메뉴 건너뛰기




Volumn 3, Issue , 2011, Pages 2204-2212

The impact of security practices on regulatory compliance and security performance

Author keywords

Compliance; Healthcare; HIPPA; HITECH; Security

Indexed keywords

COMPLIANCE; GOVERNMENT REGULATION; HEALTHCARE ORGANIZATIONS; HI-TECH; HIERARCHICAL LINEAR MODELING; HIPPA; SECURITY; SECURITY PERFORMANCE;

EID: 84884659181     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (12)

References (20)
  • 1
    • 77957061746 scopus 로고    scopus 로고
    • Information Security Policy Compliance: An Empirical Study of Rationality-based Beliefs and Information Security Awareness
    • Sep
    • Bulgurcu, B., Cavusoglu, H., and Benbasat, I. "Information Security Policy Compliance: An Empirical Study of Rationality-based Beliefs and Information Security Awareness," MIS Quarterly (34:3), Sep 2010, pp 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 2
    • 67649551429 scopus 로고    scopus 로고
    • User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
    • D'Arcy, J., Hovav, A., and Galletta, D. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research (20:1) 2009, pp 79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.3
  • 3
    • 34247541615 scopus 로고    scopus 로고
    • Releasing individually identifiable microdata with privacy protection against Stochastic threat: An application to health information
    • Garfinkel, R., Gopal, R., and Thompson, S. "Releasing individually identifiable microdata with privacy protection against Stochastic threat: An application to health information," Information Systems Research (18:1) 2007, pp 23-41.
    • (2007) Information Systems Research , vol.18 , Issue.1 , pp. 23-41
    • Garfinkel, R.1    Gopal, R.2    Thompson, S.3
  • 4
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • Apr
    • Herath, T., and Rao, H.R. "Protection motivation and deterrence: a framework for security policy compliance in organisations," European Journal of Information Systems (18:2), Apr 2009, pp 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 6
    • 0035322353 scopus 로고    scopus 로고
    • An Empirical Examination of Dynamic Quality-based Learning Models
    • April
    • Ittner, CD., Nagar, V., and Rajan, M.V. 2001."An Empirical Examination of Dynamic Quality-based Learning Models," Management Science (47:4), April, pp. 563-578.
    • (2001) Management Science , vol.47 , Issue.4 , pp. 563-578
    • Ittner, C.D.1    Nagar, V.2    Rajan, M.V.3
  • 8
    • 58849149565 scopus 로고    scopus 로고
    • Improved Security through Information Security Governance
    • Johnston, A.C., and Hale, R "Improved Security through Information Security Governance," Communications oftheACM (52:1) 2009, pp 126-129.
    • (2009) Communications OftheACM , vol.52 , Issue.1 , pp. 126-129
    • Johnston, A.C.1    Hale, R.2
  • 9
    • 77957057727 scopus 로고    scopus 로고
    • Fear Appeals and Information Security Behaviors: An Empirical Study
    • Sep
    • Johnston, A.C., and Warkentin, M. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:3), Sep 2010, pp 549-566.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 549-566
    • Johnston, A.C.1    Warkentin, M.2
  • 10
    • 78751472118 scopus 로고    scopus 로고
    • Effective Information Security Requires a Balance of Social and Technology Factors
    • Sep
    • Kayworth, T., and Whitten, D. "Effective Information Security Requires a Balance of Social and Technology Factors," MIS Quarterly Executive (9:3), Sep 2010, pp 163-175.
    • (2010) MIS Quarterly Executive , vol.9 , Issue.3 , pp. 163-175
    • Kayworth, T.1    Whitten, D.2
  • 11
    • 84947287562 scopus 로고    scopus 로고
    • Survey Results: Reduce the Cost of Compliance While Strengthening Security
    • Liberti, L. "Survey Results: Reduce the Cost of Compliance While Strengthening Security," in: Security Management Newsletter, 2008.
    • (2008) Security Management Newsletter
    • Liberti, L.1
  • 12
    • 35348859021 scopus 로고    scopus 로고
    • Perception of risk and the strategic impact of existing IT on information security strategy at board level
    • McFadzean, E., Ezingeard, J.N., and Birchall, D. "Perception of risk and the strategic impact of existing IT on information security strategy at board level," Online Information Review (31) 2007, pp 622-660.
    • (2007) Online Information Review , vol.31 , pp. 622-660
    • McFadzean, E.1    Ezingeard, J.N.2    Birchall, D.3
  • 13
    • 78650770842 scopus 로고    scopus 로고
    • Improving Employees' Compliance through Information Systems Security Training: An Action Research Study
    • Dec
    • Puhakainen, P., and Siponen, M. "Improving Employees' Compliance through Information Systems Security Training: An Action Research Study," MIS Quarterly (34:4), Dec 2010, pp 757-778.
    • (2010) MIS Quarterly , vol.34 , Issue.4 , pp. 757-778
    • Puhakainen, P.1    Siponen, M.2
  • 14
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
    • Sep
    • Siponen, M., and Vance, A. "Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations," MIS Quarterly (34:3), Sep 2010, pp 487-502.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 15
    • 77957070672 scopus 로고    scopus 로고
    • User Participation In Information Systems Security Risk Management
    • Sep
    • Spears, J.L., and Barki, H. "User Participation In Information Systems Security Risk Management," MIS Quarterly (34:3), Sep 2010, pp 503-522.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 503-522
    • Spears, J.L.1    Barki, H.2
  • 17
    • 0002699431 scopus 로고
    • Discovering and Disciplining Computer Abuse in Organizaitons-A Field-Study
    • Mar
    • Straub, D.W., and Nance, W.D. "Discovering and Disciplining Computer Abuse in Organizaitons-A Field-Study," MIS Quarterly (14:1), Mar 1990, pp 45-60.
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-60
    • Straub, D.W.1    Nance, W.D.2
  • 18
    • 0344755343 scopus 로고    scopus 로고
    • Does electronic monitoring of employee Internet usage work?
    • Jan
    • Urbaczewski, A., and Jessup, L.M. "Does electronic monitoring of employee Internet usage work?," Communications of theACM (45:1), Jan 2002, pp 80-83.
    • (2002) Communications of TheACM , vol.45 , Issue.1 , pp. 80-83
    • Urbaczewski, A.1    Jessup, L.M.2
  • 19
    • 24644448811 scopus 로고    scopus 로고
    • Information Security Governance-Compliance management vs operational management
    • von Solms, S.H. "Information Security Governance-Compliance management vs operational management," Computers & Security (24:6) 2005, pp 443-447.
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 443-447
    • von Solms, S.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.