Access the full text.
Sign up today, get DeepDyve free for 14 days.
Corey Angst, Sarv Devaraj, C. Queenan, Brad Greenwood (2011)
Performance Effects Related to the Sequence of Integration of Healthcare TechnologiesProduction and Operations Management, 20
W. Orlikowski, D. Robey (1991)
Information Technology and the Structuring of OrganizationsInf. Syst. Res., 2
Yvon Lapierre (1985)
Editorial noteJournal of Neuroimmunology, 9
R. Keeney (2006)
Eliciting Knowledge about Values for Public Policy DecisionsInt. J. Inf. Technol. Decis. Mak., 5
Information Systems Research, 12
G. Dhillon, G. Torkzadeh (2006)
Value‐focused assessment of information system security in organizationsInformation Systems Journal, 16
N. Sethi, G. Lane, Sophie Newton, Philip Egan, Samit Ghosh (2014)
Disaster easily averted? - Data confidentiality and the hospital desktop computerInternational journal of medical informatics, 83 5
I. Chang, Hsin-Ginn Hwang, Ming-Chien Hung, Ming-Hui Lin, D. Yen (2007)
Factors affecting the adoption of electronic signature: Executives' perspective of hospital information departmentDecision Support Systems, 44
Jason Merrick, Margot Garcia (2004)
Using Value-Focused Thinking to Improve WatershedsJournal of the American Planning Association, 70
J. Gibson, Douglas Martin, P. Singer (2004)
Setting priorities in health care organizations: criteria, processes, and parameters of successBMC Health Services Research, 4
B. Chaudhry, Jerome Wang, Shinyi Wu, M. Maglione, W. Mojica, E. Roth, S. Morton, P. Shekelle (2006)
Systematic Review: Impact of Health Information Technology on Quality, Efficiency, and Costs of Medical CareAnnals of Internal Medicine, 144
M. Khan, S. Kumari (2014)
An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor NetworksInternational Journal of Distributed Sensor Networks, 10
D. Power, R. Sharda (2007)
Model-driven decision support systems: Concepts and research directionsDecis. Support Syst., 43
Jeffrey May, G. Dhillon, Mário Caldeira (2013)
Defining value-based objectives for ERP systems planningDecis. Support Syst., 55
G. Walsham, T. Waema (1994)
Information systems strategy and implementation: a case study of a building societyACM Trans. Inf. Syst., 12
Sarv Devaraj, Terence Ow, R. Kohli (2013)
Examining the impact of information technology and patient flow on healthcare performance: A Theory of Swift and Even Flow (TSEF) perspectiveJournal of Operations Management, 31
K. Eisenhardt, Melissa Graebner (2007)
Theory Building From Cases: Opportunities And ChallengesAcademy of Management Journal, 50
Y. Chen, Kuang-Wei Wen, Y. Chen (2012)
Organizations' Information Security Policy Compliance: Stick or Carrot Approach?Journal of Management Information Systems, 29
R. Brandner, M. Haak, M. Hartmann, R. Haux, P. Schmücker (2002)
Electronic Signature for Medical Documents – Integration and Evaluation of a Public Key Infrastructure in HospitalsMethods of Information in Medicine, 41
A. Hutchinson, Tracey Young, K. Cooper, A. Mcintosh, J. Karnon, S. Scobie, R. Thomson (2009)
Trends in healthcare incident reporting and relationship to safety and quality data in acute hospitals: results from the National Reporting and Learning SystemQuality & Safety in Health Care, 18
T. Bodenheimer (2008)
Coordinating care--a perilous journey through the health care system.The New England journal of medicine, 358 10
Jason Merrick, G. Parnell, Jamison Barnett, Margot Garcia (2005)
A Multiple-Objective Decision Analysis of Stakeholder Values to Identify Watershed Improvement NeedsDecis. Anal., 2
M. Hunter (1997)
The use of RepGrids to gather interview data about information systems analystsInformation Systems Journal, 7
Journal of Business Ethics, 145
Patricia Mommens (1999)
Ethical Issues of Health Care in the Information SocietyHealth Informatics Journal, 5
(1994)
Creativity in decision making with value-focused thinking
Jason Merrick, M. Grabowski, Premnath Ayyalasomayajula, J. Harrald (2005)
Understanding Organizational Safety Using Value‐Focused ThinkingRisk Analysis, 25
Karin Hedström, Ella Kolkowska, F. Karlsson, Jonathan Allen (2011)
Value conflicts for information security managementJ. Strateg. Inf. Syst., 20
R. Keeney (2013)
Foundations for Group Decision AnalysisDecis. Anal., 10
R. Keeney, Asa Palley (2013)
Decision Strategies to Reduce Teenage and Young Adult Deaths in the United StatesRisk Analysis, 33
G. Walsham (1995)
Interpretive case studies in IS research: nature and methodEuropean Journal of Information Systems, 4
M. Pirson, Kirsten Martin, B. Parmar (2013)
Formation of Stakeholder Trust in Business and the Role of Personal ValuesJournal of Business Ethics, 145
Gary Phythian, M. King (1992)
