Understanding organisational responses to regulative pressures in information security management: The case of a Chinese hospital
Author
Abstract
Suggested Citation
DOI: 10.1016/j.techfore.2017.03.023
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
- Kraemer, Kenneth L. & Dedrick, Jason, 1994. "Payoffs from investment in information technology: Lessons from the Asia-Pacific region," World Development, Elsevier, vol. 22(12), pages 1921-1931, December.
- Ku, Cheng-Yuan & Chang, Yi-Wen & Yen, David C., 2009. "National information security policy and its implementation: A case study in Taiwan," Telecommunications Policy, Elsevier, vol. 33(7), pages 371-384, August.
- Sam Ransbotham & Sabyasachi Mitra, 2009. "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise," Information Systems Research, INFORMS, vol. 20(1), pages 121-139, March.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Liu, Guanyu & Liu, Jiaqi & Gao, Ping & Yu, Jiang & Pu, Zhengning, 2024. "Understanding mechanisms of digital transformation in state-owned enterprises in China: An institutional perspective," Technological Forecasting and Social Change, Elsevier, vol. 202(C).
- Wang, Huamao & Yao, Yumei & Salhi, Said, 2020. "Tension in big data using machine learning: Analysis and applications," Technological Forecasting and Social Change, Elsevier, vol. 158(C).
- Dominika Lisiak-Felicka & Pawel Nowak & Maciej Szmit, 2021. "Selected Aspects of Information Security Management in Entities Performing Medical Activity," International Journal of Operations Management, Inovatus Services Ltd., vol. 1(2), pages 30-37, January.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Sanghyun Kim & Bora Kim & Minsoo Seo, 2020. "Impacts of Sustainable Information Technology Capabilities on Information Security Assimilation: The Moderating Effects of Policy—Technology Balance," Sustainability, MDPI, vol. 12(15), pages 1-24, July.
- Silva, Leiser & Hsu, Carol & Backhouse, James & McDonnell, Aidan, 2016. "Resistance and power in a security certification scheme: the case of c:cure," LSE Research Online Documents on Economics 68348, London School of Economics and Political Science, LSE Library.
- Mazaher Kianpour & Stewart J. Kowalski & Harald Øverby, 2021. "Systematically Understanding Cybersecurity Economics: A Survey," Sustainability, MDPI, vol. 13(24), pages 1-28, December.
- Naveed, Kashif & Watanabe, Chihiro & Neittaanmäki, Pekka, 2018. "The transformative direction of innovation toward an IoT-based society - Increasing dependency on uncaptured GDP in global ICT firms," Technology in Society, Elsevier, vol. 53(C), pages 23-46.
- Pradhan, Rudra P. & Arvin, Mak B. & Norman, Neville R., 2015. "The dynamics of information and communications technologies infrastructure, economic growth, and financial development: Evidence from Asian countries," Technology in Society, Elsevier, vol. 42(C), pages 135-149.
- Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
- Kevin Zhu & Kenneth L. Kraemer, 2005. "Post-Adoption Variations in Usage and Value of E-Business by Organizations: Cross-Country Evidence from the Retail Industry," Information Systems Research, INFORMS, vol. 16(1), pages 61-84, March.
- Jean, Ruey-Jer “Bryan” & Kim, Daekwan & Cavusgil, Erin, 2020. "Antecedents and outcomes of digital platform risk for international new ventures’ internationalization," Journal of World Business, Elsevier, vol. 55(1).
- Young Lee & Jeong Hun Oh & Hwan-Joo Seo, 2002. "Digital Divide and Growth Gap: A Cumulative Relationship," WIDER Working Paper Series DP2002-88, World Institute for Development Economic Research (UNU-WIDER).
- Hameeda A. AlMalki & Christopher M. Durugbo, 2023. "Systematic review of institutional innovation literature: towards a multi-level management model," Management Review Quarterly, Springer, vol. 73(2), pages 731-785, June.
- Ajoy Ketan Sarangi & Rudra Prakash Pradhan, 2020. "ICT infrastructure and economic growth: a critical assessment and some policy implications," DECISION: Official Journal of the Indian Institute of Management Calcutta, Springer;Indian Institute of Management Calcutta, vol. 47(4), pages 363-383, December.
- V. S. Prakash Attili & Saji K. Mathew & Vijayan Sugumaran, 2022. "Information Privacy Assimilation in IT Organizations," Information Systems Frontiers, Springer, vol. 24(5), pages 1497-1513, October.
- Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
- Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
- Luca Allodi & Fabio Massacci, 2017. "Security Events and Vulnerability Data for Cybersecurity Risk Estimation," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1606-1627, August.
- Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
- Debabrata Dey & Abhijeet Ghoshal & Atanu Lahiri, 2022. "Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement," Management Science, INFORMS, vol. 68(4), pages 2914-2931, April.
- Habib Ntwoku & Solomon Negash & Peter Meso, 2017. "ICT adoption in Cameroon SME: application of Bass diffusion model," Information Technology for Development, Taylor & Francis Journals, vol. 23(2), pages 296-317, April.
- Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
- Cho, Youngsang & Lee, Jongsu & Kim, Tai-Yoo, 2007. "The impact of ICT investment and energy price on industrial electricity demand: Dynamic growth model approach," Energy Policy, Elsevier, vol. 35(9), pages 4730-4738, September.
More about this item
Keywords
China; Hospital; Information security management (ISM); Institutional theory; Organisational response strategy; Regulative pressures;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:tefoso:v:126:y:2018:i:c:p:64-75. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.sciencedirect.com/science/journal/00401625 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.