<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JFR</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Form Res</journal-id>
      <journal-title>JMIR Formative Research</journal-title>
      <issn pub-type="epub">2561-326X</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v7i1e49439</article-id>
      <article-id pub-id-type="pmid">37616025</article-id>
      <article-id pub-id-type="doi">10.2196/49439</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Demographic Comparison of Information Security Behavior Toward Health Information System Protection: Survey Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Mavragani</surname>
            <given-names>Amaryllis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Pachankis</surname>
            <given-names>Yang</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Sebastian</surname>
            <given-names>Glorin</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Sari</surname>
            <given-names>Puspita Kencana</given-names>
          </name>
          <degrees>Dr</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Faculty of Computer Science</institution>
            <institution>Universitas Indonesia</institution>
            <addr-line>Kampus Baru UI</addr-line>
            <addr-line>Depok, 16424</addr-line>
            <country>Indonesia</country>
            <phone>62 217863419</phone>
            <email>puspita.kencana91@ui.ac.id</email>
          </address>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-2679-0827</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Handayani</surname>
            <given-names>Putu Wuri</given-names>
          </name>
          <degrees>Dr</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-5341-3800</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Hidayanto</surname>
            <given-names>Achmad Nizar</given-names>
          </name>
          <degrees>Prof Dr</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-5793-9460</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Faculty of Computer Science</institution>
        <institution>Universitas Indonesia</institution>
        <addr-line>Depok</addr-line>
        <country>Indonesia</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Faculty of Economics &#38; Business</institution>
        <institution>Telkom University</institution>
        <addr-line>Bandung</addr-line>
        <country>Indonesia</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Puspita Kencana Sari <email>puspita.kencana91@ui.ac.id</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2023</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>24</day>
        <month>8</month>
        <year>2023</year>
      </pub-date>
      <volume>7</volume>
      <elocation-id>e49439</elocation-id>
      <history>
        <date date-type="received">
          <day>29</day>
          <month>5</month>
          <year>2023</year>
        </date>
        <date date-type="rev-request">
          <day>5</day>
          <month>7</month>
          <year>2023</year>
        </date>
        <date date-type="rev-recd">
          <day>11</day>
          <month>7</month>
          <year>2023</year>
        </date>
        <date date-type="accepted">
          <day>24</day>
          <month>7</month>
          <year>2023</year>
        </date>
      </history>
      <copyright-statement>©Puspita Kencana Sari, Putu Wuri Handayani, Achmad Nizar Hidayanto. Originally published in JMIR Formative Research (https://formative.jmir.org), 24.08.2023.</copyright-statement>
      <copyright-year>2023</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Formative Research, is properly cited. The complete bibliographic information, a link to the original publication on https://formative.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://formative.jmir.org/2023/1/e49439" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>The health information system (HIS) functions are getting wider with more diverse users. Information security in the health industry is crucial because it involves comprehensive and strategic information that might harm human life. The human factor is one of the biggest security threats to HIS.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study aims to investigate the information security behavior (ISB) of HIS users using a comprehensive assessment scale suited to the information security concerns in health care. Patients are increasingly being asked to submit their own data into HIS systems. As a result, this study examines the security behavior of health workers and patients, as well as their demographic variables.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We used a quantitative approach using surveys of health workers and patients. We created a research instrument from 4 existing measurement scales to measure prosecurity and antisecurity behavior. We analyzed statistical differences to test the hypotheses, that is, the Kruskal-Wallis test and the Mann-Whitney test. The descriptive analysis was used to determine whether the group exhibited exemplary behavior when processing the survey results. A correlational test using the Spearman correlation coefficient was performed to establish the significance of the relationship between ISB and age as well as level of education.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>We analyzed 421 responses from the survey. According to demographic factors, the hypotheses tested for full and partial security behavior reveal substantial differences. Education levels most significantly affect security behavior differences, followed by user type, gender, and age. The health workers’ ISB is higher than that of the patients. Women are more likely than men to engage in prosecurity actions while avoiding antisecurity behaviors. The older the HIS user, the more likely it is that they will participate in prosecurity behavior and the less probable it is that they will engage in antisecurity behavior. According to this study, differences in prosecurity behavior are mostly impacted by education level. Higher education, on the other hand, does not guarantee improved ISB for HIS users. All demographic characteristics, particularly concerning user type, show discrepancies that are caused mainly by antisecurity behavior rather than prosecurity behavior.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Since patients engage in antisecurity behavior more frequently than health workers and may pose security risks, health care facilities should start to consider information security education for patients. More comprehensive research on ISB in health care facilities is required to better understand the patient’s perspective, which is currently understudied.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>behavioral research</kwd>
        <kwd>health information system</kwd>
        <kwd>human activities</kwd>
        <kwd>information security</kwd>
        <kwd>mobile security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>The COVID-19 pandemic has progressively pushed health care institutions to use information technology solutions in providing health services that might raise the exposure to information security threats such as phishing emails, ransomware attacks, and network outages [<xref ref-type="bibr" rid="ref1">1</xref>]. Ransomware attacks are increasingly targeting hospitals in many nations [<xref ref-type="bibr" rid="ref2">2</xref>], disrupting health care operations and putting patients’ lives in danger. During the COVID-19 pandemic, the work from home policy required organizations, including health care institutions, to activate their information systems so that they could be accessible from outside the facility [<xref ref-type="bibr" rid="ref3">3</xref>]. Cyberattacks have grown during the COVID-19 pandemic as a result of personnel lacking an adequate level of security knowledge to work from home [<xref ref-type="bibr" rid="ref4">4</xref>].</p>
        <p>The health information system (HIS) functions are getting wider, from the electronic medical record system to the current telemedicine system to provide web-based health services. HIS users, including health workers and patients, are also expanding. Information security has become an essential factor to be evaluated in HIS implementation [<xref ref-type="bibr" rid="ref5">5</xref>]. The security threat from human factors is increasing because of diverse users. Meanwhile, patients as research participants are rarely studied empirically [<xref ref-type="bibr" rid="ref6">6</xref>]. Many instances of security breaches in health care providers are brought on by human behavior [<xref ref-type="bibr" rid="ref7">7</xref>-<xref ref-type="bibr" rid="ref9">9</xref>]. Therefore, it is significant to understand HIS users’ information security behavior (ISB) to determine the proper information security controls.</p>
        <p>Security behavior intentions might be divided into 2 main categories [<xref ref-type="bibr" rid="ref10">10</xref>]. First, prosecurity behavior refers to the intention to support information security, including complying with security policies and assuring security controls using required tools [<xref ref-type="bibr" rid="ref11">11</xref>]. Second, antisecurity behavior reflects the intent of disruptive information security, including violating security policies, making risky use of information system resources, and dismissing security requirements [<xref ref-type="bibr" rid="ref11">11</xref>].</p>
        <p>This study answers the research call from Ahouanmenou et al [<xref ref-type="bibr" rid="ref12">12</xref>] that stated a gap related to information security studies in hospitals where less research has been carried out on how humans affect information security-related incidents. Most of the studies focus on protection technology, processes, and procedures. Advanced information systems require knowledgeable individuals to prevent security breaches following established security requirements, so the information security knowledge and expertise of health professionals must be quantified [<xref ref-type="bibr" rid="ref13">13</xref>]. Therefore, this study aims to understand the ISB of HIS users based on a complete measurement scale adjusted to the information security risks in health care and linked to demographic differences. Academic contributions to information security research, mainly empirical measurement of HIS users’ ISB. A practical contribution is provided by proposing appropriate training approaches to raise security awareness in the health care organization.</p>
        <p>There are several frameworks for measuring ISB from previous literature, namely the Human Aspects of Information Security Questionnaire (HAIS-Q) [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>], Security Behavior Intentions Scale (SeBIS) [<xref ref-type="bibr" rid="ref16">16</xref>], Risky Cybersecurity Behaviors Scale (RScB) [<xref ref-type="bibr" rid="ref17">17</xref>], and counterproductive computer security behaviors (CCSB) [<xref ref-type="bibr" rid="ref18">18</xref>]. HAIS-Q and SeBIS focus on prosecurity behaviors that support information security protection. In contrast, RScB and CCSB focus on antisecurity behaviors that risk causing information security incidents.</p>
      </sec>
      <sec>
        <title>Previous Work</title>
