Volume 10, Issue 2 (2022)                   Health Educ Health Promot 2022, 10(2): 369-375 | Back to browse issues page

XML Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Ali Alferjanya M, Musaed Al-mwald M, Alias R. The Effect of Cyber Security Knowledge on Employees’ Personal Growth: An Empirical Study in Private Hospitals in Libya and Yemen. Health Educ Health Promot 2022; 10 (2) :369-375
URL: http://hehp.modares.ac.ir/article-5-61748-en.html
1- College of Graduated Studies, Universti Tenaga National, Putrajaya, Malaysia
2- College of Computing and Informatics, Universti Tenaga National, Putrajaya, Malaysia
3- Graduate Business School, Universiti Tenaga National, Putrajaya, Malaysia
Abstract:   (785 Views)
Aims: This study aimed to explore the effect of cyber security knowledge (proactive, reactive, and active) on employees’ personal growth (growth mindset, metacognition, and self-authorship) in private hospitals in Libya and Yemen.
Instrument & Methods: The descriptive analytical approach was used to determine the relationship between the independent CSK and dependent variable PG, the current study took place in March 2021 and was applied to a stratified random sample of 164 managers from the middle and lower management. 
Findings: The stability values of the main variables indicated that in general, the study instrument has a high stability coefficient and its ability to achieve the study objectives is high. There was a low dispersion in the responses about proactive, reactive, development of talents, growth mindset, metacognition, and self-authorship in private hospitals in Libya and Yemen. Generally, it turns out that the reality of the study sample's point of view was low. The coefficient of determination R2 showed its value of changes in a growth mindset in private hospitals in Libya & Yemen is due to the change in CSK.
Conclusion: Results indicated a lack of understanding of cyber threats and recommended mitigations and uncertainty regarding applicable legislation governing electronic patient information; also, the level of CSK & PG in the studied hospitals was low. The findings also show that CSK positively affects employees’ PG beyond the demographic differences in respondents.
 
Full-Text [PDF 737 kb]   (828 Downloads) |   |   Full-Text (HTML)  (673 Views)  
Article Type: Descriptive & Survey | Subject: Technology of Health Education
Received: 2022/04/22 | Accepted: 2022/06/5 | Published: 2022/06/15
* Corresponding Author Address: (pm20929@student.uniten.edu.my)

