<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="research-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">Online J Public Health Inform</journal-id><journal-id journal-id-type="publisher-id">ojphi</journal-id><journal-id journal-id-type="index">45</journal-id><journal-title>Online Journal of Public Health Informatics</journal-title><abbrev-journal-title>Online J Public Health Inform</abbrev-journal-title><issn pub-type="epub">1947-2579</issn><publisher><publisher-name>JMIR Publications</publisher-name><publisher-loc>Toronto, Canada</publisher-loc></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">v16i1e57764</article-id><article-id pub-id-type="doi">10.2196/57764</article-id><article-categories><subj-group subj-group-type="heading"><subject>Original Paper</subject></subj-group></article-categories><title-group><article-title>Attitudes of Health Professionals Toward Digital Health Data Security in Northwest Ethiopia: Cross-Sectional Study</article-title></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name name-style="western"><surname>Gebeyew</surname><given-names>Ayenew Sisay</given-names></name><degrees>BSc, MPH</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Wordofa</surname><given-names>Zegeye Regasa</given-names></name><degrees>BSc, MPH</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Muluneh</surname><given-names>Ayana Alebachew</given-names></name><degrees>BSc, MPH</degrees><xref ref-type="aff" rid="aff2">2</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Shibabaw</surname><given-names>Adamu Ambachew</given-names></name><degrees>BSc, MPH</degrees><xref ref-type="aff" rid="aff3">3</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Walle</surname><given-names>Agmasie Damtew</given-names></name><degrees>BSc, MPH</degrees><xref ref-type="aff" rid="aff3">3</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Tizie</surname><given-names>Sefefe Birhanu</given-names></name><degrees>BSc, MPH</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Mengistie</surname><given-names>Muluken Belachew</given-names></name><degrees>BSc, MPH</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Takillo</surname><given-names>Mitiku Kassaw</given-names></name><degrees>BSc, MPH</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Assaye</surname><given-names>Bayou Tilahun</given-names></name><degrees>BSc, MPH</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Senishaw</surname><given-names>Adualem Fentahun</given-names></name><degrees>BSc, MPH</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Hailye</surname><given-names>Gizaw</given-names></name><degrees>BSc, MPH</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Shimie</surname><given-names>Aynadis Worku</given-names></name><degrees>BSc, MPH</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Butta</surname><given-names>Fikadu Wake</given-names></name><degrees>BSc, MPH</degrees><xref ref-type="aff" rid="aff3">3</xref></contrib></contrib-group><aff id="aff1"><institution>Department of Health Informatics, College of Medicine and Health Science, Debre Markos University</institution>, <addr-line>Debre Markos</addr-line>, <country>Ethiopia</country></aff><aff id="aff2"><institution>Department of Health Informatics, School of Public Health, College of Medicine and Health Science, Wollo University</institution>, <addr-line>Dessie</addr-line>, <country>Ethiopia</country></aff><aff id="aff3"><institution>Department of Health Informatics, School of Public Health, College of Medicine and Health Science, Mettu University</institution>, <addr-line>Mettu</addr-line>, <country>Ethiopia</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Mensah</surname><given-names>Edward</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>Guadie</surname><given-names>Habtamu Alganeh</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Bhusal</surname><given-names>Sandesh</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Ayenew Sisay Gebeyew, BSc, MPH, Department of Health Informatics, College of Medicine and Health Science, Debre Markos University, Debre Markos, 269, Ethiopia, 251 93 070 1476; <email>ayenew_sisay@dmu.edu.et</email></corresp></author-notes><pub-date pub-type="collection"><year>2024</year></pub-date><pub-date pub-type="epub"><day>6</day><month>11</month><year>2024</year></pub-date><volume>16</volume><elocation-id>e57764</elocation-id><history><date date-type="received"><day>26</day><month>02</month><year>2024</year></date><date date-type="rev-recd"><day>27</day><month>05</month><year>2024</year></date><date date-type="accepted"><day>18</day><month>08</month><year>2024</year></date></history><copyright-statement>&#x00A9; Ayenew Sisay Gebeyew, Zegeye Regasa Wordofa, Ayana Alebachew Muluneh, Adamu Ambachew Shibabaw, Agmasie Damtew Walle, Sefefe Birhanu Tizie, Muluken Belachew Mengistie, Mitiku Kassaw Takillo, Bayou Tilahun Assaye, Adualem Fentahun Senishaw, Gizaw Hailye, Aynadis Worku Shimie, Fikadu Wake Butta. Originally published in the Online Journal of Public Health Informatics (<ext-link ext-link-type="uri" xlink:href="https://ojphi.jmir.org/">https://ojphi.jmir.org/</ext-link>), 6.11.2024. </copyright-statement><copyright-year>2024</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Online Journal of Public Health Informatics, is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://ojphi.jmir.org/">https://ojphi.jmir.org/</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://ojphi.jmir.org/2024/1/e57764"/><abstract><sec><title>Background</title><p>Digital health is a new health field initiative. Health professionals require security in digital places because cybercriminals target health care professionals. Therefore, millions of medical records have been breached for money. Regarding digital security, there is a gap in studies in limited-resource countries. Therefore, surveying health professionals&#x2019; attitudes toward digital health data security has a significant purpose for interventions.</p></sec><sec><title>Objective</title><p>This study aimed to assess the attitudes of health professionals toward digital health data security and their associated factors in a resource-limited country.</p></sec><sec sec-type="methods"><title>Methods</title><p>A cross-sectional study was conducted to measure health professionals&#x2019; attitudes toward digital health data security. The sample size was calculated using a single population. A pretest was conducted to measure consistency. Binary logistic regression was used to identify associated factors. For multivariable logistic analysis, a <italic>P</italic> value &#x2264;.20 was selected using Stata software (version 16; StataCorp LP).</p></sec><sec sec-type="results"><title>Results</title><p>Of the total sample, 95% (402/423) of health professionals participated in the study. Of all participants, 63.2% (254/402) were male, and the mean age of the respondents was 34.5 (SD 5.87) years. The proportion of health professionals who had a favorable attitude toward digital health data security at specialized teaching hospitals was 60.9% (95% CI 56.0%&#x2010;65.6%). Educational status (adjusted odds ratio [AOR] 3.292, 95% CI 1.16&#x2010;9.34), basic computer skills (AOR 1.807, 95% CI 1.11&#x2010;2.938), knowledge (AOR 3.238, 95% CI 2.0&#x2010;5.218), and perceived usefulness (AOR 1.965, 95% CI 1.063&#x2010;3.632) were factors associated with attitudes toward digital health data security.</p></sec><sec sec-type="conclusions"><title>Conclusions</title><p>This study aimed to assess health professionals&#x2019; attitudes toward digital health data security. Interventions on educational status, basic computer skills, knowledge, and perceived usefulness are important for improving health professionals&#x2019; attitudes. Improving the attitudes of health professionals related to digital data security is necessary for digitalization in the health care arena.</p></sec></abstract><kwd-group><kwd>health</kwd><kwd>profession</kwd><kwd>digital</kwd><kwd>attitude</kwd><kwd>security</kwd><kwd>data</kwd></kwd-group></article-meta></front><body><sec id="s1" sec-type="intro"><title>Introduction</title><p>Health care digitalization has empowered and enabled health care professionals to achieve positive health care outcomes [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. The World Health Organization (WHO) has released guidance for digital health after a critical review of available evidence for the benefits, harms, acceptability, feasibility, resource use, and equity considerations of digital health interventions [<xref ref-type="bibr" rid="ref3">3</xref>]. The growth of digital technology in the health sector has changed the relationship between health care professionals and patients. It helps to bring new attitudes toward health care or medical data. However, these new ways of thinking have been raising concerns about digital security [<xref ref-type="bibr" rid="ref4">4</xref>].