        <p>Previous studies in the health care context mostly used the HAIS-Q [<xref ref-type="bibr" rid="ref19">19</xref>-<xref ref-type="bibr" rid="ref22">22</xref>], a study [<xref ref-type="bibr" rid="ref19">19</xref>] used HAIS-Q and SeBIS, and a study used the RScB [<xref ref-type="bibr" rid="ref13">13</xref>]. The majority of studies [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref19">19</xref>-<xref ref-type="bibr" rid="ref21">21</xref>] investigate health workers as research participants, while a study [<xref ref-type="bibr" rid="ref22">22</xref>] examine patient behavior as an end user of clinical mobile apps. The riskiest behavior of health workers is visiting external websites using the hospital’s computer [<xref ref-type="bibr" rid="ref22">22</xref>], while patients rarely choose complex passwords and change passwords in their mobile health (mHealth) apps [<xref ref-type="bibr" rid="ref22">22</xref>]. Demographic factors, such as age, gender, and education level, are commonly used to predict ISB. However, different results were obtained from previous research. Previous studies [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref26">26</xref>] revealed a difference in ISB of health care professionals based on age, while a study [<xref ref-type="bibr" rid="ref13">13</xref>] showed otherwise. As well as gender, a significant difference in ISB was established in a study [<xref ref-type="bibr" rid="ref25">25</xref>] but not in other studies [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>]. Meanwhile, education level is still less explored and found significant to ISB in a study [<xref ref-type="bibr" rid="ref24">24</xref>] but not substantial in another study [<xref ref-type="bibr" rid="ref23">23</xref>].</p>
      </sec>
      <sec>
        <title>Goal of This Study</title>
        <p>This study uses a quantitative method to investigate ISB from 2 types of HIS user, health worker and patient, which are still understudied. We also examine the differences between ISB according to demographic factors. Therefore, this study has 2 research questions (RQ) to be addressed:</p>
        <list list-type="bullet">
          <list-item>
            <p>RQ1: Is there any difference in HIS users’ ISB according to user type, age, gender, and education?</p>
          </list-item>
          <list-item>
            <p>RQ2: How does HIS users’ ISB differ according to user type, age, gender, and education?</p>
          </list-item>
        </list>
        <p>This study has 4 hypotheses to address the RQs as follows:</p>
        <list list-type="bullet">
          <list-item>
            <p>Hypothesis 1: There are differences in security practices between health workers and patients.</p>
          </list-item>
          <list-item>
            <p>Hypothesis 2: There are differences in security practices between male and female.</p>
          </list-item>
          <list-item>
            <p>Hypothesis 3: There are differences in security practices across age categories.</p>
          </list-item>
          <list-item>
            <p>Hypothesis 4: There are differences in security practices across education categories.</p>
          </list-item>
        </list>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Population and Sampling</title>
        <p>The population of this study was users of HIS applications managed by health facilities in Indonesia as a case study context. Indonesia has the lowest score on the cybersecurity index for G20 countries [<xref ref-type="bibr" rid="ref27">27</xref>]. Most Indonesian health care providers have inadequate information security policies due to a lack of national health information security regulation. Meanwhile, the government is encouraging the HIS implementation in all health care facilities. By understanding the ISB, we may take the first step toward building better health information security policies.</p>
        <p>The sampling technique is nonprobability sampling, especially purposive sampling, according to the established criteria:</p>
        <list list-type="order">
          <list-item>
            <p>Patients or health workers who have user account in HIS; and</p>
          </list-item>
          <list-item>
            <p>HIS is provided and managed by health facilities through both website-based and mobile apps.</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>Research Instrument</title>
        <p><xref ref-type="table" rid="table1">Table 1</xref> describes each framework’s theoretical background, measurement scope and indicators, and measurement scale. This study establishes a modified ISB measurement scale from 4 ISB frameworks in <xref ref-type="table" rid="table1">Table 1</xref> as research instruments. We use a 5-point scale (“never” to “always”) to refer to SeBIS. There are 28 behaviors as research indicators in this study, consisting of 14 prosecurity behaviors and 14 antisecurity behaviors. The mapping of each indicator with the related framework can be seen in <xref ref-type="table" rid="table2">Table 2</xref>.</p>
        <p>In general, we divide the ISB indicators into 4 focus areas, that is, device protection (code 1.1 to 1.6), password management (code 2.1 to 2.6), proactive awareness (code 3.1 to 3.10), and information handling (code 4.1 to 4.6). We collected data through web-based and offline surveys of several health care facilities in Indonesia. We asked for respondents’ consent before they fulfill the questionnaire.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Information security behavior measurement frameworks.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="100"/>
            <col width="240"/>
            <col width="440"/>
            <col width="220"/>
            <thead>
              <tr valign="top">
                <td>Framework</td>
                <td>Underpinning theory</td>
                <td>Scope and indicators</td>
                <td>Likert scale</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>SeBIS<sup>a</sup></td>
                <td>We derived from internet and computer security best practices</td>
                <td>16 items from 4 dimensions: (1) device securement, (2) password generation, (3) proactive awareness, and (4) updating behavior</td>
                <td>5-point scale (never to always)</td>
              </tr>
              <tr valign="top">
                <td>HAIS-Q<sup>b</sup> </td>
                <td>KAB<sup>c</sup> model and empirical studies related to human error.</td>
                <td>63 items from 3 dimensions (knowledge, attitude, and behavior) with 7 focus areas: (1) password management, (2) email use, (3) internet use, (4) social networking site use, (5) incident reporting, (6) mobile computing, and (7) information handling</td>
                <td>5-point scale (strongly agree to strongly disagree)</td>
              </tr>
              <tr valign="top">
                <td>CCSB<sup>d</sup> </td>
                <td>Mostly correlated to social cognitive theory</td>
                <td>12 items from 3 dimensions: (1) careless use of IS resources, (2) procrastinating in carrying out required IS actions, and (3) improper use of IS resources</td>
                <td>7-point scale (almost never to almost always)</td>
              </tr>
              <tr valign="top">
                <td>RScB<sup>e</sup> </td>
                <td>Partly based on the SeBIS measurement scale</td>
                <td>20 items to assess behaviors that may induce poor cybersecurity practices</td>
                <td>7-point scale (never to daily)</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>SeBIS: Security Behavior Intentions Scale.</p>
            </fn>
            <fn id="table1fn2">
              <p><sup>b</sup>HAIS-Q: Human Aspects of Information Security Questionnaire.</p>
            </fn>
            <fn id="table1fn3">
              <p><sup>c</sup>KAB: Knowledge, Attitude, Behavior.</p>
            </fn>
            <fn id="table1fn4">
              <p><sup>d</sup>CCSB: counterproductive computer security behavior.</p>
            </fn>
            <fn id="table1fn5">
              <p><sup>e</sup>RScB: Risky Cybersecurity Behaviors Scale.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Information security behavior (ISB) indicators in research instruments.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="80"/>
            <col width="600"/>
            <col width="70"/>
            <col width="90"/>
            <col width="70"/>
            <col width="90"/>
            <thead>
              <tr valign="top">
                <td>Item code</td>
                <td>ISB indicators</td>
                <td colspan="4">ISB frameworks</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>SeBIS<sup>a</sup></td>
                <td>HAIS-Q<sup>b</sup></td>
                <td>RScB<sup>c</sup></td>
                <td>CCSB<sup>d</sup></td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>1.1</td>
                <td>Locking workstation when idle</td>
                <td>✓</td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>1.2</td>
                <td>Using passwords to unlock devices</td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>1.3</td>
                <td>Physically securing mobile devices</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>1.4</td>
                <td>Not logging out of secure systems after use<sup>e</sup> </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>1.5</td>
                <td>Not checking for software (antivirus, operation system) update<sup>e</sup></td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>1.6</td>
                <td>Disabling the antivirus to download from websites<sup>e</sup></td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>2.1</td>
                <td>Using strong password</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>2.2</td>
                <td>Using a different password for different account</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>2.3</td>
                <td>Updating work-related passwords regularly</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>2.4</td>
                <td>Pasting or sticking computer passwords in a visible place<sup>e</sup></td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>2.5</td>
                <td>Password sharing<sup>e</sup></td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>2.6</td>
                <td>Never change the default password<sup>e</sup></td>
                <td>✓</td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>3.1</td>
                <td>Submit information on the internet (after checking certification)</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>3.2</td>
                <td>Clicking on links (after verifying the source)</td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>3.3</td>
                <td>Opening attachments in emails from a trusted sender</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>3.4</td>
                <td>Social media privacy setting</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>3.5</td>
                <td>Accessing dubious or nonrelated websites<sup>e</sup></td>
                <td>✓</td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>3.6</td>
                <td>Downloading file (antivirus, digital media, data, and material from unknown source)<sup>e</sup></td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>✓</td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>3.7</td>
                <td>Sending sensitive information through Wi-Fi<sup>e</sup></td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>3.8</td>
                <td>Sharing sensitive information or posting about work on social media<sup>e</sup></td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>3.9</td>
                <td>Reporting all incidents</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>3.10</td>
                <td>Ignoring poor security behavior by colleagues<sup>e</sup></td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>4.1</td>
                <td>I am disposing of sensitive printouts properly</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>4.2</td>
                <td>I am never leaving sensitive material</td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>4.3</td>
                <td>Backing up data files as frequently as possible</td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>4.4</td>
                <td>Not always treating sensitive data carefully<sup>e</sup></td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>✓</td>
              </tr>
              <tr valign="top">
                <td>4.5</td>
                <td>Sending personal information to strangers (through instant messaging)<sup>e</sup></td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>4.6</td>
