Relative Influence of Social Media Socio-Technical Information Security Factors on Medical Information Breaches in selected Medical Institutions in Uganda

Authors

  • Joe Mutebi Department of Information Technology, School of Mathematics and Computing, Kampala International University (KIU) – Main Campus, Kampala Uganda
  • Margaret Kareyo Department of Information Technology, School of Mathematics and Computing, Kampala International University (KIU) – Main Campus, Kampala Uganda
  • Victor Turiabe Department of Computing, Faculty of Science and Technology, Kampala International University (KIU) – Western Campus, Ishaka-Bushenyi, Uganda
  • Maxima Ainomugisha Department of Computing, Faculty of Science and Technology, Kampala International University (KIU) – Western Campus, Ishaka-Bushenyi, Uganda
  • Aderonke Aderonke Latifat Department of Computing, Faculty of Science and Technology, Kampala International University (KIU) – Western Campus, Ishaka-Bushenyi, Uganda

Keywords:

Social Media usage, Socio-technical, Usable-security, Social dimension, Technical dimension

Abstract

This manuscript presents a study based on research conducted to assess the relative impact of social media (SM) socio-technical information security factors on medical information breaches in selected medical institutions in Uganda. The study was motivated by reported cases of medical data breaches through the use of SM. Procedurally, the study used an online survey method using Google Forms and a literature search technique. Data were solicited from 566 medical students from Mbarara University of Science and Technology (MUST), and Kampala International University (KIU), accordingly. The key datasets collected included respondent’s demographic profile, SM usage characteristics, and medical information breaches. Through literature search, key SM socio-technical information security factors were identified. Afterwards, Spearman’s rank correlational analysis was performed to determine the type of relationships existing between SM socio-technical information security factors and medical information breaches. According to the percentage distribution summary of medical information breaches, the respondent’s level of agreement ranges from 39% to 43%. Spearman’s rank correlational coefficients (r-value) indicate significant levels (p ? 0.05) of correlational relationships for the key factors identified. However, 6 of the factors presented negative and stronger relationships, while 3 factors yielded weaker correlational relationships. Relatively, the results showed stronger relationships between the social dimensional factors, compared to the technical dimension. The negative relationships could imply that an increase in end-user compliance levels of SM socio-technical information security factors would minimize the occurrence of medical information breaches on SM. While the stronger relationship factors indicate the key SM usage factors associated with medical information breaches. Overall, the study outcome would provide empirical basis for medical institutions, SM researchers, and practitioners to rationalize and leverage SM usage in operations.

References

Alunyu, E., A., et al., (2021). Investigating the Impediments to Accessing Reliable, Timely and Integrated Electronic Patient Data in Healthcare Sites in Uganda. 522-532. 10.5220/0010266705220532.

Olum, R., Kajjimu, J., Kanyike, A.M., et al. (2020). Perspective of medical students on the COVID -19 pandemic: survey of nine medical schools in Uganda. JMIR Public Health Surveill. 6:e19847.

Kuteesa, J., Musiime, V., Munabi, G., et al. (2021). Specialty career preferences among final year medical students at Makerere University College of health science, Uganda: a mixed methods study. BMC Med Education Journal, 21, 215

Mirembe, D., Lubega, J. and Kibukamusoke, M. (2019) ‘Leveraging social media in higher education: a case of Universities in Uganda’, European Journal of Open, Distance and e-Learning, Vol. 22, No. 1, p.71, ISSN: 1027-5207 © 2019 EDEN

Kaddu, S., & Mukasa, G. (2016). Social media and Social Transformation in Uganda‘s families. African Research & Documentations, (128): 70-80

Roy, Taylor, J., Cheston, C., Flickinger, T.E., & Chisolm, M.S., (2016). Social Media: Portrait of an Emerging Tool in Medical Education, Academic Psychiatry Journal, 40(1):136-140

Mutebi, J., Kareyo, M., Chinecherem, U., & Paul, A. (2022). Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles. Journal of Computer and Communications, 10 (8), 41-63.

Nwankwo, W. & Chinecherem, U. (2020). Institunalising Social Network Solution in Tertiary Educational Institutions. Journal of Applied Sciences, Information and Computing, 1(1).

