</td>
                <td>6</td>
              </tr>
              <tr valign="top">
                <td>Theory of planned behavior [<xref ref-type="bibr" rid="ref14">14</xref>]</td>
                <td>5</td>
              </tr>
              <tr valign="top">
                <td>General deterrence theory [<xref ref-type="bibr" rid="ref53">53</xref>]</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>Protection motivation theory [<xref ref-type="bibr" rid="ref14">14</xref>]</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>Technology acceptance theory [<xref ref-type="bibr" rid="ref4">4</xref>]</td>
                <td>2</td>
              </tr>
              <tr valign="top">
                <td>Technology threat avoidance theory [<xref ref-type="bibr" rid="ref59">59</xref>]</td>
                <td>1</td>
              </tr>
              <tr valign="top">
                <td>Social bond theory [<xref ref-type="bibr" rid="ref11">11</xref>]</td>
                <td>1</td>
              </tr>
              <tr valign="top">
                <td>Situational crime prevention [<xref ref-type="bibr" rid="ref53">53</xref>]</td>
                <td>1</td>
              </tr>
              <tr valign="top">
                <td>Institutional theory [<xref ref-type="bibr" rid="ref62">62</xref>]</td>
                <td>1</td>
              </tr>
              <tr valign="top">
                <td>Grounded theory [<xref ref-type="bibr" rid="ref65">65</xref>]</td>
                <td>1</td>
              </tr>
              <tr valign="top">
                <td>Social control [<xref ref-type="bibr" rid="ref7">7</xref>]</td>
                <td>1</td>
              </tr>
              <tr valign="top">
                <td>The big five theory [<xref ref-type="bibr" rid="ref7">7</xref>]</td>
                <td>1</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>The security practices that were often related with the individual characteristics of the health care professionals at their workplaces included password management (n=6), unauthorized disclosure (n=3), security policy and procedures (n=3), and email use with sensitive data (n=2), as shown in <xref ref-type="table" rid="table3">Table 3</xref> [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref50">50</xref>,<xref ref-type="bibr" rid="ref51">51</xref>,<xref ref-type="bibr" rid="ref60">60</xref>].</p>
        <p>The categories of theories frequently identified included psychology (n=7), demographics (n=6), social (n=3), and cultural (n=3), as shown in <xref ref-type="table" rid="table4">Table 4</xref>.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Security practices.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="800"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td>Security practice</td>
                <td>Count, n</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Password management [<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref51">51</xref>]</td>
                <td>6</td>
              </tr>
              <tr valign="top">
                <td>Security policy and procedure [<xref ref-type="bibr" rid="ref60">60</xref>]</td>
                <td>3</td>
              </tr>
              <tr valign="top">
                <td>Unauthorized discloser [<xref ref-type="bibr" rid="ref60">60</xref>]</td>
                <td>3</td>
              </tr>
              <tr valign="top">
                <td>Email use with sensitive data [<xref ref-type="bibr" rid="ref4">4</xref>]</td>
                <td>2</td>
              </tr>
              <tr valign="top">
                <td>Logging off session [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref50">50</xref>]</td>
                <td>2</td>
              </tr>
              <tr valign="top">
                <td>Emergency access [<xref ref-type="bibr" rid="ref4">4</xref>]</td>
                <td>2</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Categories of the studies identified.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="800"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td>Category</td>
                <td>Count, n</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Psychology</td>
                <td>7</td>
              </tr>
              <tr valign="top">
                <td>Demographics</td>
                <td>6</td>
              </tr>
              <tr valign="top">
                <td>Social</td>
                <td>3</td>
              </tr>
              <tr valign="top">
                <td>Cultural</td>
                <td>3</td>
              </tr>
              <tr valign="top">
                <td>Linguistics</td>
                <td>1</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>A higher proportion of empirical studies (n=15) was identified, compared with theoretical studies (n=9).</p>
      </sec>
      <sec>
        <title>Proposed Ontology</title>
        <p>Ontologies are formal specifications of key concepts within a domain and the relationships among them. Ontologies are purposeful artefacts that make domain assumptions explicit, enable the construction of a common understanding among stakeholders, enable the reuse of expert knowledge, etc [<xref ref-type="bibr" rid="ref51">51</xref>]. The proposed ontology contained a total of eight distinct concepts and nine relationships, which enabled us to capture the conceptual relationship between a total of 76 unique instances extracted from the literature. <xref rid="figure3" ref-type="fig">Figure 3</xref> presents the ontology capturing key concepts of the HSPAMI project and the supporting empirical evidence that corresponds to the PSC framework. The following subsections describe the steps followed for the construction of the ontology based on the guidelines presented in a previous report [<xref ref-type="bibr" rid="ref67">67</xref>].</p>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Structure of the ontology representing concepts as classes and specifying the relationship among the classes. The relationships among concepts are represented by the arrows between concepts in the rectangles. HSPAMI: Healthcare Security Practice Analysis, Modeling, and Incentivization.</p>
          </caption>
          <graphic xlink:href="humanfactors_v8i2e17604_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <sec>
          <title>Development of the Ontology</title>
          <p>The main objective of the proposed ontology was to map the HSPAMI main study areas to empirically supported research results in order to develop a literature-based comprehensive holistic framework that can be utilized in the project and by researchers or practitioners interested in the domain of information security within the health care context [<xref ref-type="bibr" rid="ref4">4</xref>].</p>
        </sec>
        <sec>
          <title>Determine the Domain and Scope of the Ontology</title>
          <p>The proposed ontology aimed to (1) structure the main focus areas of the HSPAMI project, (2) create a connection between these study areas and existing empirical research results, and (3) develop a comprehensive PSC framework that efficiently communicates domain knowledge to various stakeholders. Thus, the domain is defined as health care professionals’ security practices, and the scope is restricted to research results investigating the relationship between psychological and sociocultural theories and variables with respect to security behaviors.</p>
        </sec>
      </sec>
      <sec>
        <title>Use of Existing Ontologies</title>
        <p>Literature searches were conducted for existing comprehensive domain ontologies on Google Scholar, ScienceDirect, and Scopus, with the following keywords: “ontology,” “healthcare,” “security behavior,” and “practice.” These keywords were also combined with the Boolean functions of “AND,” “OR,” and “NOT.” No comprehensive ontology was identified. Ontologies that explicitly model and structure the domain have been proposed for various purposes in the health care domain, such as interoperability [<xref ref-type="bibr" rid="ref80">80</xref>] and regulating access control for internet of things–based health care [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref81">81</xref>]. The ontology proposed in this paper uses the HSPAMI study areas as an organizing principle for the existing empirically supported research results [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref81">81</xref>].</p>
        <sec>
          <title>List of the Relevant Terms of the Domain</title>
          <p>The fundamental concepts were identified in a previous report [<xref ref-type="bibr" rid="ref4">4</xref>] with respect to the main study areas of the HSPAMI project. These are health care professionals’ psychosocial and cultural demographic variables, security practices, and incentivization of security practices. The concepts were aligned with the classes commonly encountered in empirical studies investigating the relationship between theoretical constructs and behaviors of interest or outcome variables (eg, security practices).</p>
        </sec>
        <sec>
          <title>Define the Classes and the Class Hierarchy</title>
          <p>In order to represent the relationship between concepts of the domain and empirical research results, the classes were conceptually connected to each other. The combination approach was followed in defining the classes and hierarchy, which combined top-down and bottom-up approaches. More salient concepts (HSPAMI concepts and study components) were defined first, and then, based on the identified empirical results, more specific concepts were included. To deal with different terminologies applied to similar concepts (synonyms), the equivalence of classes was represented by the “isEquivalentTo” relationship between concepts, which was inherited by the instances added to the classes. Thus, theories that consisted of constructs could be included in the ontology by defining and connecting an instance to the accompanying theory. Variables that were not specifically part of any theory (eg, demographic variables) could be included by restricting the domain attribute to the class of constructs. <xref ref-type="table" rid="table5">Table 5</xref> shows the existing classes defined within the ontology, with example instances. Based on the literature review, a total of eight classes were defined as the most general concepts, as shown in <xref rid="figure3" ref-type="fig">Figure 3</xref>.</p>
          <table-wrap position="float" id="table5">
            <label>Table 5</label>
            <caption>
              <p>Main concepts defined as classes.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="500"/>
              <col width="500"/>
              <thead>
                <tr valign="top">
                  <td>Classes</td>
                  <td>Instances</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>HSPAMI<sup>a</sup></td>
                  <td>—<sup>b</sup></td>
                </tr>
                <tr valign="top">
                  <td>HealthCareStaff</td>
                  <td>Doctors, nurses, etc</td>
                </tr>
                <tr valign="top">
                  <td>Intervention/Incentivization</td>
                  <td>Motivation, deterrence, etc</td>
                </tr>
                <tr valign="top">
                  <td>PsychoSocialCulturalDemographicVariable</td>
                  <td>Gender, age, etc</td>
                </tr>
                <tr valign="top">
                  <td>SecurityPractice</td>
                  <td>PasswordManagement, EmailUse, etc</td>
                </tr>
                <tr valign="top">
                  <td>Theory</td>
                  <td>Theory of planned behavior, protection motivation theory, etc</td>
                </tr>
