
MedISA
Medical Centre Employee Centered Information Security Awareness
Nudge Ideas for Implementation in Medical Institutions
Nudges are targeted prompts that influence behavior in a predictable way by addressing cognitive routines and decision-making habits, without relying on prohibitions or coercion. They are based on insights from behavioral psychology and aim to make desired behavior in everyday settings easier and more likely to occur [1].
As part of the MedISA project, practice-oriented nudge ideas were developed that may be suitable for use in medical institutions to support Information Security Awareness (ISA). These ideas were designed based on participatory workshops with physicians and nursing staff and with particular consideration for practical applicability in a university hospital setting. A systematic quantitative evaluation of these measures is still pending.
The 56 nudge examples presented here are structured according to the MINDSPACE categories (Messenger, Incentives, Norms, Defaults, Salience & Priming, Affect, Commitment, Ego; cf. [2]) and address various psychological mechanisms. They were developed with a focus on critical workflows in medical contexts and are intended to provide impulses for practical implementation.
Each nudge is assigned to one of the MINDSPACE dimensions. For each dimension, relevant critical workflows are identified, potential types of intervention are outlined, and a specific nudge idea is proposed. These examples are intended as inspiration and must always be adapted to the specific organizational context and the professional realities of the target group in order to be effective and contextually appropriate."
Messenger
Behavior is influenced by who communicates the information.
- Critical Workflows
- Managers do not take an active role in communicating information security. Employees perceive low commitment because the topic is not consistently communicated or exemplified by authoritative figures.
- Possible Interventions
- Involve managers as visible role models; regular communication on the topic in team meetings; training sessions led by credible multipliers from everyday clinical practice.
- M1: ISA Team Meeting
- The unit manager opens each team meeting with a short ISA-related example from daily practice and expresses appreciation for secure behavior.
- M2: ISA Fact Check
- Once a week, a senior physician sends out a brief email titled “ISA Fact Check” containing a concrete case from practice (e.g. a forgotten logout or a data protection incident).
- M3: QM Security Tip
- The quality management officer regularly sends emails with brief security tips, accompanied by the message “One click protects patients.”
- M4: ISA Morning Briefing
- In the morning briefing, the team lead includes a short weekly information segment on data security, accompanied by praise or feedback.
- M5: ISA Figures at Staff Assembly
- At the staff assembly, the board or management presents real figures on open accounts and highlights concrete risks for patients.
- M6: ISA Poster on Duty Schedule
- A colored poster is attached to the printed duty schedule featuring a personal statement from the unit manager on the importance of information security.
- M7: Thank You Letter from Clinic Management
- A hand-signed letter from the hospital management is distributed to all units with the message “We see your contribution to security and thank you personally.”
Possible Nudges
Incentives
Reactions to incentives are shaped by predictable mental shortcuts, such as the strong tendency to avoid losses. Incentives can involve both rewards and penalties.
- Critical Workflows
- Employees do not perceive a personal or collective benefit from secure behavior. Obvious advantages or rewards are lacking, which reduces motivation.
- Possible Interventions
- Team competitions with small rewards; positive reinforcement for correct behavior (e.g. small gifts or public praise); gamification of security goals.
- I1: ISA Challenge
- The team with the most logouts wins a small prize each month.
- I2: Holiday Dinner for Secure Unit
- The unit with the best results receives a shared holiday dinner or a contribution toward a team outing.
- I3: Thank-You Box for Zero Incidents
- Small thank-you boxes with snacks and drinks are given to teams that had no information security incidents in the past month.
- I4: Hospital Newsletter with Team Photo
- The hospital newsletter features an article about units demonstrating exemplary security behavior, including a team photo.
- I5: Data Protection Champion Sticker
- Stickers or small plaques labeled ""Data Protection Champion"" are placed on computers or team carts.
- I6: ISA Bonus Points for Reports
- Individuals receive ISA bonus points for each correctly reported situation, redeemable for small rewards.
- I7: Ranking in the Newsletter
- A ranking is published in the newsletter showing which unit achieved the most consecutive days of secure work.
Possible Nudges
Norms
Behavior is strongly influenced by the (expected) behavior of others.