</p><p>Digital security in health care has an ultimate impact on an individual&#x2019;s quality of life [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref6">6</xref>] because the storage, processing, transmission, and analysis of data are major health care activities. In electronic health transactions, the privacy regulations required by the Health Insurance Portability and Accountability Act tried to assure consumers that as their health records became fully electronic and networked, their information would be protected [<xref ref-type="bibr" rid="ref5">5</xref>]. Therefore, digital health security is vital in the internet age for professionals and organizations to keep their information assets safe [<xref ref-type="bibr" rid="ref7">7</xref>].</p><p>However, there is a matter of using digital health security countermeasures, particularly as sensitive electronically protected health information has been at risk because it is accessed by every health care service in various ways digitally [<xref ref-type="bibr" rid="ref6">6</xref>]. As mentioned by many studies, among the major impediments to the adoption of digital health by users are security concerns [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>]. Numerous health care data security breaches have occurred owing to a lack of attitude by the user [<xref ref-type="bibr" rid="ref8">8</xref>]. Most prominently, digital health data were the victim of phishing, ransomware, and malware [<xref ref-type="bibr" rid="ref9">9</xref>].</p><p>As studies elucidated, the attitudes of health professionals toward digital health data security were prominent factors in determining the consequences of adopting digital technology to secure health care data [<xref ref-type="bibr" rid="ref3">3</xref>]. According to studies, these attitudes influence people&#x2019;s comprehension of and use of data-security measures [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. Henceforth, digital health data users desire to know more about security measures [<xref ref-type="bibr" rid="ref12">12</xref>]. However, human error is the main driving force behind security problems. According to a study by a security organization, about 88% of data breaches are caused by employee error [<xref ref-type="bibr" rid="ref13">13</xref>]. This revealed that health professionals have an inadequate attitude toward digital data security [<xref ref-type="bibr" rid="ref14">14</xref>]. Various studies elaborated that the contributing factors to attitudes toward security were age, frequent use of digital technology [<xref ref-type="bibr" rid="ref15">15</xref>], education, and the types of work manners or jobs [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref17">17</xref>]. Therefore, improving the attitudes of health professionals toward data security is the backbone of health care institutions. Another study suggested that improving their knowledge, computer skills, and education level was the best approach to developing a favorable attitude toward digital security [<xref ref-type="bibr" rid="ref18">18</xref>-<xref ref-type="bibr" rid="ref20">20</xref>].</p><p>Digital technologies used by health care organizations uniquely have the ultimate purpose of processing lifelong and sensitive data. In resource-limited countries, including Ethiopia, health information technology is at a developmental level; some digital health applications have run in health care settings to ease the handling of health information. These applications are smart care, district health information systems, and wearable and wireless health care devices operating in each health care field. As a result, in resource-limited countries, some health organizations have used digital technology. However, there are limitations to using digital health data security tools regarding health professionals&#x2019; attitudes. This issue has not yet been addressed. Therefore, the main aim of this research was to assess health care professionals&#x2019; attitudes toward digital data security in a limited-resource country. Identifying the factors associated with attitudes toward digital health data security will serve as a baseline for further studies and guide security strategies for health care digitalization.</p></sec><sec id="s2" sec-type="methods"><title>Methods</title><sec id="s2-1"><title>Study Design and Settings</title><p>This study was conducted at a specialized teaching hospital in a resource-limited country in Northwest Ethiopia. All hospitals play an academic and referral role for more than 3.5 million people. For this study, a cross-sectional study design was an appropriate method to assess health professionals&#x2019; attitudes toward digital data security. The study was conducted from May 30 to June 20, 2022, at a specialized teaching hospital in Northwest Ethiopia. Appropriate informed consent was taken to administer the study.</p></sec><sec id="s2-2"><title>Study Sample and Eligibility Criteria</title><p>The source population of the study was health professionals working in specialized teaching hospitals. Health professionals who had used digital devices in those hospitals were selected for the sample population. On the contrary, health professionals who had no experience in digital health and who were not in health care settings during the period of data collection were excluded from the study.</p></sec><sec id="s2-3"><title>Sample Size Determination and Sampling Procedure</title><p>The sample size was determined using single-population proportions and a nonresponse rate of 10%. The sample size was calculated assuming a 95% significance level, 5% marginal errors, and a 50% population proportion, which is recommended by biostatistician experts [<xref ref-type="bibr" rid="ref21">21</xref>]. In this case, the total sample size was 423. Proportional allocations were made for each health care institution. Then, based on the sampling frame of the list of health professionals obtained from human resources management, simple random sampling was used to pick the study participants who were working in specialized teaching and referral hospitals. These steps are illustrated in <xref ref-type="fig" rid="figure1">Figure 1</xref>.</p><fig position="float" id="figure1"><label>Figure 1.</label><caption><p>Sampling procedure of the study</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="ojphi_v16i1e57764_fig01.png"/></fig></sec><sec id="s2-4"><title>Study Variables</title><p>The outcome variable of this study was the attitudes of health professionals toward digital health data security. Other characteristics such as sociodemographics (age, gender, educational status, work experience, and monthly salary), behavioral and technological characteristics (computer skills, knowledge of digital health data security, use of the internet, use of social media, perceived ease of use, and perceived usefulness), and organizational characteristics (training and health care workload) were the explanatory variables of the study.</p></sec><sec id="s2-5"><title>Measuring Instruments</title><p>Digital health data security refers to digital health data techniques to safeguard health care data from illegitimate or unauthorized access, alteration, and destruction.</p><p>Knowledge of digital health data security refers to the know-how of health professionals to use security tools while processing health data, which we measured using a 10-item Likert scale. The data were not normally distributed, as shown using the Shapiro-Wilk test (<italic>P</italic> value &#x003C;.05), skewness, and kurtosis. Therefore, knowledge was determined based on the median; a score above the median value of 35 (IQR 31&#x2010;40) indicated good knowledge, and a score below the median score indicated poor knowledge [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>].</p><p>Attitudes toward digital health data security refer to the feelings of health professionals about digital security tools (data encryption, antivirus, etc) and while processing health data using digital devices, which have been measured using a 10-item Likert scale. The data were asymmetrically distributed and categorized by the median. A score above the median value of 31 (IQR 27&#x2010;33) indicated a favorable attitude, and a score below the median indicated an unfavorable attitude [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>].