DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kwon, Juhee | ko |
dc.contributor.author | Johnson, M. Eric | ko |
dc.date.accessioned | 2017-08-31T09:01:40Z | - |
dc.date.available | 2017-08-31T09:01:40Z | - |
dc.date.created | 2017-08-22 | - |
dc.date.created | 2017-08-22 | - |
dc.date.created | 2017-08-22 | - |
dc.date.issued | 2013 | - |
dc.identifier.citation | JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, v.30, no.2, pp.41 - 65 | - |
dc.identifier.issn | 0742-1222 | - |
dc.identifier.uri | http://hdl.handle.net/10203/225641 | - |
dc.description.abstract | This study identifies how security performance and compliance influence each other and how security resources contribute to two security outcomes: data protection and regulatory compliance. Using simultaneous equation models and data from 243 hospitals, we find that the effects of security resources vary for data breaches and perceived compliance and that security operational maturity plays an important role in the outcomes. In operationally mature organizations, breach occurrences hurt compliance, but, surprisingly, compliance does not affect actual security. In operationally immature organizations, breach occurrences do not affect compliance, whereas compliance significantly improves actual security. The results imply that operationally mature organizations are more likely to be motivated by actual security than compliance, whereas operationally immature organizations are more likely to be motivated by compliance than actual security. Our findings provide policy insights on effective security programs in complex health-care environments. | - |
dc.language | English | - |
dc.publisher | ROUTLEDGE JOURNALS | - |
dc.subject | INFORMATION-SYSTEMS SECURITY | - |
dc.subject | RESOURCE-BASED VIEW | - |
dc.subject | COMPETITIVE ADVANTAGE | - |
dc.subject | RISK-MANAGEMENT | - |
dc.subject | EMPIRICAL-EXAMINATION | - |
dc.subject | MULTIBUSINESS FIRMS | - |
dc.subject | PERFORMANCE | - |
dc.subject | TECHNOLOGY | - |
dc.subject | GOVERNANCE | - |
dc.subject | ASSETS | - |
dc.title | Health-Care Security Strategies for Data Protection and Regulatory Compliance | - |
dc.type | Article | - |
dc.identifier.wosid | 000328259900003 | - |
dc.identifier.scopusid | 2-s2.0-84898403246 | - |
dc.type.rims | ART | - |
dc.citation.volume | 30 | - |
dc.citation.issue | 2 | - |
dc.citation.beginningpage | 41 | - |
dc.citation.endingpage | 65 | - |
dc.citation.publicationname | JOURNAL OF MANAGEMENT INFORMATION SYSTEMS | - |
dc.identifier.doi | 10.2753/MIS0742-1222300202 | - |
dc.contributor.localauthor | Kwon, Juhee | - |
dc.contributor.nonIdAuthor | Johnson, M. Eric | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | compliance | - |
dc.subject.keywordAuthor | data breach | - |
dc.subject.keywordAuthor | health care | - |
dc.subject.keywordAuthor | organizational maturity | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordPlus | INFORMATION-SYSTEMS SECURITY | - |
dc.subject.keywordPlus | RESOURCE-BASED VIEW | - |
dc.subject.keywordPlus | COMPETITIVE ADVANTAGE | - |
dc.subject.keywordPlus | RISK-MANAGEMENT | - |
dc.subject.keywordPlus | EMPIRICAL-EXAMINATION | - |
dc.subject.keywordPlus | MULTIBUSINESS FIRMS | - |
dc.subject.keywordPlus | PERFORMANCE | - |
dc.subject.keywordPlus | TECHNOLOGY | - |
dc.subject.keywordPlus | GOVERNANCE | - |
dc.subject.keywordPlus | ASSETS | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.