                <td>Sending personal information to strangers (through a website)<sup>e</sup></td>
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>✓</td>
                <td>
                  <break/>
                </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>SeBIS: Security Behavior Intentions Scale.</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>HAIS-Q: Human Aspects of Information Security Questionnaire.</p>
            </fn>
            <fn id="table2fn3">
              <p><sup>c</sup>RScB: Risky Cybersecurity Behaviors Scale.</p>
            </fn>
            <fn id="table2fn4">
              <p><sup>d</sup>CCSB: counterproductive computer security behaviors.</p>
            </fn>
            <fn id="table2fn5">
              <p><sup>e</sup>antisecurity behavior.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Data Analysis Technique</title>
        <p>A statistical differences analysis of the sample according to users’ type, age, gender, and education will be conducted to analyze survey results. A test of normality (Kolmogorov-Smirnov and Shapiro-Wilk) will be conducted to define whether a parametric or nonparametric test should be performed [<xref ref-type="bibr" rid="ref28">28</xref>]. When some data fail to meet the normality assumption test (asymptotic significance value <italic>P</italic>&#60;.05), the researcher will use nonparametric statistical procedures such as the Mann-Whitney test for comparing 2 independent samples or the Kruskal-Wallis test for comparing more than 2 independent samples [<xref ref-type="bibr" rid="ref29">29</xref>]. A descriptive analysis (mean, median, and SD) of the sample in the different variables shows which group has better ISB [<xref ref-type="bibr" rid="ref30">30</xref>]. The higher mean value indicates better ISB, which means more frequently adopting prosecurity practices and less frequently adopting antisecurity practices. Furthermore, a correlative analysis was carried out to determine the significance of the correlation between ISB and age and level of education, which are ordinal variables. The correlative test uses the Spearman correlation coefficient, with a significance value of (2-tailed) <italic>P</italic>&#60;.05 indicating a significant association between ISB indicators and the age or educational level of HIS users. Meanwhile, the mean value of each group may be used to analyze the significance of the correlation between security behavior, gender, and user type.</p>
      </sec>
      <sec>
        <title>Ethical Approval</title>
        <p>Respondents will not be harmed in any way as a result of their participation in this study. The participants provide written informed consent before the trial. The privacy of research respondents will be maintained. Respondents’ voluntary involvement in the study will be regarded as extremely valuable. Respondent data are admissible only for the purpose of this study. Any deceptive details, as well as biased depictions of the main data findings, should be avoided. This study has been reviewed and approved by Manager of Research and Community Services, Faculty of Computer Science, Universitas Indonesia (IRB approval number S-252/UN2.F11.D1.5/PPM.00.00/2023).</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Demographic Characteristics</title>
        <p>We collected 564 responses through the survey from March to May 2022. After validating, 143 responses were excluded since they did not fulfill the respondents’ criteria and were not completed. We processed 421 responses to be analyzed further. <xref rid="figure1" ref-type="fig">Figure 1</xref> shows respondents’ characteristics in this study.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Demographic details of respondents.</p>
          </caption>
          <graphic xlink:href="formative_v7i1e49439_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Validity and Reliability Test</title>
        <p>The findings of the research instrument’s validity test with 28 indicators reveal a significance value of <italic>P</italic>&#60;.05, except for indicator 3.5. So, indicator 3.5 was deleted from the instrument and recalculated. Then, for 27 indicators, a revalidity test was performed, and the results are displayed in <xref ref-type="table" rid="table3">Table 3</xref>. It shows that all items in the instrument are valid. The Cronbach α rating for the research instrument reliability test with 27 indications was .793. Cronbach α values of .70 or above are typically deemed acceptable (Hair et al [<xref ref-type="bibr" rid="ref31">31</xref>]). This demonstrates that the instrument used is valid and trustworthy for assessing HIS users’ ISB.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Instrument validity test results.</p>
          </caption>
          <table border="1" rules="groups" cellpadding="5" frame="hsides" width="1000" cellspacing="0">
            <col width="350"/>
            <col width="300"/>
            <col width="350"/>
            <thead>
              <tr valign="top">
                <td>Item code</td>
                <td>Pearson correlation coeeficient</td>
                <td><italic>P</italic> value</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>1.1</td>
                <td>0.432</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>1.2</td>
                <td>0.470</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>1.3</td>
                <td>0.493</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>1.4</td>
                <td>0.371</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>1.5</td>
                <td>0.300</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>1.6</td>
                <td>0.202</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>2.1</td>
                <td>0.472</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>2.2</td>
                <td>0.404</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>2.3</td>
                <td>0.284</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>2.4</td>
                <td>0.378</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>2.5</td>
                <td>0.408</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>2.6</td>
                <td>0.227</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>3.1</td>
                <td>0.372</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>3.2</td>
                <td>0.590</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>3.3</td>
                <td>0.290</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>3.4</td>
                <td>0.471</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>3.6</td>
                <td>0.421</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>3.7</td>
                <td>0.344</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>3.8</td>
                <td>0.430</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>3.9</td>
                <td>0.514</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>3.10</td>
                <td>0.264</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>4.1</td>
                <td>0.580</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>4.2</td>
                <td>0.474</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>4.3</td>
                <td>0.460</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>4.4</td>
                <td>0.377</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>4.5</td>
                <td>0.366</td>
                <td>&#60;.001</td>
              </tr>
              <tr valign="top">
                <td>4.6</td>
                <td>0.463</td>
                <td>&#60;.001</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Hypothesis Testing</title>
        <p>The reliability test for the research instrument shows Cronbach α value is .785. Cronbach α is commonly regarded as having an acceptable range of .70 or above [<xref ref-type="bibr" rid="ref31">31</xref>]. The normality test result shows all the data are not normal (<italic>P</italic>&#60;.05); therefore, we use a nonparametric test for the hypothesis testing, namely the Mann-Whitney <italic>U</italic> test and the Kruskal-Wallis test.</p>
        <p>All hypotheses are accepted for overall ISB where the hypotheses testing shows significant results according to the user’s type (<italic>P</italic>&#60;.001), gender (<italic>P</italic>&#60;.001), age (<italic>P</italic>=.008), and education (<italic>P</italic>&#60;.001). <xref ref-type="table" rid="table4">Table 4</xref> shows the hypothesis testing result (<italic>P</italic> value) for each ISB indicator. Total 7 behaviors (1.2, 1.4, 2.3, 2.4, 3.6, 4.1, and 4.4) are significantly different based on 4 demographic factors, while 3 others (1.1, 2.1, and 2.2) are not significantly different for all factors. The most behavioral differences are based on the education level, followed by user’s type, gender, and age. The differences are dominated by antisecurity behavior in all demographic factors.</p>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Hypothesis testing result.</p>
          </caption>
          <table border="1" rules="groups" cellpadding="5" frame="hsides" width="1000" cellspacing="0">
            <col width="120"/>
            <col width="120"/>
            <col width="100"/>
            <col width="90"/>
            <col width="120"/>
            <col width="450"/>
            <thead>
              <tr valign="top">
                <td>Item code</td>
                <td colspan="2">Mann-Whitney test (<italic>P</italic> value)</td>
                <td colspan="2">Kruskal-Wallis test (<italic>P</italic> value)</td>
                <td>Conclusion</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>User’s type</td>
                <td>Gender</td>
                <td>Age</td>
                <td>Education</td>
                <td>
                  <break/>
                </td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>1.1</td>
                <td>.86</td>
                <td>.89</td>
                <td>.13</td>
                <td>.22</td>
                <td>All hypotheses are rejected</td>
              </tr>
              <tr valign="top">
                <td>1.2</td>
                <td>.007</td>
                <td>.01</td>
                <td>.04</td>
                <td>.002</td>
                <td>All hypotheses are accepted</td>
              </tr>
              <tr valign="top">
                <td>1.3</td>
                <td>.11</td>
                <td>.68</td>
                <td>.23</td>
                <td>.03</td>
                <td>H4<sup>a</sup> is accepted</td>
              </tr>
              <tr valign="top">
                <td>1.4</td>
                <td>&#60;.001</td>
                <td>&#60;.001</td>
                <td>&#60;.001</td>
                <td>.001</td>
                <td>All hypotheses are accepted</td>
              </tr>
              <tr valign="top">
                <td>1.5</td>
                <td>&#60;.001</td>
                <td>.25</td>
                <td>.16</td>
                <td>.004</td>
                <td>H1<sup>b</sup> and H4 are accepted</td>
              </tr>
              <tr valign="top">
                <td>1.6</td>
                <td>.005</td>
                <td>.24</td>
                <td>.006</td>
                <td>.04</td>
                <td>H1, H2<sup>c</sup>, and H4 are accepted</td>
              </tr>
              <tr valign="top">
                <td>2.1</td>
                <td>.43</td>
                <td>.29</td>
                <td>.13</td>
                <td>.41</td>
                <td>All hypotheses are rejected</td>
              </tr>
              <tr valign="top">
                <td>2.2</td>
                <td>.25</td>
                <td>.31</td>
                <td>.30</td>
                <td>.11</td>
                <td>All hypotheses are rejected</td>
              </tr>
              <tr valign="top">
                <td>2.3</td>
                <td>.001</td>
                <td>&#60;.001</td>
                <td>&#60;.001</td>