</p></sec><sec id="s2-6"><title>Data Collection Tool and Quality Assurance</title><p>A structured self-administered questionnaire was adopted and modified using information from various publications [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref24">24</xref>-<xref ref-type="bibr" rid="ref27">27</xref>]. The questionnaire was written in the English language. A pretest was conducted to ensure reliability before conducting the study. Trained medical professionals collected the data. Finally, the investigators took over overall supervision. Validated forms were then completed using statistical software to minimize errors and verify missing values or incompleteness. To ensure the quality of our surveys, we conducted research consultations and a pretest to check the tool. Based on suggestions from medical experts, word corrections were made to facilitate comprehension, and Cronbach &#x03B1; scores of 60% or higher were used. The pretest showed that the Cronbach &#x03B1; scores of attitude and knowledge were 0.83 and 0.86, respectively.</p></sec><sec id="s2-7"><title>Statistical Analysis</title><p>Data were input into EpiData version 4.6 software (EpiData Association) and exported to Stata (version 16; StataCorp LP). <italic>&#x03C7;</italic><sup>2</sup> assumptions, collinearity, and other assumptions, such as incomplete values, were checked and tested by presenting the data via summary statistics. After generating the cleaned data, further analysis was performed using the Stata software. The means, medians, SDs, percentages, and frequencies were used to illustrate the results in tables and graphs. We also used binary logistic regression to identify the relevant factors. Variables with <italic>P</italic> values less than or equal to .20 were candidates for multivariate analysis. Multicollinearity was checked using the variable inflation rate. Finally, an odds ratio with a 95% CI and a <italic>P</italic> value less than .05 were used to determine the outcome variable by adjusting for confounding effects. Model fit was checked using the Hosmer-Lemeshow test.</p></sec><sec id="s2-8"><title>Ethical Considerations</title><p>Ethical approval was received from the Institutional Review Board of the University of Gondar, College of Medicine and Health Science, the Institution of Public Health Ethical Review Committee (no. IPH/2013/2014). The procedures used in this study obey the rules of the Declaration of Helsinki. A formal letter was received from each specialized teaching hospital unit coordinator (no. 1061/90/13). Finally, written consent forms were delivered with each questionnaire, and appropriate written consent was taken from the respondents.</p></sec></sec><sec id="s3" sec-type="results"><title>Results</title><sec id="s3-1"><title>Sociodemographic Characteristics</title><p>Of the 423 health professionals, 95% (n=402) participated in this study, whereas 5% (n=21) of participants did not complete the survey due to various situations. In terms of sociodemographic characteristics, out of 402 health professionals, 254 (63.2%) were male, and 148 (36.8%) were female, with a mean age of 34.5 (SD 5.87) years. Among all study participants, 131 (32.6%) were aged between 20 and 30 years, 214 (53.2%) were in the range of ages between 31 and 40 years, and 57 (14.2%) were above 40 years. In the case of marital status, 166 (41.3%) were single, 191 (47.5%) health professionals were married, and the remaining 45 (11.2%) were others who might be separated or widowed. Regarding educational status, 293 (72.9%) health professionals had bachelor&#x2019;s degrees, 55 (13.7%) had master&#x2019;s degrees, and 54 (13.4%) had postmaster&#x2019;s degrees (specialist and subspecialist). Further, 224 (55.7%) and 178 (44.3%) health professionals had 1-5 years of work experience and above 5 years of work experience, respectively. Regarding monthly salary, the majority of health professionals were paid below 10,000 Ethiopian birr (US $82.95; <xref ref-type="table" rid="table1">Table 1</xref>).</p><table-wrap id="t1" position="float"><label>Table 1.</label><caption><p>Sociodemographic characteristics of health professionals&#x2019; attitudes on digital health data security at specialized teaching hospitals in Northwest Ethiopia in 2022 (n=402).</p></caption><table id="table1" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Variables</td><td align="left" valign="bottom">Frequency</td><td align="left" valign="bottom">Percent</td></tr></thead><tbody><tr><td align="left" valign="top" colspan="3"><bold>Gender</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Male</td><td align="left" valign="top">254</td><td align="left" valign="top">63.2</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Female</td><td align="left" valign="top">148</td><td align="left" valign="top">36.8</td></tr><tr><td align="left" valign="top" colspan="3"><bold>Age (years)</bold></td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>20&#x2010;30</td><td align="left" valign="top">131</td><td align="left" valign="top">32.6</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>31&#x2010;40</td><td align="left" valign="top">214</td><td align="left" valign="top">53.2</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>&#x003E;40</td><td align="left" valign="top">57</td><td align="left" valign="top">14.2</td></tr><tr><td align="left" valign="top" colspan="3"><bold>Marital status</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Single</td><td align="left" valign="top">166</td><td align="left" valign="top">41.3</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Married</td><td align="left" valign="top">191</td><td align="left" valign="top">47.5</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Other<sup><xref ref-type="table-fn" rid="table1fn1">a</xref></sup></td><td align="left" valign="top">45</td><td align="left" valign="top">11.2</td></tr><tr><td align="left" valign="top" colspan="3"><bold>Educational status</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Bachelor degree</td><td align="left" valign="top">293</td><td align="left" valign="top">72.9</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Master&#x2019;s degree</td><td align="left" valign="top">55</td><td align="left" valign="top">13.7</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Postmaster&#x2019;s degree<sup><xref ref-type="table-fn" rid="table1fn2">b</xref></sup></td><td align="left" valign="top">54</td><td align="left" valign="top">13.4</td></tr><tr><td align="left" valign="top" colspan="3"><bold>Work experience</bold></td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>1&#x2010;5 years</td><td align="left" valign="top">224</td><td align="left" valign="top">55.7</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>&#x003E;5 years</td><td align="left" valign="top">178</td><td align="left" valign="top">44.3</td></tr><tr><td align="left" valign="top" colspan="3"><bold>Monthly salary in Ethiopian birr (1 Ethiopian birr=US $0.008)</bold></td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>&#x2264;10,000</td><td align="left" valign="top">273</td><td align="left" valign="top">67.9</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>&#x003E;10,000</td><td align="left" valign="top">129</td><td align="left" valign="top">32.1</td></tr></tbody></table><table-wrap-foot><fn id="table1fn1"><p><sup>a</sup>Other (separated, widowed).</p></fn><fn id="table1fn2"><p><sup>b</sup>Postmaster&#x2019;s degree (specialist, subspecialist).</p></fn></table-wrap-foot></table-wrap></sec><sec id="s3-2"><title>Behavioral and Organizational Characteristics</title><p>Based on organizational characteristics, the results illustrate that 58% (n=233) of health professionals agreed that there is a workload in the health care organization, while 42% (n=169) agreed that there is no workload in the health care settings. In the case of digital training, 57% (n=229) of health professionals had taken basic computer training, whereas 43% (n=173) of the participants had not taken training delivered by their health care institutions. In terms of behavioral characteristics, 54.7% (n=220) of health professionals perceived digital health security tools as easy to use, while 45.3% (n=182) perceived digital health security tools as not easy to use. Regarding usefulness, 23.1% (n=93) of health professionals perceived digital health security tools as useful to use, whereas 76.9% (n=309) perceived that their usefulness was not adequate for digital health data security, as shown in <xref ref-type="table" rid="table2">Table 2</xref>.