References
1. Le Cunff AL. Mind framing: a proposed framework for personal growth [Internet]. NESS LABS; 2019 [Cited 2022 Mar 3]. Available from: https://nesslabs.com/mindframing [Link] [DOI:10.2139/ssrn.3443568]
2. Senn MJE, editor. Symposium on the healthy personality. Josiah Macy, Jr. Foundation; 1950. [Link]
3. McLeod S. Erik Erikson's stages of psychosocial development. Simply Psychol [Internet]. New York: Simply Psychology; 2018 [Cited 2022 Mar 3]. Available from: https://www.simplypsychology.org/Erik-Erikson.html [Link]
4. Ryff CD, Boylan JM, Kirsch JA. Disagreement about recommendations for measurement of well-being. Prev Med. 2020;139:106049. [Link] [DOI:10.1016/j.ypmed.2020.106049]
5. Pakrosnis R, Cepukiene V. Solution-focused self-help for improving university students' wellbeing. Innov Educ Teach Int. 2015;52(4):437-47. [Link] [DOI:10.1080/14703297.2014.930352]
6. Shoukry H, Cox E. Coaching as a social process. Manag Learn. 2018;49(4):413-28. [Link] [DOI:10.1177/1350507618762600]
7. World Health Organization. Primary Care. Geneva: World Health Organization; 2022 [Cited 2022 Mar 5]. Available from: https://www.who.int/teams/integrated-health-services/clinical-services-and-systems/primary-care. [Link]
8. Wani TA, Mendoza A, Gray K. Hospital bring-your-own-device security challenges and solutions: systematic review of gray literature. JMIR mHealth uHealth. 2020;8(6):e18175. [Link] [DOI:10.2196/18175]
9. Seh AH, Zarour M, Alenezi M, Sarkar AK, Agrawal A, Kumar R, et al. Healthcare data breaches: insights and implications. Healthcare. 2020;8(2):133. [Link] [DOI:10.3390/healthcare8020133]
10. Yari IA, Dehling T, Kluge F, Geck J, Sunyaev A, Eskofier B. Security engineering of patient-centered health care information systems in peer-to-peer environments: systematic review. J Med Internet Res. 2021;23(11):e24460. [Link] [DOI:10.2196/24460]
11. Karyda M, Mitrou L. Data breach notification: issues and challenges for security management. MCIS. 2016:60. [Link]
12. Dong K, Ali RF, Dominic PDD, Ali SEA. The effect of organizational information security climate on information security policy compliance: the mediating effect of social bonding towards healthcare nurses. Sustainability. 2021;13(5):2800. [Link] [DOI:10.3390/su13052800]
13. Cram WA, Proudfoot JG, D'arcy J. Organizational information security policies: a review and research framework. Eur J Inf Syst. 2017;26(6):605-41. [Link] [DOI:10.1057/s41303-017-0059-9]
14. Anwar M, He W, Ash I, Yuan X, Li L, Xu LD. Gender difference and employees' cybersecurity behaviors. Comput Hum Behav. 2017;69:437-43. [Link] [DOI:10.1016/j.chb.2016.12.040]
15. Mitosis KD, Lamnisos D, Talias MA. Talent management in healthcare: a systematic qualitative review. Sustainability. 2021;13(8):4469. [Link] [DOI:10.3390/su13084469]
16. van Woerkom M, Meyers MC. Strengthening personal growth: The effects of a strength's intervention on personal growth initiative. J Occup Organiz Psychol. 2019;92(1):98-121. [Link] [DOI:10.1111/joop.12240]
17. Argaw ST, Troncoso-Pastoriza JR, Lacey D, Florin MV, Calcavecchia F, Anderson D, et al. Cybersecurity of Hospitals: discussing the challenges and working towards mitigating the risks. BMC Med Inf Decis Mak. 2020;20(1). [Link] [DOI:10.1186/s12911-020-01161-7]
18. Song JY, Park JE. The effects of strategy of enhanced metacognition on the improvement of creative problem solving skills. J Digit Converg. 2017;15(7):1-2. [Link]
19. Offner KL, Sitnikova E, Joiner K, MacIntyre CR. Towards understanding cybersecurity capability in Australian healthcare organizations: a systematic review of recent trends, threats and mitigation. Intell Nat Secur. 2020;35(4):556-85. [Link] [DOI:10.1080/02684527.2020.1752459]
20. Al-Muhtadi J, Shahzad B, Saleem K, Jameel W, Orgun MA. Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment. Health Inform J. 2019;315-29. [Link] [DOI:10.1177/1460458217706184]
21. Alonso SG, Arambarri J, López-Coronado M, de la Torre Díez I. Proposing new blockchain challenges in eHealth. J Med Syst. 2019;43:64. [Link] [DOI:10.1007/s10916-019-1195-7]
22. Bhuyan SS, Kabir UY, Escareno JM, Ector K, Palakodeti S, Wyant D, Kumar S, Levy M, Kedia S, Dasgupta D, Dobalian A. Transforming healthcare cybersecurity from reactive to proactive: current status and future recommendations. J med syst. 2020;44(5):1-9. [Link] [DOI:10.1007/s10916-019-1507-y]
23. Yeng PK, Yang B, Snekkenes EA. Healthcare staffs' information security practices towards mitigating data breaches: a literature survey. Stud Health Technol Inform. 2019;261:239-45. [Link]
24. O'Connor P. O'Connor P, Benţa MI, editors. The technologisation of the social: a political anthropology of the digital machine. London: Routledge; 2021. [Link]
25. Galinec D, Moznik D, Guberina B. Cybersecurity and cyber defense: national level strategic approach. Automatika. 2017;58(3):273-86. [Link] [DOI:10.1080/00051144.2017.1407022]
26. Wong LW, Lee VH, Tan GW, Ooi KB, Sohal A. The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. Int J Inf Manag. 2022;66:102520. [Link] [DOI:10.1016/j.ijinfomgt.2022.102520]
27. Chen P, Chavez O, Ong DC, Gunderson B. Strategic resource use for learning: a self-administered intervention that guides self-reflection on effective resource use enhances academic performance. Psychol Sci. 2017;28(6):774-85. [Link] [DOI:10.1177/0956797617696456]
28. Sekaran U, Bougie R. Research methods for business: a skill building approach. 7th Edition. Hoboken: Wily; 2016. [Link]

Add your comments about this article : Your username or Email:
CAPTCHA

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.