{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:35:25Z","timestamp":1764333325656,"version":"3.40.5"},"reference-count":143,"publisher":"Informa UK Limited","issue":"1-2","funder":[{"name":"Cyber Security Division, Ministry of Electronics and Information Technology, Government of India","award":["AAA.22\/1\/2022-CSRD-MeitY"],"award-info":[{"award-number":["AAA.22\/1\/2022-CSRD-MeitY"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Organizational Computing and Electronic Commerce"],"published-print":{"date-parts":[[2023,4,3]]},"DOI":"10.1080\/10919392.2023.2244386","type":"journal-article","created":{"date-parts":[[2023,8,11]],"date-time":"2023-08-11T04:52:16Z","timestamp":1691729536000},"page":"41-69","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":9,"title":["CAN CYBER RISK OF HEALTH CARE FIRMS BE INSURED? A MULTINOMIAL LOGISTIC REGRESSION MODEL"],"prefix":"10.1080","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2445-8107","authenticated-orcid":false,"given":"Swati","family":"Jain","sequence":"first","affiliation":[{"name":"Information Technology and Systems, Indian Institute of Management Lucknow, Lucknow, India"}]},{"given":"Arunabha","family":"Mukhopadhyay","sequence":"additional","affiliation":[{"name":"Information Technology and Systems, Indian Institute of Management Lucknow, Lucknow, India"}]},{"given":"Saloni","family":"Jain","sequence":"additional","affiliation":[{"name":"Information Technology and Systems, Indian Institute of Management Lucknow, Lucknow, India"}]}],"member":"301","published-online":{"date-parts":[[2023,8,10]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2019.03.010"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.08.003"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102030"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907485"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.001"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI54926.2021.00189"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.10"},{"key":"e_1_3_3_9_1","first-page":"5","article-title":"COSO: Internal Control - Integrated Framework: An Implementation Guide for the Healthcare Industry","volume":"5","author":"Annette S.","year":"2019","unstructured":"Annette, S., and P. L. Foster. 2019. COSO: Internal Control - Integrated Framework: An Implementation Guide for the Healthcare Industry. COSO - Committee of Sponsoring Organizations of the Treadway Commission 5:5.","journal-title":"COSO - Committee of Sponsoring Organizations of the Treadway Commission"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.04.004"},{"key":"e_1_3_3_11_1","unstructured":"Austin R. D. and C. A. R. Darby. 2003. \u201cHarvard business review online | the myth of secure computing the myth of secure computing.\u201d http:\/\/www.hbsp.org."},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-020-10087-4"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijieeb.2013.01.06"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73951-9_6"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/162124.162127"},{"key":"e_1_3_3_16_1","first-page":"112","volume-title":"Information security policy, processes, and practices","author":"Baskerville R. L.","year":"2008","unstructured":"Baskerville, R. L., D. W. Straub, and S. Goodman. 2008. Strategic information security risk management. In Information security policy, processes, and practices, 112\u201322. Armonk, New York: ME Sharpe."},{"key":"e_1_3_3_17_1","volume-title":"The economic approach to human behavior","author":"Becker G.","year":"1990","unstructured":"Becker, G. 1990. The economic approach to human behavior. Chicago: University of Chicago Press."},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2020.03.010"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-05-2017-0069"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2021.113651"},{"key":"e_1_3_3_21_1","unstructured":"Bodeau D. S. Boyle and J. Fabius-Greene. 2010. \u201cCyber Security governance a component of MITRE\u2019 s cyber prep methodology.\u201d"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11824633_4"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2019.1552745"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2022.3187063"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(18)30069-2"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2019.1568713"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781071837313"},{"key":"e_1_3_3_30_1","unstructured":"Check P. 2022. \u201cCyberattacks on the Healthcare Sector.\u201d https:\/\/www.checkpoint.com\/cyber-hub\/cyber-security\/what-is-healthcare-cyber-security\/cyberattacks-on-the-healthcare-sector\/."