</p><table-wrap id="t2" position="float"><label>Table 2.</label><caption><p>Behavioral, organizational, and technological characteristics of health professionals regarding digital health data security at specialized teaching hospitals in Northwest Ethiopia in 2022 (n=402).</p></caption><table id="table2" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Variables</td><td align="left" valign="bottom">Frequency</td><td align="left" valign="bottom">Percent</td></tr></thead><tbody><tr><td align="left" valign="top" colspan="3"><bold>Health care workload</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Low workload</td><td align="left" valign="top">169</td><td align="left" valign="top">42</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Have workload</td><td align="left" valign="top">233</td><td align="left" valign="top">58</td></tr><tr><td align="left" valign="top" colspan="3"><bold>Use internet</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Yes</td><td align="left" valign="top">394</td><td align="left" valign="top">98</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>No</td><td align="left" valign="top">8</td><td align="left" valign="top">2</td></tr><tr><td align="left" valign="top" colspan="3"><bold>Use social media</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Yes</td><td align="left" valign="top">390</td><td align="left" valign="top">97</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>No</td><td align="left" valign="top">12</td><td align="left" valign="top">3</td></tr><tr><td align="left" valign="top" colspan="3"><bold>Taken computer training</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Yes</td><td align="left" valign="top">229</td><td align="left" valign="top">57</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>No</td><td align="left" valign="top">173</td><td align="left" valign="top">43</td></tr><tr><td align="left" valign="top" colspan="3"><bold>Trained in digital data security</bold></td></tr><tr><td align="left" valign="top">&#x2003;Yes</td><td align="left" valign="top">75</td><td align="left" valign="top">18.7</td></tr><tr><td align="left" valign="top">&#x2003;No</td><td align="left" valign="top">327</td><td align="left" valign="top">81.3</td></tr><tr><td align="left" valign="top" colspan="3"><bold>Digital literacy</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Poor literacy</td><td align="left" valign="top">148</td><td align="left" valign="top">36.8</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Good literacy</td><td align="left" valign="top">254</td><td align="left" valign="top">63.2</td></tr><tr><td align="left" valign="top" colspan="3"><bold>Perceived ease of use</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Not easy</td><td align="left" valign="top">220</td><td align="left" valign="top">54.7</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Easy</td><td align="left" valign="top">182</td><td align="left" valign="top">45.3</td></tr><tr><td align="left" valign="top" colspan="3"><bold>Perceived usefulness</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Inadequate usefulness</td><td align="left" valign="top">309</td><td align="left" valign="top">76.9</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Usefulness</td><td align="left" valign="top">93</td><td align="left" valign="top">23.1</td></tr></tbody></table></table-wrap></sec><sec id="s3-3"><title>Technological Characteristics</title><p>The study shows that according to technical characteristics, 63.2% (n=254) of health professionals were digitally literate, whereas 36.8% (n=148) of the participants did not have adequate digital literacy. Concerning digital security, 18.7% (n=75) of health professionals were trained in digital security, whereas the majority of participants, which accounted for 81.3% (n=327), were not adequate in digital security. Related to internet and social media accessibility, the majority of health professionals, which accounted for 98% (n=394), had used the internet, and 97% (n=390) had used social media. A few participants had limited access to the internet and social media (<xref ref-type="table" rid="table2">Table 2</xref>).</p></sec><sec id="s3-4"><title>Health Professionals&#x2019; Attitudes Toward Digital Health Data Security</title><sec id="s3-4-1"><title>Overview</title><p>The first and main aim of this study was to find out the prevalence of health professionals&#x2019; attitudes toward digital health data security in a limited-resource country. Using the median score, those above the median value of 31 (IQR 27&#x2010;33) have favorable attitudes, whereas those below the median value have unfavorable attitudes [<xref ref-type="bibr" rid="ref23">23</xref>]. Based on that, from a total of 402 health professionals, 245 participants had a favorable attitude, which accounted for 60.9%. In contrast, 157 (39.1%) participants had an unfavorable attitude toward digital health data security countermeasures. This indicates that out of 5 health professionals, 3 need an intervention to improve their attitudes and reach an optimal level of security to minimize risk for digital health data.</p></sec><sec id="s3-4-2"><title>Factors Associated With Attitudes Toward Digital Health Data Security</title><p>According to the context of a limited-resource country, the significant factors of health professionals&#x2019; attitudes toward digital health data security were identified using logistic regression analysis. After identifying the variable using binary logistic analysis, the candidate variables were adjusted for final analysis and interpretations. Therefore, education status, computer skills, knowledge, and perceived usefulness were determined as associated factors for health professionals&#x2019; attitudes toward digital health data security.</p><p>This study revealed that educational status was a significant factor and that the professionals with a postmaster&#x2019;s degree were 3.29 (adjusted odds ratio [AOR] 3.292, 95% CI 1.16&#x2010;9.34) times more likely to have a favorable attitude toward digital data security, and this difference was statistically significant at a <italic>P</italic> value of .03. Second, health professionals with basic computer skills were 1.8 (AOR 1.807, 95% CI 1.11&#x2010;2.938) times more likely to have a favorable attitude toward digital data security, with a statistically significant <italic>P</italic> value of .02. The findings also show that health professionals with good knowledge of data security were 3.238 (AOR 3.238, 95% CI 2.0&#x2010;5.218) times more likely to have a favorable attitude toward digital data security, with a statistically significant <italic>P</italic> value of 0.00. Similarly, the professionals who perceived the usefulness of digital data security were 1.965 (AOR 1.965, 95% CI 1.063&#x2010;3.632) times more likely to have a favorable attitude toward digital health data security, with a statistically significant at a <italic>P</italic> value of .03 (<xref ref-type="table" rid="table3">Table 3</xref>).</p><table-wrap id="t3" position="float"><label>Table 3.</label><caption><p>Bivariable and multivariable analysis of factors associated with the attitudes toward digital health data security among health professionals working at specialized teaching hospitals in Northwest Ethiopia (n=402).