IDEAS home Printed from https://ideas.repec.org/a/eee/tefoso/v126y2018icp64-75.html
   My bibliography  Save this article

Understanding organisational responses to regulative pressures in information security management: The case of a Chinese hospital

Author

Listed:
  • Hou, Ye
  • Gao, Ping
  • Nicholson, Brian

Abstract

This paper advances existing theoretical understanding of the factors impacting upon organisational responses to regulative pressures in the process of information security management (ISM). Drawing on institutional theory, we conduct a case study of ISM in a Chinese hospital. A theoretical framework is presented, which proposes that organisational response strategies devised in response to regulative pressures are determined jointly by internal organisational incentives and external government supervision and enforcement. Practical implications for policymakers to promote organisational ISM are given and suggestions for future research based on the theoretical findings of the case study are provided.

Suggested Citation

  • Hou, Ye & Gao, Ping & Nicholson, Brian, 2018. "Understanding organisational responses to regulative pressures in information security management: The case of a Chinese hospital," Technological Forecasting and Social Change, Elsevier, vol. 126(C), pages 64-75.
  • Handle: RePEc:eee:tefoso:v:126:y:2018:i:c:p:64-75
    DOI: 10.1016/j.techfore.2017.03.023
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0040162517303645
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.techfore.2017.03.023?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Ku, Cheng-Yuan & Chang, Yi-Wen & Yen, David C., 2009. "National information security policy and its implementation: A case study in Taiwan," Telecommunications Policy, Elsevier, vol. 33(7), pages 371-384, August.
    2. Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
    3. Kraemer, Kenneth L. & Dedrick, Jason, 1994. "Payoffs from investment in information technology: Lessons from the Asia-Pacific region," World Development, Elsevier, vol. 22(12), pages 1921-1931, December.
    4. Sam Ransbotham & Sabyasachi Mitra, 2009. "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise," Information Systems Research, INFORMS, vol. 20(1), pages 121-139, March.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Liu, Guanyu & Liu, Jiaqi & Gao, Ping & Yu, Jiang & Pu, Zhengning, 2024. "Understanding mechanisms of digital transformation in state-owned enterprises in China: An institutional perspective," Technological Forecasting and Social Change, Elsevier, vol. 202(C).
    2. Wang, Huamao & Yao, Yumei & Salhi, Said, 2020. "Tension in big data using machine learning: Analysis and applications," Technological Forecasting and Social Change, Elsevier, vol. 158(C).
    3. Dominika Lisiak-Felicka & Pawel Nowak & Maciej Szmit, 2021. "Selected Aspects of Information Security Management in Entities Performing Medical Activity," International Journal of Operations Management, Inovatus Services Ltd., vol. 1(2), pages 30-37, January.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Sanghyun Kim & Bora Kim & Minsoo Seo, 2020. "Impacts of Sustainable Information Technology Capabilities on Information Security Assimilation: The Moderating Effects of Policy—Technology Balance," Sustainability, MDPI, vol. 12(15), pages 1-24, July.
    2. Silva, Leiser & Hsu, Carol & Backhouse, James & McDonnell, Aidan, 2016. "Resistance and power in a security certification scheme: the case of c:cure," LSE Research Online Documents on Economics 68348, London School of Economics and Political Science, LSE Library.
    3. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    4. Kevin Zhu & Kenneth L. Kraemer, 2005. "Post-Adoption Variations in Usage and Value of E-Business by Organizations: Cross-Country Evidence from the Retail Industry," Information Systems Research, INFORMS, vol. 16(1), pages 61-84, March.
    5. Young Lee & Jeong Hun Oh & Hwan-Joo Seo, 2002. "Digital Divide and Growth Gap: A Cumulative Relationship," WIDER Working Paper Series DP2002-88, World Institute for Development Economic Research (UNU-WIDER).
    6. Hameeda A. AlMalki & Christopher M. Durugbo, 2023. "Systematic review of institutional innovation literature: towards a multi-level management model," Management Review Quarterly, Springer, vol. 73(2), pages 731-785, June.
    7. Ajoy Ketan Sarangi & Rudra Prakash Pradhan, 2020. "ICT infrastructure and economic growth: a critical assessment and some policy implications," DECISION: Official Journal of the Indian Institute of Management Calcutta, Springer;Indian Institute of Management Calcutta, vol. 47(4), pages 363-383, December.
    8. Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
    9. Luca Allodi & Fabio Massacci, 2017. "Security Events and Vulnerability Data for Cybersecurity Risk Estimation," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1606-1627, August.
    10. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    11. Habib Ntwoku & Solomon Negash & Peter Meso, 2017. "ICT adoption in Cameroon SME: application of Bass diffusion model," Information Technology for Development, Taylor & Francis Journals, vol. 23(2), pages 296-317, April.
    12. Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
    13. Ahmed Abbasi & David Dobolyi & Anthony Vance & Fatemeh Mariam Zahedi, 2021. "The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites," Information Systems Research, INFORMS, vol. 32(2), pages 410-436, June.
    14. de Cornière, Alexandre & Taylor, Greg, 2021. "A Model of Information Security and Competition," TSE Working Papers 21-1285, Toulouse School of Economics (TSE).
    15. Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.
    16. Steinbart, Paul John & Raschke, Robyn L. & Gal, Graham & Dilla, William N., 2012. "The relationship between internal audit and information security: An exploratory investigation," International Journal of Accounting Information Systems, Elsevier, vol. 13(3), pages 228-243.
    17. John D’Arcy & Idris Adjerid & Corey M. Angst & Ante Glavas, 2020. "Too Good to Be True: Firm Social Performance and the Risk of Data Breach," Information Systems Research, INFORMS, vol. 31(4), pages 1200-1223, December.
    18. Concetta Castiglione, 2012. "Technical efficiency and ICT investment in Italian manufacturing firms," Applied Economics, Taylor & Francis Journals, vol. 44(14), pages 1749-1763, May.
    19. Terrence August & Tunay I. Tunca, 2011. "Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments," Management Science, INFORMS, vol. 57(5), pages 934-959, May.
    20. Masoud, Najeb & Al-Utaibi, Ghassan, 2022. "The determinants of cybersecurity risk disclosure in firms’ financial reporting: Empirical evidence," Research in Economics, Elsevier, vol. 76(2), pages 131-140.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:tefoso:v:126:y:2018:i:c:p:64-75. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.sciencedirect.com/science/journal/00401625 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.