                <tr valign="top">
                  <td>Construct/IndependentVariable</td>
                  <td>Attitude, SubjectiveNorm, etc</td>
                </tr>
                <tr valign="top">
                  <td>DependentVariable</td>
                  <td>ActualBehavior, SecuriyAwareness, etc</td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table5fn1">
                <p><sup>a</sup>HSPAMI: Healthcare Security Practice Analysis Modeling and Incentivization.</p>
              </fn>
              <fn id="table5fn2">
                <p><sup>b</sup>No instance.</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>
        </sec>
        <sec>
          <title>Define Properties of Classes</title>
          <p>The main objective of this step was to describe the relationship of a class to other individuals. The properties were defined at the most general class; thus, all members of that class inherited the given property. <xref ref-type="table" rid="table6">Table 6</xref> shows the relationships and the connected classes in the proposed ontology. A total of nine properties link various concepts in the ontology.</p>
          <table-wrap position="float" id="table6">
            <label>Table 6</label>
            <caption>
              <p>Relation of classes.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="500"/>
              <col width="500"/>
              <thead>
                <tr valign="top">
                  <td>Relation of classes</td>
                  <td>Classes connected</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>consistsOf</td>
                  <td>Theory - Construct</td>
                </tr>
                <tr valign="top">
                  <td>influence</td>
                  <td>IndependentVariable - DependentVariable</td>
                </tr>
                <tr valign="top">
                  <td>isEquivalentTo</td>
                  <td>Construct - PsychoSocialCulturalDemographicVariable</td>
                </tr>
                <tr valign="top">
                  <td>exhibit</td>
                  <td>HealthCareStaff - SecurityPractice, DependentVariable</td>
                </tr>
                <tr valign="top">
                  <td>isCharacterizedBy/isModeledBy</td>
                  <td>HealthCareStaff - Construct</td>
                </tr>
                <tr valign="top">
                  <td>aimsToModify</td>
                  <td>Intervention/Incentivization - SecurityPractice</td>
                </tr>
                <tr valign="top">
                  <td>focusesOn</td>
                  <td>HSPAMI<sup>a</sup> - Intervention, HealthCareStaff</td>
                </tr>
                <tr valign="top">
                  <td>isATypeOf</td>
                  <td>Gender - Construct</td>
                </tr>
                <tr valign="top">
                  <td>hasAttribute</td>
                  <td>SelfEfficacy - Psychological; Gender - Demographic</td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table6fn1">
                <p><sup>a</sup>HSPAMI: Healthcare Security Practice Analysis Modeling and Incentivization.</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>
        </sec>
      </sec>
      <sec>
        <title>Define the Data-Type Properties</title>
        <p>This step was excluded in the development of the ontology at this stage. Since ontologies can be developed at various levels of granularity, these steps may be iteratively completed at a future stage when the requirements (eg, development of software) are defined more specifically. For the purpose of creating a comprehensive framework of health care staff characteristics and security practices, this step was unnecessary.</p>
        <sec>
          <title>Create Instances</title>
          <p>The research papers meeting the inclusion criteria were subsequently analyzed in detail to extract instances for the previously enumerated classes. The list of papers reviewed for constructing the ontology are presented in <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref>.</p>
          <p>For the purpose of demonstration, <xref rid="figure4" ref-type="fig">Figure 4</xref> and <xref rid="figure5" ref-type="fig">Figure 5</xref> present how instances can be included in the existing ontology. Additional properties (eg, equivalence of classes) can be represented, which is especially important to avoid ambiguity and for clarifying the semantic meaning of different concepts when they are related (eg, self-efficacy is equivalent to perceived behavioral control). Each theory discussed in a previous report [<xref ref-type="bibr" rid="ref82">82</xref>] was represented as an instance of the theory class, and the object property “isATypeOf” was proposed to capture the relationship. The TPB consisted of the following three constructs: “AttitudeTowardBehavior,” “SubjectiveNorm,” and “PerceivedBehavioralControl,” which can be considered equivalent to beliefs related to self-efficacy.</p>
          <fig id="figure4" position="float">
            <label>Figure 4</label>
            <caption>
              <p>Instances and additional properties defined from the review paper [<xref ref-type="bibr" rid="ref38">38</xref>]. GDT: general deterrence theory; PMT: protection motivation theory; TAM: technology acceptance model; TPB: theory of planned behavior; TRA: theory of reasoned action.</p>
            </caption>
            <graphic xlink:href="humanfactors_v8i2e17604_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <fig id="figure5" position="float">
            <label>Figure 5</label>
            <caption>
              <p>Expansion of the ontology based on results from a previous report [<xref ref-type="bibr" rid="ref38">38</xref>].</p>
            </caption>
            <graphic xlink:href="humanfactors_v8i2e17604_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
      </sec>
      <sec>
        <title>Ontology and the PSC Framework</title>
        <p>The framework shown in <xref rid="figure6" ref-type="fig">Figure 6</xref> consists of independent variables, mediating variables, and the dependent or target variable. The independent variables have various constructs, including psychological traits, social factors, cultural influences, and sociodemographic characteristics. Attributes of these constructs were associated with comprehensive security practices. The security practices served as mediating variables. The target or dependent variable, known as health care professionals’ security metrics, was obtained after relating the independent and mediating variables. The framework components are as follows:</p>
        <list list-type="order">
          <list-item>
            <p>Independent variables: This aspect of the PSC framework consists of the characteristics of the health care staff that can impact health care professionals’ security practices. With reference to <xref rid="figure4" ref-type="fig">Figure 4</xref> and <xref rid="figure6" ref-type="fig">Figure 6</xref>, these characteristics are segregated into psychological or perception variables, sociodemographics, and social and cultural attributes. The psychological traits include perception variables or constructs, such as perceived severity, perceived susceptibility, perceived cues to action, perceived barriers, and perceived self-efficacy, personality, and emotions.</p>
          </list-item>
          <list-item>
            <p>Social bonding: Social bonding is related to social behaviors that can influence health care professionals’ information security behaviors. Such constructs include social bonding, peer pressure, and trust level, as shown in <xref rid="figure6" ref-type="fig">Figure 6</xref>.</p>
          </list-item>
          <list-item>
            <p>Cultural factors: Culture-related traits that can impact information security include environmental norms, beliefs, and assumptions.</p>
          </list-item>
          <list-item>
            <p>Social demographics: Social demographics, such as gender, workload, information security experience, emergency, role, and experience, are hypothesized to have an impact on information security relating to health care staff.</p>
          </list-item>
        </list>
        <fig id="figure6" position="float">
          <label>Figure 6</label>
          <caption>
            <p>Proposed psychosociocultural framework.</p>
          </caption>
          <graphic xlink:href="humanfactors_v8i2e17604_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p><xref rid="figure4" ref-type="fig">Figure 4</xref> presents the expansion of the ontology with empirical results that have particular theories associated with them. Psychological, cultural, and demographic variables were grouped by defining additional attributes to facilitate knowledge sharing.</p>
        <p>The PSC framework also has mediating variables that are basically the security practices of the health care staff. The health care security practices are the required security-related behaviors defined in the policies, standards, regulations, and codes of conduct for health care personnel. Health care staff are therefore required to abide by such security measures to enhance the confidentiality, integrity, and availability of health care data. The security practices in the PSC framework were adopted from the HAIS-Q. The HAIS-Q is a framework consisting of a comprehensive information security practice. In a typical health care environment, health care staff members go through their daily security practices within the scope of the HAIS-Q, and these security practices are impacted by independent variables. Security practices include social network usage, password management, incident reporting, mobile computing, and internet use, as shown in <xref rid="figure6" ref-type="fig">Figure 6</xref>.</p>
        <p>Finally, the target or the dependent variable is the measured security practice of health care staff. Such a security metric can therefore be used for management decision-making, such as implementing intervention measures aimed to improve conscious care security practices.</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>Information security management for mitigating data breaches involves identifying the threats to information security and devising efficient countermeasures [<xref ref-type="bibr" rid="ref28">28</xref>]. Information security management includes adding tools and serving employees with checklists of information security user policies for work roles, as well as requiring employees to abide by those policies. However, the security of health care data also requires systematic analysis of the health care professionals’ security practices for building a “human firewall,” with the objective of enhancing a conscious care and security resilience culture. Thus, identification of various sources of human threats in the social, cultural, and psychological contexts is vital [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref39">39</xref>].</p>
        <p>To this end, we identified constructs capturing psychological, sociocultural, and demographic variables (termed in this study as “psychosociocultural context”) to develop the PSC framework to understand health care professionals’ security practices. The main contribution of this paper is the development of the PSC framework implemented as a domain ontology. Specifically, the framework includes concepts and important variables that have been empirically proven to influence the behavior (ie, security-related practices) of health care professionals when dealing with sensitive information in a health care work setting.</p>
