Health-Care Security Strategies for Data Protection and Regulatory Compliance

Cited 41 time in webofscience Cited 0 time in scopus
  • Hit : 544
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKwon, Juheeko
dc.contributor.authorJohnson, M. Ericko
dc.date.accessioned2017-08-31T09:01:40Z-
dc.date.available2017-08-31T09:01:40Z-
dc.date.created2017-08-22-
dc.date.created2017-08-22-
dc.date.created2017-08-22-
dc.date.issued2013-
dc.identifier.citationJOURNAL OF MANAGEMENT INFORMATION SYSTEMS, v.30, no.2, pp.41 - 65-
dc.identifier.issn0742-1222-
dc.identifier.urihttp://hdl.handle.net/10203/225641-
dc.description.abstractThis study identifies how security performance and compliance influence each other and how security resources contribute to two security outcomes: data protection and regulatory compliance. Using simultaneous equation models and data from 243 hospitals, we find that the effects of security resources vary for data breaches and perceived compliance and that security operational maturity plays an important role in the outcomes. In operationally mature organizations, breach occurrences hurt compliance, but, surprisingly, compliance does not affect actual security. In operationally immature organizations, breach occurrences do not affect compliance, whereas compliance significantly improves actual security. The results imply that operationally mature organizations are more likely to be motivated by actual security than compliance, whereas operationally immature organizations are more likely to be motivated by compliance than actual security. Our findings provide policy insights on effective security programs in complex health-care environments.-
dc.languageEnglish-
dc.publisherROUTLEDGE JOURNALS-
dc.subjectINFORMATION-SYSTEMS SECURITY-
dc.subjectRESOURCE-BASED VIEW-
dc.subjectCOMPETITIVE ADVANTAGE-
dc.subjectRISK-MANAGEMENT-
dc.subjectEMPIRICAL-EXAMINATION-
dc.subjectMULTIBUSINESS FIRMS-
dc.subjectPERFORMANCE-
dc.subjectTECHNOLOGY-
dc.subjectGOVERNANCE-
dc.subjectASSETS-
dc.titleHealth-Care Security Strategies for Data Protection and Regulatory Compliance-
dc.typeArticle-
dc.identifier.wosid000328259900003-
dc.identifier.scopusid2-s2.0-84898403246-
dc.type.rimsART-
dc.citation.volume30-
dc.citation.issue2-
dc.citation.beginningpage41-
dc.citation.endingpage65-
dc.citation.publicationnameJOURNAL OF MANAGEMENT INFORMATION SYSTEMS-
dc.identifier.doi10.2753/MIS0742-1222300202-
dc.contributor.localauthorKwon, Juhee-
dc.contributor.nonIdAuthorJohnson, M. Eric-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorcompliance-
dc.subject.keywordAuthordata breach-
dc.subject.keywordAuthorhealth care-
dc.subject.keywordAuthororganizational maturity-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordPlusINFORMATION-SYSTEMS SECURITY-
dc.subject.keywordPlusRESOURCE-BASED VIEW-
dc.subject.keywordPlusCOMPETITIVE ADVANTAGE-
dc.subject.keywordPlusRISK-MANAGEMENT-
dc.subject.keywordPlusEMPIRICAL-EXAMINATION-
dc.subject.keywordPlusMULTIBUSINESS FIRMS-
dc.subject.keywordPlusPERFORMANCE-
dc.subject.keywordPlusTECHNOLOGY-
dc.subject.keywordPlusGOVERNANCE-
dc.subject.keywordPlusASSETS-
Appears in Collection
MT-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 41 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0