Iranian Journal of Information Processing and Management

Iranian Journal of Information Processing and Management

Providing a model of protective behavior against the concern of group privacy violations (case study: social security medical centers)

Authors
Abstract
This study aims to provide a model of protective behavior against the concern of violating the group's privacy. The current research is an applied-developmental research in terms of its purpose, and it is a survey-cross-sectional research from the point of view of the data collection method. A mixed exploratory design has been used to achieve the goal of the research. The statistical population includes the treatment and administrative staff of the Social Security Organization of Semnan Province, numbering 652 people, and the sample size was estimated to be 277 people using Cochran's formula. Interviews and questionnaires were used to collect data. The underlying categories of the three branches of management were identified by thematic analysis method and the final model was validated by the structural equation modeling method. Qualitative data analysis was done with Maxqda software and quantitative part with LISREL. The results have shown that the overarching categories are grouped in the form of factors of concern about the violation of group privacy and protection. Organizing factors also include concerns about privacy violations of group members, group nature, group behavior, group communication, group information, caution, restriction, intervention, and control. Also, the moderating effect of formality and centrality of the group on the path of concern about violation of group privacy to protective behavior has been investigated and confirmed.
Keywords

آزاده، محمدرضا، طاهره رمضانی، و زهرا طاهری. 1399. عوامل مؤثر بر رفتارهای محافظتی محل کار بیماری کرونا در کارمندان ادارات پرتردد. سلامت کار ایران 17 (1): 115-125.
اصفهانی، پروانه، منیره شمسایی، و طیبه سرزهی. 1399. بررسی دیدگاه بیماران بستری نسبت به حفظ حریم خصوصی در بیمارستان آموزشی. مجلة دانشکده پزشکی زابل 3 (1): 15-21.
حبیبی، آرش، و مریم عدن‌ور. 1396. مدل‌یابی معادلات ساختاری و تحلیل عاملی. تهران: انتشارات جهاد دانشگاهی.
محتوای کیفی. مجله مراقبت پرستاری و مامایی ابن‌سینا. ۲۷ (۶): 441-۴۵۰.
دهقانی، فریبا، محمد عباسی، اکرم حیدری، و منصوره شاکری. 1394. دیدگاه بیماران نسبت به حفظ حریم خصوصی توسط کادر درمان بیمارستان شهید بهشتی قم. نشریه پرستاری ایران ۲۸ (۹۸): ۶۶-۵۸.
صفا، نیما، روحیه فرزانه، و عطیه صفایی. 1400. بررسی رعایت حریم خصوصی بیماران در بخش اورژانس. طب اورژانس ایران 8 (1): 1-25.
قارونی، کسری، فاطمه یعقوبی، و بهنام قارونی. 1400. بررسی میزان آگاهی دندان‌پزشکان عمومی در مورد رعایت منشور حقوق بیماران. اخلاق پزشکی 15 (46): 1-13.
مجاهد، افشین. 1400. رویکردی تطبیقی بر حریم خصوصی. پژوهش‌های حقوق تطبیقی عدل و انصاف 4 (13): 7--26.
موگهی، ساسانف معصومه تاجیک، و ماریا چراغی. 1399. بررسی میزان رعایت حریم خصوصی بیماران سالمند در مراکز آموزشی و ‌درمانی. اخلاق و تاریخ پزشکی ایران ۱۳ (۱): 607-۶۱۸.
Adhikari, K., & R. K. Panda. 2018. Users' information privacy concerns and privacy protection behaviors in social networks. Journal of Global Marketing 31 (2): 96-110.
Altman, Irwin. 1975. Environment and Social Behavior, Monterey. Ca: Brooks/ Cole.
Attride-Stirling, J. 2001. Thematic networks: an analytic tool for qualitative research. Qualitative research 1 (3): 385-405.
Braun, V. & V. Clarke. 2006. Using thematic analysis in psychology. Journal of Qualitative Research in Psychology 3 (2): 77-101.
Cameron, J., M. Thurlin, N. Z. Hilton, L. C. Ball, L. Marshall & N. J, Kolla. 2022. Privacy and safety: Issues of dual compliance in high-secure and other forensic psychiatric hospitals. International Journal of Law and Psychiatry 8 (2): 761-780.