},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.2307\/23044049"},{"key":"e_1_3_3_32_1","unstructured":"COBIT. 2007. \u201cEffective IT Governance at Your Fingertips.\u201d https:\/\/www.isaca.org\/resources\/cobit."},{"key":"e_1_3_3_33_1","unstructured":"COBIT. 2019. \u201cControl Objectives for Information Technologies.\u201d ISACA Journal . https:\/\/www.isaca.org\/resources\/cobit."},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.02.039"},{"key":"e_1_3_3_35_1","unstructured":"COSO. 1994. COSO: Internal Control \u2013 Integrated Framework issued 1994."},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.maturitas.2018.04.008"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_8"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12319"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-017-9809-4"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-02-2018-0035"},{"key":"e_1_3_3_41_1","unstructured":"2022. \u201cDoS Vs DDos attack - l7 defense: API security solutions.\u201d https:\/\/www.l7defense.com\/cyber-security\/ddos-vs-dos\/."},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ELEKTRO.2012.6225571"},{"key":"e_1_3_3_43_1","doi-asserted-by":"crossref","unstructured":"Dutta K. and J. Perry. 2006. \u201cA tale of tails: an empirical analysis of loss distribution models for estimating operational risk capital.\u201d FRB of Boston Working Paper.","DOI":"10.2139\/ssrn.918880"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13385-020-00250-1"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1108\/JRF-09-2016-0122"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2022.2068906"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101996"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/S2212-5671(15)01106-5"},{"key":"e_1_3_3_49_1","article-title":"Criticality Analysis Helping Healthcare Address the Threat of Ransomware CJA at a Glance","author":"Fitzpatrick J. R.","year":"2021","unstructured":"Fitzpatrick, J. R. 2021. Criticality Analysis Helping Healthcare Address the Threat of Ransomware CJA at a Glance. The Mitre corporation.","journal-title":"The Mitre corporation"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-018-9836-9"},{"issue":"2","key":"e_1_3_3_51_1","first-page":"1","article-title":"Information security expenditures and real options: A wait-and-see approach","volume":"19","author":"Gordon L. A.","year":"2003","unstructured":"Gordon, L. A., M. P. Loeb, and W. Lucyshyn. 2003. Information security expenditures and real options: A wait-and-see approach. Computer Security Journal 19 (2):1\u20137. Computer Security Institute.","journal-title":"Computer Security Journal"},{"key":"e_1_3_3_52_1","volume-title":"Data Mining Concepts and Techniques","author":"Han J.","year":"2012","unstructured":"Han, J., M. Kamber, and J. Pei. 2012. Data Mining Concepts and Techniques. USA: Morgan Kaufmann Publishers."},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2015.1117842"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.prro.2021.09.011"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3514229"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21606-5"},{"key":"e_1_3_3_57_1","unstructured":"Health I. S. 2021. \u201cThe threat of distributed denial-of-service attacks in healthcare.\u201d https:\/\/healthitsecurity.com\/features\/the-threat-of-distributed-denial-of-service-attacks-in-healthcare."},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3400043.3400046"},{"key":"e_1_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2019.1611528"},{"key":"e_1_3_3_60_1","unstructured":"HHS. 2016. \u201cOffice for Civil Rights \u201d no. April 2013: 1\u20138. https:\/\/www.hhs.gov\/sites\/default\/files\/RansomwareFactSheet.pdf."},{"key":"e_1_3_3_61_1","first-page":"1","article-title":"HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework","author":"HIPAA","year":"2014","unstructured":"HIPAA. 2014. HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework. U.S. Department of Health and Human Services 1\u201335.","journal-title":"U.S. Department of Health and Human Services"},{"key":"e_1_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-017-9421-4"},{"key":"e_1_3_3_63_1","first-page":"1","volume-title":"Introductory Statistics with Applications in General Insurance","author":"Hossack I.","year":"1983","unstructured":"Hossack, I., J. Pollard, and B. Zehnwirth. 1983. Introductory Statistics with Applications in General Insurance, Vol. 1, 1\u2013282. Cambridge: Cambridge University Press."},{"key":"e_1_3_3_64_1","volume-title":"Cost of a Data Breach 2022","author":"IBM","year":"2022","unstructured":"IBM. 2022a. Cost of a Data Breach 2022."},{"key":"e_1_3_3_65_1","unstructured":"IBM. 2022b. \u201cWhat is Security Information and Event Management (SIEM)?