Abstract
Organizational change surrounding the security of identifiable health information has become imperative. This is a significant challenge for managers who are held responsible for loss of privacy through faulty security procedures. Management cannot completely secure the organization and still provide employees and customers with the information and services they need. Organizations must decide how much and what type of security they need, how to assign priorities, and how to manage security as the organization evolves in a competitive environment.
- Austin, R. D. and C. Darby. "The Myth of Secure Computing," Harvard Business Review, 81:6, 2003, pp. 120--126.Google Scholar
- Bowman, E. and D. Hurry. "Strategy Through the Option Lens: An Integrated View of Resource Investments and the Incremental-Choice Process," Academy of Management Review, 18:4, 1993, pp. 760--782.Google Scholar
- Detert, J., R. Schroeder, and J. Mauriel. "A Framework for Linking Culture and Improvement Initiatives in Organizations," Academy of Management Review, 25:4, 2000, pp. 850--863.Google ScholarCross Ref
- Ginsberg, A. "Measuring and Modeling Changes in Strategy: Theoretical Foundations and Empirical Directions," Strategic Management Journal, 9, 1988, pp559--575.Google ScholarCross Ref
- Guha, S., V. Grover, W. Kettinger, and J. Teng. "Business Process Change and Organizational Performance: Exploring an Antecedent Model," Journal of Management Information Systems, 14:1, 1997, 119--154. Google ScholarDigital Library
- March, J. "Footnotes to Organizational Change," Administrative Science Quarterly, December 1981, pp. 563--577.Google Scholar
- Orlikowski, W. "Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations," Organization Science, 11:4, 2000, pp. 404--428. Google ScholarDigital Library
- Rajagopalan, N. and G. Spreitzer. "Toward a Theory of Strategic Change: A Multi-lens Perspective and Integrative Framework," The Academy of Management Review, 22:1, 1997, 48--79.Google Scholar
- Segev, A., J. Porra, and M. Roldan. "Internet Security and the Case of Bank of America," Communications of the ACM, 41:10, 1998, pp.81--87. Google ScholarDigital Library
- Van De Ven, A. "Nothing is Quite So Practical as a Good Theory," Academy of Management Review, 14:4, 1989, 486--489.Google ScholarCross Ref
Index Terms
- HIPPA, privacy and organizational change: a challenge for management
Recommendations
Implementation costs of IS-enabled organizational change
Organizations incur substantial costs in managing organizational changes associated with the implementation of information systems (IS). However, the relationship between organizational changes and IS implementation costs is not well understood. ...
Organizational Downsizing: A Convergence and Reorientation Framework
Organizational downsizing is becoming pervasive as a characteristic of modern organizations, yet little scholarly literature has addressed the processes and outcomes associated with this phenomenon at the organizational level. Downsizing has often ...
Organizational Downsizing: A Convergence and Reorientation Framework
Organizational downsizing is becoming pervasive as a characteristic of modern organizations, yet little scholarly literature has addressed the processes and outcomes associated with this phenomenon at the organizational level. Downsizing has often ...
Comments