                <td>.02</td>
                <td>All hypotheses are accepted</td>
              </tr>
              <tr valign="top">
                <td>2.4</td>
                <td>.002</td>
                <td>.02</td>
                <td>.01</td>
                <td>.02</td>
                <td>All hypotheses are accepted</td>
              </tr>
              <tr valign="top">
                <td>2.5</td>
                <td>.048</td>
                <td>.47</td>
                <td>.09</td>
                <td>.47</td>
                <td>H1 is accepted</td>
              </tr>
              <tr valign="top">
                <td>2.6</td>
                <td>&#60;.001</td>
                <td>.63</td>
                <td>.34</td>
                <td>.08</td>
                <td>H1 is accepted</td>
              </tr>
              <tr valign="top">
                <td>3.1</td>
                <td>.69</td>
                <td>.84</td>
                <td>.24</td>
                <td>.02</td>
                <td>H4 is accepted</td>
              </tr>
              <tr valign="top">
                <td>3.2</td>
                <td>.68</td>
                <td>.049</td>
                <td>.09</td>
                <td>.82</td>
                <td>H2 is accepted</td>
              </tr>
              <tr valign="top">
                <td>3.3</td>
                <td>.37</td>
                <td>.77</td>
                <td>.45</td>
                <td>.01</td>
                <td>H4 is accepted</td>
              </tr>
              <tr valign="top">
                <td>3.4</td>
                <td>.78</td>
                <td>.66</td>
                <td>.002</td>
                <td>.17</td>
                <td>H3<sup>d</sup> is accepted</td>
              </tr>
              <tr valign="top">
                <td>3.6</td>
                <td>&#60;.001</td>
                <td>&#60;.001</td>
                <td>&#60;.001</td>
                <td>&#60;.009</td>
                <td>All hypotheses are accepted</td>
              </tr>
              <tr valign="top">
                <td>3.7</td>
                <td>.06</td>
                <td>.006</td>
                <td>.005</td>
                <td>.02</td>
                <td>H2, H3, and H4 are accepted</td>
              </tr>
              <tr valign="top">
                <td>3.8</td>
                <td>&#60;.001</td>
                <td>.002</td>
                <td>.07</td>
                <td>.28</td>
                <td>H1 and H2 are accepted</td>
              </tr>
              <tr valign="top">
                <td>3.9</td>
                <td>&#60;.001</td>
                <td>.002</td>
                <td>.46</td>
                <td>.002</td>
                <td>H1, H2, and H4 are accepted</td>
              </tr>
              <tr valign="top">
                <td>3.10</td>
                <td>.04</td>
                <td>.007</td>
                <td>.02</td>
                <td>.81</td>
                <td>H1, H2, and H3 are accepted</td>
              </tr>
              <tr valign="top">
                <td>4.1</td>
                <td>.001</td>
                <td>&#60;.001</td>
                <td>.04</td>
                <td>.001</td>
                <td>All hypotheses are accepted</td>
              </tr>
              <tr valign="top">
                <td>4.2</td>
                <td>.16</td>
                <td>.01</td>
                <td>.56</td>
                <td>.25</td>
                <td>H2 is accepted</td>
              </tr>
              <tr valign="top">
                <td>4.3</td>
                <td>.87</td>
                <td>.90</td>
                <td>.02</td>
                <td>.01</td>
                <td>H3 and H4 are accepted</td>
              </tr>
              <tr valign="top">
                <td>4.4</td>
                <td>&#60;.001</td>
                <td>&#60;.001</td>
                <td>.005</td>
                <td>.02</td>
                <td>All hypotheses are accepted</td>
              </tr>
              <tr valign="top">
                <td>4.5</td>
                <td>&#60;.001</td>
                <td>.001</td>
                <td>.21</td>
                <td>.001</td>
                <td>H1, H2, and H4 are accepted</td>
              </tr>
              <tr valign="top">
                <td>4.6</td>
                <td>.001</td>
                <td>&#60;.001</td>
                <td>.16</td>
                <td>.003</td>
                <td>H1, H2, and H4 are accepted</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>H4: hypothesis 4.</p>
            </fn>
            <fn id="table4fn2">
              <p><sup>b</sup>H1: hypothesis 1.</p>
            </fn>
            <fn id="table4fn3">
              <p><sup>c</sup>H2: hypothesis 2.</p>
            </fn>
            <fn id="table4fn4">
              <p><sup>d</sup>H3: hypothesis 3.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Descriptive Analysis</title>
        <p><xref ref-type="table" rid="table5">Table 5</xref> shows the results of the descriptive analysis calculation for each behavior indicator. The bigger the mean or median value, the better the ISB since it suggests that security behavior is performed more frequently for prosecurity indicators and less frequently for antisecurity indicators. There are some information security practices that still need to be improved based on the mean and median values in <xref ref-type="table" rid="table5">Table 5</xref>. First, in terms of device security, more respondents do not use the device screen lock feature to get access to the HIS with a password (item 1.1). Furthermore, respondents almost never signed out after using HIS (item 1.4) and upgrading critical apps such as antivirus and operating systems (item 1.5). Second, in terms of password management, many respondents still do not update their passwords on a regular basis (item 2.3). Third, when it comes to proactive awareness in using the internet, social media, email, and incident reporting, many respondents continue to provide information to websites without first confirming their legitimacy and security (item 3.1). Furthermore, respondents continue to allow colleagues or acquaintances to violate information security (item 3.10).</p>
        <table-wrap position="float" id="table5">
          <label>Table 5</label>
          <caption>
            <p>Descriptive statistics.</p>
          </caption>
          <table border="1" rules="groups" cellpadding="5" frame="hsides" width="1000" cellspacing="0">
            <col width="350"/>
            <col width="300"/>
            <col width="350"/>
            <thead>
              <tr valign="top">
                <td>Item code</td>
                <td>Mean (SD)</td>
                <td>Median</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>1.1</td>
                <td>3.15 (1.47)</td>
                <td>3</td>
              </tr>
              <tr valign="top">
                <td>1.2</td>
                <td>3.88 (1.38)</td>
                <td>5</td>
              </tr>
              <tr valign="top">
                <td>1.3</td>
                <td>3.66 (1.28)</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>1.4</td>
                <td>3.25 (1.47)</td>
                <td>3</td>
              </tr>
              <tr valign="top">
                <td>1.5</td>
                <td>3.29 (1.16)</td>
                <td>3</td>
              </tr>
              <tr valign="top">
                <td>1.6</td>
                <td>3.85 (1.32)</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>2.1</td>
                <td>4.01 (1.27)</td>
                <td>5</td>
              </tr>
              <tr valign="top">
                <td>2.2</td>
                <td>3.48 (1.38)</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>2.3</td>
                <td>2.46 (1.23)</td>
                <td>2</td>
              </tr>
              <tr valign="top">
                <td>2.4</td>
                <td>4.38 (1.10)</td>
                <td>5</td>
              </tr>
              <tr valign="top">
                <td>2.5</td>
                <td>4.42 (1.02)</td>
                <td>5</td>
              </tr>
              <tr valign="top">
                <td>2.6</td>
                <td>3.56 (1.46)</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>3.1</td>
                <td>3.25 (1.33)</td>
                <td>3</td>
              </tr>
              <tr valign="top">
                <td>3.2</td>
                <td>4.35 (0.97)</td>
                <td>5</td>
              </tr>
              <tr valign="top">
                <td>3.3</td>
                <td>3.69 (1.28)</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>3.4</td>
                <td>3.53 (1.18)</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>3.6</td>
                <td>3.80 (1.07)</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>3.7</td>
                <td>3.78 (1.14)</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>3.8</td>
                <td>4.47 (0.90)</td>
                <td>5</td>
              </tr>
              <tr valign="top">
                <td>3.9</td>
                <td>3.61 (1.31)</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>3.10</td>
                <td>3.43 (1.15)</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>4.1</td>
                <td>3.85 (1.29)</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>4.2</td>
                <td>4.00 (1.28)</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>4.3</td>
                <td>3.55 (1.30)</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>4.4</td>
                <td>4.02 (1.15)</td>
                <td>4</td>
              </tr>
              <tr valign="top">
                <td>4.5</td>
                <td>4.26 (1.03)</td>
                <td>5</td>
              </tr>
              <tr valign="top">
                <td>4.6</td>
                <td>4.68 (0.77)</td>
                <td>5</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Comparative and Correlative Analysis</title>
        <sec>
          <title>ISB Differences Based on User’s Type</title>
          <p>There are 16 behaviors significantly different between health worker and patient, consisting of 4 prosecurity (<xref rid="figure2" ref-type="fig">Figure 2</xref>A) and 12 antisecurity (<xref rid="figure2" ref-type="fig">Figure 2</xref>B) behaviors. The health worker has better ISB than the patient since having a higher mean value in almost all different behaviors. However, patients have better behavior regarding password management than health workers. Patients more frequently update passwords, change default passwords, and rarely share passwords than health workers.</p>
          <fig id="figure2" position="float">
            <label>Figure 2</label>
            <caption>
              <p>(A) Prosecurity behavior (B) and antisecurity behavior differences based on the user’s type.</p>
            </caption>
            <graphic xlink:href="formative_v7i1e49439_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>ISB Differences Based on Gender</title>
          <p><xref rid="figure3" ref-type="fig">Figure 3</xref> shows 15 security behaviors that differ between male and female users, consisting of 6 prosecurity (<xref rid="figure3" ref-type="fig">Figure 3</xref>A) and 9 antisecurity (<xref rid="figure3" ref-type="fig">Figure 3</xref>B) behaviors. Female users have better ISB than males in practicing security protection and avoiding risky behavior. Male users are only better at updating work-related passwords regularly.</p>
          <fig id="figure3" position="float">
            <label>Figure 3</label>
            <caption>
              <p>(A) Prosecurity behavior (B) and antisecurity behavior differences based on gender.</p>
            </caption>
            <graphic xlink:href="formative_v7i1e49439_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>ISB Differences Based on Age Group</title>
