2017
DOI: 10.25300/misq/2017/41.3.10
|View full text |Cite
|
Sign up to set email alerts
|

When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

5
56
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 155 publications
(76 citation statements)
references
References 98 publications
5
56
0
2
Order By: Relevance
“…Thus, the close relation between both theory types is attenuated and the influence of external factors such as legal and social structures promoted. In this regard, IS studies which employ an Institutional Theory approach, have investigated and demonstrated the influence of environmental aspects such as conformity with external norms and social influence on investment decisions [7,18].…”
Section: Organizational Decision-makingmentioning
confidence: 99%
See 3 more Smart Citations
“…Thus, the close relation between both theory types is attenuated and the influence of external factors such as legal and social structures promoted. In this regard, IS studies which employ an Institutional Theory approach, have investigated and demonstrated the influence of environmental aspects such as conformity with external norms and social influence on investment decisions [7,18].…”
Section: Organizational Decision-makingmentioning
confidence: 99%
“…Selection criteria were mostly determined by the theoretical framework and the resulting focus on the decision process. As a result, publications like Angst and colleagues' investigation of institutional factors in healthcare security investment [7] which detail the evaluation and implementation of investments rather than the decision process leading towards the investment, were excluded. Similarly, Baskerville's [5] study on risk analysis covers only the second phase of Straub and Welke's [14] model and was thus suspended after full text screening.…”
Section: Search and Selection Strategymentioning
confidence: 99%
See 2 more Smart Citations
“…A abordagem institucional foi utilizada recentemente em trabalhos sobre o tema (Tejay & Barton, 2013;Anthony et al, 2014;Lopes & Sá-Soares, 2014;Alkalbani, Deng & Kam, 2015;Angst, Block, D'Arcy, & Kelley, 2017;Alkalbani et al, 2017;Hou et al, 2018;Choi, Lee, & Hwang, 2018), mas, se analisados em conjunto, esses trabalhos são inconclusivos quanto aos mecanismos institucionais que pressionam as organizações a adoptarem medidas de Segurança da Informação, pois apontam para pressões normativas e miméticas (Tejay & Barton, 2013), coercitivas (AlKalbani et al, 2015Hou et al, 2018), miméticas e coercitivas (Anthony et al, 2014;Alkalbani et al, 2017), e coercitivas e normativas (Kam et al, 2013;Lopes & Sá-Soares, 2014;Choi et al, 2018). Além disso, os trabalhos abordam principalmente medidas formais (Williams et al, 2013;Kam et al, 2013;Lopes & Sá-Soares, 2014;Anthony et al, 2014;Angst et al, 2017;Alkalbani et al, 2017;Hou et al, 2018;Choi et al, 2018), dando pouca atenção às medidas informais e técnicas.…”
Section: Modelo De Pesquisaunclassified