\u201d IBM . https:\/\/www.ibm.com\/in-en\/topics\/siem."},{"key":"e_1_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/s1361-3723(21)00082-8"},{"key":"e_1_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/s1361-3723(21)00082-8"},{"key":"e_1_3_3_69_1","volume-title":"INDAM 2023 @ SBM - NMIMS MUMBAI","author":"Jain S.","year":"2023","unstructured":"Jain, S., S. Jain, and A. Mukhopadhyay. 2023. Is US Healthcare Prepared to Resist a DoS Attack? In INDAM 2023 @ SBM - NMIMS MUMBAI. Mumbai."},{"key":"e_1_3_3_70_1","first-page":"1","volume-title":"SOM 2022: 25th Annual International Conference of the Society of Operations Management,Indian Institute of Management Indore","author":"Jain S.","year":"2022","unstructured":"Jain, S., and A. Mukhopadhyay. 2022a. \u201cGrowing menace of ransomware: its detection and mitigation.\u201d In SOM 2022: 25th Annual International Conference of the Society of Operations Management,Indian Institute of Management Indore, 2:1\u20135. Indore."},{"key":"e_1_3_3_71_1","volume-title":"Bright Internet Global Summit (BIGS) 2022,Pre-International Conference on Information Systems (ICIS) 2022, Copenhagen","author":"Jain S.","year":"2022","unstructured":"Jain, S., and A. Mukhopadhyay. 2022b. \u201cImpact of cyber-attack on organizations: threat exposure assessment, quantification, and mitigation.\u201d In Bright Internet Global Summit (BIGS) 2022,Pre-International Conference on Information Systems (ICIS) 2022, Copenhagen. Copenhagen, Denmark."},{"key":"e_1_3_3_72_1","first-page":"17","volume-title":"AMCIS 2023 Proceedings","author":"Jain S.","year":"2023","unstructured":"Jain, S., and Mukhopadhyay, A. 2023. Vulnerability-based Cyber-Risk Management\u202f: A Text-mining Approach. AMCIS 2023 Proceedings 17. https:\/\/aisel.aisnet.org\/amcis2023\/sig_sec\/sig_sec\/17."},{"key":"e_1_3_3_73_1","first-page":"587","volume-title":"8th Pan IIM World Management Conference, IIM Kozhikode","author":"Jain S.","year":"2021","unstructured":"Jain, S., K. Sharma, and A. Mukhopadhyay. 2021. \u201cDoes network traffic slowdown impact revenue of e-commerce firms?\u201d In 8th Pan IIM World Management Conference, IIM Kozhikode, Kozhikode, India, 587\u201394. Kozhikode."},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2020.1776033"},{"key":"e_1_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/13580"},{"key":"e_1_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3145372"},{"key":"e_1_3_3_77_1","unstructured":"Kaspersky. 2015. \u201cCollateral Damage: 26% of DDoS Attacks Lead to Data Loss.\u201d https:\/\/www.kaspersky.com\/about\/press-releases\/2015_collateral-damage-26-of-ddos-attacks-lead-to-data-loss."},{"key":"e_1_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1999.tb00442.x"},{"key":"e_1_3_3_79_1","first-page":"1","volume-title":"2013 5th International Conference on Cyber Conflict (CYCON 2013)","author":"Kotenko I.","year":"2013","unstructured":"Kotenko, I., and A. Chechulin. 2013. \u201cA cyber attack modeling and impact assessment framework.\u201d 2013 5th International Conference on Cyber Conflict (CYCON 2013), Tallinn, Estonia, 1\u201324."},{"issue":"11","key":"e_1_3_3_80_1","first-page":"951","article-title":"Deterrence of Cyber Attacks","volume":"6","author":"Kugler R. L.","year":"2021","unstructured":"Kugler, R. L. 2021. Deterrence of Cyber Attacks. Angewandte Chemie International Edition 6 (11):951\u2013952. 2013\u201315.","journal-title":"Angewandte Chemie International Edition"},{"key":"e_1_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.2.06"},{"key":"e_1_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11"},{"key":"e_1_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2021.1870390"},{"key":"e_1_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECET55527.2022.9872810"},{"key":"e_1_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2017.01.001"},{"key":"e_1_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.j3179"},{"key":"e_1_3_3_87_1","volume-title":"Estimating the Impact of Cyber-Attack Strategies for Stochastic Control Systems","author":"Miloevi\u0107 J.","year":"2018","unstructured":"Miloevi\u0107, J., H. Sandberg, and K. Henrik Johansson. 2018. Estimating the Impact of Cyber-Attack Strategies for Stochastic Control Systems. ArXiv: Systems and Control."},{"key":"e_1_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211267639"},{"key":"e_1_3_3_91_1","article-title":"The Ransomware Dilemma","author":"Muhly F.","year":"2022","unstructured":"Muhly, F., \u00d6. I\u015fik, and P. Leo. 2022. The Ransomware Dilemma. MIT Sloan Management Review. https:\/\/sloanreview.mit.edu\/article\/the-ransomware-dilemma\/.","journal-title":"MIT Sloan Management Review"},{"key":"e_1_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-017-9808-5"},{"key":"e_1_3_3_93_1","unstructured":"NBC News. 2015. Medical Informatics Engineering Hack Exposed Data on 3.9 Million People. https:\/\/www.nbcnews.com\/tech\/security\/medical-informatics-engineering-hack-exposed-data-3-9-million-people-n403351"},{"key":"e_1_3_3_94_1","unstructured":"NIST. 1990. \u201cHealth IT.