          <p>According to the age group, there are 12 security behavior differences, consisting of 5 prosecurity (<xref rid="figure4" ref-type="fig">Figure 4</xref>A) and 7 antisecurity (<xref rid="figure4" ref-type="fig">Figure 4</xref>B) behaviors. Younger users (18-29 years old) are better at security protection than other groups, especially in backing up data files, changing social media privacy settings, and regularly updating work-related passwords. There is no specific age group that exhibits less frequent prosecurity behavior. Meanwhile, older users (&#62;50 years old) are better at practicing less antisecurity behavior, but younger users (18-29 years old) more often practice antisecurity behavior.</p>
          <fig id="figure4" position="float">
            <label>Figure 4</label>
            <caption>
              <p>(A) Prosecurity behavior (B) and antisecurity behavior difference based on age group.</p>
            </caption>
            <graphic xlink:href="formative_v7i1e49439_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>ISB Differences Based on the Education Level</title>
          <p>A total of 17 behavior indicators are different based on education level, which are 8 prosecurity (<xref rid="figure5" ref-type="fig">Figure 5</xref>A) and 9 antisecurity behaviors (<xref rid="figure5" ref-type="fig">Figure 5</xref>B). Diploma users have better security behavior, are more frequently prosecurity, and have less antisecurity behavior than other groups. Postgraduate users are less likely to engage in prosecurity behavior except for opening an email attachment from a trusted sender. Meanwhile, the high school users’ group is most often practicing antisecurity behavior.</p>
          <fig id="figure5" position="float">
            <label>Figure 5</label>
            <caption>
              <p>(A) Prosecurity behavior and (B) antisecurity behavior differences based on the education level.</p>
            </caption>
            <graphic xlink:href="formative_v7i1e49439_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
      </sec>
      <sec>
        <title>ISB Correlation to Age and Education Level</title>
        <p>This study included further comparative and correlative analyses. A correlational analysis was conducted to determine the relevance of the association between ISB and age and level of education, which is ordinal data. While the mean value of each group descriptively allows for comparison research to assess the relevance of the association between security behavior and gender and user type. The correlative test uses the Spearman correlation coefficient, with a significance value of (2-tailed) <italic>P</italic>=.05 indicating a significant association between ISB indicators and HIS users’ age or educational level.</p>
        <p><xref ref-type="table" rid="table6">Table 6</xref> displays the correlation research results for prosecurity behavior with age and educational level. The behavior of users to use passwords to unlock devices used to access HIS (1.2) and ensure sensitive printouts (such as medical resumes, test results, and prescriptions) are appropriately destroyed before disposal (4.1) is significantly positively connected with age. This demonstrates that older HIS users are more likely to engage in both activities. Meanwhile, the behavior of HIS users to update HIS passwords on a regular basis (2.3), maintain social media privacy (3.4), and back up essential data on HIS (4.3) shows a negative association with age, with older users doing it less frequently. The correlation of HIS user behavior for not opening email attachments from unknown senders (3.3) shows a positive correlation with education level, with the higher the educational level of HIS users, the more frequently this behavior occurs. Because of the negative link, HIS users with higher levels of education change HIS account passwords (2.3) less frequently and back up essential data on HIS (4.3).</p>
        <p><xref ref-type="table" rid="table7">Table 7</xref> shows the correlative study results for antisecurity behavior with age and education. The behavior of not logging out of HIS (1.4), sticking passwords in the open (2.4), downloading files from unofficial sources (3.6), sending sensitive information using public Wi-Fi (3.7), sharing sensitive information on social media (3.8), doing nothing when colleagues commit security breaches (3.10), not treating sensitive data carefully (4.4), and sending personal information to unknown websites (4.6) significantly positively correlated with age, so that the older HIS users tend to do less of this behavior. While the educational level of HIS users has a positive correlation with the behavior of disabling antivirus (1.6), pasting passwords (2.4), downloading files from unofficial sources (3.6), not treating sensitive data with care (4.4), and sending sensitive data through instant messaging without verifying the authenticity of the account (4.5). This shows that the higher the educational level of HIS users, the less likely they are to engage in this behavior.</p>
        <table-wrap position="float" id="table6">
          <label>Table 6</label>
          <caption>
            <p>Correlative test results for prosecurity behaviors.</p>
          </caption>
          <table border="1" rules="groups" cellpadding="5" frame="hsides" width="1000" cellspacing="0">
            <col width="220"/>
            <col width="170"/>
            <col width="100"/>
            <col width="170"/>
            <col width="340"/>
            <thead>
              <tr valign="top">
                <td>Item code</td>
                <td colspan="2">Age</td>
                <td colspan="2">Education</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Correlation coefficient</td>
                <td><italic>P</italic> value</td>
                <td>Correlation coefficient</td>
                <td><italic>P</italic> value</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>1.1</td>
                <td>0.037</td>
                <td>.45</td>
                <td>0.037</td>
                <td>.45</td>
              </tr>
              <tr valign="top">
                <td>1.2</td>
                <td>0.127</td>
                <td>.009</td>
                <td>0.009</td>
                <td>.86</td>
              </tr>
              <tr valign="top">
                <td>1.3</td>
                <td>–0.023</td>
                <td>.64</td>
                <td>–0.078</td>
                <td>.11</td>
              </tr>
              <tr valign="top">
                <td>2.1</td>
                <td>0.015</td>
                <td>.76</td>
                <td>–0.043</td>
                <td>.38</td>
              </tr>
              <tr valign="top">
                <td>2.2</td>
                <td>0.046</td>
                <td>.35</td>
                <td>–0.031</td>
                <td>.53</td>
              </tr>
              <tr valign="top">
                <td>2.3</td>
                <td>–0.191</td>
                <td>&#60;.001</td>
                <td>–0.134</td>
                <td>.006</td>
              </tr>
              <tr valign="top">
                <td>3.1</td>
                <td>–0.047</td>
                <td>.33</td>
                <td>–0.073</td>
                <td>.14</td>
              </tr>
              <tr valign="top">
                <td>3.2</td>
                <td>0.058</td>
                <td>.23</td>
                <td>0.015</td>
                <td>.76</td>
              </tr>
              <tr valign="top">
                <td>3.3</td>
                <td>0.064</td>
                <td>.19</td>
                <td>0.109</td>
                <td>.03</td>
              </tr>
              <tr valign="top">
                <td>3.4</td>
                <td>–0.163</td>
                <td>.001</td>
                <td>–0.092</td>
                <td>.06</td>
              </tr>
              <tr valign="top">
                <td>3.9</td>
                <td>0.060</td>
                <td>.22</td>
                <td>0.006</td>
                <td>.90</td>
              </tr>
              <tr valign="top">
                <td>4.1</td>
                <td>0.131</td>
                <td>.007</td>
                <td>0.014</td>
                <td>.78</td>
              </tr>
              <tr valign="top">
                <td>4.2</td>
                <td>0.045</td>
                <td>.36</td>
                <td>0.015</td>
                <td>.76</td>
              </tr>
              <tr valign="top">
                <td>4.3</td>
                <td>–0.104</td>
                <td>.03</td>
                <td>–0.133</td>
                <td>.006</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table7">
          <label>Table 7</label>
          <caption>
            <p>Correlative test results for antisecurity behaviors.</p>
          </caption>
          <table border="1" rules="groups" cellpadding="5" frame="hsides" width="1000" cellspacing="0">
            <col width="220"/>
            <col width="170"/>
            <col width="100"/>
            <col width="170"/>
            <col width="340"/>
            <thead>
              <tr valign="top">
                <td>Item code</td>
                <td colspan="2">Age</td>
                <td colspan="2">Education</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Correlation coefficient</td>
                <td><italic>P</italic> value</td>
                <td>Correlation coefficient</td>
                <td><italic>P</italic> value</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>1.4</td>
                <td>0.257</td>
                <td>&#60;.001</td>
                <td>0.086</td>
                <td>.08</td>
              </tr>
              <tr valign="top">
                <td>1.5</td>
                <td>0.089</td>
                <td>.07</td>
                <td>–0.004</td>
                <td>.94</td>
              </tr>
              <tr valign="top">
                <td>1.6</td>
                <td>0.028</td>
                <td>.57</td>
                <td>0.116</td>
                <td>.02</td>
              </tr>
              <tr valign="top">
                <td>2.4</td>
                <td>0.155</td>
                <td>.001</td>
                <td>0.112</td>
                <td>.02</td>
              </tr>
              <tr valign="top">
                <td>2.5</td>
                <td>0.038</td>
                <td>.44</td>
                <td>–0.013</td>
                <td>.79</td>
              </tr>
              <tr valign="top">
                <td>2.6</td>
                <td>–0.022</td>
                <td>.65</td>
                <td>0.089</td>
                <td>.07</td>
              </tr>
              <tr valign="top">
                <td>3.6</td>
                <td>0.368</td>
                <td>&#60;.001</td>
                <td>0.099</td>
                <td>.04</td>
              </tr>
              <tr valign="top">
                <td>3.7</td>
                <td>0.160</td>
                <td>.001</td>
                <td>0.026</td>
                <td>.60</td>
              </tr>
              <tr valign="top">
                <td>3.8</td>
                <td>0.118</td>
                <td>.02</td>
                <td>0.064</td>
                <td>.19</td>
              </tr>
              <tr valign="top">
                <td>3.10</td>
                <td>0.136</td>
                <td>.005</td>
                <td>0.006</td>
                <td>.90</td>
              </tr>
              <tr valign="top">
                <td>4.4</td>
                <td>0.169</td>
                <td>.001</td>
                <td>0.121</td>
                <td>.01</td>
              </tr>
              <tr valign="top">
                <td>4.5</td>
                <td>0.094</td>
                <td>.06</td>
                <td>0.115</td>
                <td>.02</td>
              </tr>
              <tr valign="top">
                <td>4.6</td>
                <td>0.112</td>
                <td>.02</td>
                <td>0.075</td>
