SPROUTS HOME | FIRST TIME VISITORS | ABOUT | BOARD | GUIDE for AUTHORS | FAQ |CONTACT US
sprouts Login | Create Account AIS
Working Papers on Information Systems ISSN 1535-6078
Browse by: Year | Tag | Author | Organization | Proceedings
Advanced search

Why do Healthcare Organizations Choose to Violate Information Technology Privacy Regulations? Proposing the Selective Information Privacy Violations in Healthcare Organizations Model (SIPVHOM)

Paul Benjamin Lowry
City University of Hong Kong, China
Jeffrey D. Wall
University of North Carolina-Greensboro, USA
James Selfridge
Brigham Young University, USA


Abstract
Privacy concerns about protected healthcare information (PHI) are rampant because of the ease of access to PHI from the advent of Healthcare IT (HIT) and its exploding use. Continual negative cases in the popular attest to the fact that current privacy regulations are failing to keep PHI sufficiently secure in the climate of increate HIT use. To address these issues, this paper proposes a theoretical model with testable hypotheses to explain and predict organizational IT privacy violations in the healthcare industry. Our model, the Selective Information Privacy Violations in Healthcare Organizations Model (SIPVHOM), explains how organizational structures and processes and characteristics of regulatory environments alter perceptions of risk and thereby the likelihood of rule violations. Finally, based on SIPVHOM, we offer recommendations for the structuring of regulatory environments and organizational structures to decrease abuse of PHI.

Full Text Document:
[img]
Preview
PDF 644Kb
Reference:Lowry, P. B., Wall, J. D., Selfridge, J. (2011). "Why do Healthcare Organizations Choose to Violate Information Technology Privacy Regulations? Proposing the Selective Information Privacy Violations in Healthcare Organizations Model (SIPVHOM)," Proceedings > Proceedings of JAIS Theory Development Workshop . Sprouts: Working Papers on Information Systems, 11(138). http://sprouts.aisnet.org/11-138
Keywords:HIPPA, privacy violations, organizations, organizational violations, privacy regulations, privacy policies, healthcare, IT policies
Item Type:Article - Volume 11 Article 138 (2011)
Language:English
Email: Paul Benjamin Lowry (Paul.Lowry.PhD@gmail.com)
Jeffrey D. Wall (jeffrey.d.wall@gmail.com)
James Selfridge (jdselfridge@gmail.com)

Repository Staff Only: item control page

Show Tags

Tag this item: