Making research real: Is action research a suitable methodology for medical information security investigations?

Research output: Contribution to conferencePaperpeer-review

4 Citations (Scopus)

Abstract

In the medical field, information security is an important yet vastly underrated issue. Research into the protection of sensitive medical data is often technically focused and does not address information systems and behavioural aspects integral to effective information security implementation. Current information security policy and guidelines are strategically oriented which, whilst relevant to large organisations, are less supportive to smaller enterprises such as primary care practices. Further, the conservative nature of the medical profession has been shown to hinder investigation into information technology use and management, making effective improvement based on research problematical. It is an environment which relies greatly on trust, inhibiting good security practice. Research into how information security practice in this setting can be improved demands an interpretivist approach rather than a positivist one. Action research is one such interpretivist method that allows a creation of scientific knowledge with practical value. Whilst there is some opposition to the action research method on grounds of rigour, its fundamental cyclic process of participation, action and reflection promotes internal rigour and can overcome many of the barriers to research inherent in the primary care medical environment.
Original languageEnglish
Number of pages14
DOIs
Publication statusPublished - 2006
Externally publishedYes
Event4th Australian Information Security Management Conference - Edith Cowan university , Perth, Australia
Duration: 5 Dec 2006 → …

Conference

Conference4th Australian Information Security Management Conference
Country/TerritoryAustralia
CityPerth
Period5/12/06 → …

Fingerprint

Dive into the research topics of 'Making research real: Is action research a suitable methodology for medical information security investigations?'. Together they form a unique fingerprint.

Cite this