IS

Johnson, M. Eric

Topic Weight Topic Terms
0.841 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.223 firms firm financial services firm's size examine new based result level including results industry important
0.217 technology investments investment information firm firms profitability value performance impact data higher evidence diversification industry
0.147 information types different type sources analysis develop used behavior specific conditions consider improve using alternative
0.130 process problem method technique experts using formation identification implicit analysis common proactive input improvements identify
0.124 complexity task environments e-business environment factors technology characteristics literature affect influence role important relationship model
0.120 model research data results study using theoretical influence findings theory support implications test collected tested
0.114 health healthcare medical care patient patients hospital hospitals hit health-care telemedicine systems records clinical practices
0.111 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.109 performance results study impact research influence effects data higher efficiency effect significantly findings impacts empirical
0.109 effect impact affect results positive effects direct findings influence important positively model data suggest test
0.107 business large organizations using work changing rapidly make today's available designed need increasingly recent manage

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Kwon, Juhee 2
compliance 1 data breaches 1 data breach 1 file-sharing 1
health care 1 healthcare 1 inadvertent disclosure 1 information security 1
intellectual property leaks 1 organizational maturity 1 organizational learning 1 peer-to-peer networks 1
proactive 1 risk management 1 reactive 1 security 1
Security investment 1

Articles (3)

Proactive Versus Reactive Security Investments in the Healthcare Sector (MIS Quarterly, 2014)
Authors: Abstract:
    This study identifies the effects of security investments that arise from previous failures or external regulatory pressure. Building on organizational learning theory, the study focuses on the healthcare sector where legislation mandates breach disclosure and detailed data on security investments are available. Using a Cox proportional hazard model, we demonstrate that proactive security investments are associated with lower security failure rates. Coupling that result with the economics of breach disclosure, we also show that proactive investments are more cost effective in healthcare security than reactive investments. Our results further indicate that this effect is amplified at the state level, supporting the argument that security investments create positive externalities. We also find that external pressure decreases the effect of proactive investments on security performance. This implies that proactive investments, voluntarily made, have more impact than those involuntarily made. Our findings suggest that security managers and policy makers should pay attention to the strategic and regulatory factors influencing security investment decisions.
Health-Care Security Strategies for Data Protection and Regulatory Compliance. (Journal of Management Information Systems, 2013)
Authors: Abstract:
    This study identifies how security performance and compliance influence each other and how security resources contribute to two security outcomes: data protection and regulatory compliance. Using simultaneous equation models and data from 243 hospitals, we find that the effects of security resources vary for data breaches and perceived compliance and that security operational maturity plays an important role in the outcomes. In operationally mature organizations, breach occurrences hurt compliance, but, surprisingly, compliance does not affect actual security. In operationally immature organizations, breach occurrences do not affect compliance, whereas compliance significantly improves actual security. The results imply that operationally mature organizations are more likely to be motivated by actual security than compliance, whereas operationally immature organizations are more likely to be motivated by compliance than actual security. Our findings provide policy insights on effective security programs in complex health-care environments.
Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the Financial Supply Chain. (Journal of Management Information Systems, 2008)
Authors: Abstract:
    Firms face many different types of information security risk. Inadvertent disclosure of sensitive business information represents one of the largest classes of recent security breaches. We examine a specific instance of this problem--inadvertent disclosures through peer-to-peer file-sharing networks. We characterize the extent of the security risk for a group of large financial institutions using a direct analysis of leaked documents. We also characterize the threat of loss by examining search patterns in peer-to-peer networks. Our analysis demonstrates both a substantial threat and vulnerability for large financial firms. We find a statistically significant link between leakage and leak sources including the firm employment base and the number of retail accounts. We also find a link between firm visibility and threat activity. Finally, we find that firms with more leaks also experience increased threat.