\u201d https:\/\/www.nist.gov\/health-it."},{"key":"e_1_3_3_95_1","unstructured":"NIST. 2014. \u201cFramework for Improving Critical Infrastructure Cybersecurity.\u201d https:\/\/www.nist.gov\/system\/files\/documents\/cyberframework\/cybersecurity-framework-021214.pdf."},{"key":"e_1_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.CSWP.04162018"},{"key":"e_1_3_3_97_1","unstructured":"NIST. 2022a. \u201cAdvanced DDoS Mitigation Techniques.\u201d https:\/\/www.nist.gov\/programs-projects\/advanced-ddos-mitigation-techniques."},{"key":"e_1_3_3_98_1","unstructured":"NIST. 2022b. Getting started with cybersecurity risk management: Ransomware. https:\/\/csrc.nist.gov\/pubs\/other\/2022\/02\/24\/getting-started-with-cybersecurity-risk-management\/final."},{"key":"e_1_3_3_99_1","unstructured":"Olt C. T. U. Darmstadt T. U. Darmstadt P. Buxmann T. Universit\u00e4t Darmstadt and C. M. Olt. 2019. \u201cAssociation for Information Systems AIS Electronic Library (AISeL) on the Benefits of senior executives \u2019 information security awareness on the benefits of senior executives \u2019 information security awareness completed research paper.\u201d"},{"key":"e_1_3_3_100_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2022.2028530"},{"key":"e_1_3_3_101_1","first-page":"1","article-title":"Cyber risk quantification and mitigation framework for healthcare using machine learning","author":"Pal S.","year":"2018","unstructured":"Pal, S., and A. Mukhopadhyay. 2018a. \u201cCyber risk quantification and mitigation framework for healthcare using machine learning.\u201c Americas Conference on Information Systems 2018: Digital Disruption 1\u201310.","journal-title":"Americas Conference on Information Systems 2018: Digital Disruption"},{"key":"e_1_3_3_102_1","first-page":"1","volume-title":"Americas Conference on Information Systems 2018: Digital Disruption, AMCIS 2018","author":"Pal S.","year":"2018","unstructured":"Pal, S., and A. Mukhopadhyay. 2018b. \u201cFramework to Explain Factors Affecting Severity of Exposure of Medical Data Breach: A Statistical Analysis.\u201d Americas Conference on Information Systems 2018: Digital Disruption, AMCIS 2018, 1\u20135."},{"key":"e_1_3_3_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2022.101707"},{"key":"e_1_3_3_104_1","volume-title":"HBR at 100: The most influential and innovative articles from Harvard business review\u2019s first century","author":"Porter M. E.","year":"2022","unstructured":"Porter, M. E., C. M. Christensen, W. Chan Kim, and R. A. Mauborgne. 2022. HBR at 100: The most influential and innovative articles from Harvard business review\u2019s first century. Brighton, Massachusetts: Harvard Business Press."},{"key":"e_1_3_3_105_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41288-020-00185-4"},{"key":"e_1_3_3_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113400"},{"key":"e_1_3_3_107_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0174"},{"key":"e_1_3_3_108_1","unstructured":"Redscan. 2020. \u201cPremera Blue Cross Phishing Attack.\u201d https:\/\/www.redscan.com\/news\/premera-blue-cross-phishing-attack\/."},{"key":"e_1_3_3_109_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919390802421242"},{"key":"e_1_3_3_110_1","unstructured":"Renaud K. M. Warkentin and G. Westerman. 2023. From ChatGPT to HackGPT: Meeting the cybersecurity threat of generative AI. MIT Sloan Management Review ."},{"key":"e_1_3_3_111_1","doi-asserted-by":"publisher","DOI":"10.23919\/ANNSIM55834.2022.9859283"},{"key":"e_1_3_3_112_1","unstructured":"Roberts P. 2015. \u201cDDoS as a Cover for Data Theft.\u201d https:\/\/www.digitalguardian.com\/blog\/ddos-cover-data-theft."