        <p>Based on the overview of existing literature [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref44">44</xref>,<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref49">49</xref>-<xref ref-type="bibr" rid="ref66">66</xref>], we concluded that existing frameworks lack a comprehensive and holistic perspective. Furthermore, not all frameworks provide strong empirical support for the inclusion of variables from the perspective of both security related-behaviors and professionals’ characteristics [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref52">52</xref>,<xref ref-type="bibr" rid="ref55">55</xref>,<xref ref-type="bibr" rid="ref57">57</xref>-<xref ref-type="bibr" rid="ref59">59</xref>]. Therefore, this paper represents a step toward creating a comprehensive and practically useful framework that can aid information security practitioners in fulfilling their work requirements by incorporating relevant concepts and research results that serve as a foundation of the framework.</p>
        <p>The utility of the proposed framework will be tested in the HSPAMI project by scoping the forthcoming investigations on factors that must be considered in monitoring and modifying health care professionals’ security-related behaviors. While specific empirical research papers are necessarily limited with respect to their scope on the security practices and the theories utilized, such papers provide the crucial building blocks of the overarching framework. The first major advantage of the present framework is that it encompasses accumulated knowledge by utilizing the evidence from previous investigations (each focusing on narrowly defined behaviors [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref82">82</xref>-<xref ref-type="bibr" rid="ref84">84</xref>], eg, responding to spam and sharing information on social media); thus, the framework provides a more comprehensive perspective on the various forms of security-related behaviors that should be investigated. This aspect of the present framework is mainly supported by the inclusion of the concepts found in the HAIS-Q instrument, which is a validated and widely utilized questionnaire for measuring information security–related beliefs, knowledge, and attitudes [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref39">39</xref>].</p>
        <p>Based on the literature survey, we also developed an ontology to include significant concepts for the development of the PSC framework. Within the PSC context of health care professionals’ security practices, various studies exist [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref41">41</xref>]. The second major contribution therefore involves the selection of psychological, social, and demographic variables (ie, constructs and theories) from existing literature [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref82">82</xref>-<xref ref-type="bibr" rid="ref84">84</xref>] and the representation of the framework in the form of a domain ontology. By specifying the framework as an ontology, we can efficiently structure, organize, and reuse the vast amount of existing knowledge. Furthermore, the ontology also enables an efficient way to share information with other stakeholders within and outside the HSPAMI project without ambiguities, thus helping to build a common understanding. This aspect is exemplified by object relations that link synonyms or different terminologies used for the same construct to build a common language shared by all stakeholders involved in project-related activities. Finally, the ontology may as well serve as a blueprint for applications developed within the project, such as relational databases containing relevant variables and specifying the connections between them.</p>
        <p>Evaluation of the ontology refers to judgments about the technical features of the ontology and assessment of its usability and utility. Generally, evaluation aims at ensuring the correctness and completeness of an ontology [<xref ref-type="bibr" rid="ref85">85</xref>]. It is an iterative process, which can be conducted at each point of the ontology’s life cycle. An evaluation must be done against a frame of reference, which may be a set of competency questions and requirements, and the real world [<xref ref-type="bibr" rid="ref85">85</xref>], and may take the form of a technical evaluation in the lab or at the location of application (eg, health care context with health care professionals). Evaluation may be performed with several criteria as follows: evaluation of definitions (checking for the absence of well-defined properties in the ontology), structure of the ontology (matching the ontology’s structure with the design criteria of the environment, where it is intended to be used), syntax of definitions (ensuring that syntactically correct keywords are present), content of definitions (identifying what concepts are covered and what concepts are not included or included incorrectly), consistency (avoiding contradictions), completeness (extent of covered concepts in the domain of interest), and conciseness (checking whether information contained in the ontology is relevant and accurate) [<xref ref-type="bibr" rid="ref85">85</xref>]. As the ontology has been developed using existing empirical research results, its validity partially depends on the reliability and validity of the findings in the knowledge base. Furthermore, at this stage of development, only a technical evaluation is possible; thus, its validation in real-world settings is among the key goals of future work. Eventually, the practical benefits of the ontology depend on its recognition and approval among experts who utilize it [<xref ref-type="bibr" rid="ref86">86</xref>].</p>
        <p>With respect to the comprehensiveness of the current PSC framework, it is comparable to similar approaches [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref31">31</xref>] with a stronger focus on the requirement that only empirically supported research results are included. While this may limit the comprehensiveness of the framework, it ensures that only relevant and practically significant theories and concepts are investigated and applied during the activities of the overall project, which can save time and other valuable resources during the process. The real-world evaluation of the framework in terms of its usefulness for sharing and analyzing knowledge, creating a common understanding, and representing concrete aspects of the envisaged application domain will be studied within the scope of the project through case studies, field experiments, or other research methods.</p>
        <p>To complement the efforts of health care professionals in maintaining the confidentiality, integrity, and availability of health care data, a systematic approach to identify the detailed and subtle health care professionals’ characteristics that impact information security practices must be applied. All these constructs are vital when measuring the conscious care behavior of health care professionals. For example, if we assume that psychological constructs are not measured in a typical empirical study of security conscious care behaviors, there will be a gap since the perception of the health care security practice will not be captured [<xref ref-type="bibr" rid="ref12">12</xref>]. Thus, if security solutions are professed based on such a study, the solutions will lack measures to deal with the perception aspect.</p>
        <p>Therefore, through the PSC framework developed in this paper, we identified various constructs within the project domain. The holistic approach is much needed because it strives to capture the entire problem area in the scope of the project. Focusing on just one or two aspects of staff-related traits that impact security in the health care industry might not be sufficiently effective [<xref ref-type="bibr" rid="ref12">12</xref>]. For instance, some of the frameworks focused only on social factors, with the exclusion of other factors, such as the perception. Without determining how health care staff perceived the severity of the impact of their information security malpractices in a related study, health care professionals may not be treated with appropriate incentivization methods for improving such malpractices. Lack of perception variables implies that health care staff would not be able to perceive the gravity of their security-related malpractices, which means there may still be data breaches resulting from untreated psychological traits. Conversely, if a study is conducted with only psychological constructs, data breaches may still occur as a result of untreated social-related constructs, such as social bonding and peer pressure. An approach, such as the PSC framework, therefore appears necessary for an efficient study.</p>
      </sec>
      <sec>
        <title>Conclusion and Future Work</title>
        <p>The mutual trust between health care professionals and their patients is under threat owing to frequent and large data breaches in health care. Furthermore, the richness of health care data is attracting cyber criminals. Since scaling universal technological security measures is challenging, cyber criminals tend to exploit health care staff for easy entry.</p>
        <p>To curtail this ascendance in data breaches, a comprehensive set of health care professionals’ characteristics and security practices, which can impact information security, was identified. An ontology was developed from the identified literature generated by a literature review. Then, a holistic PSC framework was developed. The framework can be implemented with a mixed method approach encompassing both qualitative and quantitative studies [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref87">87</xref>].</p>
        <p>Owing to the systematic approach used to develop the PSC framework, it is possible to identify reliable security metrics while considering all the subtle characteristics of health care professionals and their related security practices. Such metrics can then be used to develop incentivization or motivational measures aimed toward building stronger “human firewalls” to curtail data breaches in health care. Beyond the conventional qualitative evaluation methods of interviews and questionnaires or surveys, other approaches, including team-based learning [<xref ref-type="bibr" rid="ref87">87</xref>] and the Delphi method [<xref ref-type="bibr" rid="ref45">45</xref>], should be explored in the future to enrich empirical studies using comprehensive frameworks such as our PSC framework. Additionally, organizational factors should be considered in the future, since they were not entirely covered in this study.</p>
        <p>Furthermore, clarifying the meaning and interconnectedness of various terms imported from different domains (eg, psychology, information security, sociology, etc) can be beneficial for discovering contradictory or converging pieces of evidence revealed by researchers. While the ontology currently captures only a limited number of concepts from the PSC and demographic contexts of health care professionals, it is flexible and can be extended with new results based on advances in the literature. The level of granularity can, for instance, be increased depending on the requirements of the applications in future work. The emphasis on empirical foundations could also be strengthened by representing associations between variables through specifying additional object properties associated with the classes (eg, correlations, predictive accuracy, etc). The compatibility of this domain ontology with other ontologies (eg, health care staff demographic characteristics in employee databases) needs to be investigated in future work to increase reusability and to achieve more realistic mapping between research results and the opportunities to observe the variables included in the framework. Additional expert knowledge could be useful for enriching the framework, and this can be achieved through iterative workshop sessions with other stakeholders (eg, health care staff, security practitioners, etc).</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Analysis of the theories and their application areas in the Healthcare Security Practice Analysis Modeling and Incentivization (HSPAMI) project [&#60;xref ref-type="bibr" rid="ref4"&#62;4&#60;/xref&#62;].</p>
