IS

Kwon, Juhee

Topic Weight Topic Terms
0.732 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.217 technology investments investment information firm firms profitability value performance impact data higher evidence diversification industry
0.130 process problem method technique experts using formation identification implicit analysis common proactive input improvements identify
0.124 complexity task environments e-business environment factors technology characteristics literature affect influence role important relationship model
0.120 model research data results study using theoretical influence findings theory support implications test collected tested
0.114 health healthcare medical care patient patients hospital hospitals hit health-care telemedicine systems records clinical practices
0.109 performance results study impact research influence effects data higher efficiency effect significantly findings impacts empirical
0.109 effect impact affect results positive effects direct findings influence important positively model data suggest test

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Johnson, M. Eric 2
compliance 1 data breach 1 health care 1 healthcare 1
organizational maturity 1 organizational learning 1 proactive 1 reactive 1
security 1 Security investment 1

Articles (2)

Proactive Versus Reactive Security Investments in the Healthcare Sector (MIS Quarterly, 2014)
Authors: Abstract:
    This study identifies the effects of security investments that arise from previous failures or external regulatory pressure. Building on organizational learning theory, the study focuses on the healthcare sector where legislation mandates breach disclosure and detailed data on security investments are available. Using a Cox proportional hazard model, we demonstrate that proactive security investments are associated with lower security failure rates. Coupling that result with the economics of breach disclosure, we also show that proactive investments are more cost effective in healthcare security than reactive investments. Our results further indicate that this effect is amplified at the state level, supporting the argument that security investments create positive externalities. We also find that external pressure decreases the effect of proactive investments on security performance. This implies that proactive investments, voluntarily made, have more impact than those involuntarily made. Our findings suggest that security managers and policy makers should pay attention to the strategic and regulatory factors influencing security investment decisions.
Health-Care Security Strategies for Data Protection and Regulatory Compliance. (Journal of Management Information Systems, 2013)
Authors: Abstract:
    This study identifies how security performance and compliance influence each other and how security resources contribute to two security outcomes: data protection and regulatory compliance. Using simultaneous equation models and data from 243 hospitals, we find that the effects of security resources vary for data breaches and perceived compliance and that security operational maturity plays an important role in the outcomes. In operationally mature organizations, breach occurrences hurt compliance, but, surprisingly, compliance does not affect actual security. In operationally immature organizations, breach occurrences do not affect compliance, whereas compliance significantly improves actual security. The results imply that operationally mature organizations are more likely to be motivated by actual security than compliance, whereas operationally immature organizations are more likely to be motivated by compliance than actual security. Our findings provide policy insights on effective security programs in complex health-care environments.