Empirical data has consistently identified insider threat/user error as a leading cause of security breaches in the healthcare industry. To mitigate this, organizations often attempt to invest in technologies and the creation of new processes rather than focusing on more effective and innovative ways of educating and engaging the end users. This quantitative study compares the application of knowledge gained over time when educating healthcare professionals on proper procedures for handling sensitive data through the means of traditional versus gamification style training. The study utilized an experimental approach in order to test four hypotheses that compared the knowledge gained by healthcare professionals when administering different training techniques. The results of this research study suggest that gamification style training tailored toward security awareness could play an essential role in reducing the frequency of internal compromise within the healthcare industry. With the understanding that technology alone will not provide a sufficient safety net for managing human risk, healthcare providers should consider gamification as an option that can improve their cybersecurity infrastructure with minimal cost.
|Commitee:||Draus, Peter, Paullet, Karen|
|School:||Robert Morris University|
|Department:||Information Systems and Communications|
|School Location:||United States -- Pennsylvania|
|Source:||DAI-A 82/5(E), Dissertation Abstracts International|
|Subjects:||Educational technology, Information Technology, Health care management, Medical Ethics, Public health|
|Keywords:||Application of knowledge, Cybersecurity, Experiential Learning Theory, Game-based learning, Gamification, Security awareness, Healthcare industry|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be