• Sat. Apr 18th, 2026

Christina Antonelli

Connecting the World, Technology in Time

Information security behavior of healthcare professionals in the Sultanate of Oman based on the PMT model

Information security behavior of healthcare professionals in the Sultanate of Oman based on the PMT model
  • Kittur, L. J., Mehra, R. & Chandavarkar, B. R. The dependency of healthcare on security: Issues and challenges. In ICCCE 2020: Proceedings of the 3rd International Conference on Communications and Cyber Physical Engineering. 119–129. (Springer Nature Singapore, 2020). https://doi.org/10.1007/978-981-15-7961-5_12

  • Folasole, A., Adegboye, O. S., Ekuewa, O. I. & Eshua, P. E. Security, privacy challenges and available countermeasures in electronic health record systems: A review. Eur. J. Electr. Eng. Comput. Sci. 7 (6), 27–33. (2023).

    Article 

    Google Scholar 

  • Rai, A. Case studies on disproportionate impact of cyberattacks in the healthcare sector. J. High. School Res. (2024).

    Article 

    Google Scholar 

  • Khan, M. Healthcare cybersecurity: A mini review on recent incidents and preventive strategies. SSN J. Manage. Technol. Res. Commun. (2024).

    Article 

    Google Scholar 

  • Triplett, W. Ransomware attacks on the healthcare industry. J. Bus. Technol. Leadersh. 4 (1), 1–13. (2022).

    Article 

    Google Scholar 

  • Cartwright, A. J. The elephant in the room: cybersecurity in healthcare. J. Clin. Monit. Comput. 37 (5), 1123–1132. (2023).

    Article 
    PubMed 

    Google Scholar 

  • Ifinedo, P. Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput. Secur. 31 (1), 83–95. (2012).

    Article 

    Google Scholar 

  • Hearth, T. & Rao, H. R. Protection motivation and deterrence: A framework for security policy compliance in organizations. Eur. J. Inform. Syst. 18 (2), 106–125. (2009).

    Article 

    Google Scholar 

  • Workman, M., Bommer, W. H. & Straub, D. Security lapses and the omission of information security measures: A threat control model and empirical test. Comput. Hum. Behav. 24 (6), 2799–2816. (2008).

    Article 

    Google Scholar 

  • Rogers, R. W. A protection motivation theory of fear appeals and attitude change1. J. Psychol. 91 (1), 93–114 (1975).

    Article 
    PubMed 

    Google Scholar 

  • Maddux, J. E. & Rogers, R. W. Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. J. Exp. Soc. Psychol. 19 (5), 469–479. (1983).

    Article 

    Google Scholar 

  • Jalali, M. S. & Kaiser, J. P. Cybersecurity in hospitals: a systematic, organizational perspective. J. Med. Internet. Res. 20 (5), e10059. (2018).

    Article 
    PubMed 
    PubMed Central 

    Google Scholar 

  • Moody, G. D., Siponen, M. & Pahnila, S. Toward a unified model of information security policy compliance. MIS Q. 42 (1), 285–A22. (2018).

    Article 

    Google Scholar 

  • Towbin, R. S. A Protection Motivation Theory Approach To Healthcare Cybersecurity: A Multiple Case Study (Northcentral University, 2019).

  • Lebek, B., Uffen, J., Neumann, M., Hohler, B., Breitner, H. & M Information security awareness and behavior: a theory-based literature review. Manage. Res. Rev. 37 (12), 1049–1092 (2014).

    Article 

    Google Scholar 

  • Menard, P., Warkentin, M. & Lowry, P. B. The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination. Computers Secur. 75, 147–166. (2018).

    Article 

    Google Scholar 

  • Ma, X. IS professionals’ information security behaviors in Chinese IT organizations for information security protection. Inf. Process. Manag. 59 (1), 102744. (2022).

    Article 

    Google Scholar 

  • Floyd, D. L., Prentice-Dunn, S. & Rogers, R. W. A meta‐analysis of research on protection motivation theory. J. Appl. Soc. Psychol. 30 (2), 407–429. (2000).

    Article 

    Google Scholar 

  • Van Bavel, R., Rodríguez-Priego, N., Vila, J. & Briggs, P. Using protection motivation theory in the design of nudges to improve online security behavior. Int. J. Hum. Comput. Stud. 123, 29–39. (2019).

    Article 

    Google Scholar 

  • Liang, H. & Xue, Y. Avoidance of information technology threats: A theoretical perspective. MIS Q. 71–90. (2009).

