WHEN DO IT SECURITY INVESTMENTS MATTER? ACCOUNTING FOR THE INFLUENCE OF INSTITUTIONAL FACTORS IN THE CONTEXT OF HEALTHCARE DATA BREACHES

被引:0
作者
Angst, Corey M. [1 ]
Block, Emily S. [2 ]
D'Arcy, John [3 ]
Kelley, Ken [4 ]
机构
[1] Univ Notre Dame, IT Analyt & Operat Dept, Mendoza Coll Business 348, Notre Dame, IN 46556 USA
[2] Univ Alberta, F Alberta Sch Business 4 21, Dept Strateg Management & Org, Edmonton, AB T6G 2R6, Canada
[3] Univ Delaware, Dept Accounting & MIS, 356 Purnell Hall, Newark, DE 19716 USA
[4] Univ Notre Dame, IT Analyt & Operat Dept, Mendoza Coll Business 363, Notre Dame, IN 46556 USA
关键词
Data security breach; institutional theory; firm characteristics; IT security; health IT; panel data; growth mixture model; longitudinal; ORGANIZATIONAL IDENTITY ORIENTATION; ELECTRONIC MEDICAL-RECORDS; INFORMATION-TECHNOLOGY; POLICY COMPLIANCE; FINANCIAL PERFORMANCE; SYSTEMS; DETERRENCE; MANAGEMENT; MODEL; FIRM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this study, we argue that institutional factors determine the extent to which hospitals are symbolic or substantive adopters of information technology (IT) specific organizational practices. We then propose that symbolic and substantive adoption will moderate the effect that IT security investments have on reducing the incidence of data security breaches over time. Using data from three different sources, we create a matched panel of over 5,000 U. S. hospitals and 938 breaches over the 2005-2013 time frame. Using a growth mixture model approach to model the heterogeneity in likelihood of breach, we use a two class solution in which hospitals that (1) belong to smaller health systems, (2) are older, (3) smaller in size, (4) for-profit, (5) nonacademic, (6) faith-based, and (7) less entrepreneurial with IT are classified as symbolic adopters. We find that symbolic adoption diminishes the effectiveness of IT security investments, resulting in an increased likelihood of breach. Contrary to our theorizing, the use of more IT security is not directly responsible for reducing breaches, but instead, institutional factors create the conditions under which IT security investments can be more effective. Implications of these findings are significant for policy and practice, the most important of which may be the discovery that firms need to consider how adoption is influenced by institutional factors and how this should be balanced with technological solutions. In particular, our results support the notion that deeper integration of security into IT-related processes and routines leads to fewer breaches, with the caveat that it takes time for these benefits to be realized.
引用
收藏
页码:893 / +
页数:32
相关论文
共 122 条
[1]   When are technologies disruptive? A demand-based view of the emergence of competition [J].
Adner, R .
STRATEGIC MANAGEMENT JOURNAL, 2002, 23 (08) :667-688
[2]   Social Contagion and Information Technology Diffusion: The Adoption of Electronic Medical Records in US Hospitals [J].
Angst, Corey M. ;
Agarwal, Ritu ;
Sambamurthy, V. ;
Kelley, Ken .
MANAGEMENT SCIENCE, 2010, 56 (08) :1219-1241
[3]  
[Anonymous], 2015, WHAT EV CEO NEEDS KN
[4]  
[Anonymous], 2014, WHY HACKERS ARE TARG
[5]  
[Anonymous], GARTN SAYS WORLDW IN
[6]  
[Anonymous], JOURNAL, DOI DOI 10.1080/10705511.2014.915181
[7]  
[Anonymous], 2003, ORG ACTION SOCIAL SC
[8]  
[Anonymous], 6 ANN HIMSS SEC SURV
[9]  
[Anonymous], CSI FBI COMPUTER CRI
[10]  
[Anonymous], HIPAA BREACH NOT TO