MedISA
Medical Centre Employee Centered Information Security Awareness
Katalog
Im Rahmen der MedISA-Forschung wurden verschiedene Messinstrumente zur Erfassung der Information Security Awareness in einem Katalog zusammengestellt, die für weitere Forschungsarbeiten und praktische Anwendungen genutzt werden können. Die zusammengestellten Instrumente bieten Hinweise auf Reliabilität und Validität, die wissenschaftlichen Gütekriterien sind jedoch von unterschiedlicher Qualität. Weitere Hinweise entnehmen Sie den dazugehörigen Publikationen.
Name: The Human Aspects of Information Security Questionnaire (HAIS-Q) DOI: https://doi.org/10.1016/j.cose.2017.01.004
Added: 2017
Added: 2017
Name: Simplified Information Security Awareness Scale (SISA) DOI: https://doi.org/10.3233/SHTI210248
Added: 2021
Added: 2021
Name: Information Security Attitude Questionnaire for Nurses (ISA-Q) DOI: https://doi.org/10.1002/nop2.1353
Added: 2022
Added: 2022
Name: Mobile Information Security Awareness Scale (MISAS) DOI: https://doi.org/10.1108/OIR-04-2020-0129
Added: 2021
Added: 2021
Name: Security Behavior Intentions Scale (SeBIS) DOI: https://doi.org/10.1145/2702123.2702249
Added: 2015
Added: 2015
Name: SABS ISO/IEC 17799 Scale with Focus on Hospitals (SIIS) DOI: https://www.cabidigitallibrary.org/doi/full/10.5555/20163074395
Added: 2015
Added: 2015
Name: Cyber Security Awareness Scale Based on Recommendation of ENISA and the U.S. HHS (CSAS) DOI: http://hdl.handle.net/10125/64215
Added: 2020
Added: 2020
Name: End-User Security Attitudes Scale (SA-6) DOI: https://www.usenix.org/conference/soups2019/presentation/faklaris
Added: 2019
Added: 2019
Name: Security Awareness Scale for Health Care Information Systems (SAS-HIPAA) DOI: https://doi.org/10.48009/1_iis_2011_224-236
Added: 2011
Added: 2011
Name: Hospital Staff’s Risky Cybersecurity Practices Scales (RCSPS) DOI: https://doi.org/10.1145/3465481.3470094
Added: 2021
Added: 2021
SABS ISO/IEC 17799 Scale with Focus on Hospitals (SIIS)
Antwort Spezifikation: Five-point Likert scale (1 = Strongly disagree, 2 = Disagree, 3 = Neutral, 4 = Agree, 5 = Strongly agree)
Item |
---|
Users may not logon / gain access to our systems without being formerly registered with their own user account. |
We ensure that information processing facilities are only used for authorised business purposes. |
Our organisation controls access to information via an access control policy which specifies which users have access to what data. |
Despite being connected to public networks, we are confident that our systems are adequately protected by our internet service provider’s security and / or our own firewalling systems. |
We are confident that our anti-virus systems are up to date and in the event of a virus outbreak, we should be able to protect our systems as best as possible. |
In the event of a security incident, procedures clearly define what to do and who to call for assistance. |
A password management system is in place which specifies the frequency of password changes as well as the minimum password complexity. |
Appropriate mechanisms are in place to authenticate users logging onto our systems. |
Item |
---|
There is a formal disciplinary process for employees who have violated our security policies and processes. |
Staff have been trained to secure their computers at all times, when moving away from their work stations. |
Staff are aware that security incidents must be reported to management immediately. |
Expertise on information security is available internally and where not, external advice is sought. |
We are confident that in the event of equipment failure, theft or site disaster, our data backups and storage would enable us to retrieve our information with minimal business interruption. |
Item |
---|
Changes in the workflow with computer use, do not prevent the granting of the necessary importance to information security. |
Information security process does not adversely affect the quality of service. |
Information security is a priority issue among daily works. |
Having more workload in a organisations does not prevent the granting of the necessary importance to information security |
Item |
---|
A director (or equivalent) member of our staff has responsibility for information security. |
There is a nominated person in our organisation who is expertise on information security. |
Directors take care to improve information security in the organisation. |
Staffs take care to improve information security in the organisation. |
Staff are well informed as to what is considered to be acceptable and unacceptable usage of our information systems. |
Item |
---|
Staff are aware of our information security policy. |
We have a documented information security policy. |
Roles and responsibilities for information security in our organization are well defined. |
All staff are given adequate and appropriate information security education and training. |