  • Lee, Y. & Larsen, K. R. Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software. Eur. J. Inform. Syst. 18 (2), 177–187. (2009).

    Article 

    Google Scholar 

  • Hwang, I., Kim, D., Kim, T. & Kim, S. Why not comply with information security? An empirical approach for the causes of non-compliance. Online Inf. Rev. 41 (1), 2–18. (2017).

    Article 

    Google Scholar 

  • Nelson, R. Factors that Influence Medical Professionals’ Noncompliance with Organizational Mobile Device Security Policies (Doctoral Dissertation, Capella University, 2019).

  • Haag, S., Siponen, M. & Liu, F. Protection motivation theory in information systems security research: A review of the past and a road map for the future. ACM SIGMIS Database: DATABASE Adv. Inform. Syst. 52 (2), 25–67. (2021).

    Article 

    Google Scholar 

  • Li, W., Liu, R., Sun, L., Guo, Z. & Gao, J. An investigation of employees’ intention to comply with information security system—A mixed approach based on regression analysis and FsQCA. Int. J. Environ. Res. Public Health. 19 (23). (2022).

  • Johnston, A. C., Warkentin, M. & Siponen, M. An enhanced fear appeal rhetorical framework. MIS Q. 39 (1), 113–134. (2015).

    Article 

    Google Scholar 

  • Schneider, M. Protection Motivation Theory Factors that Influence Undergraduates to Adopt Smartphone Security Measures (Doctoral Dissertation, Capella University, 2020).

  • Tsai, H. Y. S. et al. Understanding online safety behaviors: A protection motivation theory perspective. Computers Secur. 59, 138–150. (2016).

    Article 

    Google Scholar 

  • Khan, N. F., Murtaza, H., Malik, K., Mahmood, M. & Asadi, M. A. Explanatory and predictive analysis of smartphone security using protection motivation theory: a hybrid SEM-AI approach. Inform. Technol. People. 38 (4), 2041–2068 (2025).

    Article 

    Google Scholar 

  • Warkentin, M., Johnston, A. C., Shropshire, J. & Barnett, W. D. Continuance of protective security behavior: A longitudinal study. Decis. Support Syst. 92, 25–35. (2016).

    Article 

    Google Scholar 

  • Thompson, N., McGill, T. & Narula, N. No point worrying’–The role of threat devaluation in information security behavior. Comput. Secur. 143. (2024).

  • Burns, A. J., Posey, C., Roberts, T. L. & Lowry, P. B. Examining the relationship of organizational insiders’ psychological capital with information security threat and coping appraisals. Comput. Hum. Behav. 68, 190–209 (2017).

    Article 

    Google Scholar 

  • Almansoori, A., Al-Emran, M. & Shaalan, K. Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories. Appl. Sci. 13 (9), 5700. (2023).

    Article 
    CAS 

    Google Scholar 

  • Bandura, A. Self-Efficacy: The Exercise of Control (Macmillan, 1997).

  • Bandura, A. Social Foundations of Thought and Action (Englewood Cliffs, 1986).

  • Borgert, N. et al. Self-efficacy and security behavior: Results from a systematic review of research methods. In Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems. 1–32. (2024). https://doi.org/10.1145/3613904.3642432

  • Vance, A., Siponen, M. & Pahnila, S. Motivating IS security compliance: insights from habit and protection motivation theory. Inf. Manag. 49 (3–4), 190–198. (2012).

    Article 

    Google Scholar 

  • Mortada, E., Abdel-Azeem, A., Al Showair, A. & Zalat, M. M. Preventive behaviors towards Covid-19 pandemic among healthcare providers in Saudi Arabia using the protection motivation theory. Risk Manag. Healthc. Policy 685–694. (2021).

  • Sreenath, S. S., Hewitt, B. & Sreenath, S. Understanding security behaviour among healthcare professionals by comparing results from technology threat avoidance theory and protection motivation theory. Behav. Inform. Technol. 44 (2), 181–196. (2024).

    Article 

    Google Scholar 

  • Sari, P. K., Handayani, P. W., Hidayanto, A. N., Yazid, S. & Aji, R. F. Information security behavior in health information systems: A review of research trends and antecedent factors. In Healthcare. Vol. 10(12) 2531. (MDPI, 2022). https://doi.org/10.3390/healthcare10122531

  • Yeng, P. K., Fauzi, M. A. & Yang, B. A comprehensive assessment of human factors in cyber security compliance toward enhancing the security practice of healthcare staff in paperless hospitals. Information 13 (7), 335. (2022).