</p></caption><table id="table3" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Variables</td><td align="left" valign="bottom">Unfavorable attitude, n (%)</td><td align="left" valign="bottom">Favorable attitude, n (%)</td><td align="left" valign="bottom">COR<sup><xref ref-type="table-fn" rid="table3fn1">a</xref></sup> (95% CI)</td><td align="left" valign="bottom">AOR<sup><xref ref-type="table-fn" rid="table3fn2">b</xref></sup> (95% CI)</td></tr></thead><tbody><tr><td align="left" valign="top" colspan="5"><bold>Educational status</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>BSc degree</td><td align="left" valign="top">130 (32.3)</td><td align="left" valign="top">163 (40.6)</td><td align="left" valign="top">1</td><td align="left" valign="top">1</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Master&#x2019;s</td><td align="left" valign="top">21 (5.2)</td><td align="left" valign="top">34 (8.5)</td><td align="left" valign="top">1.29 (0.715&#x2010;2.33)</td><td align="left" valign="top">0.96 (0.488&#x2010;1.886)</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Postmaster&#x2019;s</td><td align="left" valign="top">6 (1.5)</td><td align="left" valign="top">48 (11.9)</td><td align="left" valign="top">6.38 (2.65&#x2010;15.37)</td><td align="left" valign="top">3.292 (1.16&#x2010;9.34)<sup><xref ref-type="table-fn" rid="table3fn3">c</xref></sup></td></tr><tr><td align="left" valign="top" colspan="5"><bold>Monthly salary in Ethiopian birr (1 Ethiopian birr=US $0.008)</bold></td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>&#x2264;10,000</td><td align="left" valign="top">121 (30.1)</td><td align="left" valign="top">152 (37.8)</td><td align="left" valign="top">1</td><td align="left" valign="top">1</td></tr><tr><td align="char" char="." valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>&#x003E;10,000</td><td align="left" valign="top">36 (9)</td><td align="left" valign="top">93 (23.1)</td><td align="left" valign="top">0.763 (0.563-1.035)</td><td align="left" valign="top">1.166 (0.646&#x2010;2.105)</td></tr><tr><td align="left" valign="top" colspan="5"><bold>Taken computer training</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>No</td><td align="left" valign="top">85 (21.1)</td><td align="left" valign="top">88 (21.9)</td><td align="left" valign="top">1</td><td align="left" valign="top">1</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Yes</td><td align="left" valign="top">72 (17.9)</td><td align="left" valign="top">157 (39.1)</td><td align="left" valign="top">2.106 (1.4&#x2010;3.168)</td><td align="left" valign="top">1.498 (0.936&#x2010;2.397)</td></tr><tr><td align="left" valign="top" colspan="5"><bold>Use email</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>No</td><td align="left" valign="top">15 (3.7)</td><td align="left" valign="top">13 (3.2)</td><td align="left" valign="top">1</td><td align="left" valign="top">1</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Yes</td><td align="left" valign="top">142 (35.3)</td><td align="left" valign="top">232 (57.7)</td><td align="left" valign="top">1.885 (0.872&#x2010;4.078)</td><td align="left" valign="top">1.01 (0.426-2.4)</td></tr><tr><td align="left" valign="top" colspan="5"><bold>Basic computer skills</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Poor</td><td align="left" valign="top">85 (21.1)</td><td align="left" valign="top">63 (15.7)</td><td align="left" valign="top">1</td><td align="left" valign="top">1</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Good</td><td align="left" valign="top">72 (17.9)</td><td align="left" valign="top">182 (45.3)</td><td align="left" valign="top">3.41 (2.23&#x2010;5.217)</td><td align="left" valign="top">1.807(1.11-2.938)<sup><xref ref-type="table-fn" rid="table3fn3">c</xref></sup></td></tr><tr><td align="left" valign="top" colspan="5"><bold>Knowledge of digital data security</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Poor</td><td align="left" valign="top">115 (28.6)</td><td align="left" valign="top">91 (22.6)</td><td align="left" valign="top">1</td><td align="left" valign="top">1</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Good</td><td align="left" valign="top">42 (10.5)</td><td align="left" valign="top">154 (38.3)</td><td align="left" valign="top">4.634 (2.99&#x2010;7.182)</td><td align="left" valign="top">3.238 (2.009-5.218)<sup><xref ref-type="table-fn" rid="table3fn4">d</xref></sup></td></tr><tr><td align="left" valign="top" colspan="5"><bold>Perceived usefulness</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Inadequate usefulness</td><td align="left" valign="top">136 (33.8)</td><td align="left" valign="top">173 (43)</td><td align="left" valign="top">1</td><td align="left" valign="top">1</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Useful</td><td align="left" valign="top">21 (5.2)</td><td align="left" valign="top">72 (17.9)</td><td align="left" valign="top">2.695 (1.578&#x2010;4.604)</td><td align="left" valign="top">1.965 (1.063-3.632)<sup><xref ref-type="table-fn" rid="table3fn3">c</xref></sup></td></tr><tr><td align="left" valign="top" colspan="5"><bold>Perceived ease of use</bold></td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Not easy</td><td align="left" valign="top">103 (25.6)</td><td align="left" valign="top">117 (29.1)</td><td align="left" valign="top">1</td><td align="left" valign="top">1</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Easy</td><td align="left" valign="top">54 (13.4)</td><td align="left" valign="top">128 (31.8)</td><td align="left" valign="top">2.087 (1.38&#x2010;3.156)</td><td align="left" valign="top">1.289 (0.789-2.106)</td></tr></tbody></table><table-wrap-foot><fn id="table3fn1"><p><sup>a</sup>COR: crude odds ratio.</p></fn><fn id="table3fn2"><p><sup>b</sup>AOR: adjusted odds ratio.</p></fn><fn id="table3fn3"><p><sup>c</sup><italic>P</italic>&#x003C;.05.</p></fn><fn id="table3fn4"><p><sup>d</sup><italic>P</italic>&#x003C;.01.</p></fn></table-wrap-foot></table-wrap></sec></sec></sec><sec id="s4" sec-type="discussion"><title>Discussion</title><sec id="s4-1"><title>Principal Findings</title><p>The main aim of this study was to assess health professionals&#x2019; attitudes toward digital health security in health care in a limited-resource country. The proportion of health professionals who had a favorable attitude toward digital health data security was 60.95% (95% CI 56.0%&#x2010;65.6%). While comparing this finding with resourceful countries however, this was contrary to studies conducted in Portugal [<xref ref-type="bibr" rid="ref4">4</xref>], Norway [<xref ref-type="bibr" rid="ref14">14</xref>], Turkey [<xref ref-type="bibr" rid="ref28">28</xref>], and Sweden [<xref ref-type="bibr" rid="ref29">29</xref>]. The majority, which accounted for 81.7% (1283/1569) of the participants, had a favorable attitude, which entails that health professionals have trust in data security techniques and believe that worthy health needs virtuous digital data security measures. In rich countries, there may be sufficient resources to give training on digital health security techniques and be actively involved in health care technology compared with resource-limited country.</p><p>The findings of this study identified educational status as a significant factor; professionals with postmaster degrees were 3.29 times more likely to have a favorable attitude toward digital data security. This denotes that the level of health professional educational status has an enormous effect on attitude toward digital data security techniques. This finding is in line with the studies conducted in European countries that show education status has a significant effect on attitudes toward digital health data security [<xref ref-type="bibr" rid="ref16">16</xref>]. This is because, through the life of education, nearly developed digital security tools are accessed by health data users to be authenticated.</p><p>Professionals with basic computer or digital literacy were 1.807 times more likely to have a favorable attitude toward digital data security. This suggests that taking basic literacy courses related to digital technology influences a favorable attitude toward the use of digital security techniques. This finding is evidenced in Turkey, where acquiring digital literacy skills has improved attitudes toward data security [<xref ref-type="bibr" rid="ref30">30</xref>]. However, in this study, only 63.2% (254/402) of health professionals had good computer skills. This indicates that there was a low level of involvement of health professionals in the use of digital technology to facilitate daily health care tasks.</p><p>The findings also showed that the knowledge of health professionals is 3.238 times more likely to have a favorable attitude toward digital data security. This revealed that health professionals&#x2019; knowledge of digital security significantly influences their attitude toward digital data security, and this is consistent with a study in Norway that found that the knowledge of health care professionals significantly enhances their attitude in health care settings [<xref ref-type="bibr" rid="ref14">14</xref>]. Similarly, a study conducted in Indonesia indicates that the workforce&#x2019;s knowledge of digital security has a beneficial effect on their attitude, resulting in a strong and enthusiastic data security culture [<xref ref-type="bibr" rid="ref20">20</xref>].</p><p>Finally, professionals who perceived the usefulness of digital data security were 1.965 times more likely to have a favorable attitude toward digital data security. This explains why well-perceived usefulness in digital security has a significant association with attitudes toward digital health data security. This result is supported by a study conducted in Korea that used the Technology Acceptance Model, which showed that perceived usefulness made a great difference in digital security [<xref ref-type="bibr" rid="ref31">31</xref>].