        <media xlink:href="humanfactors_v8i2e17604_app1.docx" xlink:title="DOCX File , 14 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Summary of the literature review.</p>
        <media xlink:href="humanfactors_v8i2e17604_app2.docx" xlink:title="DOCX File , 18 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>Articles used to construct the ontology.</p>
        <media xlink:href="humanfactors_v8i2e17604_app3.docx" xlink:title="DOCX File , 17 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">GDPR</term>
          <def>
            <p>General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">HAIS-Q</term>
          <def>
            <p>Human Aspect of Information Security Questionnaire</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">HSPAMI</term>
          <def>
            <p>Healthcare Security Practice Analysis Modeling and Incentivization</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">IT</term>
          <def>
            <p>information technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">PMT</term>
          <def>
            <p>protection motivation theory</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">PSC</term>
          <def>
            <p>psychosociocultural</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">TAM</term>
          <def>
            <p>technology acceptance model</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">TPB</term>
          <def>
            <p>theory of planned behavior</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">TRA</term>
          <def>
            <p>theory of reasoned action</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <article-title>IBM Study Shows Data Breach Costs on the Rise; Financial Impact Felt for Years</article-title>
          <source>IBM</source>
          <year>2019</year>
          <access-date>2019-09-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://newsroom.ibm.com/2019-07-23-IBM-Study-Shows-Data-Breach-Costs-on-the-Rise-Financial-Impact-Felt-for-Years">https://newsroom.ibm.com/2019-07-23-IBM-Study-Shows-Data-Breach-Costs-on-the-Rise-Financial-Impact-Felt-for-Years</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <article-title>Norway healthcare cyber-attack ‘could be biggest of its kind’</article-title>
          <source>digitalhealth</source>
          <year>2018</year>
          <access-date>2019-02-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.digitalhealth.net/2018/01/norway-healthcare-cyber-attack-could-be-biggest/">https://www.digitalhealth.net/2018/01/norway-healthcare-cyber-attack-could-be-biggest/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
          <article-title>Hospital takes aim at patient health data security with AI tools</article-title>
          <source>SearchHealthIT</source>
          <year>2019</year>
          <access-date>2019-12-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://searchhealthit.techtarget.com/feature/Hospital-takes-aim-at-patient-health-data-security-with-AI-tools">https://searchhealthit.techtarget.com/feature/Hospital-takes-aim-at-patient-health-data-security-with-AI-tools</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yeng</surname>
              <given-names>PK</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Snekkenes</surname>
              <given-names>EA</given-names>
            </name>
          </person-group>
          <article-title>Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2019</year>
          <volume>261</volume>
          <fpage>239</fpage>
          <lpage>245</lpage>
          <pub-id pub-id-type="medline">31156123</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
          <article-title>2019 Verizon Data Breach Investigations Report</article-title>
          <source>National Institute of Standards and Technology</source>
          <year>2019</year>
          <access-date>2019-12-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nist.gov/system/files/documents/2019/10/16/1-2-dbir-widup.pdf">https://www.nist.gov/system/files/documents/2019/10/16/1-2-dbir-widup.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gunnar</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Steinar</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Lessons learned from 25 years with telemedicine in Northern Norway</article-title>
          <source>International Society for Telemedicine &#38; eHealth</source>
          <year>2015</year>
          <access-date>2021-05-17</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.isfteh.org/files/media/TitulPrefaceContent.pdf">https://www.isfteh.org/files/media/TitulPrefaceContent.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cannoy</surname>
              <given-names>SD</given-names>
            </name>
            <name name-style="western">
              <surname>Salam</surname>
              <given-names>AF</given-names>
            </name>
          </person-group>
          <article-title>A framework for health care information assurance policy and compliance</article-title>
          <source>Commun. ACM</source>
          <year>2010</year>
          <month>03</month>
          <volume>53</volume>
          <issue>3</issue>
          <fpage>126</fpage>
          <lpage>131</lpage>
          <pub-id pub-id-type="doi">10.1145/1666420.1666453</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Koppel</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Blythe</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kothari</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Workarounds to computer access in healthcare organizations: you want my password or a dead patient?</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2015</year>
          <volume>208</volume>
          <fpage>215</fpage>
          <lpage>20</lpage>
          <pub-id pub-id-type="medline">25676976</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pfleeger</surname>
              <given-names>SL</given-names>
            </name>
            <name name-style="western">
              <surname>Predd</surname>
              <given-names>JB</given-names>
            </name>
            <name name-style="western">
              <surname>Hunker</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Bulford</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Insiders Behaving Badly: Addressing Bad Actors and Their Actions</article-title>
          <source>IEEE Trans.Inform.Forensic Secur</source>
          <year>2010</year>
          <month>3</month>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>169</fpage>
          <lpage>179</lpage>
          <pub-id pub-id-type="doi">10.1109/tifs.2009.2039591</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Predd</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Pfleeger</surname>
              <given-names>SL</given-names>
            </name>
            <name name-style="western">
              <surname>Hunker</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Bulford</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Insiders Behaving Badly</article-title>
          <source>IEEE Secur. Privacy Mag</source>
          <year>2008</year>
          <month>07</month>
          <volume>6</volume>
          <issue>4</issue>
          <fpage>66</fpage>
          <lpage>70</lpage>
          <pub-id pub-id-type="doi">10.1109/msp.2008.87</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Whitman</surname>
              <given-names>EM</given-names>
            </name>
            <name name-style="western">
              <surname>Fendler</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Caylor</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Baker</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Rebuilding the human firewall</article-title>
          <source>InfoSecCD '05: Proceedings of the 2nd annual conference on Information security curriculum development</source>
          <year>2005</year>
          <month>09</month>
          <conf-name>2nd annual conference on Information security curriculum development</conf-name>
          <conf-date>September 2005</conf-date>
          <conf-loc>Kennesaw, GA</conf-loc>
          <fpage>104</fpage>
          <lpage>106</lpage>
          <pub-id pub-id-type="doi">10.1145/1107622.1107646</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yeng</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Bian</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Einar</surname>
              <given-names>AS</given-names>
            </name>
          </person-group>
          <article-title>Framework for Healthcare Security Practice Analysis, Modeling and Incentivization</article-title>
          <year>2019</year>
          <month>12</month>
          <conf-name>2019 IEEE International Conference on Big Data (Big Data)</conf-name>
          <conf-date>December 9-12, 2019</conf-date>
          <conf-loc>Los Angeles, CA</conf-loc>
          <fpage>3242</fpage>
          <lpage>3251</lpage>
          <pub-id pub-id-type="doi">10.1109/BigData47090.2019.9006529</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tetz</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Network Firewalls: Perimeter Defense</article-title>
          <source>Dummies</source>
          <access-date>2019-03-03</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.dummies.com/programming/networking/cisco/network-firewalls-perimeter-defense/">https://www.dummies.com/programming/networking/cisco/network-firewalls-perimeter-defense/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Safa</surname>
              <given-names>NS</given-names>
            </name>
            <name name-style="western">
              <surname>Sookhak</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Von Solms</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Furnell</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ghani</surname>
              <given-names>NA</given-names>
            </name>
            <name name-style="western">
              <surname>Herawan</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Information security conscious care behaviour formation in organizations</article-title>
          <source>Computers &#38; Security</source>
          <year>2015</year>
          <month>09</month>
          <volume>53</volume>
          <fpage>65</fpage>
          <lpage>78</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2015.05.012</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Box</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Pottas</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Improving Information Security Behaviour in the Healthcare Context</article-title>
          <source>Procedia Technology</source>
          <year>2013</year>
          <volume>9</volume>
          <fpage>1093</fpage>
          <lpage>1103</lpage>
          <pub-id pub-id-type="doi">10.1016/j.protcy.2013.12.122</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Box</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Pottas</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>A Model for Information Security Compliant Behaviour in the Healthcare Context</article-title>
          <source>Procedia Technology</source>
          <year>2014</year>
          <volume>16</volume>
          <fpage>1462</fpage>
          <lpage>1470</lpage>
          <pub-id pub-id-type="doi">10.1016/j.protcy.2014.10.166</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The 10 Biggest Healthcare Data Breaches of 2019, So Far</article-title>
