skip to main content
article

HIPPA, privacy and organizational change: a challenge for management

Published: 01 June 2007 Publication History

Abstract

Organizational change surrounding the security of identifiable health information has become imperative. This is a significant challenge for managers who are held responsible for loss of privacy through faulty security procedures. Management cannot completely secure the organization and still provide employees and customers with the information and services they need. Organizations must decide how much and what type of security they need, how to assign priorities, and how to manage security as the organization evolves in a competitive environment.

References

[1]
Austin, R. D. and C. Darby. "The Myth of Secure Computing," Harvard Business Review, 81:6, 2003, pp. 120--126.
[2]
Bowman, E. and D. Hurry. "Strategy Through the Option Lens: An Integrated View of Resource Investments and the Incremental-Choice Process," Academy of Management Review, 18:4, 1993, pp. 760--782.
[3]
Detert, J., R. Schroeder, and J. Mauriel. "A Framework for Linking Culture and Improvement Initiatives in Organizations," Academy of Management Review, 25:4, 2000, pp. 850--863.
[4]
Ginsberg, A. "Measuring and Modeling Changes in Strategy: Theoretical Foundations and Empirical Directions," Strategic Management Journal, 9, 1988, pp559--575.
[5]
Guha, S., V. Grover, W. Kettinger, and J. Teng. "Business Process Change and Organizational Performance: Exploring an Antecedent Model," Journal of Management Information Systems, 14:1, 1997, 119--154.
[6]
March, J. "Footnotes to Organizational Change," Administrative Science Quarterly, December 1981, pp. 563--577.
[7]
Orlikowski, W. "Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations," Organization Science, 11:4, 2000, pp. 404--428.
[8]
Rajagopalan, N. and G. Spreitzer. "Toward a Theory of Strategic Change: A Multi-lens Perspective and Integrative Framework," The Academy of Management Review, 22:1, 1997, 48--79.
[9]
Segev, A., J. Porra, and M. Roldan. "Internet Security and the Case of Bank of America," Communications of the ACM, 41:10, 1998, pp.81--87.
[10]
Van De Ven, A. "Nothing is Quite So Practical as a Good Theory," Academy of Management Review, 14:4, 1989, 486--489.

Cited By

View all
  • (2020)Checking, Generating, and Revising Safety Data Sheets using Globally Harmonized System Standards2020 IEEE 24th International Enterprise Distributed Object Computing Conference (EDOC)10.1109/EDOC49727.2020.00028(165-170)Online publication date: Oct-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCAS Computers and Society
ACM SIGCAS Computers and Society  Volume 37, Issue 1
June 2007
32 pages
ISSN:0095-2737
DOI:10.1145/1273353
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2007
Published in SIGCAS Volume 37, Issue 1

Check for updates

Author Tags

  1. HIPPA
  2. computer security
  3. organizational change
  4. privacy

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)1
Reflects downloads up to 21 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Checking, Generating, and Revising Safety Data Sheets using Globally Harmonized System Standards2020 IEEE 24th International Enterprise Distributed Object Computing Conference (EDOC)10.1109/EDOC49727.2020.00028(165-170)Online publication date: Oct-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media