{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T18:21:21Z","timestamp":1767896481312,"version":"3.49.0"},"reference-count":56,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/hicss.2013.246","type":"proceedings-article","created":{"date-parts":[[2013,3,21]],"date-time":"2013-03-21T20:23:07Z","timestamp":1363897387000},"page":"3972-3981","source":"Crossref","is-referenced-by-count":6,"title":["Healthcare Security Strategies for Regulatory Compliance and Data Security"],"prefix":"10.1109","author":[{"given":"Juhee","family":"Kwon","sequence":"first","affiliation":[]},{"given":"M. Eric","family":"Johnson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0094"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2007.11.001"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199710)18:9<697::AID-SMJ909>3.0.CO;2-C"},{"key":"34","doi-asserted-by":"crossref","first-page":"183","DOI":"10.2307\/25148633","article-title":"A field study of the effect of interpersonal trust on virtual collaborative relationship performance","volume":"28","author":"paul","year":"2004","journal-title":"MIS Quarterly"},{"key":"39","doi-asserted-by":"crossref","first-page":"617","DOI":"10.2307\/20650313","article-title":"Offshore information systems project success: The role of social embeddedness and cultural characteristics","volume":"33","author":"rai","year":"2009","journal-title":"MIS Quarterly"},{"key":"37","article-title":"Information security: User precautions, attacker efforts, and enforcement","author":"png","year":"2008","journal-title":"2009 42nd Hawaii International Conference on System Sciences (HICSS 2009)"},{"key":"38","author":"porter","year":"0","journal-title":"Competitive Strategy"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.2307\/1251799"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.4.351.14429"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.2307\/2390698"},{"key":"40","first-page":"31","article-title":"Develop long-term competitiveness through IT assets","volume":"38","author":"ross","year":"1996","journal-title":"Sloan Management Review"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.77"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1435417.1435446"},{"key":"24","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","article-title":"Fear appeals and information security behaviors: An empirical study","volume":"34","author":"johnston","year":"2010","journal-title":"MIS Quarterly"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.74.1.94"},{"key":"26","first-page":"163","article-title":"Effective information security requires a balance of social and technology factors","volume":"9","author":"kayworth","year":"2010","journal-title":"MIS Quarterly Executive"},{"key":"27","year":"2010","journal-title":"HIMSS Analytics Report Security of Patient Data"},{"key":"28","author":"liberti","year":"2008","journal-title":"Survey Results Reduce the Cost of Compliance while Strengthening Security Security Management Newslette"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1108\/14684520710832333"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1070.0306"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1504\/IJIEM.2010.035624"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222220307"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260308"},{"key":"30","author":"menard","year":"2001","journal-title":"Applied Logistic Regression Analysis"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0148"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.51.6.1173"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1040.0272"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.2307\/4132332"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.242"},{"key":"9","author":"cyert","year":"1963","journal-title":"A Behavioral Theory of the Firm"},{"key":"8","first-page":"49","article-title":"Why IT executives should help employees secure their home computers","volume":"7","author":"culnan","year":"2008","journal-title":"MIS Quarterly Executive"},{"key":"56","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1080\/07421222.2004.11045794","article-title":"The complementarity of information technology infrastructure and e- commerce capability: A resource-based assessment of their business value","volume":"21","author":"zhu","year":"2004","journal-title":"Journal of Management Information Systems"},{"key":"19","author":"hosmer","year":"1992","journal-title":"Applied Logistic Regression"},{"key":"55","article-title":"Access governance: Flexibility with escalation and audit","author":"xia","year":"2010","journal-title":"2010 43rd Hawaii International Conference on System Sciences (HICSS 2010)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.81"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/0149-2063(93)90004-7"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250171110"},{"key":"16","author":"hair","year":"2005","journal-title":"Multivariate Data Analysis"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/smj.972"},{"key":"14","first-page":"132","article-title":"Can a corporation have a conscience","volume":"60","author":"goodpaster","year":"1982","journal-title":"Harvard Business Review"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.2307\/258903"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1110.0382"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.47.4.563.9831"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.43.4.522"},{"key":"49","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/502269.502303","article-title":"Does electronic monitoring of employee internet usage work?","volume":"45","author":"urbaczewski","year":"2001","journal-title":"Communications of the ACM"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1287\/isre.7.2.248"},{"key":"45","doi-asserted-by":"crossref","first-page":"57","DOI":"10.2307\/25148717","article-title":"Performance effects of information technology synergies in multibusiness firms","volume":"30","author":"tanriverdi","year":"2006","journal-title":"MIS Quarterly"},{"key":"44","author":"straubd","year":"2008","journal-title":"Information Security Policy Processes and Practices"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199708)18:7<509::AID-SMJ882>3.0.CO;2-Z"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1002\/smj.435"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.2307\/3641622"},{"key":"52","author":"weber","year":"1999","journal-title":"Information System Control and Audit"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250050207"},{"key":"54","author":"whitman","year":"2011","journal-title":"Principles of Information Security Course Technology"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.07.003"}],"event":{"name":"2013 46th Hawaii International Conference on System Sciences (HICSS)","location":"Wailea, HI, USA","start":{"date-parts":[[2013,1,7]]},"end":{"date-parts":[[2013,1,10]]}},"container-title":["2013 46th Hawaii International Conference on System Sciences"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6479598\/6479821\/06480324.pdf?arnumber=6480324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,12]],"date-time":"2022-02-12T02:48:12Z","timestamp":1644634092000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6480324\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/hicss.2013.246","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}