Fenwick, T. (2016). Social media, professionalism and higher education: a sociomaterial consideration. Studies in Higher Education, 41(4): 664-677.

Whyte, W., & Hennessy C. (2017). Social Media use within medical education: a systematic review to develop a pilot questionnaire on how social media can be best used at BSMS. Med Educ Publish, 6(2): 01-36

Surani, Z., et al., (2017). Social media usage among health care providers. BMC Res Notes 10, 654.

Lombardo, Mordonini, M., & Tomaiuolo, M. (2021). Adoption of Social Media in Socio-Technical Systems: A Survey. Information (Basel), 12(3), 132–. https://doi.org/10.3390/info12030132

Wilcox, & Bhattacharya, M. (2015). Countering Social Engineering through Social Media: An Enterprise Security Perspective. In Computational Collective Intelligence (pp. 54–64). Springer International Publishing. https://doi.org/10.1007/978-3-319-24306-1_6

Pander, T., Pinilla, S., Dimitriadis, K., & Fischer, M.R., (2014). The use of Facebook in medical education – A literature review. GMS Z Med Ausbild, 31(3):33.

Seh A. H., et al., (2020). Healthcare data breaches: insights and implications. Healthcare 8(2): 133

Katz M., Nandi N., (2021). Social Media and medical Education in the Context of the COVID-19 Pandemics: Scoping Review JMIR Med Educ, 7(2): e25892

HIPPA, (2018). De-identification of Protected Health Information. HPPA Journal. https://www.hipaajournal.com/de-identification-protected-health-information.

Jomin, G., & Takura, B., (2019). Security, Confidentiality, and Privacy in Health of Healthcare Data. International Journal of Trends in Scientific Research and Development, 3(4): 2456-6470.

Adler, J., Demicco, M., & Neiditz, J. (2015). Critical privacy and data security risk management issues for the franchisor. Franchise Law Journal, 35, 79-92

Liaw, S. T. & Hannan, T. (2011). Can we trust the PCEHR not to leak? Medical Journal of Australia. 195, 222.

Usher, K., Woods, C., Casella, E., Glass, N., Wilson, R., Mayner, L., Jackson, D., Brown, J., Duffy, E., Mather, C., Cummings, E. and Irwin, P. (2014). 'Australian health professions student use of social media', Collegian, 21(2): 95–101

Tayouri. (2015). The Human Factor in the Social Media Security – Combining Education and Technology to Reduce Social Engineering Risks and Damages. Procedia Manufacturing, 3, 1096–1100. https://doi.org/10.1016/j.promfg.2015.07.181

Mujinga, Eloff, M. M., & Kroeze, J. H. (2019). Towards a framework for online information security applications development: A socio-technical approach. South African Computer Journal, 31(1), 24–50. https://doi.org/10.18489/sacj.v31i1.587

Di Gangi, Johnston, A. C., Worrell, J. L., & Thompson, S. C. (2016). What could possibly go wrong? A multi-panel Delphi study of organizational social media risk. Information Systems Frontiers, 20(5), 1097–1116. https://doi.org/10.1007/s10796-016-9714-2

Schneiderman, B., Plaisant, C., Cohen, M., Jacobs, S., Elmqvist, N. & Diakopoulos, N. (2016). Designing the user interface: Strategies for effective human-computer interaction. Pearson Education.

Preece, J., Rogers, Y. & Sharp, H. (2015). Interaction design: Beyond Human Computer Interaction. Wiley and Sons.

Yeratziotis, Pottas, D., & Van Greunen, D. (2012). A Usable Security Heuristic Evaluation for the Online Health Social Networking Paradigm. International Journal of Human-Computer Interaction, 28(10), 678–694. https://doi.org/10.1080/10447318.2011.654202

Jain, Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157–2177. https://doi.org/10.1007/s40747-021-00409-7

Andrew Swinney. (2019). CREATING A SOCIAL MEDIA RISK ASSESSMENT. Bank News, 119(2), 10–13.

