Content area
This qualitative study explored the adoption of cloud computing in healthcare, applying the Technology Acceptance Model (TAM) to evaluate cybersecurity measures essential for safeguarding sensitive healthcare data. As healthcare organizations transition to cloud-based infrastructures, the demand for comprehensive security protocols to address emerging cyber threats has grown significantly. The expansion of big data in healthcare further complicates these challenges, particularly in maintaining scalability and securing extensive amounts of information. This research focused on healthcare IT professionals' perceptions of the usability and effectiveness of access control mechanisms designed to protect cloud-stored data. Using an in-depth qualitative approach, the study gathered insights from healthcare IT professionals involved in managing cloud-based systems, offering a real-world perspective on balancing security with regulatory standards such as the Health Insurance Portability and Accountability Act (HIPAA) and operational efficiency. The data analysis highlights key areas where current cybersecurity practices could be improved, focusing on vulnerability assessments, risk management strategies, and compliance audits. The findings offer practical recommendations for enhancing data security in healthcare organizations and contribute to the ongoing discourse on safeguarding healthcare data against escalating cyber threats. Results emphasize the need for user-centered security measures that protect sensitive data while supporting the operational demands of healthcare environments, ensuring usability, robust security, and compliance. This study addresses a critical gap in the literature by providing a framework for healthcare organizations to strengthen their cybersecurity practices and support healthcare IT professionals in managing cloud security effectively.