Gerber, l., & R. Von Solms. 2018 Information Security Management (1): Why Information Security is so Important. Information Management and Computer Security. Journal of Association Information Systems 6: 174-177.
Han, L., Y. Li, B. A. Niknam & J. R. Zubizarreta. 2022. Privacy-Preserving and Communication-Efficient Causal Inference for Hospital Quality Measurement. arXiv preprint arXiv:21 (3): 768-789.
Hausler, N., M. Bopp, & O. Hämmig. 2018. Effort–Reward Imbalance, Work–Privacy Conflict, and Burnout Among Hospital Employees. Journal of occupational and environmental medicine 60 (4): 183-187.
Holsti, O. R. 1969. Content analysis for the social sciences and humanities, Reading. MA: Addison-Wesley.
Kansal, P. 2014. Online privacy concerns and consumer reactions: Insights for future strategies. Journal of Indian Business Research
Kerkouche, R., G. Acs, C. Castelluccia & P. Genevès. 2021. Privacy-preserving and bandwidth-efficient federated learning: an application to in-hospital mortality prediction. In Proceedings of the Conference on Health. Inference, and Learning 1 (1): 25-35.
Krasnova, H., N. F. Veltri & O. Günther. 2012. Self-disclosure and privacy calculus on social networking sites: the role of culture. Business & Information Systems Engineering 4 (3): 127-135.
Mamonov, R. & N. Benbunan-Fich. 2018 Information Security Management (1): Why Information Security is so Important. Information Management and Computer Security. Journal of Association Information Systems 6: 174-177.
Marshan, A., I. Tussyadiah & A. Ioannou. 2021. Dispositional mindfulness as an antecedent of privacy concerns: A protection motivation theory perspective. Psychology & Marketing 38 (10): 1766-1778.
McGraw, D., & K. D. Mandl. 2021. Privacy protections to encourage use of health-relevant digital data in a learning health system. NPJ digital medicine 4 (1): 1-11.
Mou, J., J. F. Cohen, A. Bhattacherjee & J. Kim. 2022. A Test of Protection Motivation Theory in the Information Security Literature: A Meta-Analytic Structural Equation Modeling Approach. Journal of the Association for Information Systems 23 (1): 196-236.
Park, E. & Y. S. Chung. 2017. The Role of Information Security Learning and Individual Factors in Disclosing Patients’ Health Information. Computers & Security 65: 64- 76.
Sharma, A., V. Feuer, B. K. Stuart, J. B. Folk, B. T. Doan, C. A. Kulkarni, ... & K. Myers. 2021. Home-Based Telemental Health: A Proposed Privacy and Safety Protocol and Tool. Journal of Child and Adolescent Psychopharmacology 31 (7): 464-474.
Skinner, G., S. Han & E, Chang. 2006. An information privacy taxonomy for collaborative environments. Information management & computer security 14 (4): 382-394.
Smith, H. J., T. Dinev & H. Xu. 2011. Information privacy research: an interdisciplinary review. MIS quarterly : 989-1015.
Thomas, A. 2017. Multivariate hybrid pathways for creating exceptional customer experiences. Business Process Management Journal 23 (4): 822-829.
Van Scheek, Y., M. Lee, Y. Jun, Y. Lee, J. Cho & M. Kwon. 2018. Revision of the Measurement Tool for Patients’ Health Information Protection Awareness. Healthcare Informatics Research 22 (3): 206–216.
Watson-Manheim, M. B. & F. Belanger. 2007. Communication media repertoires: Dealing with the multiplicity of media choices. MIS quarterly : 267-293.
Westland, J. C. 2010. Lower bounds on sample size in structural equation modeling. Electronic commerce research and applications 9 (6): 476-487.
Volume 38, Issue 3 - Serial Number 113
Spring 2023
Pages 1041-1065

  • Receive Date 10 December 2022
  • Revise Date 28 January 2023