          <source>HealthITSecurity</source>
          <year>2019</year>
          <access-date>2019-08-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://healthitsecurity.com/news/the-10-biggest-healthcare-data-breaches-of-2019-so-far">https://healthitsecurity.com/news/the-10-biggest-healthcare-data-breaches-of-2019-so-far</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sone</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Mizunuma</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Nakajima</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yasunaga</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ohtomo</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Job satisfaction, income, workload, workplace, and demographics of Japanese radiologists in the 2008 survey</article-title>
          <source>Jpn J Radiol</source>
          <year>2013</year>
          <month>05</month>
          <day>22</day>
          <volume>31</volume>
          <issue>5</issue>
          <fpage>364</fpage>
          <lpage>70</lpage>
          <pub-id pub-id-type="doi">10.1007/s11604-013-0189-5</pub-id>
          <pub-id pub-id-type="medline">23430397</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shilton</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Subramaniam1</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Vitak</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Winter</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Qualitative Approaches to Cybersecurity Research</article-title>
          <source>IConference 2016 Proceedings</source>
          <year>2016</year>
          <month>03</month>
          <conf-name>IConference 2016</conf-name>
          <conf-date>March 2016</conf-date>
          <conf-loc>Philadelphia, PA</conf-loc>
          <pub-id pub-id-type="doi">10.9776/16495</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="web">
          <article-title>A convicted hacker debunks some myths</article-title>
          <source>CNN</source>
          <year>2005</year>
          <access-date>2019-08-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://edition.cnn.com/2005/TECH/internet/10/07/kevin.mitnick.cnna/">http://edition.cnn.com/2005/TECH/internet/10/07/kevin.mitnick.cnna/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Martikainen</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Bartley</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lahelma</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Psychosocial determinants of health in social epidemiology</article-title>
          <source>Int J Epidemiol</source>
          <year>2002</year>
          <month>12</month>
          <volume>31</volume>
          <issue>6</issue>
          <fpage>1091</fpage>
          <lpage>3</lpage>
          <pub-id pub-id-type="doi">10.1093/ije/31.6.1091</pub-id>
          <pub-id pub-id-type="medline">12540696</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ayyagari</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>An Exploratory Analysis of Data Breaches from 2005-2011: Trends and Insights</article-title>
          <source>Journal of Information Privacy and Security</source>
          <year>2014</year>
          <month>07</month>
          <day>07</day>
          <volume>8</volume>
          <issue>2</issue>
          <fpage>33</fpage>
          <lpage>56</lpage>
          <pub-id pub-id-type="doi">10.1080/15536548.2012.10845654</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Moffit</surname>
              <given-names>RE</given-names>
            </name>
            <name name-style="western">
              <surname>Steffen</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Health Care Data Breaches: A Changing Landscape</article-title>
          <source>Maryland Health Care Commission</source>
          <year>2017</year>
          <access-date>2019-12-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhcc.maryland.gov/mhcc/pages/hit/hit/documents/HIT_DataBreachesBrief_Brf_Rpt_090717.pdf">https://mhcc.maryland.gov/mhcc/pages/hit/hit/documents/HIT_DataBreachesBrief_Brf_Rpt_090717.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="web">
          <article-title>Implementation of GDPR in health care sector in Norway</article-title>
          <source>Direktoratet for e-helse</source>
          <year>2019</year>
          <access-date>2019-08-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ehelse.no/personvern-og-informasjonssikkerhet/implementation-of-gdpr-in-health-care-sector-in-norway">https://www.ehelse.no/personvern-og-informasjonssikkerhet/implementation-of-gdpr-in-health-care-sector-in-norway</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wright</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Aaron</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Bates</surname>
              <given-names>DW</given-names>
            </name>
          </person-group>
          <article-title>The Big Phish: Cyberattacks Against U.S. Healthcare Systems</article-title>
          <source>J Gen Intern Med</source>
          <year>2016</year>
          <month>10</month>
          <day>13</day>
          <volume>31</volume>
          <issue>10</issue>
          <fpage>1115</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/27177913"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s11606-016-3741-z</pub-id>
          <pub-id pub-id-type="medline">27177913</pub-id>
          <pub-id pub-id-type="pii">10.1007/s11606-016-3741-z</pub-id>
          <pub-id pub-id-type="pmcid">PMC5023604</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gordon</surname>
              <given-names>WJ</given-names>
            </name>
            <name name-style="western">
              <surname>Wright</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Aiyagari</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Corbo</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Glynn</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Kadakia</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kufahl</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Mazzone</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Noga</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Parkulo</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sanford</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Scheib</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Landman</surname>
              <given-names>AB</given-names>
            </name>
          </person-group>
          <article-title>Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions</article-title>
          <source>JAMA Netw Open</source>
          <year>2019</year>
          <month>03</month>
          <day>01</day>
          <volume>2</volume>
          <issue>3</issue>
          <fpage>e190393</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://jamanetwork.com/journals/jamanetworkopen/fullarticle/10.1001/jamanetworkopen.2019.0393"/>
          </comment>
          <pub-id pub-id-type="doi">10.1001/jamanetworkopen.2019.0393</pub-id>
          <pub-id pub-id-type="medline">30848810</pub-id>
          <pub-id pub-id-type="pii">2727270</pub-id>
          <pub-id pub-id-type="pmcid">PMC6484661</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yeng</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Snekkenes</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices</article-title>
          <year>2019</year>
          <month>07</month>
          <conf-name>2019 IEEE 43rd Annual Computer Software and Applications Conference</conf-name>
          <conf-date>July 15-19, 2019</conf-date>
          <conf-loc>Milwaukee, WI</conf-loc>
          <fpage>397</fpage>
          <lpage>404</lpage>
          <pub-id pub-id-type="doi">10.1109/COMPSAC.2019.10239</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="web">
          <article-title>Key Changes with the General Data Protection Regulation-EUGDPR</article-title>
          <source>EUGDPR</source>
          <year>2019</year>
          <access-date>2019-02-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://eugdpr.org/the-regulation/">https://eugdpr.org/the-regulation/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lewis</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>How to tackle today's IT security risks</article-title>
          <source>BSI Group</source>
          <year>2019</year>
          <access-date>2019-08-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bsigroup.com/globalassets/localfiles/en-nz/ISO%2027001/documents/how-to-tackle-it-security-risks-bsi0371-2002-nz-web.pdf">https://www.bsigroup.com/globalassets/localfiles/en-nz/ISO%2027001/documents/how-to-tackle-it-security-risks-bsi0371-2002-nz-web.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Eloff</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Cognitive fuzzy modeling for enhanced risk assessment in a health care institution</article-title>
          <source>IEEE Intell. Syst</source>
          <year>2000</year>
          <month>03</month>
          <volume>15</volume>
          <issue>2</issue>
          <fpage>69</fpage>
          <lpage>75</lpage>
          <pub-id pub-id-type="doi">10.1109/5254.850830</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Humaidi</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Balakrishnan</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>The Influence of Security Awareness and Security Technology on Users’ Behavior towards the Implementation of Health Information System: A Conceptual Framework</article-title>
          <year>2012</year>
          <conf-name>2nd International Conference on Management and Artificial Intelligence IPEDR</conf-name>
          <conf-date>April 7-8, 2012</conf-date>
          <conf-loc>Bangkok, Thailand</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yuryna Connolly</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Lang</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gathegi</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Tygar</surname>
              <given-names>DJ</given-names>
            </name>
          </person-group>
          <article-title>Organisational culture, procedural countermeasures, and employee security behaviour</article-title>
          <source>ICS</source>
          <year>2017</year>
          <month>06</month>
          <day>12</day>
          <volume>25</volume>
          <issue>2</issue>
          <fpage>118</fpage>
          <lpage>136</lpage>
          <pub-id pub-id-type="doi">10.1108/ics-03-2017-0013</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cheng</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Holm</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Zhai</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory</article-title>
          <source>Computers &#38; Security</source>
          <year>2013</year>
          <month>11</month>
          <volume>39</volume>
          <fpage>447</fpage>
          <lpage>459</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2013.09.009</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Parsons</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>McCormac</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Butavicius</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Pattinson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Jerram</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>The Development of the Human Aspects of Information Security Questionnaire (HAIS-Q)</article-title>
          <source>ACIS 2013 Proceedings</source>
          <year>2013</year>
          <conf-name>24th Australasian Conference on Information Systems</conf-name>
          <conf-date>2013</conf-date>
