Background Contact tracing apps are an essential component of an effective COVID-19 testing strategy to counteract the spread of the pandemic and thereby avoid overburdening the health care system. As the adoption rates in several regions are undesirable, governments must increase the acceptance of COVID-19 tracing apps in these times of uncertainty. Objective Building on the Uncertainty Reduction Theory (URT), this study aims to investigate how uncertainty reduction measures foster the adoption of COVID-19 tracing apps and how their use affects the perception of different risks. Methods Representative survey data were gathered at two measurement points (before and after the app’s release) and analyzed by performing covariance-based structural equation modeling (n=1003). Results We found that uncertainty reduction measures in the form of the transparency dimensions disclosure and accuracy, as well as social influence and trust in government, foster the adoption process. The use of the COVID-19 tracing app in turn reduced the perceived privacy and performance risks but did not reduce social risks and health-related COVID-19 concerns. Conclusions This study contributes to the mass adoption of health care technology and URT research by integrating interactive communication measures and transparency as a multidimensional concept to reduce different types of uncertainty over time. Furthermore, our results help to derive communication strategies to promote the mass adoption of COVID-19 tracing apps, thus detecting infection chains and allowing intelligent COVID-19 testing.
Background Hospitals have been one of the major targets for phishing attacks. Despite efforts to improve information security compliance, hospitals still significantly suffer from such attacks, impacting the quality of care and the safety of patients. Objective This study aimed to investigate why hospital employees decide to click on phishing emails by analyzing actual clicking data. Methods We first gauged the factors that influence clicking behavior using the theory of planned behavior (TPB) and integrating trust theories. We then conducted a survey in hospitals and used structural equation modeling to investigate the components of compliance intention. We matched employees’ survey results with their actual clicking data from phishing campaigns. Results Our analysis (N=397) reveals that TPB factors (attitude, subjective norms, and perceived behavioral control), as well as collective felt trust and trust in information security technology, are positively related to compliance intention. However, compliance intention is not significantly related to compliance behavior. Only the level of employees’ workload is positively associated with the likelihood of employees clicking on a phishing link. Conclusions This is one of the few studies in information security and decision making that observed compliance behavior by analyzing clicking data rather than using self-reported data. We show that, in the context of phishing emails, intention and compliance might not be as strongly linked as previously assumed; hence, hospitals must remain vigilant with vulnerabilities that cannot be easily managed. Importantly, given the significant association between workload and noncompliance behavior (ie, clicking on phishing links), hospitals should better manage employees’ workload to increase information security. Our findings can help health care organizations augment employees’ compliance with their cybersecurity policies and reduce the likelihood of clicking on phishing links.
Background: Hospitals have been one of the major targets for phishing attacks. Despite efforts to improve information security compliance, hospitals still significantly suffer from such attacks, impacting the quality of care and the safety of patients. Objective: This study aimed to investigate why hospital employees decide to click on phishing emails by analyzing actual clicking data. Methods: We first gauged the factors that influence clicking behavior using the theory of planned behavior (TPB) and integrating trust theories. We then conducted a survey in hospitals and used structural equation modeling to investigate the components of compliance intention. We matched employees' survey results with their actual clicking data from phishing campaigns. Results: Our analysis (N=397) reveals that TPB factors (attitude, subjective norms, and perceived behavioral control), as well as collective felt trust and trust in information security technology, are positively related to compliance intention. However, compliance intention is not significantly related to compliance behavior. Only the level of employees' workload is positively associated with the likelihood of employees clicking on a phishing link. Conclusions: This is one of the few studies in information security and decision making that observed compliance behavior by analyzing clicking data rather than using self-reported data. We show that, in the context of phishing emails, intention and compliance might not be as strongly linked as previously assumed; hence, hospitals must remain vigilant with vulnerabilities that cannot be easily managed. Importantly, given the significant association between workload and noncompliance behavior (ie, clicking on phishing links), hospitals should better manage employees' workload to increase information security. Our findings can help health care organizations augment employees' compliance with their cybersecurity policies and reduce the likelihood of clicking on phishing links.
In recent years anti-doping organizations have implemented various measures to deter elite athletes from using performance-enhancing drugs. One of the main challenges in the fight against doping is that the effectiveness of these anti-doping measures is still unknown. Since the effectiveness of the measures depends primarily on the athletes’ perception, this study focuses on the following four objectives: (1) How effective do top-level athletes perceive individual anti-doping measures to be? (2) Are the results stable across different sports and (3) genders? (4) How can the anti-doping measures be structured into appropriate categories? To address these issues the perceived effectiveness of 14 anti-doping measures was surveyed among 146 top athletes from Germany (Cycling: N = 42; Athletics: N = 104) who are members of at least the National Testing Pool. Results reveal significant differences in the perceived effectiveness of the anti-doping measures. Improved diagnostics were considered to be the most effective remedy for doping, followed by increased bans and the implementation of an anti-doping law. In contrast, fines and a leniency program were considered significantly less effective. Second, with the exception of indirect detection methods and increased use of an Anti-Doping Administration and Management System, results were consistent across cyclists and track and field athletes. Third, no significant gender difference was observed. Finally, an exploratory factor analysis showed that all anti-doping measures can be classified into the three categories risk of detection (e.g., control frequency and efficiency), punishment (e.g., fines and bans) and communication (e.g., education program). The results of this study provide a guideline for future research and for anti-doping and sport organizations when developing strategies against doping and allocating their anti-doping budget.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.