8 research outputs found

    Factors Influencing Data Breaches in Healthcare Organizations: A Comprehensive Analysis

    Get PDF
    Data breaches pose significant risks to patient privacy and security, especially in healthcare organizations. Despite the valuable insights provided by prior studies, a notable gap exists regarding the examination of technological and organizational factors that contribute to breaches. This study employs the Technology, Organization, and Environment (TOE) framework to provide insights into how data security in healthcare organizations can be enhanced. The TOE framework enables a thorough examination of the relationships between technical infrastructure, organizational variables, and the external environment, offering a holistic view of potential data security vulnerabilities. Within this framework, this study specifically explores the interplay between technological infrastructure, human resource management, and security protocols, with the goal of better understanding the variables that contribute to data breaches in the healthcare industry. The preliminary findings indicate a notable trend wherein breached healthcare organizations exhibit a higher employment of full-time equivalent (FTE) programmers and network administrators, suggesting a potential vulnerability stemming from system complexity or heightened susceptibility points. Yet, distinctions in other staffing categories, overall FTEs, and hospital size were not significant. When observing security software, these compromised organizations reflected reduced usage of comprehensive security tools like antivirus, data loss prevention, encryption, and user authentication mechanisms. This emphasizes the centrality of a fortified technological infrastructure in alignment with the TOE framework. Interestingly, a pronounced reliance on firewall software was identified among breached institutions, potentially indicating an overemphasis on this singular defense mechanism. The research also found an absence of a marked difference in the adoption of biometric technologies between breached and secure organizations. This revelation underscores that biometric adoption in isolation may not drastically alter breach likelihood, accentuating the importance of other TOE dimensions such as robust user training and regulatory compliance. Furthermore, apart from a decreased usage of Thin Clients, the overall computer system configuration did not present significant variations, suggesting that the mere deployment type or volume of systems may not directly correlate with breach probabilities. In line with this, breached organizations displayed reduced employment of diverse server types, aligning with the TOE framework\u27s technological dimension, which proposes that server diversity may augment system resilience. Nonetheless, it\u27s imperative to recognize that the type of server alone isn\u27t the lone breach determinant, reiterating the holistic necessity of considering all facets of the TOE framework, inclusive of encompassing security protocols and external determinants

    UNDERSTANDING THE COST ASSOCIATED WITH DATA SECURITY BREACHES

    Get PDF
    To estimate the cost of a data breach to the inflicted firm, this study examines the relationship between a breach incident and changes in the inflicted firm’s profitability, perceived risk, and the inflicted firms’ information environment transparency. Profitability is measured as reported earnings and analysts’ earnings forecasts. Perceived risk is measured as reported stock return volatility and dispersion among analysts’ forecasts. Although a number of studies have investigated the stock market reaction surrounding the disclosure of a breach incident to quantify the cost associated with breaches, we argue that there exists information uncertainty and deficiency in the disclosure of the breach incident and stock market reaction surrounding a security breach announcement date may not be the best measure for the cost of security breaches. And research using other complementary measures is warranted. Our preliminary finding suggests that data breaches negatively impact firm profitability, perceived risk and information transparency. Nevertheless, the damage of a breach most likely stems from direct costs such as compensation and litigation costs rather than indirect costs such as tarnished reputation and a decrease in market share and sales. More sophisticated analysts are also found to add value in estimating the real cost of a security breach

    A Conceptual Framework for Understanding Trust Building and Maintenance in Virtual Organizations

    Get PDF
    The issue of trust development in traditional organizations has been widely discussed in the academic literature for several years. Recently, scholars have also studied trust development in temporary groups and have noted some fundamental differences between the manner in which trust develops in traditional organizations and the manner in which it develops in temporary groups. Virtual organizations are a new type of organization characterized by traits of both traditional organizations and temporary groups. This paper integrates the literature on trust in virtual organizations and the perspectives of trust development in both traditional organizations and temporary groups to develop a process-based framework which facilitates the understanding of trust development in the virtual organization setting

    Differential Market Reaction to Data Security Breaches: A Screening Perspective

    Get PDF
    This paper aims to identify breach- and firm-level characteristics that may account for the heterogenous stock market reaction to data breaches. Drawing upon the screening theory, this paper examines the possibility of three breach characteristics (breach severity, breach locus and breach controllability) and two firm attributes (CEO stock ownership, and corporate social responsibility (CSR) performance) serving as information screens to influence stock market reaction to a data breach incident. Using an archival dataset compiled from multiple sources, we examine 607 data breaches from 2004 to 2018 and find that the stock market reacts more negatively if a breach is more severe (i.e., involving more data records and financially sensitive consumer data), controllable (i.e., could have been prevented), and if the breached firm has weak corporate governance, as indicated by low CEO stock ownership. Furthermore, CSR provides an “insurance-like” protection by attenuating the negative effects of breach severity, breach controllability, and poor corporate governance on firm value. Findings of this research highlight the relevance of screening theory as a theoretical lens for examining the contextual dependence of stock market reaction to data breaches on key breach- and firm-level characteristics
    corecore