Understanding organisational responses to regulative pressures in information security management: The case of a Chinese hospital
Author
Abstract
Suggested Citation
DOI: 10.1016/j.techfore.2017.03.023
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Ku, Cheng-Yuan & Chang, Yi-Wen & Yen, David C., 2009. "National information security policy and its implementation: A case study in Taiwan," Telecommunications Policy, Elsevier, vol. 33(7), pages 371-384, August.
- Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
- Kraemer, Kenneth L. & Dedrick, Jason, 1994. "Payoffs from investment in information technology: Lessons from the Asia-Pacific region," World Development, Elsevier, vol. 22(12), pages 1921-1931, December.
- Sam Ransbotham & Sabyasachi Mitra, 2009. "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise," Information Systems Research, INFORMS, vol. 20(1), pages 121-139, March.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Liu, Guanyu & Liu, Jiaqi & Gao, Ping & Yu, Jiang & Pu, Zhengning, 2024. "Understanding mechanisms of digital transformation in state-owned enterprises in China: An institutional perspective," Technological Forecasting and Social Change, Elsevier, vol. 202(C).
- Wang, Huamao & Yao, Yumei & Salhi, Said, 2020. "Tension in big data using machine learning: Analysis and applications," Technological Forecasting and Social Change, Elsevier, vol. 158(C).
- Dominika Lisiak-Felicka & Pawel Nowak & Maciej Szmit, 2021. "Selected Aspects of Information Security Management in Entities Performing Medical Activity," International Journal of Operations Management, Inovatus Services Ltd., vol. 1(2), pages 30-37, January.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Sanghyun Kim & Bora Kim & Minsoo Seo, 2020. "Impacts of Sustainable Information Technology Capabilities on Information Security Assimilation: The Moderating Effects of Policy—Technology Balance," Sustainability, MDPI, vol. 12(15), pages 1-24, July.
- Silva, Leiser & Hsu, Carol & Backhouse, James & McDonnell, Aidan, 2016. "Resistance and power in a security certification scheme: the case of c:cure," LSE Research Online Documents on Economics 68348, London School of Economics and Political Science, LSE Library.
- Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
- Kevin Zhu & Kenneth L. Kraemer, 2005. "Post-Adoption Variations in Usage and Value of E-Business by Organizations: Cross-Country Evidence from the Retail Industry," Information Systems Research, INFORMS, vol. 16(1), pages 61-84, March.
- Young Lee & Jeong Hun Oh & Hwan-Joo Seo, 2002. "Digital Divide and Growth Gap: A Cumulative Relationship," WIDER Working Paper Series DP2002-88, World Institute for Development Economic Research (UNU-WIDER).
- Hameeda A. AlMalki & Christopher M. Durugbo, 2023. "Systematic review of institutional innovation literature: towards a multi-level management model," Management Review Quarterly, Springer, vol. 73(2), pages 731-785, June.
- Ajoy Ketan Sarangi & Rudra Prakash Pradhan, 2020. "ICT infrastructure and economic growth: a critical assessment and some policy implications," DECISION: Official Journal of the Indian Institute of Management Calcutta, Springer;Indian Institute of Management Calcutta, vol. 47(4), pages 363-383, December.
- Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
- Luca Allodi & Fabio Massacci, 2017. "Security Events and Vulnerability Data for Cybersecurity Risk Estimation," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1606-1627, August.
- Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
- Habib Ntwoku & Solomon Negash & Peter Meso, 2017. "ICT adoption in Cameroon SME: application of Bass diffusion model," Information Technology for Development, Taylor & Francis Journals, vol. 23(2), pages 296-317, April.
- Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
- Ahmed Abbasi & David Dobolyi & Anthony Vance & Fatemeh Mariam Zahedi, 2021. "The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites," Information Systems Research, INFORMS, vol. 32(2), pages 410-436, June.
- de Cornière, Alexandre & Taylor, Greg, 2021.
"A Model of Information Security and Competition,"
TSE Working Papers
21-1285, Toulouse School of Economics (TSE).
- de Cornière, Alexandre & Taylor, Greg, 2021. "A model of information security and competition," CEPR Discussion Papers 16457, C.E.P.R. Discussion Papers.
- Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.
- Steinbart, Paul John & Raschke, Robyn L. & Gal, Graham & Dilla, William N., 2012. "The relationship between internal audit and information security: An exploratory investigation," International Journal of Accounting Information Systems, Elsevier, vol. 13(3), pages 228-243.
- John D’Arcy & Idris Adjerid & Corey M. Angst & Ante Glavas, 2020. "Too Good to Be True: Firm Social Performance and the Risk of Data Breach," Information Systems Research, INFORMS, vol. 31(4), pages 1200-1223, December.
- Concetta Castiglione, 2012.
"Technical efficiency and ICT investment in Italian manufacturing firms,"
Applied Economics, Taylor & Francis Journals, vol. 44(14), pages 1749-1763, May.
- Concetta Castiglione, 2011. "Technical Efficiency and ICT Investment in Italian Manufacturing Firms," Post-Print hal-00682262, HAL.
- Terrence August & Tunay I. Tunca, 2011. "Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments," Management Science, INFORMS, vol. 57(5), pages 934-959, May.
- Masoud, Najeb & Al-Utaibi, Ghassan, 2022. "The determinants of cybersecurity risk disclosure in firms’ financial reporting: Empirical evidence," Research in Economics, Elsevier, vol. 76(2), pages 131-140.
More about this item
Keywords
China; Hospital; Information security management (ISM); Institutional theory; Organisational response strategy; Regulative pressures;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:tefoso:v:126:y:2018:i:c:p:64-75. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.sciencedirect.com/science/journal/00401625 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.