          <conf-loc>Melbourne, Australia</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://researchrepository.rmit.edu.au/esploro/outputs/conferenceProceeding/The-development-of-the-human-aspects-of-information-security-questionnaire-HAIS-Q/9921861244701341"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Parsons</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Calic</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Pattinson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Butavicius</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>McCormac</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Zwaans</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies</article-title>
          <source>Computers &#38; Security</source>
          <year>2017</year>
          <month>05</month>
          <volume>66</volume>
          <fpage>40</fpage>
          <lpage>51</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2017.01.004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Egelman</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Peer</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS)</article-title>
          <source>CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems</source>
          <year>2015</year>
          <conf-name>33rd Annual ACM Conference on Human Factors in Computing Systems</conf-name>
          <conf-date>April 2015</conf-date>
          <conf-loc>Seoul, Republic of Korea</conf-loc>
          <fpage>2873</fpage>
          <lpage>2882</lpage>
          <pub-id pub-id-type="doi">10.1145/2702123.2702249</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shropshire</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Warkentin</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Johnston</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Schmidt</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Personality and IT security: An application of the five-factor model</article-title>
          <source>AMCIS 2006 Proceedings</source>
          <year>2006</year>
          <conf-name>AMCIS 2006</conf-name>
          <conf-date>July 2006</conf-date>
          <conf-loc>Acapulco, Mexico</conf-loc>
          <fpage>415</fpage>
          <lpage>420</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Anwar</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>He</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Ash</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Yuan</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Gender difference and employees' cybersecurity behaviors</article-title>
          <source>Computers in Human Behavior</source>
          <year>2017</year>
          <month>04</month>
          <volume>69</volume>
          <fpage>437</fpage>
          <lpage>443</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2016.12.040</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Caldwell</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>HAIS-Q: A smart solution to cyber security</article-title>
          <source>Defence Science and Technology Group</source>
          <year>2017</year>
          <access-date>2019-08-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.dst.defence.gov.au/podcast/hais-q-smart-solution-cyber-security">https://www.dst.defence.gov.au/podcast/hais-q-smart-solution-cyber-security</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Agrawal</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Towards the Ontology of ISO/IEC 27005:2011 Risk Management Standard</article-title>
          <source>Proceedings of the Tenth International Symposium on Human Aspects of Information Security &#38; Assurance (HAISA 2016)</source>
          <year>2016</year>
          <conf-name>Tenth International Symposium on Human Aspects of Information Security &#38; Assurance</conf-name>
          <conf-date>July 19-21, 2016</conf-date>
          <conf-loc>Frankfurt, Germany</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fernández-Alemán</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Sánchez-Henarejos</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Toval</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sánchez-García</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Hernández-Hernández</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Fernandez-Luque</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Analysis of health professional security behaviors in a real clinical setting: an empirical study</article-title>
          <source>Int J Med Inform</source>
          <year>2015</year>
          <month>06</month>
          <volume>84</volume>
          <issue>6</issue>
          <fpage>454</fpage>
          <lpage>67</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2015.01.010</pub-id>
          <pub-id pub-id-type="medline">25678101</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(15)00013-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ajzen</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Perceived Behavioral Control, Self‐Efficacy, Locus of Control, and the Theory of Planned Behavior</article-title>
          <source>Journal of Applied Social Psychology</source>
          <year>2002</year>
          <volume>32</volume>
          <issue>4</issue>
          <fpage>665</fpage>
          <lpage>683</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1559-1816.2002.tb00236.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ajzen</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Madden</surname>
              <given-names>TJ</given-names>
            </name>
          </person-group>
          <article-title>Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control</article-title>
          <source>Journal of Experimental Social Psychology</source>
          <year>1986</year>
          <month>9</month>
          <volume>22</volume>
          <issue>5</issue>
          <fpage>453</fpage>
          <lpage>474</lpage>
          <pub-id pub-id-type="doi">10.1016/0022-1031(86)90045-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hassan</surname>
              <given-names>NH</given-names>
            </name>
            <name name-style="western">
              <surname>Ismail</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>A Conceptual Model for Investigating Factors Influencing Information Security Culture in Healthcare Environment</article-title>
          <source>Procedia - Social and Behavioral Sciences</source>
          <year>2012</year>
          <month>12</month>
          <volume>65</volume>
          <fpage>1007</fpage>
          <lpage>1012</lpage>
          <pub-id pub-id-type="doi">10.1016/j.sbspro.2012.11.234</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Deursen</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Buchanan</surname>
              <given-names>WJ</given-names>
            </name>
            <name name-style="western">
              <surname>Duff</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Monitoring information security risks within health care</article-title>
          <source>Computers &#38; Security</source>
          <year>2013</year>
          <month>9</month>
          <volume>37</volume>
          <fpage>31</fpage>
          <lpage>45</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2013.04.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="web">
          <article-title>Code of Conduct</article-title>
          <source>Direktoratet for e-helse</source>
          <year>2018</year>
          <access-date>2019-08-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ehelse.no/normen/documents-in-english">https://ehelse.no/normen/documents-in-english</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="web">
          <article-title>ISO 27799:2016 Health informatics — Information security management in health using ISO/IEC 27002</article-title>
          <source>ISO</source>
          <access-date>2019-08-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.iso.org/standard/62777.html">https://www.iso.org/standard/62777.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ng</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Kankanhalli</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Studying users' computer security behavior: A health belief perspective</article-title>
          <source>Decision Support Systems</source>
          <year>2009</year>
          <month>3</month>
          <volume>46</volume>
          <issue>4</issue>
          <fpage>815</fpage>
          <lpage>825</lpage>
          <pub-id pub-id-type="doi">10.1016/j.dss.2008.11.010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Humaidi</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Balakrishnan</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Shahrom</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Exploring user's compliance behavior towards Health Information System security policies based on extended Health Belief Model</article-title>
          <year>2014</year>
          <conf-name>2014 IEEE Conference on e-Learning, e-Management and e-Services (IC3e)</conf-name>
          <conf-date>December 10-12, 2014</conf-date>
          <conf-loc>Hawthorne, VIC, Australia</conf-loc>
          <fpage>30</fpage>
          <lpage>35</lpage>
          <pub-id pub-id-type="doi">10.1109/ic3e.2014.7081237</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Albarrak</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Evaluation of users Information Security Practices at King Saud University Hospitals</article-title>
          <source>International Journal of Collaborative Research on Internal Medicine &#38; Public Health</source>
          <year>2011</year>
          <volume>3</volume>
          <issue>3</issue>
          <fpage>197</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shahri</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Ismail</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Rahim</surname>
              <given-names>NZA</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Rocha</surname>
              <given-names>Á</given-names>
            </name>
            <name name-style="western">
              <surname>Correia</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wilson</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Stroetmann</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Constructing Conceptual Model for Security Culture in Health Information Systems Security Effectiveness</article-title>
          <source>Advances in Information Systems and Technologies. Advances in Intelligent Systems and Computing, vol 206</source>
          <year>2013</year>
          <publisher-loc>Berlin, Heidelberg</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>213</fpage>
          <lpage>220</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shahri</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Ismail</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Mohanna</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran</article-title>
          <source>J Med Syst</source>
          <year>2016</year>
          <month>11</month>
          <day>28</day>
          <volume>40</volume>
          <issue>11</issue>
          <fpage>241</fpage>
          <lpage>250</lpage>
          <pub-id pub-id-type="doi">10.1007/s10916-016-0591-5</pub-id>
          <pub-id pub-id-type="medline">27681101</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10916-016-0591-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Theoharidou</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kokolakis</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Karyda</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kiountouzis</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>The insider threat to information systems and the effectiveness of ISO17799</article-title>