                <td>.13</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Results</title>
        <p>There is no previous study comparing the security behaviors of health workers and patients directly. This study shows that patients update and change default passwords more frequently. Patients also share their HIS password less often than health workers, who use HIS to work and share information with their colleagues. In contrast with a previous study [<xref ref-type="bibr" rid="ref22">22</xref>], mHealth end users do not change their password regularly but use strong and different passwords. Health workers are more likely to use the same password due to stress factors in the health care environment [<xref ref-type="bibr" rid="ref19">19</xref>]. This study also shows that health workers use the default password, which is usually the same for all accounts. They can easily ask their colleagues if they forget the password. The high workload sometimes causes health workers not to be able to access the HIS on their own, so they ask a coworker to help them by using their passwords. There is a significant difference in prosecurity behavior between health care workers and patients when it comes to reporting security events or disruptions to the HIS manager. Most of the staff will report incidents, but most of the patients will not. As a result, if there is a HIS problem, HIS managers must engage more with patients or provide more information about complaint services. User-reported events can be used to detect attacks or larger issues. Patients frequently do not log out after using HIS, which makes a significant impact in antisecurity behavior. This might happen since patients use their own devices to access the HIS, so they can feel safer if they do not log out, but health workers use institutional devices that someone else can use.</p>
        <p>This study shows female and male users’ ISBs are different as a whole or in several indicators. Women tend to adopt prosecurity practices and avoid antisecurity behaviors, except for updating HIS password regularly. This result contradicts previous studies that took health workers [<xref ref-type="bibr" rid="ref25">25</xref>] and nonhealth workers [<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>] as research participants and revealed that males are more likely to adhere to security controls and avoid risky behavior. However, a previous study [<xref ref-type="bibr" rid="ref34">34</xref>] that included health workers as part of its research revealed that females are more likely to comply with security policies. There is a significant disparity in prosecurity behavior between both genders, with male users changing their HIS passwords more regularly and female users being more cautious while deleting sensitive information such as medicine prescriptions, ultrasound printouts, or medical resumes. Antisecurity behavior that differs substantially between male and female users includes not closing the system after usage, downloading files from unknown sources, and not frequently managing sensitive data with care. Female users are less likely to engage in all 3 of these behaviors. The causes for the disparities in behavior between male and female users must be investigated further.</p>
        <p>In general, the older the HIS user, the more frequently they engage in prosecurity behavior and seldom engage in antisecurity behavior. However, younger HIS users are more likely to change passwords on a regular basis, set privacy on social media, and back up crucial data. It is supported by previous study where younger users are more likely to use security controls on mobile devices [<xref ref-type="bibr" rid="ref25">25</xref>], but older users generally are more cautious with sensitive information [<xref ref-type="bibr" rid="ref26">26</xref>]. The younger HIS users are more likely to embrace detailed processes. Still, most older people groups evaluate and accept informal security measures as a more seasoned response to security problems [<xref ref-type="bibr" rid="ref24">24</xref>]. Older users (&#62;40 years old) have better overall behavior. This is demonstrated by a correlation analysis between user age and security behavior, particularly antisecurity behavior, where the older the user, the less likely it is to engage in antisecurity behavior. However, the younger the user, the more frequently they change passwords and social media privacy settings.</p>
        <p>This finding shows that education level mostly influences the differences in prosecurity behavior. However, higher education does not guarantee better ISB for HIS users. It is supported by a previous study [<xref ref-type="bibr" rid="ref24">24</xref>] that revealed security policy compliance was lower at the master’s level than at the undergraduate level. Overall, users with a diploma education behave better than other age groups. However, these disparities in behavior vary sufficiently so that, according to the correlative analysis, there isn’t a very substantial association between education level and user security behavior. Furthermore, this study indicates that the higher the education of HIS users, the less frequently they change passwords and back up essential data.</p>
        <p>Overall, the frequency with which HIS users engage in risky security behavior is lower than the frequency with which behavior is predicted. Because patients have a lower degree of security behavior than health care workers, information security education for HIS users is critical. This study adds a deeper understanding of HIS user behavior by age, gender, and educational level. Health care facilities management may personalize education programs and formats to the target group of end users.</p>
      </sec>
      <sec>
        <title>Implication and Limitations</title>
        <p>These findings suggest the necessity for security education programs specific to user demographics and the categories of security behaviors the organization wants to enhance. Differences primarily influence antisecurity behavior in user roles, age, and gender, but education level affects both equally. This study demonstrates distinctions between prosecurity and antisecurity behaviors that have not been thoroughly examined in earlier studies. Health care facilities should focus on user-specific needs, knowledge, ability, and work limitations to reduce conflict between protection and work efficiency goals and develop customized security training programs [<xref ref-type="bibr" rid="ref21">21</xref>].</p>
        <p>Security education for the patient should be considered since they do antisecurity more often than health workers and can pose security threats. This study also differs from most previous studies because female users exhibit more secure behavior than males. Younger HIS users are more susceptible to engaging in risky security behavior, but they are also more likely to engage in prosecurity behavior, while older users are better at preventing antisecurity behavior. Based on educational degree, there are significant disparities in ISB. Users with a high school education are more susceptible to antisecurity behavior, thus they should be educated on information security risks. As users with undergraduate and postgraduate degrees are less likely to engage in prosecurity behavior, technical security training is required. Some behaviors that can be improved include regularly updating the HIS password, setting the device screen to automatically lock when not in use, not logging out after using the HIS, verifying website security before sending sensitive information, and delaying software updates such as operating system and antivirus updates. Security threats posed by HIS user behavior can be mitigated by including technological security measures into HIS, such as an automated logout function on HIS and user devices after a given amount of inactivity and implementing a password validity period for a set length of time. HIS users should be educated on potential risks that might occur if the software used is not kept up to date, as well as how to assess the security of a website.</p>
        <p>This study uses a self-reported survey and does not distinguish the types of health facilities. It might cause bias because the security behavior described by the respondents’ answers can apply to a particular health facility. Additionally, this work does not thoroughly investigate the relationship between ISB and HIS features and the used devices. For instance, patients use smartphones more frequently to register through mobile apps, while health workers use desktop computers more frequently to access electronic medical records. Current technology adopting artificial intelligence might bring new security risks to health care systems [<xref ref-type="bibr" rid="ref35">35</xref>]. Future research can investigate more relevant information security knowledge and behavior to cope with security risks from those technologies. This study assesses the ISB of HIS users based on a history of security events in health institutions and potential security threats. The influence of this user behavior on information security in associated health institutions has not been studied further. Future research can do a longitudinal study on a specific health institution to see the impact of this behavior and make measurements before and after introducing suitable security measures.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>Health care providers other than hospitals are still understudied. Studies related to both prosecurity and antisecurity behaviors show that the factors preventing protection can be different from the factors promoting information security violations. Therefore, both types of security behavior are necessary to be investigated for further research. The development of technological solutions used by health facilities since the COVID-19 outbreak, such as telemedicine and mHealth apps, has caused the coverage of HIS users to expand. Protection of health information security does not only rely on health care professionals but also on patients who participate in managing their own personal data. Information security risk does not only come from internal users at the health care provider but also from external users who have access rights to the system. Therefore, studies on ISB in the context of health organizations need to understand the patient’s perspective, which is still rarely studied.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">CCSB</term>
          <def>
            <p>counterproductive computer security behaviors</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">HAIS-Q</term>
          <def>
            <p>Human Aspects of Information Security Questionnaire</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">HIS</term>
          <def>
            <p>health information system</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">ISB</term>
          <def>
            <p>information security behavior</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">mHealth</term>
          <def>
            <p>mobile health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">RQ</term>
          <def>
            <p>research question</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">RScB</term>
          <def>
            <p>Risky Cybersecurity Behaviors Scale</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">SeBIS</term>
          <def>
            <p>Security Behavior Intentions Scale</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This research is supported by Universitas Indonesia under the grant Hibah Publikasi Terindeks Internasional Pascasarjana (grants NKB-022/UN2.RST/HKP.05.00/2023).</p>
    </ack>
    <notes>
      <sec>
        <title>Data Availability</title>
        <p>The data sets generated and analyzed during this study are available from the corresponding author on reasonable request.</p>
      </sec>
    </notes>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Chaturvedi</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Chakravarthy</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity risks in a pandemic</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>09</month>