},{"key":"e_1_3_3_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2274735"},{"key":"e_1_3_3_114_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-012-1331-5"},{"key":"e_1_3_3_115_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_3_3_116_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/6716918"},{"key":"e_1_3_3_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3117338"},{"issue":"34","key":"e_1_3_3_119_1","first-page":"8334","article-title":"Health insurance reform: Security standards. final rule","volume":"68","author":"Security Rule H. I. P. A. A.","year":"2003","unstructured":"Security Rule, H. I. P. A. A. 2003. Health insurance reform: Security standards. final rule. Federal Register 68 (34):8334\u201381.","journal-title":"Federal Register"},{"key":"e_1_3_3_120_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1063315"},{"key":"e_1_3_3_121_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2021.1987790"},{"key":"e_1_3_3_122_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-021-10232-7"},{"key":"e_1_3_3_123_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2022.2054259"},{"key":"e_1_3_3_124_1","doi-asserted-by":"publisher","DOI":"10.1097\/HAP.0000000000000039"},{"key":"e_1_3_3_125_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108709"},{"key":"e_1_3_3_126_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-83r1%0A"},{"key":"e_1_3_3_127_1","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"e_1_3_3_128_1","volume-title":"ICIS 2020 Proceedings. International Conference on Information Systems, ICIS","author":"Tanriverdi H.","year":"2020","unstructured":"Tanriverdi, H., J. Kwon, and I. Ghiyoung 2020. \u201cData breaches in multihospital systems: antecedents and mitigation mechanisms.\u201d In ICIS 2020 Proceedings. International Conference on Information Systems, ICIS. Association for Information Systems. https:\/\/icis2020.aisconferences.org\/."},{"key":"e_1_3_3_129_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2019.1598608"},{"key":"e_1_3_3_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048028"},{"key":"e_1_3_3_131_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-012-0173-3"},{"key":"e_1_3_3_132_1","doi-asserted-by":"publisher","DOI":"10.5539\/ijbm.v13n6p1"},{"key":"e_1_3_3_133_1","unstructured":"Trinity Health. 2020. \u201cBlackbaud recovery Hartford Connecticut (ct) Trinity Health of New England.\u201d https:\/\/www.trinityhealthofne.org\/about-us\/blackbaud-recovery."},{"key":"e_1_3_3_134_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2020.1818521"},{"key":"e_1_3_3_135_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2022.103707"},{"key":"e_1_3_3_136_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2022.103707"},{"key":"e_1_3_3_137_1","unstructured":"UpGuard. 2023. \u201cBiggest cyber threats in healthcare.\u201d https:\/\/www.upguard.com\/blog\/biggest-cyber-threats-in-healthcare."},{"key":"e_1_3_3_138_1","unstructured":"US-CERT. 2012. \u201cData backup options.\u201d https:\/\/www.cisa.gov\/uscert\/sites\/default\/files\/publications\/data_backup_options.pdf."},{"key":"e_1_3_3_139_1","unstructured":"The Verge. 2020. \u201cAmazon says it mitigated the largest ddos attack ever recorded.\u201d https:\/\/www.theverge.com\/2020\/6\/18\/21295337\/amazon-aws-biggest-ddos-attack-ever-2-3-tbps-shield-github-netscout-arbor."},{"key":"e_1_3_3_140_1","volume-title":"In. PACIS 2020 Proceedings","author":"Viswanath Prakash A.","year":"2020","unstructured":"Viswanath Prakash, A., and S. Das. 2020. \u201cWould you trust a bot for healthcare advice? an empirical investigation.\u201d In. PACIS 2020 Proceedings. aisel.aisnet.org\/pacis2020\/62."},{"key":"e_1_3_3_141_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0143"},{"key":"e_1_3_3_142_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.05"},{"key":"e_1_3_3_143_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1083992"},{"key":"e_1_3_3_144_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2022\/15713"},{"key":"e_1_3_3_145_1","unstructured":"Williams M. 2022. \u201cHealthcare data breaches & DDoS Attacks: A rising threat?\u201d https:\/\/www.verizon.com\/business\/resources\/articles\/s\/healthcare-data-breaches-and-ddos-in-healthcare\/."},{"key":"e_1_3_3_146_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2051489"},{"key":"e_1_3_3_147_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10093210"}],"container-title":["Journal of Organizational Computing and Electronic Commerce"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10919392.2023.2244386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T12:10:04Z","timestamp":1695384604000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10919392.2023.2244386"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,3]]},"references-count":143,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2023,4,3]]}},"alternative-id":["10.1080\/10919392.2023.2244386"],"URL":"https:\/\/doi.org\/10.1080\/10919392.2023.2244386","relation":{},"ISSN":["1091-9392","1532-7744"],"issn-type":[{"type":"print","value":"1091-9392"},{"type":"electronic","value":"1532-7744"}],"subject":[],"published":{"date-parts":[[2023,4,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hoce20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hoce20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-08-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}