    Article 

    Google Scholar 

  • Yeng, P. K., Fauzi, M. A. & Yang, B. Assessing the effect of human factors in healthcare cyber security practice: An empirical study. In Proceedings of the 25th Pan-Hellenic Conference on Informatics. 472–476. (2021). https://doi.org/10.1145/3503823.3503909

  • Kiran, U., Khan, N. F., Murtaza, H., Farooq, A. & Pirkkalainen, H. Explanatory and predictive modeling of cybersecurity behaviors using protection motivation theory. Computers Secur. 149, 104204 (2025).

    Article 

    Google Scholar 

  • Khan, N. F., Ikram, N., Murtaza, H. & Javed, M. Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick’s model. Computers Secur. 125, 103049 (2023).

    Article 

    Google Scholar 

  • Simon, J., Watson, S. J., & van Sintemaartensdijk, I. Response-efficacy messages produce stronger passwords than self-efficacy messages… for now: A longitudinal experimental study of the efficacy of coping message types on password creation behaviour. Comput. Hum. Behav. Rep. 17, 100615 (2025).

  • van’t Hoff-de Goede, M. S., Leukfeldt, E. R., van de Weijer, S. G. A. & van der Kleij, R. Does protection motivation predict self-protective online behaviour? Comparing self-reported and actual online behaviour using a population-based survey experiment. Computers Hum. Behav. Rep. 18, 100649 (2025).

    Article 

    Google Scholar 

  • Khan, N. F., Ikram, N. & Saleem, S. Effects of socioeconomic and digital inequalities on cybersecurity in a developing country. Secur. J. 1 (2023).

  • Khan, N. F., Ikram, N. & Saleem, S. Digital divide and socio-economic differences in smartphone information security behaviour among university students: empirical evidence from Pakistan. Int. J. Mobile Commun. 22 (1), 1–24 (2023b).

    Article 
    CAS 

    Google Scholar 

  • Kanimozhi, R., Padmavathi, V. & Ramesh, P. S. Perceived digital threats influencing smartphone use among the aging population. Sci. Rep. 15 (1), 27813 (2025).

    Article 
    ADS 
    CAS 
    PubMed 
    PubMed Central 

    Google Scholar 

  • Khadka, K. & Ullah, A. B. Human factors in cybersecurity: an interdisciplinary review and framework proposal. Int. J. Inf. Secur. 24, 119. (2025).

    Article 

    Google Scholar 

  • Zou, Y. et al. Encouraging users to change breached passwords using the protection motivation theory. ACM Trans. Computer-Human Interact. 31 (5), 1–45 (2024).

    Article 

    Google Scholar 

  • Weber, A. S. et al. Systematic thematic review of e-health research in the Gulf Cooperation Council (Arabian Gulf): Bahrain, Kuwait, Oman, Qatar, Saudi Arabia and United Arab Emirates. J. Telemed. Telecare. 23, 452–459. (2017).

    Article 
    ADS 
    PubMed 

    Google Scholar 

  • Al-Azri, M. H., Al-Belushi, R., Al-Mamari, M., Davidson, R. & Mathew, A. C. Knowledge and health beliefs regarding sickle cell disease among Omanis in a primary healthcare setting: cross-sectional study. Sultan Qaboos Univ. Med. J. 16 (4), e437. (2016).

    Article 
    PubMed 
    PubMed Central 

    Google Scholar 

  • Al-Farsi, O. A. et al. A study on knowledge, attitude, and practice towards premarital carrier screening among adults attending primary healthcare centers in a region in Oman. BMC Public. Health. 14, 1–7. (2014).

    Article 

    Google Scholar 

  • Qoronflesh, M. W., Essa, M. M., Alharahsheh, S. T., Al-Farsi, Y. M. & Al-Adawi, S. Autism in the Gulf states: A regional overview. Front. Bioscience-Landmark. 24 (2), 334–346. (2019).

    Article 

    Google Scholar 

  • MOH. MOH Annual Report. (2020).

  • Walliman, N. Research Methods: The Basics (Routledge, 2011).

  • Oniwinde, B. The essence of compliance is making choices. Social Sci. Res. Netw. (2024).

    Article 

    Google Scholar 

  • Lowry, P. B. & Moody, G. D. Proposing the control-reactance compliance model CRCM to explain opposing motivations to comply with organisational information security policies. Inform. Syst. J. 25 (5), 433–463. (2015).

    Article 

    Google Scholar 

  • Bozeman, B. Rules compliance behavior: A heuristic model. Perspect. Public. Manage. Gov. 5 (1), 36–49. (2022).

    Article 

    Google Scholar 

  • link

    By admin