Security Practices and Regulatory Compliance in the Healthcare Industry

被引:0
|
作者
Kwon, Juhee [1 ]
Johnson, M. Eric [1 ]
机构
[1] Dartmouth Coll, Tuck Sch Business, Hanover, NH 03755 USA
来源
基金
美国国家科学基金会;
关键词
Security Practices; Compliance; Healthcare; Regulation; INFORMATION; DETERRENCE; MANAGEMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study examined the adoption of security practices, with the goal of identifying dominant configurations and their relationship to perceived compliance. We utilized survey data from 204 hospitals including adoption status of 17 security practices and perceived compliance levels on HITECH, HIPAA, Red Flags Rules, CMS, and State laws governing patient information security. Using cluster analysis and t-tests, we found that three clusters of security practices are significantly associated with different levels of perceived compliance. We demonstrated significant differences among non-technical practices rather than technical practices, and the highest levels of compliance are associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-time and cultural practices). Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Security practices and regulatory compliance in the healthcare industry
    Kwon, Juhee
    Johnson, M. Eric
    [J]. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2013, 20 (01) : 44 - 51
  • [2] Healthcare Security Strategies for Regulatory Compliance and Data Security
    Kwon, Juhee
    Johnson, M. Eric
    [J]. PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 3972 - 3981
  • [3] The Triple Challenge for the Healthcare Industry: Sustainability, Privacy, and Cloud-Centric Regulatory Compliance
    Godbole, Nina S.
    Lamb, John
    [J]. 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
  • [4] Regulatory Compliance and Information Security Assurance
    Tashi, Igli
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 670 - 674
  • [5] Healthcare Data Security Technology: HIPAA Compliance
    Mbonihankuye, Scholas
    Nkunzimana, Athanase
    Ndagijimana, Ange
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [6] Security versus Compliance: An Empirical Study of the Impact of Industry Standards Compliance on Application Security
    Stewart, Harrison
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2022, 32 (03) : 363 - 393
  • [7] Security for Web Service based on Regulatory Compliance
    Chen, Gang
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 1285 - 1288
  • [8] AUTOMATED ASSESSMENT OF COMPLIANCE WITH SECURITY BEST PRACTICES
    Anwar, Zahid
    Campbell, Roy
    [J]. CRITICAL INFRASTRUCTURE PROTECTION II, 2008, 290 : 173 - 187
  • [9] Digital regulatory compliance checking for the construction industry
    Amor, Robert
    Kumar, Bimal
    Watson, Richard
    [J]. ADVANCED ENGINEERING INFORMATICS, 2024, 61
  • [10] REGULATORY COMPLIANCE COSTS IN THE CANADIAN BREWING INDUSTRY
    CALANTONE, C
    [J]. OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE, 1992, 20 (5-6): : 661 - 670