Thilini B G Herath, Prashant Khanna, & Monjur Ahmed. (2022). Cybersecurity Practices for Social Media Users: A Systematic Literature Review. Journal of Cybersecurity and Privacy, 2(1), 1–18. https://doi.org/10.3390/jcp2010001

Obrain T. Murire, Stephen Flowerday, Kariena Strydom, & Christoffel J.S. Fourie. (2021). Narrative review: Social media use by employees and the risk to institutional and personal information security compliance in South Africa. The Journal for Transdisciplinary Research in Southern Africa, 17(1), e1–e10. https://doi.org/10.4102/td.v17i1.909

Philip Nyblom, Gaute Wangen, & Vasileios Gkioulos. (2020). Risk Perceptions on Social Media Use in Norway. Future Internet, 12(12), 211–. https://doi.org/10.3390/fi12120211

Ma, Zhang, S., Li, G., & Wu, Y. (2019). Exploring information security education on social media use: Perspective of uses and gratifications theory. Aslib Journal of Information Management, 71(5), 618–636. https://doi.org/10.1108/AJIM-09-2018-0213

Albladi, & Weir, G. R. S. (2018). User characteristics that influence judgment of social engineering attacks in social networks. Human-Centric Computing and Information Sciences, 8(1). https://doi.org/10.1186/s13673-018-0128-7

He, W. (2012). A review of social media security risks and mitigation techniques. Journal of Systems and Information Technology, 14(2), 171-180.

Ferreira, Huynen, J.-L., Koenig, V., & Lenzini, G. (2014). A Conceptual Framework to Study Socio-Technical Security. In Human Aspects of Information Security, Privacy, and Trust (pp. 318–329). Springer International Publishing. https://doi.org/10.1007/978-3-319-07620-1_28.

Agrawal, Alenezi, M., Khan, S. A., Kumar, R., & Khan, R. A. (2022). Multi-level Fuzzy system for usable-security assessment. Journal of King Saud University. Computer and Information Sciences, 34(3), 657–665. https://doi.org/10.1016/j.jksuci.2019.04.007.

Qasem, N., Ali, M., Gul, A., & Bilal, S. (2014). Effect of Items Direction (Positive or Negative) on the 797 Factorial Construction and Criterion Related Validity in Likert Scale. Khazar Journal of 798 Humanities and Social Sciences, 17(3), 77-84.

Joshi, A., Kale, S., Chandel, S., & Pal, D. K. (2015). Likert scale: Explored and explained. Current Journal of Applied Science and Technology, 7(4): 396-403.

Zamanzadeh V, Ghahramanian A, Rassouli M, Abbaszadeh A, & Alavi, H. (2015). Design and implementation content validity Study: development of an instrument for measuring patient-centered communication. Journal of Caring Science; 4(5): 165-178.

Tamarah, S., & Samantha, S., (2018). Reliability and Validity of the Research Methods Skills Assessment, International Journal of Teaching and Learning in Higher Education, Volume 30 (1) 80-90.

Keya Rani Das, A. H. M. Rahmatullah Imon (2016). A Brief Review of Tests for Normality. American Journal of Theoretical and Applied Statistics. Vol. 5, No. 1, pp. 5-12. doi: 10.11648/j.ajtas.20160501.12

Mutebi, J., et al., (2022). A model for adopting a secure Social Media usage in selected Medical Institutions in Uganda. International Journal of Computer, 10 (10): 43 – 46

Mutebi, J., et al., (2022). Medical information breaches occurrence with respect to Social Media usage, in selected medical institutions in Uganda. Journal of Computer and Communications, 10 (10): 10 – 33

Akampurira P., Mutebi J. et al., (2022). A Framework for Evaluating the Usability of Mobile Learning Applications in Universities”, Journal of Science and Technology, 07, (05): 42-59

Downloads

Published

2022-11-28

How to Cite

Mutebi, J., Margaret Kareyo, Turiabe, V., Ainomugisha, M., & Aderonke Latifat, A. (2022). Relative Influence of Social Media Socio-Technical Information Security Factors on Medical Information Breaches in selected Medical Institutions in Uganda. International Journal of Computer (IJC), 45(1), 105–121. Retrieved from https://www.ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/1988

Issue

Section

Articles