          <source>Computers &#38; Security</source>
          <year>2005</year>
          <month>9</month>
          <volume>24</volume>
          <issue>6</issue>
          <fpage>472</fpage>
          <lpage>484</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2005.05.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sedlack</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Understanding Cyber Security Perceptions Related to Information Risk in a Healthcare Setting</article-title>
          <source>Association for Information Systems</source>
          <year>2016</year>
          <conf-name>22nd Americas Conference on Information Systems, AMCIS 2016</conf-name>
          <conf-date>August 11-14, 2016</conf-date>
          <conf-loc>San Diego, CA</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Park</surname>
              <given-names>EH</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>YS</given-names>
            </name>
          </person-group>
          <article-title>The role of information security learning and individual factors in disclosing patients' health information</article-title>
          <source>Computers &#38; Security</source>
          <year>2017</year>
          <month>03</month>
          <volume>65</volume>
          <fpage>64</fpage>
          <lpage>76</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2016.10.011</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>PA</given-names>
            </name>
          </person-group>
          <article-title>In a ‘trusting’ environment, everyone is responsible for information security</article-title>
          <source>Information Security Technical Report</source>
          <year>2008</year>
          <month>11</month>
          <volume>13</volume>
          <issue>4</issue>
          <fpage>207</fpage>
          <lpage>215</lpage>
          <pub-id pub-id-type="doi">10.1016/j.istr.2008.10.009</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>PAH</given-names>
            </name>
          </person-group>
          <article-title>When trust defies common security sense</article-title>
          <source>Health Informatics J</source>
          <year>2008</year>
          <month>09</month>
          <day>01</day>
          <volume>14</volume>
          <issue>3</issue>
          <fpage>211</fpage>
          <lpage>221</lpage>
          <pub-id pub-id-type="doi">10.1177/1081180x08092831</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hassan</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Maarop</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Ismail</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Zainal Abidin</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Information security culture in health informatics environment: A qualitative approach</article-title>
          <year>2017</year>
          <conf-name>International Conference on Research and Innovation in Information Systems (ICRIIS)</conf-name>
          <conf-date>July 16-17, 2017</conf-date>
          <conf-loc>Langkawi, Malaysia</conf-loc>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1109/icriis.2017.8002450</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Samhan</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Security behaviors of healthcare providers using HIT outside of work: A technology threat avoidance perspective</article-title>
          <year>2017</year>
          <conf-name>8th International Conference on Information and Communication Systems (ICICS)</conf-name>
          <conf-date>April 4-6, 2017</conf-date>
          <conf-loc>Irbid, Jordan</conf-loc>
          <fpage>342</fpage>
          <lpage>347</lpage>
          <pub-id pub-id-type="doi">10.1109/iacs.2017.7921995</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gebrasilase</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Lessa</surname>
              <given-names>LF</given-names>
            </name>
          </person-group>
          <article-title>Information Security Culture in Public Hospitals: The Case of Hawassa Referral Hospital</article-title>
          <source>The African Journal of Information Systems</source>
          <year>2011</year>
          <volume>3</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digitalcommons.kennesaw.edu/ajis/vol3/iss3/1"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hedström</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Kolkowska</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Karlsson</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Allen</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Value conflicts for information security management</article-title>
          <source>The Journal of Strategic Information Systems</source>
          <year>2011</year>
          <month>12</month>
          <volume>20</volume>
          <issue>4</issue>
          <fpage>373</fpage>
          <lpage>384</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jsis.2011.06.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Appari</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>ME</given-names>
            </name>
            <name name-style="western">
              <surname>Anthony</surname>
              <given-names>DL</given-names>
            </name>
          </person-group>
          <article-title>HIPAA Compliance: An Institutional Theory Perspective</article-title>
          <source>AMCIS 2009 Proceedings</source>
          <year>2009</year>
          <conf-name>AMCIS 2009</conf-name>
          <conf-date>August 6-9, 2009</conf-date>
          <conf-loc>San Francisco, CA</conf-loc>
          <fpage>252</fpage>
          <lpage>259</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Park</surname>
              <given-names>EH</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Wiles</surname>
              <given-names>LL</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>YS</given-names>
            </name>
          </person-group>
          <article-title>Factors affecting intention to disclose patients’ health information</article-title>
          <source>Computers &#38; Security</source>
          <year>2019</year>
          <month>11</month>
          <volume>87</volume>
          <fpage>101340</fpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2018.05.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Drevin</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Kruger</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Bell</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Steyn</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Bishop</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Futcher</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Miloslavskaya</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Theocharidou</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>A Linguistic Approach to Information Security Awareness Education in a Healthcare Environment</article-title>
          <source>Information Security Education for a Global Digital Society. WISE 2017. IFIP Advances in Information and Communication Technology, vol 503</source>
          <year>2017</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>87</fpage>
          <lpage>97</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ferreira</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Antunes</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Chadwick</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Correia</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Grounding information security in healthcare</article-title>
          <source>Int J Med Inform</source>
          <year>2010</year>
          <month>04</month>
          <volume>79</volume>
          <issue>4</issue>
          <fpage>268</fpage>
          <lpage>83</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2010.01.009</pub-id>
          <pub-id pub-id-type="medline">20153245</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(10)00022-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Okeke</surname>
              <given-names>SO</given-names>
            </name>
            <name name-style="western">
              <surname>Mabuza</surname>
              <given-names>LH</given-names>
            </name>
          </person-group>
          <article-title>Perceptions of health care professionals on the safety and security at Odi District Hospital, Gauteng, South Africa</article-title>
          <source>Afr J Prim Health Care Fam Med</source>
          <year>2017</year>
          <month>10</month>
          <day>27</day>
          <volume>9</volume>
          <issue>1</issue>
          <fpage>e1</fpage>
          <lpage>e7</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29113444"/>
          </comment>
          <pub-id pub-id-type="doi">10.4102/phcfm.v9i1.1441</pub-id>
          <pub-id pub-id-type="medline">29113444</pub-id>
          <pub-id pub-id-type="pii">1441</pub-id>
          <pub-id pub-id-type="pmcid">PMC5675923</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Noy</surname>
              <given-names>NF</given-names>
            </name>
            <name name-style="western">
              <surname>McGuinness</surname>
              <given-names>DL</given-names>
            </name>
          </person-group>
          <article-title>Ontology Development 101: A Guide to Creating Your First Ontology</article-title>
          <source>Knowledge Systems Laboratory Stanford University</source>
          <year>2001</year>
          <access-date>2021-05-17</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.ksl.stanford.edu/people/dlm/papers/ontology-tutorial-noy-mcguinness-abstract.html">http://www.ksl.stanford.edu/people/dlm/papers/ontology-tutorial-noy-mcguinness-abstract.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>G’abor</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Studer</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Grimm</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Abecker</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Ontology Development</article-title>
          <source>Semantic Web Services Concepts, Technologies, and Applications</source>
          <year>2007</year>
          <publisher-loc>Berlin, Heidelberg</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>107</fpage>
          <lpage>134</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chou</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Jou</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>MIS key issues in Taiwan's enterprises</article-title>
          <source>International Journal of Information Management</source>
          <year>1999</year>
          <month>10</month>
          <volume>19</volume>
          <issue>5</issue>
          <fpage>369</fpage>
          <lpage>387</lpage>
          <pub-id pub-id-type="doi">10.1016/s0268-4012(99)00033-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kearns</surname>
              <given-names>GS</given-names>
            </name>
            <name name-style="western">
              <surname>Lederer</surname>
              <given-names>AL</given-names>
            </name>
          </person-group>
          <article-title>The impact of industry contextual factors on IT focus and the use of IT for competitive advantage</article-title>
          <source>Information &#38; Management</source>
          <year>2004</year>
          <month>9</month>
          <volume>41</volume>
          <issue>7</issue>
          <fpage>899</fpage>
          <lpage>919</lpage>
          <pub-id pub-id-type="doi">10.1016/j.im.2003.08.018</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alshawaf</surname>
              <given-names>AH</given-names>
            </name>
            <name name-style="western">
              <surname>Ali</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Hasan</surname>