          <day>17</day>
          <volume>22</volume>
          <issue>9</issue>
          <fpage>e23692</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/9/e23692/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/23692</pub-id>
          <pub-id pub-id-type="medline">32897869</pub-id>
          <pub-id pub-id-type="pii">v22i9e23692</pub-id>
          <pub-id pub-id-type="pmcid">PMC7528623</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jercich</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>VMware Carbon Black's healthcare users faced 239M attempted cyberattacks in 2020</article-title>
          <source>Healthcare IT News</source>
          <year>2021</year>
          <access-date>2021-06-08</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.healthcareitnews.com/news/vmware-carbon-blacks-healthcare-users-faced-239m-attempted-cyberattacks-2020">https://www.healthcareitnews.com/news/vmware-carbon-blacks-healthcare-users-faced-239m-attempted-​cyberattacks-2020</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sebastian</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>A descriptive study on cybersecurity challenges of working from home during COVID-19 pandemic and a proposed 8 step WFH cyber-attack mitigation plan</article-title>
          <source>CIBIMA</source>
          <year>2021</year>
          <volume>2021</volume>
          <issue>2021</issue>
          <fpage>1</fpage>
          <lpage>7</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ibimapublishing.com/articles/CIBIMA/2021/589235/589235.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.5171/2021.589235</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oltsik</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>ESG research report: the impact of the COVID-19 pandemic on cybersecurity</article-title>
          <source>Enterprise Strategy Group</source>
          <year>2020</year>
          <access-date>2021-07-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.esg-global.com/research/esg-research-report-the-impact-of-the-covid-19-pandemic-on-cybersecurity">https://www.esg-global.com/research/esg-research-report-the-impact-of-the-covid-19-pandemic-on-cybersecurity</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Evaluation framework for telemedicine using the logical framework approach and a fishbone diagram</article-title>
          <source>Healthc Inform Res</source>
          <year>2015</year>
          <month>10</month>
          <volume>21</volume>
          <issue>4</issue>
          <fpage>230</fpage>
          <lpage>238</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/26618028"/>
          </comment>
          <pub-id pub-id-type="doi">10.4258/hir.2015.21.4.230</pub-id>
          <pub-id pub-id-type="medline">26618028</pub-id>
          <pub-id pub-id-type="pmcid">PMC4659879</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>YW</given-names>
            </name>
            <name name-style="western">
              <surname>Cho</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Jang</surname>
              <given-names>HJ</given-names>
            </name>
          </person-group>
          <article-title>Trends in research on the security of medical information in Korea: focused on information privacy security in hospitals</article-title>
          <source>Healthc Inform Res</source>
          <year>2018</year>
          <month>01</month>
          <volume>24</volume>
          <issue>1</issue>
          <fpage>61</fpage>
          <lpage>68</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/29503754"/>
          </comment>
          <pub-id pub-id-type="doi">10.4258/hir.2018.24.1.61</pub-id>
          <pub-id pub-id-type="medline">29503754</pub-id>
          <pub-id pub-id-type="pmcid">PMC5820088</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alumaran</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Bella</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>The role and impact of cultural dimensions on information systems security in Saudi Arabia National Health Service</article-title>
          <source>Int J Comput Appl</source>
          <year>2015</year>
          <volume>112</volume>
          <issue>2</issue>
          <fpage>21</fpage>
          <lpage>28</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://research.ijcaonline.org/volume112/number2/pxc3901217.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Deursen</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Buchanan</surname>
              <given-names>WJ</given-names>
            </name>
            <name name-style="western">
              <surname>Duff</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Monitoring information security risks within health care</article-title>
          <source>Computers &#38; Security</source>
          <year>2013</year>
          <month>9</month>
          <volume>37</volume>
          <fpage>31</fpage>
          <lpage>45</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2013.04.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Albarrak</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Evaluation of users information security practices at King Saud University hospitals</article-title>
          <source>Global Business and Management Research</source>
          <year>2011</year>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>6</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jaeger</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Information security awareness: literature review and integrative framework</article-title>
          <year>2018</year>
          <conf-name>Proceedings of the 51st Hawaii International Conference on System Sciences</conf-name>
          <conf-date>January 3-6, 2018</conf-date>
          <conf-loc>Hilton Waikoloa Village, Hawaii</conf-loc>
          <fpage>4703</fpage>
          <lpage>4712</lpage>
          <pub-id pub-id-type="doi">10.24251/hicss.2018.593</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Guo</surname>
              <given-names>KH</given-names>
            </name>
          </person-group>
          <article-title>Security-related behavior in using information systems in the workplace: a review and synthesis</article-title>
          <source>Comput Secur</source>
          <year>2013</year>
          <volume>32</volume>
          <fpage>242</fpage>
          <lpage>251</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2012.10.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ahouanmenou</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Van Looy</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Poels</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Information security and privacy in hospitals: a literature mapping and review of research gaps</article-title>
          <source>Inform Health Soc Care</source>
          <year>2023</year>
          <volume>48</volume>
          <issue>1</issue>
          <fpage>30</fpage>
          <lpage>46</lpage>
          <pub-id pub-id-type="doi">10.1080/17538157.2022.2049274</pub-id>
          <pub-id pub-id-type="medline">35300555</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nunes</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Antunes</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Silva</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Evaluating cybersecurity attitudes and behaviors in Portuguese healthcare institutions</article-title>
          <source>Procedia Comput Sci</source>
          <year>2021</year>
          <volume>181</volume>
          <fpage>173</fpage>
          <lpage>181</lpage>
          <pub-id pub-id-type="doi">10.1016/j.procs.2021.01.118</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Parsons</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>McCormac</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Butavicius</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Pattinson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Jerram</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)</article-title>
          <source>Comput Secur</source>
          <year>2014</year>
          <volume>42</volume>
          <fpage>165</fpage>
          <lpage>176</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2013.12.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Parsons</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Calic</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Pattinson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Butavicius</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>McCormac</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Zwaans</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>The Human Aspects of Information Security Questionnaire (HAIS-Q): two further validation studies</article-title>
          <source>Comput Secur</source>
          <year>2017</year>
          <volume>66</volume>
          <fpage>40</fpage>
          <lpage>51</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2017.01.004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Egelman</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Peer</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Scaling the security wall: developing a Security Behavior Intentions Scale (SeBIS)</article-title>
          <year>2015</year>
          <conf-name>CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems</conf-name>
          <conf-date>April 18-23, 2015</conf-date>
          <conf-loc>Seoul Republic of Korea</conf-loc>
          <publisher-loc>New York, U.S</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <fpage>2873</fpage>
          <lpage>2882</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.acm.org/doi/10.1145/2702123.2702249"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2702123.2702249</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hadlington</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours</article-title>
          <source>Heliyon</source>
          <year>2017</year>
          <volume>3</volume>
          <issue>7</issue>
          <fpage>e00346</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2405-8440(17)30998-2"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.heliyon.2017.e00346</pub-id>
          <pub-id pub-id-type="medline">28725870</pub-id>
          <pub-id pub-id-type="pii">S2405-8440(17)30998-2</pub-id>
          <pub-id pub-id-type="pmcid">PMC5501883</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ifinedo</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Akinnuwesi</surname>
              <given-names>BA</given-names>
            </name>
          </person-group>
          <article-title>Employees' non-malicious, counterproductive computer security behaviors (CCSB) in Nigeria and Canada: an empirical and comparative analysis</article-title>
          <year>2014</year>
          <conf-name>IEEE 6th International Conference on Adaptive Science &#38; Technology (ICAST)</conf-name>
          <conf-date>29-31 October 2014</conf-date>
          <conf-loc>Ota, Nigeria</conf-loc>
          <publisher-name>IEEE</publisher-name>
          <pub-id pub-id-type="doi">10.1109/icastech.2014.7068109</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fauzi</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Yeng</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Rachmayani</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Examining the link between stress level and cybersecurity practices of hospital staff in Indonesia</article-title>
          <year>2021</year>
          <conf-name>ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security</conf-name>
          <conf-date>August 17-20, 2021</conf-date>
          <conf-loc>Vienna, Austria</conf-loc>
