Table 5.
Measuring the feasibility of the measures to prevent unsecured access to DHT and patient's data (Sec D).
| S/N | Statement | Mean | Standard deviation | 95% confidence interval | |
|---|---|---|---|---|---|
| Lower bound | Upper bound | ||||
| D1 | Healthcare institution should have sufficient measures against DHT security threats. | 4.22 | 0.593 | 4.16 | 4.28 |
| D2 | Two-factor authentication should be a requirement for accessing DHTs | 4.04 | 0.755 | 3.97 | 4.12 |
| D3 | Encryption should be employed when storing data to the database. | 4.36 | 0.530 | 4.30 | 4.41 |
| D4 | Appropriate access controls and restrictions will prevent health institution from suffering data breach. | 4.10 | 0.976 | 4.00 | 4.22 |
| D5 | Regular security training for staff would reduce cases of security threats to DHTs. | 4.20 | 0.762 | 4.12 | 4.28 |
| D6 | Password access to DHT systems should be changed periodically | 4.15 | 0.884 | 4.06 | 4.24 |
Source: Author Field Data (2023).