<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//TaxonX//DTD Taxonomic Treatment Publishing DTD v0 20100105//EN" "../../nlm/tax-treatment-NS0.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:tp="http://www.plazi.org/taxpub" article-type="research-article" dtd-version="3.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">109</journal-id>
      <journal-id journal-id-type="index">urn:lsid:arphahub.com:pub:3dc5f44e-8666-58db-bc76-a455210e8891</journal-id>
      <journal-title-group>
        <journal-title xml:lang="en">JUCS - Journal of Universal Computer Science</journal-title>
        <abbrev-journal-title xml:lang="en">jucs</abbrev-journal-title>
      </journal-title-group>
      <issn pub-type="ppub">0948-695X</issn>
      <issn pub-type="epub">0948-6968</issn>
      <publisher>
        <publisher-name>Journal of Universal Computer Science</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.3217/jucs-024-05-0634</article-id>
      <article-id pub-id-type="publisher-id">23224</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group subj-group-type="scientific_subject">
          <subject>H.4.3 - Communications Applications</subject>
          <subject>J.3 - LIFE AND MEDICAL SCIENCES</subject>
          <subject>K.6.5 - Security and Protection</subject>
          <subject>L.7 - UBIQUITOUS/PERVASIVE/MOBILE</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Relating Mobile Device Use and Adherence to Information Security Policy with Data Breach Consequences in Hospitals</article-title>
      </title-group>
      <contrib-group content-type="authors">
        <contrib contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Vrhovec</surname>
            <given-names>Simon</given-names>
          </name>
          <email xlink:type="simple">simon.vrhovec@fvv.uni-mb.si</email>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Markelj</surname>
            <given-names>Blaž</given-names>
          </name>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
      </contrib-group>
      <aff id="A1">
        <label>1</label>
        <addr-line content-type="verbatim">University of Maribor, Ljubljana, Slovenia</addr-line>
        <institution>University of Maribor</institution>
        <addr-line content-type="city">Ljubljana</addr-line>
        <country>Slovenia</country>
      </aff>
      <author-notes>
        <fn fn-type="corresp">
          <p>Corresponding author: Simon Vrhovec (<email xlink:type="simple">simon.vrhovec@fvv.uni-mb.si</email>).</p>
        </fn>
        <fn fn-type="edited-by">
          <p>Academic editor: </p>
        </fn>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2018</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>28</day>
        <month>05</month>
        <year>2018</year>
      </pub-date>
      <volume>24</volume>
      <issue>5</issue>
      <fpage>634</fpage>
      <lpage>645</lpage>
      <uri content-type="arpha" xlink:href="http://openbiodiv.net/15FDC35E-F22E-5EED-9562-D9348FDA89BD">15FDC35E-F22E-5EED-9562-D9348FDA89BD</uri>
      <uri content-type="zenodo_dep_id" xlink:href="https://zenodo.org/record/5505173">5505173</uri>
      <history>
        <date date-type="received">
          <day>23</day>
          <month>01</month>
          <year>2018</year>
        </date>
        <date date-type="accepted">
          <day>28</day>
          <month>04</month>
          <year>2018</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>Simon Vrhovec, Blaž Markelj</copyright-statement>
        <license license-type="creative-commons-attribution" xlink:href="" xlink:type="simple">
          <license-p>This article is freely available under the J.UCS Open Content License.</license-p>
        </license>
      </permissions>
      <abstract>
        <label>Abstract</label>
        <p>Critical infrastructure is a high value target in the real world and cyberspace. A failure to protect the critical infrastructure in the cyberspace could lead to serious financial and material losses and violate the effective functioning of a country. In this paper, we will focus on healthcare as an important part of the critical infrastructure. An important part of the healthcare infrastructure are hospitals. Hospital personnel is increasingly using mobile devices in their everyday work to improve patient care. Hospitals may however fail to adequately address the use of mobile devices and adapt their information security policies in time. Hospital personnel may use both their personal and work mobile devices for everyday work. Sometimes they do it without adhering to an adequate hospital information security policy. The objective of this paper is to study the relation between the use of mobile devices, adhering to hospital information security policy and perceived consequences of data breaches. An exploratory survey (N = 95) has been conducted in a Slovenian hospital. Respondents were asked about the use of their personal and work mobile devices for accessing medical data, adhering to the hospital information security policy, and the perceived consequences of data breaches for themselves, the hospital and the patients. The results show that perceived personal consequences are negatively correlated with personal and work mobile device use for work. Also, adhering to information security policy is positively correlated with perceived data breach consequences for both the patients and the hospital.</p>
      </abstract>
    </article-meta>
  </front>
</article>