</p><p>Overall, the contribution of this study to the research on attitudes toward digital health security is as follows. First, the study revealed that the education level and digital literacy of health professionals have positively influenced their attitudes toward digital health data security. Second, perceived usefulness and knowledge about data security are also important to improve their attitude toward digital data security. These findings are essential and contribute to studies on digital health.</p></sec><sec id="s4-2"><title>Strength and Limitation</title><p>Digital health security is an urgent issue in the digital health environment. Especially, the findings of health professionals&#x2019; attitudes toward digital data security are the basis for expanding the installation of digital health in resource-limited countries. Therefore, the findings of this study will serve as a guide for interventions in digital health development. This cross-sectional study may have introduced bias in identifying the cause-and-effect relationship.</p></sec><sec id="s4-3"><title>Conclusions</title><p>According to the results of this study, the attitudes of health professionals toward digital health data security in a limited-resource country were inadequate. To improve the attitudes of health professionals, working on the significant factors, which are updating educational status, improving computer skills and knowledge toward digital security, and increasing perceived digital health security usefulness, is the basis for improving attitudes and ultimately has the purpose of safeguarding digital health data. Therefore, improving health care professionals&#x2019; attitudes toward digital data security will guide the development of health care digitalization.</p><p>The findings will be forwarded to referral hospitals, the Regional Health Bureau, the Federal Minister of Health, and other institutions. The outcomes may help to improve health professionals&#x2019; attitudes toward digital health data security by motivating them to improve their computer skills and enhance their educational level. Health care institutions shall be changing the attitudes of health professionals toward digital data security to create a safe digital environment. Finally, the Regional Health Bureau and the Minister of Health will formulate a plan to ensure the optimum use of digital security measures.</p></sec></sec></body><back><ack><p>First, we would like forward our deepest gratitude to a compassionate God. Then, we give special thanks to the University of Gondar and Debre Markos University for their contribution. Finally, we sincerely express our pleasure to our colleagues for their unlimited help in developing the research manuscript. All authors declared that they had insufficient funding to support open access publication of this manuscript, including from affiliated organizations or institutions, funding agencies, or other organizations. JMIR Publications provided article processing fee (APF) support for the publication of this article</p></ack><notes><sec><title>Data Availability</title><p>The datasets analyzed in the study are not available due to confidentiality.</p></sec></notes><fn-group><fn fn-type="con"><p>The authors confirm their contributions to the study as follows: ASG, ZRW, and MBM contributed to study conception and design; ASG, AAM, AAS, ADW, MBM, and SBT contributed to data collection, analysis, and interpretation of results; and ASG, GH, FWB, MKT, BTA, AFS, AWS, and FWB contributed to draft manuscript preparation. All authors reviewed the results and approved the final version of the manuscript.</p></fn><fn fn-type="conflict"><p>None declared.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">AOR</term><def><p>adjusted odds ratio</p></def></def-item><def-item><term id="abb2">WHO</term><def><p>World Health Organization</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Adeola</surname><given-names>O</given-names> </name><name name-style="western"><surname>Evans</surname><given-names>O</given-names> </name></person-group><article-title>Digital health: ICT and health in Africa</article-title><source>Act Probl Econ</source><year>2018</year><volume>10</volume><issue>208</issue><fpage>66</fpage><lpage>83</lpage></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Al Knawy</surname><given-names>B</given-names> </name><name name-style="western"><surname>McKillop</surname><given-names>MM</given-names> </name><name name-style="western"><surname>Abduljawad</surname><given-names>J</given-names> </name><etal/></person-group><article-title>Successfully implementing digital health to ensure future global health security during pandemics: a consensus statement</article-title><source>JAMA Netw Open</source><year>2022</year><month>02</month><day>1</day><volume>5</volume><issue>2</issue><fpage>e220214</fpage><pub-id pub-id-type="doi">10.1001/jamanetworkopen.2022.0214</pub-id><pub-id pub-id-type="medline">35195701</pub-id></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jandoo</surname><given-names>T</given-names> </name></person-group><article-title>WHO guidance for digital health: what it means for researchers</article-title><source>Digit Health</source><year>2020</year><volume>6</volume><fpage>2055207619898984</fpage><pub-id pub-id-type="doi">10.1177/2055207619898984</pub-id><pub-id pub-id-type="medline">31949918</pub-id></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Nunes</surname><given-names>P</given-names> </name><name name-style="western"><surname>Antunes</surname><given-names>M</given-names> </name><name name-style="western"><surname>Silva</surname><given-names>C</given-names> </name></person-group><article-title>Evaluating cybersecurity attitudes and behaviors in Portuguese healthcare institutions</article-title><source>Proc Comput Sci</source><year>2021</year><volume>181</volume><fpage>173</fpage><lpage>181</lpage><pub-id pub-id-type="doi">10.1016/j.procs.2021.01.118</pub-id></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Dinev</surname><given-names>T</given-names> </name><name name-style="western"><surname>Albano</surname><given-names>V</given-names> </name><name name-style="western"><surname>Xu</surname><given-names>H</given-names> </name><name name-style="western"><surname>D&#x2019;Atri</surname><given-names>A</given-names> </name><name name-style="western"><surname>Hart</surname><given-names>P</given-names> </name></person-group><article-title>Individuals&#x2019; attitudes towards electronic health records: a privacy calculus perspective</article-title><source>Advances in Healthcare Informatics and Analytics</source><year>2016</year><publisher-name>Springer International Publishing</publisher-name><fpage>19</fpage><lpage>50</lpage><pub-id pub-id-type="doi">10.1007/978-3-319-23294-2_2</pub-id></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Altynpara</surname><given-names>E</given-names> </name></person-group><article-title>Cybersecurity and data protection in healthcare</article-title><source>Forbes</source><year>2022</year><month>02</month><day>15</day><access-date>2024-10-25</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.forbes.com/councils/forbestechcouncil/2022/02/15/cybersecurity-and-data-protection-in-healthcare/#:~:text=Use%20multi%2Dfactor%20authentication%2C%20application,of%20lost%20or%20stolen%20phones.&#x0026;text=Regularly%20update%20software%2C%20including%20safety%20applications%20and%20medical%20sensor%20control%20systems.&#x0026;text=HIPAA%20and%20similar%20regulations%20require,a%20workable%20data%20protection%20strategy">https://www.forbes.com/councils/forbestechcouncil/2022/02/15/cybersecurity-and-data-protection-in-healthcare/#:~:text=Use%20multi%2Dfactor%20authentication%2C%20application,of%20lost%20or%20stolen%20phones.&#x0026;text=Regularly%20update%20software%2C%20including%20safety%20applications%20and%20medical%20sensor%20control%20systems.