              <given-names>MH</given-names>
            </name>
          </person-group>
          <article-title>A benchmarking framework for information systems management issues in Kuwait</article-title>
          <source>Benchmarking</source>
          <year>2005</year>
          <month>02</month>
          <volume>12</volume>
          <issue>1</issue>
          <fpage>30</fpage>
          <lpage>44</lpage>
          <pub-id pub-id-type="doi">10.1108/14635770510582899</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ernest Chang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ho</surname>
              <given-names>CB</given-names>
            </name>
          </person-group>
          <article-title>Organizational factors to the effectiveness of implementing information security management</article-title>
          <source>Industr Mngmnt &#38; Data Systems</source>
          <year>2006</year>
          <month>03</month>
          <volume>106</volume>
          <issue>3</issue>
          <fpage>345</fpage>
          <lpage>361</lpage>
          <pub-id pub-id-type="doi">10.1108/02635570610653498</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kitchenham</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Pretorius</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Budgen</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Pearl Brereton</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Turner</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Niazi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Linkman</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Systematic literature reviews in software engineering – A tertiary study</article-title>
          <source>Information and Software Technology</source>
          <year>2010</year>
          <month>8</month>
          <volume>52</volume>
          <issue>8</issue>
          <fpage>792</fpage>
          <lpage>805</lpage>
          <pub-id pub-id-type="doi">10.1016/j.infsof.2010.03.006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Booth</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sutton</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Papaioannou</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <source>Systematic Approaches to a Successful Literature Review</source>
          <year>2016</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>SAGE Publications</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>SU</given-names>
            </name>
          </person-group>
          <article-title>A preliminary structure of software security assurance model</article-title>
          <source>ICGSE '18: Proceedings of the 13th International Conference on Global Software Engineering</source>
          <year>2018</year>
          <conf-name>13th International Conference on Global Software Engineering</conf-name>
          <conf-date>May 27-June 3, 2018</conf-date>
          <conf-loc>Gothenburg, Sweden</conf-loc>
          <fpage>137</fpage>
          <lpage>140</lpage>
          <pub-id pub-id-type="doi">10.1145/3196369.3196385</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Petersen</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Vakkalanka</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kuzniarz</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Guidelines for conducting systematic mapping studies in software engineering: An update</article-title>
          <source>Information and Software Technology</source>
          <year>2015</year>
          <month>08</month>
          <volume>64</volume>
          <fpage>1</fpage>
          <lpage>18</lpage>
          <pub-id pub-id-type="doi">10.1016/j.infsof.2015.03.007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McLeod</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Dolezel</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Cyber-analytics: Modeling factors associated with healthcare data breaches</article-title>
          <source>Decision Support Systems</source>
          <year>2018</year>
          <month>04</month>
          <volume>108</volume>
          <fpage>57</fpage>
          <lpage>68</lpage>
          <pub-id pub-id-type="doi">10.1016/j.dss.2018.02.007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Morais</surname>
              <given-names>RMD</given-names>
            </name>
            <name name-style="western">
              <surname>Somera</surname>
              <given-names>SC</given-names>
            </name>
            <name name-style="western">
              <surname>Goes</surname>
              <given-names>WM</given-names>
            </name>
            <name name-style="western">
              <surname>Costa</surname>
              <given-names>AL</given-names>
            </name>
          </person-group>
          <article-title>Applicability of an assessment model for healthcare information systems in a public hospital</article-title>
          <source>JISTEM</source>
          <year>2016</year>
          <month>12</month>
          <day>30</day>
          <volume>13</volume>
          <issue>3</issue>
          <fpage>459</fpage>
          <lpage>478</lpage>
          <pub-id pub-id-type="doi">10.4301/s1807-17752016000300006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="web">
          <source>PRISMA</source>
          <access-date>2019-08-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.prisma-statement.org/">http://www.prisma-statement.org/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Asim</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Petković</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Qu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>An interoperable security framework for connected healthcare</article-title>
          <year>2011</year>
          <conf-name>2011 IEEE Consumer Communications and Networking Conference, CCNC'2011</conf-name>
          <conf-date>January 9-12, 2011</conf-date>
          <conf-loc>Las Vegas, NV</conf-loc>
          <fpage>116</fpage>
          <lpage>120</lpage>
          <pub-id pub-id-type="doi">10.1109/ccnc.2011.5766361</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Henriques</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Lamanna</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Kotowski</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Hlomani</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Stacey</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Baker</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Harper</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>An ontology-driven approach to mobile data collection applications for the healthcare industry</article-title>
          <source>Netw Model Anal Health Inform Bioinforma</source>
          <year>2013</year>
          <month>8</month>
          <day>20</day>
          <volume>2</volume>
          <issue>4</issue>
          <fpage>213</fpage>
          <lpage>223</lpage>
          <pub-id pub-id-type="doi">10.1007/s13721-013-0038-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lebek</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Uffen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Breitner</surname>
              <given-names>MH</given-names>
            </name>
            <name name-style="western">
              <surname>Neumann</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hohler</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Employees' Information Security Awareness and Behavior: A Literature Review</article-title>
          <year>2013</year>
          <conf-name>46th Hawaii International Conference on System Sciences</conf-name>
          <conf-date>January 7-10, 2013</conf-date>
          <conf-loc>Wailea, HI</conf-loc>
          <pub-id pub-id-type="doi">10.1109/hicss.2013.192</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aurigemma</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Mattson</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Do it OR ELSE! Exploring the Effectiveness of Deterrence on Employee Compliance with Information Security Policies</article-title>
          <year>2014</year>
          <conf-name>20th Americas Conference on Information Systems, AMCIS</conf-name>
          <conf-date>August 7-10, 2014</conf-date>
          <conf-loc>Savannah, GA</conf-loc>
          <fpage>67</fpage>
          <lpage>81</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McCormac</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Zwaans</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Parsons</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Calic</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Butavicius</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Pattinson</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Individual differences and Information Security Awareness</article-title>
          <source>Computers in Human Behavior</source>
          <year>2017</year>
          <month>04</month>
          <volume>69</volume>
          <fpage>151</fpage>
          <lpage>156</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2016.11.065</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gómez-Pérez</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Some ideas and examples to evaluate ontologies</article-title>
          <source>Proceedings of the 11th Conference on Artificial Intelligence for Applications</source>
          <year>1995</year>
          <conf-name>11th Conference on Artificial Intelligence for Applications</conf-name>
          <conf-date>February 20-23, 1995</conf-date>
          <conf-loc>Los Angeles, CA</conf-loc>
          <pub-id pub-id-type="doi">10.1109/caia.1995.378808</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Busse</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Humm</surname>
              <given-names>BG</given-names>
            </name>
            <name name-style="western">
              <surname>Lübbert</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Moelter</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Reibold</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rewald</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Schlüter</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Seiler,</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Tegtmeier</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Zeh</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Actually, what does ?ontology? mean?</article-title>
          <source>Journal of Computing and Information Technology</source>
          <year>2015</year>
          <volume>23</volume>
          <issue>1</issue>
          <fpage>29</fpage>
          <lpage>41</lpage>
          <pub-id pub-id-type="doi">10.2498/cit.1002508</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Morrison</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Zimmerman</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hall</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Chase</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Kaushal</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ancker</surname>
              <given-names>JS</given-names>
            </name>
          </person-group>
          <article-title>Developing an online and in-person HIT workforce training program using a team-based learning approach</article-title>
          <source>AMIA Annu Symp Proc</source>
          <year>2011</year>
          <volume>2011</volume>
          <fpage>63</fpage>
          <lpage>71</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22195056"/>
          </comment>
          <pub-id pub-id-type="medline">22195056</pub-id>
          <pub-id pub-id-type="pmcid">PMC3243269</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