- Critical Workflows
- In everyday clinical work, information security rules are often neglected because norms and standards are unclear or not internalized. New employees tend to adopt existing problematic routines.
- Possible Interventions
- Identifying and promoting role models within teams; integrating ISA topics into onboarding processes; addressing the topic during shift handovers; regular feedback sessions on secure behavior.
- N1: Team Pillar Quote
- Photos of key team members are displayed on the unit board along with a personal quote about their approach to information security.
- N2: Welcome Package
- New staff members receive a welcome package that includes clear behavioral guidelines and messages such as “This is how we do things on this unit.”
- N3: Mentoring System
- A mentoring system pairs new employees with particularly security-conscious colleagues for the first few weeks.
- N4: Praise in Meetings
- Weekly team meetings include public recognition of those who demonstrated consistently secure behavior the previous week.
- N5: Badge for Role Models
- Key team members receive small pins or stickers on their name badges to visibly identify them as role models.
- N6: Reflection on Incidents
- Real-life violations are discussed in team meetings, accompanied by the question, “How can we prevent this together in the future?”
- N7: Best Practice Posters
- A series of posters presents best-practice cases from the hospital, including short interviews.
Possible Nudges
Defaults
People often “go with the flow” and choose preselected or offered options, meaning they are likely to choose the default setting when one is provided.
- Critical Workflows
- Technical systems allow insecure behaviors (e.g. no automatic logout, no screen lock). As a result, staff are not guided toward secure behavior.
- Possible Interventions
- Technical defaults such as automatic logout after 3 minutes; mandatory screen lock; reduced reliance on active security behavior.
- D1: Automatic Logout on Inactivity
- All workstations are configured to automatically log out after three minutes of inactivity.
- D2: Preconfigured Secure Communication Software
- Communication software with a secure transmission standard is preinstalled and set as the default.
- D3: Contactless Login with Auto-Logout
- Login is performed using a personal contactless access card that also triggers automatic logout when removed.
- D4: Device Lock on Location Change
- Mobile devices automatically lock when leaving the ward area.
- D5: Uniform Logout Icons
- Logout icons are designed uniformly and positioned identically across all devices to facilitate automatic behavior.
- D6: Touch Logout with LED Color
- Touch logout buttons on mobile devices are marked with an LED color code.
- D7: Default Double-Sided Printing
- Print jobs are preset to double-sided printing in order to reduce data protection risks.
Possible Nudges
Salience & Priming
Behavior is influenced by being drawn to new or seemingly relevant stimuli, or by unconscious cues that prime certain actions.
- Critical Workflows
- In the hectic routine of clinical work, security risks are often not top of mind because information security cues are either placed inconspicuously or not designed for the situation. However, the work environment offers many opportunities to steer behavior unconsciously in a safer direction through targeted cues.
- Possible Interventions
- Purposeful design of the environment using noticeable temporary cues at high-traffic locations, such as rotating mini-posters, table displays, or color-coded symbols, can effectively bring information security into awareness. Visual cues are especially effective when placed directly at relevant points of action and when repeated, embedded in routines, or combined with sensory signals to unconsciously promote secure behavior.
- S&P1: ""Are You Logged Out?"" Sticker on Screen
- Red stickers labeled “Are you logged out?” are placed directly on the screen bezel to visually remind staff when leaving their workstation.
- S&P2: One Minute Wonder on Mirror
- Weekly rotating “One Minute Wonder” posters featuring real risk or error examples are placed on restroom mirrors and encourage conscious behavior.
- S&P3: Stickers on Coffee Machines
- In break rooms, humorous stickers on coffee machines say “No coffee without logout,” subtly reinforcing the security message.
- S&P4: Pop-up with Security Tip
- When logging in, a short pop-up appears with a security tip like “One click protects more than you think.”
- S&P5: QR Code on ID Badge
- The staff ID badge features a QR code linking to a 30-second mini-training on data protection basics.
- S&P6: Visual Logout Timer on Desktop
- A visual timer on the desktop shows how long a workstation has been active without logout.
- S&P7: QR Code Stickers with Security Rules
- QR code stickers providing quick access to security rule tips are placed at key information security locations.
