usage and IT-security practices), this study addresses
one of the major concerns surrounding the electronic
HIE usage: the IT-security practices that are required
to ensure the trust of both patients and healthcare
providers. In future works, it would be worthwhile to
pursue and deepen the analysis of factors that
determine the levels of HIE usage and IT-security
practices implementation.
REFERENCES
Absolute Software Corporation, 2015. The Cost of a Data
Breach: Healthcare Settlements Involving Lost or
Stolen Devices. Austin, Texas: Absolute Software
Corporation.
Ancker, J. S., Edwards, A. M., Miller, M. C., & Kaushal,
R., 2012. Consumer perceptions of electronic health
information exchange. American Journal of Preventive
Medicine, 43(1), 76-80.
Bahtiyar, S., & Çaglayan, M. U., 2014. Trust Assessment
of Security for e-Health Systems. Electronic Commerce
Research and Applications, 13(3), 164-177.
Berwick, D.M., Nolan, T. W., & Whittington, J., 2008. The
Triple Aim: Care, health, and cost. Health Affairs,
27(3), 759-769.
Bitton, A., Flier, L. A., & Jha, A. K., 2012. Health
information technology in the era of care delivery
reform: To what end? The Journal of the American
Medical Association, 307(24), 2593-2594.
Cochran, G. L., Lander, L., Morien, M., Lomelin, D. E.,
Sayles, H., & Klepser, D. G., 2015. Health care
provider perceptions of a query-based health
information exchange: barriers and benefits. Journal of
Innovation in Health Informatics, 22(2), 302-308.
Dehling, T., & Sunyaev, A., 2014. Secure provision of
patient-centered health information technology services
in public networks--leveraging security and privacy
features provided by the German nationwide health
information technology infrastructure. Electronic
Markets, 24(2), 89-99.
European Commission, 2014. European hospital survey:
Benchmarking deployment of eHealth services (2012-
2013). Luxembourg: JRC Scientific and Policy Reports
- Institute for Prospective Technological Studies.
Häyrinen, K., Saranto, K., & Nykänen, P., 2008. Definition,
Structure, Content, Use and Impacts of Electronic
Health Records: A Review of the Research Literature.
International Journal of Medical Informatics, 77(5),
291-304.
HIMSS, 2015. 2015 HIMSS Cybersecurity Survey.
Chicago, IL: HIMSS.
Hwang, H.-G., Han, H.-E., Kuo, K.-M., & Liu, C.-F., 2012.
The differing privacy concerns regarding exchanging
electronic medical records of Internet users in Taiwan.
Journal of Medical Systems, 36(6), 3783-3793.
ISMG, 2014. Healthcare Information Security Today. 2014
Survey Analysis: Update on HIPAA Omnibus
Compliance, Protecting Patient Data (pp. 38).
Retrieved from http://6dbf9d0f8046b8d5551a-
7164cafcaac68bfd3318486ab257f999.r57.cf1.rackcdn.
com/2014-healthcare-information-security-today-
survey-pdf-5-h-53.pdf.
Kaelber, D. C., & Bates, D. W., 2007. Health information
exchange and patient safety. Journal of Biomedical
Informatics, 40(6 SUPPL), S40-S45.
Ketchen, D. J., & Shook, C., 1996. The Application of
Cluster Analysis in Strategic Management Research:
An Analysis and Critique. Strategic Management
Journal, 17(6), 441-458.
O’Donnell, H. C., Patel, V., Kern, L. M., Barrón, Y.,
Teixeira, P., Dhopeshwarkar, R., & Kaushal, R., 2011.
Healthcare consumers’ attitudes towards physician and
personal use of health information exchange.
Journal of
General Internal Medicine, 26(9), 1019-1026.
Ponemon Institute, 2016. Sixth annual benchmark study on
privacy & security of healthcare data. Traverse City,
MI, USA: Ponemon Institute.
Simon, S. R., Benjamin, A., Delano, D., & Bates, D. W.,
2009. Patients’ attitudes toward electronic health
information exchange: Qualitative study. Journal of
Medical Internet Research, 11(3), e30.
Tejero, A., & de la Torre, I., 2012. Advances and Current
State of the Security and Privacy in Electronic Health
Records: Survey from a Social Perspective. Journal of
Medical Systems, 36(5), 3019-3027.
Vogel, J., Brown, J. S., Land, T., Platt, R., & Klompas, M.,
2014. MDPHnet: Secure, distributed sharing of
electronic health record data for public health
surveillance, evaluation, and planning. American
Journal of Public Health, 104(12), 2265-2270.
von Solms, S. H., 2005. Information security governance:
Compliance management vs operational management.
Computers & Security, 24(6), 443-447.
White, P., 2004. Privacy and security issues in
teleradiology. Seminars in Ultrasound, CT and MRI,
25(5), 391-395.
Yaraghi, N., 2015. An empirical analysis of the financial
benefits of health information exchange in emergency
departments. Journal of the American Medical
Informatics Association, 22(6), 1169-1172.
Zwaanswijk, M., Ploem, M. C., Wiesman, F. J., Verheij, R.
A., Friele, R. D., & Gevers, J. K., 2013. Understanding
health care providers' reluctance to adopt a national
electronic patient record: an empirical and legal
analysis. Medicine And Law, 32(1), 13-31.