Developing an expert support system for tender enquiry evaluation: A case studyEuropean Journal of Operational Research, 56
G. Torkzadeh, G. Dhillon (2002)
Measuring Factors that Influence the Success of Internet CommerceInf. Syst. Res., 13
Allen Lee (1994)
Electronic Mail as a Medium for Rich Communication: An Empirical Investigation Using Hermeneutic Interpretation
J. Marsden, Y. Tung, R. Keeney (1999)
The Value of Internet Commerce to the CustomerManagement Science, 45
L. Drevin, H. Kruger, T. Steyn (2006)
Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment
S. Furnell, P. Sanders, M. Warren (1997)
Addressing information security training and awareness within the European healthcare community.Studies in health technology and informatics, 43 Pt B
G. Dhillon, T. Oliveira, Santa Susarapu, Mário Caldeira (2016)
Deciding between information security and usability: Developing value based objectivesComput. Hum. Behav., 61
L. Drevin, H. Kruger, T. Steyn (2007)
Value-focused assessment of ICT security awareness in an academic environmentComput. Secur., 26
D. Pothier, P. Monteiro, Mutuzua Mooktiar, A. Shaw (2005)
Pilot study to show the loss of important data in nursing handover.British journal of nursing, 14 20
R. Barrows, P. Clayton (1996)
Review: Privacy, Confidentiality, and Electronic Medical RecordsJ. Am. Medical Informatics Assoc., 3
Ming Li, Shucheng Yu, K. Ren, W. Lou (2010)
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings
H. Klein, M. Myers (1999)
A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information SystemsMIS Q., 23
Ruth Halperin, J. Backhouse (2008)
A roadmap for research on identity in the information societyIdentity in the Information Society, 1
Ashwin Belle, Raghuram Thiagarajan, S. Soroushmehr, F. Navidi, D. Beard, K. Najarian, Reza Soroushmehr (2015)
Big Data Analytics in HealthcareBioMed Research International, 2015
Lawrence Koved, Bo Zhang (2014)
Improving Usability of Complex Authentication Schemes Via Queue Management and Load Shedding
N. Nelson (2007)
Downtime procedures for a clinical information system: a critical issue.Journal of critical care, 22 1
P. Biernacki, D. Waldorf (1981)
Snowball Sampling: Problems and Techniques of Chain Referral SamplingSociological Methods & Research, 10
G. Dhillon, Chandrashekar Challa, Kane Smith (2019)
Defining Objectives for Preventing CyberstalkingJournal of Business Ethics, 157
Karin Hedström, F. Karlsson, Fredrik Söderström (2016)
Challenges of introducing a professional eID card within health careTransforming Government: People, Process and Policy, 10
W. Raghupathi, V. Raghupathi (2014)
Big data analytics in healthcare: promise and potentialHealth Information Science and Systems, 2
Eva Witesman, Lawrence Walters (2015)
Modeling Public Decision Preferences Using Context-Specific Value HierarchiesThe American Review of Public Administration, 45
Richard Holden, P. Carayon, Ayse Gurses, P. Hoonakker, A. Hundt, A. Ozok, A. Rivera-Rodriguez (2013)
SEIPS 2.0: a human factors framework for studying and improving the work of healthcare professionals and patientsErgonomics, 56
H. Akkermans, Kees Helden (2002)
Vicious and virtuous cycles in ERP implementation: a case study of interrelations between critical success factorsEuropean Journal of Information Systems, 11
PurposeIn this paper, using values of individuals in a Swedish health-care organization, electronic identity management objectives related to security are defined.Design/methodology/approachBy using value-focused thinking, eliciting values from interviews of three groups of health-care staff’s objective hierarchies for three stakeholder groups are identified and defined. Objective hierarchies allow comparison across multiple stakeholder groups such that strategic objectives for identity management can be compared and contrasted.FindingsThis qualitative investigation, which used value-focused thinking, revealed 94 subobjectives, grouped into 12 fundamental and 14 means objectives, which are essential for developing measures that address potential value conflicts in a health-care organization around electronic identity management. The objectives developed in this study are grounded socioorganizationally and provide a way forward in developing measures aimed to reducing potential conflicts at a policy level.Originality/valueIn a final synthesis, congruence (or lack thereof) in the electronic identity management approach for a Swedish health organization is suggested. This also creates a foundation to evaluate and weight different objectives for strategic decision management.
Information and Computer Security – Emerald Publishing
Published: Jun 11, 2018
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.