This study examined the adoption of security practices, with the goal of identifying dominant configurations and their relationship to perceived compliance. We utilized survey data from 204 hospitals including adoption status of 17 security practices and perceived compliance levels on HITECH, HIPAA, Red Flags Rules, CMS, and State laws governing patient information security. Using cluster analysis and t-tests, we found that three clusters of security practices are significantly associated with different levels of perceived compliance. We demonstrated significant differences among non-technical practices rather than technical practices, and the highest levels of compliance are associated with hospitals that employed a balanced approach betwe...
Protection of data and information security are crucial to business processes and include technical,...
Information security has come to the forefront as an organizational priority since information syste...
The increase reliance on information systems has created unprecedented challenges for organizations ...
This study examined the adoption of security practices, with the goal of identifying dominant config...
A study of 1,000 randomly selected U.S. hospitals was conducted to identify (1) the perceptions of H...
This study extends the body of literature concerning security compliance by investigating the antece...
BACKGROUND: Health information systems are innovative products designed to improve the delivery of e...
The purpose of the study was to identify the policies and procedures required in U.S. hospitals to m...
Health Information System (HIS) has a higher degree of vulnerability towards threats of information ...
AbstractHealthcare professionals are dedicated to maintaining the confidentiality of patient informa...
Abstract: The increasing threat to information security has created institutional pressures on organ...
In this article, data collected from onsite assessments of federal healthcare research programs were...
HIPAA security compliance in academic medical centers is a central concern of researchers, academici...
One would think that the enactment of the HIPAA and associated mandates on data security and privacy...
This study extends current information security compliance research by adapting "work-stress mo...
Protection of data and information security are crucial to business processes and include technical,...
Information security has come to the forefront as an organizational priority since information syste...
The increase reliance on information systems has created unprecedented challenges for organizations ...
This study examined the adoption of security practices, with the goal of identifying dominant config...
A study of 1,000 randomly selected U.S. hospitals was conducted to identify (1) the perceptions of H...
This study extends the body of literature concerning security compliance by investigating the antece...
BACKGROUND: Health information systems are innovative products designed to improve the delivery of e...
The purpose of the study was to identify the policies and procedures required in U.S. hospitals to m...
Health Information System (HIS) has a higher degree of vulnerability towards threats of information ...
AbstractHealthcare professionals are dedicated to maintaining the confidentiality of patient informa...
Abstract: The increasing threat to information security has created institutional pressures on organ...
In this article, data collected from onsite assessments of federal healthcare research programs were...
HIPAA security compliance in academic medical centers is a central concern of researchers, academici...
One would think that the enactment of the HIPAA and associated mandates on data security and privacy...
This study extends current information security compliance research by adapting "work-stress mo...
Protection of data and information security are crucial to business processes and include technical,...
Information security has come to the forefront as an organizational priority since information syste...
The increase reliance on information systems has created unprecedented challenges for organizations ...