Possible Nudges
Affect
Decisions are shaped by emotions, meaning that emotional reactions to a situation can influence actions.
- Critical Workflows
- Lack of personal responsibility and emotional connection to information security violations.
- Possible Interventions
- Present emotionally resonant case studies (e.g. unauthorized access to patient data); encourage reflection on personal responsibility during meetings; visualize potential consequences.
- A1: Poster with Real Incident
- A poster describes an anonymized case in which an employee was exposed due to a forgotten logout.
- A2: Video with Patient on Data Security
- In a video, a patient explains how she felt when her data was left unprotected and viewable.
- A3: Sticker with Data Privacy Question
- Stickers at workstations ask, “Would you want someone to see your data?”
- A4: Reflection Cards During Breaks
- During breaks, reflection cards are available with the question, “What if this affected your family?”
- A5: Mirror Sticker on Personal Impact
- Small mirrors in break rooms or staff restrooms display a subtle sticker asking, “If it were your health data, would you want someone to talk about it?”
- A6: Comic Posters with Consequences
- Comic-style posters illustrate everyday mistakes with consequences, such as “The Forgotten Logout.”
- A7: Logout Sound Effect
- A friendly sound effect plays upon successful logout, positively reinforcing the action.
Possible Nudges
Commitment
People strive to remain true to their public commitments and tend to follow through on actions accordingly.
- Critical Workflows
- Signatures or training participation are perceived as mere formalities, lacking genuine commitment or reflection.
- Possible Interventions
- Binding team goals; personal pledges or agreements within teams; integration into goal-setting discussions with supervisors.
- C1: Signature During Onboarding
- During onboarding, new employees sign a commitment to information security, which is regularly reaffirmed.
- C2: Red Sticker Board in Staff Room
- A board in the staff room anonymously tracks how often individuals forget to log out by marking incidents with a red sticker each day.
- C3: Security Card with Checkboxes
- Employees receive a small laminated card for their coat pocket labeled “My Daily Security Ritual,” with checkboxes on the back to track behavior goals.
- C4: Team Code Word Reminder
- The team agrees on a shared, subtle code word or gesture to gently remind colleagues about secure behavior, for example, “Window open?” as a cue for forgotten logout.
- C5: Team Mini-Agreements Displayed
- Units create their own mini-agreements on information security and display them visibly in the team area.
- C6: Logout Field on Handover Forms
- Handover documentation includes a field where the last logout is recorded.
- C7: Online Quiz with Certificate
- All employees complete an online quiz and receive a certificate as a visible symbol of their commitment to information security.
Possible Nudges
Ego
The ego motivates people to act in ways that help maintain or enhance a positive self-image.
- Critical Workflows
- Secure behavior is not associated with a positive self-image. Recognition for responsible action within the team is lacking.
- Possible Interventions
- Positive reinforcement of responsible behaviors; highlighting role models; competitions such as "ISA Hero of the Week"; team challenges with visibility on the intranet.
- E1: Hero of the Month
- Once a month, one team member is recognized for particularly thoughtful behavior, such as reporting a security risk.
- E2: ISA Badge
- Upon request, employees may add an ISA badge or symbol to team rosters, shift schedules, or email signatures if they participated in a voluntary information security training.
- E3: Notice on Medical Reports
- Monitors, printed reports, or report folders feature a discreet yet visible message: “You quickly recognize irregularities in patients. Information security begins with the same level of attention.”
- E4: Smiley Terminal for Self-Assessment
- At the end of their shift, employees assess their data security behavior using a smiley terminal asking, “How securely did you handle sensitive data today?” A short message like “Thank you for taking responsibility” appears after positive responses.
- E5: Desk Sign with Message
- A small desk sign reads: “Security doesn’t start with IT, it starts with your own actions.”
- E6: Mirror with Reputation Message
- In locker rooms, a mirror displays the message: “You're not just protecting sensitive data, you're protecting your reputation.”
- E7: Sticker on ID Badge
- A subtle sticker on the staff ID badge reads: “Information security is my standard.”
Possible Nudges
References:
Year:2016
Year:2020