Healthcare Security Strategies for Regulatory Compliance and Data Security

被引:1
|
作者
Kwon, Juhee [1 ]
Johnson, M. Eric [1 ]
机构
[1] Dartmouth Coll, Tuck Sch Business, Hanover, NH 03755 USA
关键词
RESOURCE-BASED VIEW; INFORMATION-SYSTEMS; TOP MANAGEMENT; COMPETITIVE ADVANTAGE; EMPIRICAL-EXAMINATION; MULTIBUSINESS FIRMS; PRODUCT DEVELOPMENT; PERFORMANCE; CAPABILITIES; TECHNOLOGY;
D O I
10.1109/HICSS.2013.246
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Regulatory compliance and data security are important objectives for IT managers. Building on the resource-based view, this study examines the impact of IT security resources, functional capabilities, and managerial capabilities on regulatory compliance and data security. Using binomial and multinomial logit models, we analyze data from 250 healthcare organizations. The results show that IT security resources are positively associated with compliance and data security. Within functional capabilities, prevention capabilities improve both compliance and data security, and complement IT security resources. Functional audit capabilities are also associated with improved compliance but result in increased breaches, likely because such auditing helps organizations find, disclose and fix breach-related problems. Managerial capabilities (i.e., top management support, expertise, and data coordination) influence compliance more than data security. Our findings provide policy insight on effective security programs that harness IT resources, functional capabilities, and managerial capabilities.
引用
收藏
页码:3972 / 3981
页数:10
相关论文
共 50 条
  • [1] Security Practices and Regulatory Compliance in the Healthcare Industry
    Kwon, Juhee
    Johnson, M. Eric
    [J]. AMCIS 2012 PROCEEDINGS, 2012,
  • [2] Security practices and regulatory compliance in the healthcare industry
    Kwon, Juhee
    Johnson, M. Eric
    [J]. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2013, 20 (01) : 44 - 51
  • [3] Health-Care Security Strategies for Data Protection and Regulatory Compliance
    Kwon, Juhee
    Johnson, M. Eric
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2013, 30 (02) : 41 - 65
  • [4] Healthcare Data Security Technology: HIPAA Compliance
    Mbonihankuye, Scholas
    Nkunzimana, Athanase
    Ndagijimana, Ange
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [5] Regulatory Compliance and Information Security Assurance
    Tashi, Igli
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 670 - 674
  • [6] Security for Web Service based on Regulatory Compliance
    Chen, Gang
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 1285 - 1288
  • [7] Big Data: A Security Compliance Model
    Gupta, Archana
    Verma, Ajita
    Kalra, Parul
    Kumar, Lokesh
    [J]. 2014 CONFERENCE ON IT IN BUSINESS, INDUSTRY AND GOVERNMENT (CSIBIG), 2014,
  • [8] Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
    Blake, Errol A.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2007, 2 (04) : 77 - 106
  • [9] Harnessing Healthcare Data Security in Cloud
    Aiswarya, R.
    Divya, R.
    Sangeetha, D.
    Vaidehi, V.
    [J]. 2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 482 - 488
  • [10] Malware Detection for Healthcare Data Security
    Chowdhury, Mozammel
    Jahan, Sharmin
    Islam, Rafiqul
    Gao, Junbin
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT II, 2018, 255 : 407 - 416