&#x0026;text=HIPAA%20and%20similar%20regulations%20require,a%20workable%20data%20protection%20strategy</ext-link></comment></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Fern&#x00E1;ndez-Alem&#x00E1;n</surname><given-names>JL</given-names> </name><name name-style="western"><surname>Se&#x00F1;or</surname><given-names>IC</given-names> </name><name name-style="western"><surname>Lozoya</surname><given-names>P&#x00C1;O</given-names> </name><name name-style="western"><surname>Toval</surname><given-names>A</given-names> </name></person-group><article-title>Security and privacy in electronic health records: a systematic literature review</article-title><source>J Biomed Inform</source><year>2013</year><month>06</month><volume>46</volume><issue>3</issue><fpage>541</fpage><lpage>562</lpage><pub-id pub-id-type="doi">10.1016/j.jbi.2012.12.003</pub-id><pub-id pub-id-type="medline">23305810</pub-id></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kessler</surname><given-names>SR</given-names> </name><name name-style="western"><surname>Pindek</surname><given-names>S</given-names> </name><name name-style="western"><surname>Kleinman</surname><given-names>G</given-names> </name><name name-style="western"><surname>Andel</surname><given-names>SA</given-names> </name><name name-style="western"><surname>Spector</surname><given-names>PE</given-names> </name></person-group><article-title>Information security climate and the assessment of information security risk among healthcare employees</article-title><source>Health Informatics J</source><year>2020</year><month>03</month><volume>26</volume><issue>1</issue><fpage>461</fpage><lpage>473</lpage><pub-id pub-id-type="doi">10.1177/1460458219832048</pub-id><pub-id pub-id-type="medline">30866704</pub-id></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Bhosale</surname><given-names>KS</given-names> </name><name name-style="western"><surname>Nenova</surname><given-names>M</given-names> </name><name name-style="western"><surname>Iliev</surname><given-names>G</given-names> </name></person-group><article-title>A study of cyber attacks: in the healthcare sector</article-title><year>2021</year><conf-name>2021 Sixth Junior Conference on Lighting (Lighting)</conf-name><conf-date>Sep 23-25, 2021</conf-date><conf-loc>Gabrovo, Bulgaria</conf-loc><fpage>1</fpage><lpage>6</lpage></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Romansky</surname><given-names>RP</given-names> </name><name name-style="western"><surname>Noninska</surname><given-names>IS</given-names> </name></person-group><article-title>Challenges of the digital age for privacy and personal data protection</article-title><source>Math Biosci Eng</source><year>2020</year><month>08</month><day>10</day><volume>17</volume><issue>5</issue><fpage>5288</fpage><lpage>5303</lpage><pub-id pub-id-type="doi">10.3934/mbe.2020286</pub-id><pub-id pub-id-type="medline">33120553</pub-id></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gallego-Arrufat</surname><given-names>M</given-names> </name><name name-style="western"><surname>Torres-Hern&#x00E1;ndez</surname><given-names>NTH</given-names> </name><name name-style="western"><surname>Pessoa</surname><given-names>TP</given-names> </name><name name-style="western"><surname>Gallego-Arrufat</surname><given-names>MJ</given-names> </name><name name-style="western"><surname>Torres-Hern&#x00E1;ndez</surname><given-names>N</given-names> </name><name name-style="western"><surname>Pessoa</surname><given-names>T</given-names> </name></person-group><article-title>Competence of future teachers in the digital security area</article-title><source>Comunicar Rev Cient Comun Educ</source><year>2019</year><month>10</month><day>1</day><volume>27</volume><issue>61</issue><fpage>57</fpage><lpage>67</lpage><pub-id pub-id-type="doi">10.3916/C61-2019-05</pub-id></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Gabriele</surname><given-names>S</given-names> </name><name name-style="western"><surname>Chiasson</surname><given-names>S</given-names> </name></person-group><article-title>Understanding fitness tracker users&#x2019; security and privacy knowledge, attitudes and behaviours</article-title><conf-name>Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems</conf-name><conf-date>Apr 25-30, 2020</conf-date><conf-loc>Honolulu, HI, USA</conf-loc><pub-id pub-id-type="doi">10.1145/3313831.3376651</pub-id></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="web"><article-title>"Psychology of human error&#x201D; could help businesses prevent security breaches</article-title><source>CISOMAG</source><year>2020</year><month>09</month><day>12</day><access-date>2024-10-25</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://cisomag.com/psychology-of-human-error-could-help-businesses-prevent-security-breaches/">https://cisomag.com/psychology-of-human-error-could-help-businesses-prevent-security-breaches/</ext-link></comment></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Yeng</surname><given-names>PK</given-names> </name><name name-style="western"><surname>Fauzi</surname><given-names>MA</given-names> </name><name name-style="western"><surname>Yang</surname><given-names>B</given-names> </name></person-group><article-title>A comprehensive assessment of human factors in cyber security compliance toward enhancing the security practice of healthcare staff in paperless hospitals</article-title><source>Information</source><year>2022</year><volume>13</volume><issue>7</issue><fpage>335</fpage><pub-id pub-id-type="doi">10.3390/info13070335</pub-id></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Walle</surname><given-names>AD</given-names> </name><name name-style="western"><surname>Butta</surname><given-names>FW</given-names> </name><name name-style="western"><surname>Kassie</surname><given-names>SY</given-names> </name><etal/></person-group><article-title>Healthcare professionals&#x2019; attitude to using mobile health technology and its associated factors in a resource&#x2010;limited country&#x2014;an implication for digital health implementers: a cross sectional study</article-title><source>Biomed Res Int</source><year>2024</year><month>07</month><day>12</day><volume>2024</volume><issue>1</issue><fpage>1631376</fpage><pub-id pub-id-type="doi">10.1155/2024/1631376</pub-id><pub-id pub-id-type="medline">39035773</pub-id></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Karampela</surname><given-names>M</given-names> </name><name name-style="western"><surname>Ouhbi</surname><given-names>S</given-names> </name><name name-style="western"><surname>Isomursu</surname><given-names>M</given-names> </name></person-group><article-title>Connected health user willingness to share personal health data: questionnaire study</article-title><source>J Med Internet Res</source><year>2019</year><month>11</month><day>27</day><volume>21</volume><issue>11</issue><fpage>e14537</fpage><pub-id pub-id-type="doi">10.2196/14537</pub-id><pub-id pub-id-type="medline">31774410</pub-id></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Khan</surname><given-names>HU</given-names> </name><name name-style="western"><surname>AlShare</surname><given-names>KA</given-names> </name></person-group><article-title>Violators versus non-violators of information security measures in organizations&#x2014;a study of distinguishing factors</article-title><source>J Organ Comput Electron Comm</source><year>2019</year><month>01</month><day>2</day><volume>29</volume><issue>1</issue><fpage>4</fpage><lpage>23</lpage><pub-id pub-id-type="doi">10.1080/10919392.2019.1552743</pub-id></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Yehualashet</surname><given-names>G</given-names> </name><name name-style="western"><surname>Asemahagn</surname><given-names>M</given-names> </name><name name-style="western"><surname>Tilahun</surname><given-names>B</given-names> </name></person-group><article-title>The attitude towards and use of electronic medical record system by health professionals at a referral hospital in Northern Ethiopia: cross-sectional study</article-title><source>J Health Inf Afr</source><year>2015</year><month>10</month><day>28</day><volume>3</volume><issue>1</issue><fpage>19</fpage><lpage>29</lpage><pub-id pub-id-type="doi">10.12856/JHIA-2015-v3-i1-124</pub-id></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kalayou</surname><given-names>MH</given-names> </name><name name-style="western"><surname>Endehabtu</surname><given-names>BF</given-names> </name><name name-style="western"><surname>Guadie</surname><given-names>HA</given-names> </name><etal/></person-group><article-title>Physicians&#x2019; attitude towards electronic medical record systems: an input for future implementers</article-title><source>Biomed Res Int</source><year>2021</year><volume>2021</volume><fpage>5523787</fpage><pub-id pub-id-type="doi">10.1155/2021/5523787</pub-id><pub-id pub-id-type="medline">34493979</pub-id></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sari</surname><given-names>PK</given-names> </name><name