14 research outputs found

    Wireless handheld device and LAN security issues: a case study

    Get PDF
    The application of WLAN (Wireless Local Area Network) technology in the healthcare industry has gained increasing attention in recent years. It provides effective and efficient sharing of health information among healthcare professionals in timely and effective treatment of patients (Collaborative Health Informatics Centre, 2000, Whetton, 2005a). However, there is still a concern among healthcare professionals whether health information is shared safely with WLAN technology. The primary aim of this study is to explore factors influencing healthcare professionals' adoption of WLAN security technology. This study was conducted in regional health settings in Queensland, Australia with a mixed research methodology. A focus group discussion and a questionnaire survey were used in the mixed research methodology. Four factors were extracted from the study. Learning support, user technology awareness, readiness of existing system and social influence are four important factors in healthcare professionals' adoption of WLAN security technology in this study. The findings suggest that healthcare professionals prefer to be more informed and prepared on knowledge of WLAN security technology before they decide to adopt it in their work environment. Healthcare professionals are concerned with their interaction with WLAN security technology. Therefore, their awareness of what the technology can do and cannot do for them and the support they could get in learning to use the technology play a crucial role. The healthcare professionals are also concerned with how readily their existing system could support WLAN security technology and how people important to them would influence their decision in adopting WLAN security technology. Future research should extend the study in three areas. Firstly, future study should examine factors in this study with more regional areas of Australia. Secondly, future research should also examine the relationship between the factors and the demographic variables. Finally, there is also the possibility of examining the adoption factors with other security technology in healthcare such as the pairing of WLAN technology and biometric security

    Student perceptions of learning digital literacy online in a leadership program

    No full text
    This chapter presents a study that examined student perceptions of taking a digital literacy class online and its effects on the development of leadership skills in relation to the use of technology. It was found that, in general, the participants tended to be satisfied with this online class. Their perceptions of different types of interactions were discussed. The participants tended to perceive that this class was effective in developing their knowledge and skills in using technology to enact leadership practice. The results have implications in online teaching and learning, group projects and technology learning in leadership development

    Factors Affecting the Citizens’ Trust in E-Government

    No full text
    In e-government context, trust plays a vital role in helping citizens overcome perceived risks. Trust makes citizens comfortable sharing personal information, make online government transaction, and acting on e-Government advices. Thus, trust is a significant notion that should be critically investigated to help both researchers and practitioners to understand citizens' acceptance to e-Government. Prior research in trust has focused mainly on consumer's trust in e-Commerce. Most of existing literatures on trust in e-government focus on technical perspective such as PKI. This paper contributes by proposing a conceptual model of citizens' trust in e-Government. The proposed conceptual model of citizens' trust in e-government is integrated constructs from multiple disciplines: psychology, sociology, e-commerce, and HCI. The research is aimed also to develop items in order to measure the theoretical constructs in the proposed model. The pool of items is generated based on literature review. Q-Methodology has been utilised to validate the generated measurement items. The outcome of two Q-sorting rounds resulted in developing a survey instrument for proposed model with an excellent validity and reliability statistical results.Griffith Sciences, School of Information and Communication TechnologyNo Full Tex
    corecore