Usability of Security Mechanisms of E-Health Applications: Cases From Ethiopia

Usability of Security Mechanisms of E-Health Applications: Cases From Ethiopia

Lemma Lessa, Antonyo George Etoribussi
ISBN13: 9781668465813|ISBN10: 1668465817|ISBN13 Softcover: 9781668465820|EISBN13: 9781668465837
DOI: 10.4018/978-1-6684-6581-3.ch002
Cite Chapter Cite Chapter

MLA

Lessa, Lemma, and Antonyo George Etoribussi. "Usability of Security Mechanisms of E-Health Applications: Cases From Ethiopia." Fraud Prevention, Confidentiality, and Data Security for Modern Businesses, edited by Arshi Naim, et al., IGI Global, 2023, pp. 37-56. https://doi.org/10.4018/978-1-6684-6581-3.ch002

APA

Lessa, L. & Etoribussi, A. G. (2023). Usability of Security Mechanisms of E-Health Applications: Cases From Ethiopia. In A. Naim, P. Malik, & F. Zaidi (Eds.), Fraud Prevention, Confidentiality, and Data Security for Modern Businesses (pp. 37-56). IGI Global. https://doi.org/10.4018/978-1-6684-6581-3.ch002

Chicago

Lessa, Lemma, and Antonyo George Etoribussi. "Usability of Security Mechanisms of E-Health Applications: Cases From Ethiopia." In Fraud Prevention, Confidentiality, and Data Security for Modern Businesses, edited by Arshi Naim, Praveen Kumar Malik, and Firasat Ali Zaidi, 37-56. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-6581-3.ch002

Export Reference

Mendeley
Favorite

Abstract

Extant literature supports that e-health applications are developed with a proper set of security mechanisms in place. However, the majority of the security mechanisms were not considered from the users' point of view. As a result, the security of health information is becoming an important and growing concern. The objective of this study is to evaluate the usability of security mechanisms of e-Health applications functional at health facilities operating under the Addis Ababa Health Bureau, and identify the strengths and weaknesses of the usability of the security features of the e-Health applications. This study uses a qualitative research methodology. The findings revealed that out of the thirteen criteria, learnability, aesthetics and minimalist design, and user language complied; on the contrary, revocability and user suitability were not in compliance with security features according to all the experts' review of all e-Health applications. Finally, recommendations were given for practice, and suggestions were forwarded for future research.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.