name-style="western"><surname>Prasetio</surname><given-names>A</given-names> </name><collab>Candiwan</collab><etal/></person-group><article-title>Information security cultural differences among health care facilities in Indonesia</article-title><source>Heliyon</source><year>2021</year><month>06</month><volume>7</volume><issue>6</issue><fpage>e07248</fpage><pub-id pub-id-type="doi">10.1016/j.heliyon.2021.e07248</pub-id><pub-id pub-id-type="medline">34179533</pub-id></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Naing</surname><given-names>L</given-names> </name><name name-style="western"><surname>Nordin</surname><given-names>RB</given-names> </name><name name-style="western"><surname>Abdul Rahman</surname><given-names>H</given-names> </name><name name-style="western"><surname>Naing</surname><given-names>YT</given-names> </name></person-group><article-title>Sample size calculation for prevalence studies using Scalex and ScalaR calculators</article-title><source>BMC Med Res Methodol</source><year>2022</year><month>07</month><day>30</day><volume>22</volume><issue>1</issue><fpage>209</fpage><pub-id pub-id-type="doi">10.1186/s12874-022-01694-7</pub-id><pub-id pub-id-type="medline">35907796</pub-id></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="thesis"><person-group person-group-type="author"><name name-style="western"><surname>Hull</surname><given-names>MS</given-names> </name></person-group><article-title>Factors affecting secure computer behaviour [Master&#x2019;s thesis]</article-title><year>2015</year><access-date>2024-10-25</access-date><publisher-name>Carleton University</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="https://repository.library.carleton.ca/concern/etds/6t053g751">https://repository.library.carleton.ca/concern/etds/6t053g751</ext-link></comment></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dagnew</surname><given-names>E</given-names> </name><name name-style="western"><surname>Woreta</surname><given-names>SA</given-names> </name><name name-style="western"><surname>Shiferaw</surname><given-names>AM</given-names> </name></person-group><article-title>Routine health information utilization and associated factors among health care professionals working at public health institution in North Gondar, Northwest Ethiopia</article-title><source>BMC Health Serv Res</source><year>2018</year><month>09</month><day>4</day><volume>18</volume><issue>1</issue><fpage>685</fpage><pub-id pub-id-type="doi">10.1186/s12913-018-3498-7</pub-id><pub-id pub-id-type="medline">30180897</pub-id></nlm-citation></ref><ref id="ref24"><label>24</label><nlm-citation citation-type="thesis"><person-group person-group-type="author"><name name-style="western"><surname>Howard</surname><given-names>DJ</given-names> </name></person-group><article-title>Development of the cybersecurity attitudes scale and modeling cybersecurity behavior and its antecedents</article-title><source>Master&#x2019;s Thesis</source><year>2018</year><access-date>2024-10-25</access-date><publisher-name>University of South Florida</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=8503&#x0026;context=etd">https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=8503&#x0026;context=etd</ext-link></comment></nlm-citation></ref><ref id="ref25"><label>25</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>James</surname><given-names>T</given-names> </name><name name-style="western"><surname>Nottingham</surname><given-names>Q</given-names> </name><name name-style="western"><surname>Kim</surname><given-names>BC</given-names> </name></person-group><article-title>Determining the antecedents of digital security practices in the general public dimension</article-title><source>Inf Technol Manag</source><year>2013</year><month>06</month><volume>14</volume><issue>2</issue><fpage>69</fpage><lpage>89</lpage><pub-id pub-id-type="doi">10.1007/s10799-012-0147-4</pub-id></nlm-citation></ref><ref id="ref26"><label>26</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Adedeji</surname><given-names>P</given-names> </name><name name-style="western"><surname>Irinoye</surname><given-names>O</given-names> </name><name name-style="western"><surname>Ikono</surname><given-names>R</given-names> </name><name name-style="western"><surname>Komolafe</surname><given-names>A</given-names> </name></person-group><article-title>Factors influencing the use of electronic health records among nurses in a teaching hospital in Nigeria</article-title><source>J Health Inform Dev Ctries</source><year>2018</year><access-date>2024-10-25</access-date><volume>12</volume><issue>2</issue><comment><ext-link ext-link-type="uri" xlink:href="https://www.jhidc.org/index.php/jhidc/article/view/174">https://www.jhidc.org/index.php/jhidc/article/view/174</ext-link></comment></nlm-citation></ref><ref id="ref27"><label>27</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Balaji</surname><given-names>J</given-names> </name><name name-style="western"><surname>Ganesh</surname><given-names>G</given-names></name></person-group><article-title>Knowledge, attitude and practice study on awareness and preventing cyber threats among the electronic devices used by the doctors of government medical college Vellore, Tamil Nadu, India</article-title><source>Int J Community Med Public Health</source><year>2020</year><volume>7</volume><issue>1</issue><fpage>283</fpage><lpage>288</lpage><pub-id pub-id-type="doi">10.18203/2394-6040.ijcmph20195868</pub-id></nlm-citation></ref><ref id="ref28"><label>28</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Secginli</surname><given-names>S</given-names> </name><name name-style="western"><surname>Erdogan</surname><given-names>S</given-names> </name><name name-style="western"><surname>Monsen</surname><given-names>KA</given-names> </name></person-group><article-title>Attitudes of health professionals towards electronic health records in primary health care settings: a questionnaire survey</article-title><source>Inform Health Soc Care</source><year>2014</year><month>01</month><volume>39</volume><issue>1</issue><fpage>15</fpage><lpage>32</lpage><pub-id pub-id-type="doi">10.3109/17538157.2013.834342</pub-id><pub-id pub-id-type="medline">24131449</pub-id></nlm-citation></ref><ref id="ref29"><label>29</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Belfrage</surname><given-names>S</given-names> </name><name name-style="western"><surname>Helgesson</surname><given-names>G</given-names> </name><name name-style="western"><surname>Lyn&#x00F8;e</surname><given-names>N</given-names> </name></person-group><article-title>Trust and digital privacy in healthcare: a cross-sectional descriptive study of trust and attitudes towards uses of electronic health data among the general public in Sweden</article-title><source>BMC Med Ethics</source><year>2022</year><month>03</month><day>4</day><volume>23</volume><issue>1</issue><fpage>19</fpage><pub-id pub-id-type="doi">10.1186/s12910-022-00758-z</pub-id><pub-id pub-id-type="medline">35246118</pub-id></nlm-citation></ref><ref id="ref30"><label>30</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Karanfilo&#x011F;lu</surname><given-names>M</given-names> </name></person-group><person-group person-group-type="editor"><name name-style="western"><surname>&#x00C7;okluk</surname><given-names>N</given-names> </name><name name-style="western"><surname>Kara</surname><given-names>N</given-names></name></person-group><article-title>Digital literacy in increasing data security: an evaluation from the communicator&#x2019;s perspective</article-title><source>Privacy in the Digital Age: Digital Communication and Personal Data</source><year>2022</year><publisher-name>Literat&#x00FC;rk Academia</publisher-name><fpage>43</fpage><lpage>60</lpage><pub-id pub-id-type="other">9786257606790</pub-id></nlm-citation></ref><ref id="ref31"><label>31</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Mijin</surname><given-names>N</given-names> </name><name name-style="western"><surname>Jang</surname><given-names>H</given-names> </name><name name-style="western"><surname>Choi</surname><given-names>B</given-names> </name><name name-style="western"><surname>Khongorzul</surname><given-names>G</given-names> </name></person-group><article-title>Attitude toward the use of electronic medical record systems: exploring moderating effects of self-image</article-title><source>Inf Dev</source><year>2017</year><volume>35</volume><fpage>67</fpage><lpage>79</lpage><pub-id pub-id-type="doi">10.1177/0266666917729730</pub-id></nlm-citation></ref></ref-list></back></article>