IDEAS home Printed from https://ideas.repec.org/a/taf/tjisxx/v25y2016i2p91-109.html
   My bibliography  Save this article

Factors influencing the intention to comply with data protection regulations in hospitals: based on gender differences in behaviour and deterrence

Author

Listed:
  • Michael Foth

Abstract

German hospitals are required to comply with, and give due consideration to, the data protection laws and regulations that apply to their daily work. However, the data protection scandals that have occurred in Germany in recent years imply that this compliance on the part of hospital employees cannot be taken for granted. According to the literature available, psychological factors may account for this fact – in particular the variables of the theory of planned behaviour and the general deterrence theory. In keeping with these theories, this research has analysed the influences of the attitudes, subjective norms and perceived behavioural control on employees’ intentions to comply with data protection regulations. A survey was conducted among hospital employees in Germany to further identify the most significant factors influencing their intention to comply with data protection and the variance in intention between men and women. The results suggest that psychological factors such as attitude, subjective norms and perceived behaviour control are significantly influential and find significant differences between the genders in the intention to comply with data protection regulations. The results of this study demonstrate that there are practical implications that, if implemented, can lead to a higher standard of data protection compliance in hospitals in the future by taking the technical and organisational measures of awareness for data protection compliance into account.

Suggested Citation

  • Michael Foth, 2016. "Factors influencing the intention to comply with data protection regulations in hospitals: based on gender differences in behaviour and deterrence," European Journal of Information Systems, Taylor & Francis Journals, vol. 25(2), pages 91-109, March.
  • Handle: RePEc:taf:tjisxx:v:25:y:2016:i:2:p:91-109
    DOI: 10.1057/ejis.2015.9
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1057/ejis.2015.9
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1057/ejis.2015.9?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. A. J. Burns & Tom L. Roberts & Clay Posey & Paul Benjamin Lowry & Bryan Fuller, 2023. "Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse," Information Systems Research, INFORMS, vol. 34(1), pages 342-362, March.
    2. Davit Marikyan & Savvas Papagiannidis, 2024. "Exercising the “Right to Repair”: A Customer’s Perspective," Journal of Business Ethics, Springer, vol. 193(1), pages 35-61, August.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:taf:tjisxx:v:25:y:2016:i:2:p:91-109. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Longhurst (email available below). General contact details of provider: http://www.tandfonline.com/tjis .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.