          <publisher-loc>New York, U.S</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <fpage>1</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.acm.org/doi/10.1145/3465481.3470094"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3465481.3470094</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schmidt</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Nøhr</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Koppel</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>A simple assessment of information security awareness in hospital staff across five Danish regions</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2021</year>
          <volume>281</volume>
          <fpage>635</fpage>
          <lpage>639</lpage>
          <pub-id pub-id-type="doi">10.3233/SHTI210248</pub-id>
          <pub-id pub-id-type="medline">34042653</pub-id>
          <pub-id pub-id-type="pii">SHTI210248</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pollini</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Callari</surname>
              <given-names>TC</given-names>
            </name>
            <name name-style="western">
              <surname>Tedeschi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ruscio</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Save</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Chiarugi</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Guerri</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Leveraging human factors in cybersecurity: an integrated methodological approach</article-title>
          <source>Cogn Technol Work</source>
          <year>2022</year>
          <volume>24</volume>
          <issue>2</issue>
          <fpage>371</fpage>
          <lpage>390</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/34149309"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10111-021-00683-y</pub-id>
          <pub-id pub-id-type="medline">34149309</pub-id>
          <pub-id pub-id-type="pii">683</pub-id>
          <pub-id pub-id-type="pmcid">PMC8195225</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aljedaani</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Ahmad</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Zahedi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Babar</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Security awareness of end-users of mobile health applications: an empirical study</article-title>
          <year>2020</year>
          <conf-name>MobiQuitous 2020—17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services</conf-name>
          <conf-date>December 7-9, 2020</conf-date>
          <conf-loc>Darmstadt, Germany</conf-loc>
          <publisher-loc>New York, U.S</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <fpage>125</fpage>
          <lpage>136</lpage>
          <pub-id pub-id-type="doi">10.1145/3448891.3448952</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fernández-Alemán</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Sánchez-Henarejos</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Toval</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sánchez-García</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Hernández-Hernández</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Fernandez-Luque</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Analysis of health professional security behaviors in a real clinical setting: an empirical study</article-title>
          <source>Int J Med Inform</source>
          <year>2015</year>
          <volume>84</volume>
          <issue>6</issue>
          <fpage>454</fpage>
          <lpage>467</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2015.01.010</pub-id>
          <pub-id pub-id-type="medline">25678101</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(15)00013-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mishra</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Caputo</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Leone</surname>
              <given-names>GJ</given-names>
            </name>
            <name name-style="western">
              <surname>Kohun</surname>
              <given-names>FG</given-names>
            </name>
            <name name-style="western">
              <surname>Draus</surname>
              <given-names>PJ</given-names>
            </name>
          </person-group>
          <article-title>The role of awareness and communications in information security management: a health care information systems perspective</article-title>
          <source>IJMIS</source>
          <year>2014</year>
          <volume>18</volume>
          <issue>2</issue>
          <fpage>139</fpage>
          <lpage>148</lpage>
          <pub-id pub-id-type="doi">10.19030/ijmis.v18i2.8495</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alexandrou</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>LC</given-names>
            </name>
          </person-group>
          <article-title>A security risk perception model for the adoption of mobile devices in the healthcare industry</article-title>
          <source>Secur J</source>
          <year>2019</year>
          <volume>32</volume>
          <issue>4</issue>
          <fpage>410</fpage>
          <lpage>434</lpage>
          <pub-id pub-id-type="doi">10.1057/s41284-019-00170-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kessler</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Pindek</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kleinman</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Andel</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Spector</surname>
              <given-names>PE</given-names>
            </name>
          </person-group>
          <article-title>Information security climate and the assessment of information security risk among healthcare employees</article-title>
          <source>Health Informatics J</source>
          <year>2020</year>
          <volume>26</volume>
          <issue>1</issue>
          <fpage>461</fpage>
          <lpage>473</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/1460458219832048?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/1460458219832048</pub-id>
          <pub-id pub-id-type="medline">30866704</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Burke</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Oseni</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Jolfaei</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Gondal</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity indexes for eHealth</article-title>
          <year>2019</year>
          <conf-name>ACSW '19: Proceedings of the Australasian Computer Science Week Multiconference</conf-name>
          <conf-date>January 29-31, 2019</conf-date>
          <conf-loc>Sydney, NSW, Australia</conf-loc>
          <publisher-loc>New York, U.S</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <fpage>1</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1145/3290688.3290721</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ghasemi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Zahediasl</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Normality tests for statistical analysis: a guide for non-statisticians</article-title>
          <source>Int J Endocrinol Metab</source>
          <year>2012</year>
          <volume>10</volume>
          <issue>2</issue>
          <fpage>486</fpage>
          <lpage>489</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/23843808"/>
          </comment>
          <pub-id pub-id-type="doi">10.5812/ijem.3505</pub-id>
          <pub-id pub-id-type="medline">23843808</pub-id>
          <pub-id pub-id-type="pmcid">PMC3693611</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Corder</surname>
              <given-names>GW</given-names>
            </name>
            <name name-style="western">
              <surname>Foreman</surname>
              <given-names>DI</given-names>
            </name>
          </person-group>
          <source>Nonparametric Statistics for Non-Statisticians: A Step-by-Step Approach</source>
          <year>2009</year>
          <publisher-loc>Hoboken, New Jersey</publisher-loc>
          <publisher-name>A John Wiley &#38; Sons, Inc., Publication</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Spriestersbach</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Röhrig</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>du Prel</surname>
              <given-names>JB</given-names>
            </name>
            <name name-style="western">
              <surname>Gerhold-Ay</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Blettner</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Descriptive statistics: the specification of statistical measures and their presentation in tables and graphs. Part 7 of a series on evaluation of scientific publications</article-title>
          <source>Dtsch Arztebl Int</source>
          <year>2009</year>
          <volume>106</volume>
          <issue>36</issue>
          <fpage>578</fpage>
          <lpage>583</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/19890414"/>
          </comment>
          <pub-id pub-id-type="doi">10.3238/arztebl.2009.0578</pub-id>
          <pub-id pub-id-type="medline">19890414</pub-id>
          <pub-id pub-id-type="pmcid">PMC2770212</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hair</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Page</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Brunsveld</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <source>Essentials of Business Research Methods, 4th Edition</source>
          <year>2019</year>
          <publisher-loc>New York</publisher-loc>
          <publisher-name>Routledge</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gratian</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bandi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Cukier</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Dykstra</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ginther</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Correlating human traits and cyber security behavior intentions</article-title>
          <source>Comput Secur</source>
          <year>2018</year>
          <volume>73</volume>
          <fpage>345</fpage>
          <lpage>358</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2017.11.015</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arend</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Shabtai</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Idan</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Keinan</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Bereby-Meyer</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Passive- and not active-risk tendencies predict cyber security behavior</article-title>
          <source>Comput Secur</source>
          <year>2020</year>
          <volume>97</volume>
          <fpage>101964</fpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2020.101964</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Herath</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Rao</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness</article-title>
          <source>Decis Support Syst</source>
          <year>2009</year>
          <volume>47</volume>
          <issue>2</issue>
          <fpage>154</fpage>
          <lpage>165</lpage>
          <pub-id pub-id-type="doi">10.1016/j.dss.2009.02.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sebastian</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>George</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Jackson</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Persuading patients using rhetoric to improve artificial intelligence adoption: experimental study</article-title>
          <source>J Med Internet Res</source>
          <year>2023</year>
          <volume>25</volume>
          <fpage>e41430</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2023//e41430/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/41430</pub-id>
          <pub-id pub-id-type="medline">36912869</pub-id>
          <pub-id pub-id-type="pii">v25i1e41430</pub-id>
          <pub-id pub-id-type="pmcid">PMC10131865</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
