{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:33:59Z","timestamp":1764333239069,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T00:00:00Z","timestamp":1661472000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8,26]]},"DOI":"10.1145\/3564858.3564921","type":"proceedings-article","created":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T15:14:57Z","timestamp":1670512497000},"page":"407-412","source":"Crossref","is-referenced-by-count":1,"title":["Research on Information Security Investment in Healthcare Institutions Under Medical Treatment Combinations"],"prefix":"10.1145","author":[{"given":"Wangyu","family":"Lu","sequence":"first","affiliation":[{"name":"Nanjing University of Science and Technology, China"}]},{"given":"Huijun","family":"Huang","sequence":"additional","affiliation":[{"name":"Nanjing University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Exploration and consideration of the medical alliance modes.\u00a0Iranian Journal of Public Health,\u00a047(8), 1160","author":"Ying C. A. I.","year":"2018","unstructured":"Ying , C. A. I. , Cheng , W. E. N. , Long , T. A. N. G. , Pufei , L. I. U. , Yan , X. U. , Suxia , H. U., . .. & Junhua , C. A. O. ( 2018 ). Exploration and consideration of the medical alliance modes.\u00a0Iranian Journal of Public Health,\u00a047(8), 1160 . Ying, C. A. I., Cheng, W. E. N., Long, T. A. N. G., Pufei, L. I. U., Yan, X. U., Suxia, H. U., ... & Junhua, C. A. O. (2018). Exploration and consideration of the medical alliance modes.\u00a0Iranian Journal of Public Health,\u00a047(8), 1160."},{"issue":"3","key":"e_1_3_2_1_2_1","first-page":"152","article-title":"Research on Chinese integrated medical and health service system: policy evolution and theoretical mechanism","volume":"18","author":"Wang J.","year":"2021","unstructured":"Wang , J. , & Wang , X. ( 2021 ). Research on Chinese integrated medical and health service system: policy evolution and theoretical mechanism . Journal of Public Management , 18 ( 3 ): 152 - 167 . Wang, J., & Wang, X. (2021). Research on Chinese integrated medical and health service system: policy evolution and theoretical mechanism. Journal of Public Management, 18(3): 152-167.","journal-title":"Journal of Public Management"},{"issue":"03","key":"e_1_3_2_1_3_1","first-page":"139","article-title":"Loose medical consortium empowers the primary medical service system\u2014\u2014organization competition and cooperation\u3001policy incentive and promotion of dynamic capacity","volume":"18","author":"Sun S.","year":"2021","unstructured":"Sun , S. , Jiang , X. , Li , W. , & Liu , J. ( 2021 ) Loose medical consortium empowers the primary medical service system\u2014\u2014organization competition and cooperation\u3001policy incentive and promotion of dynamic capacity . Journal of Public Management , 18 ( 03 ): 139 - 151 +175. Sun, S., Jiang, X., Li, W., & Liu, J. (2021) Loose medical consortium empowers the primary medical service system\u2014\u2014organization competition and cooperation\u3001policy incentive and promotion of dynamic capacity. Journal of Public Management, 18(03):139-151+175.","journal-title":"Journal of Public Management"},{"key":"e_1_3_2_1_4_1","volume-title":"Game of information security investment: Impact of attack types and network vulnerability.\u00a0Expert Systems with Applications,\u00a042(15-16), 6132-6146","author":"Wu Y.","year":"2015","unstructured":"Wu , Y. , Feng , G. , Wang , N. , & Liang , H. ( 2015 ). Game of information security investment: Impact of attack types and network vulnerability.\u00a0Expert Systems with Applications,\u00a042(15-16), 6132-6146 . Wu, Y., Feng, G., Wang, N., & Liang, H. (2015). Game of information security investment: Impact of attack types and network vulnerability.\u00a0Expert Systems with Applications,\u00a042(15-16), 6132-6146."},{"key":"e_1_3_2_1_5_1","volume-title":"Cybersecurity investments in a two-echelon supply chain with third-party risk propagation.\u00a0International Journal of Production Research,\u00a059(4), 1216-1238","author":"Li Y.","year":"2021","unstructured":"Li , Y. , & Xu , L. ( 2021 ). Cybersecurity investments in a two-echelon supply chain with third-party risk propagation.\u00a0International Journal of Production Research,\u00a059(4), 1216-1238 . Li, Y., & Xu, L. (2021). Cybersecurity investments in a two-echelon supply chain with third-party risk propagation.\u00a0International Journal of Production Research,\u00a059(4), 1216-1238."},{"issue":"3","key":"e_1_3_2_1_6_1","first-page":"152","article-title":"Research on Chinese integrated medical and health service system: policy evolution and theoretical mechanism","volume":"18","author":"Wang J.","year":"2021","unstructured":"Wang , J. , & Wang , X. ( 2021 ) Research on Chinese integrated medical and health service system: policy evolution and theoretical mechanism . Journal of Public Management , 18 ( 3 ): 152 - 167 . Wang, J., & Wang, X. (2021) Research on Chinese integrated medical and health service system: policy evolution and theoretical mechanism. Journal of Public Management, 18(3): 152-167.","journal-title":"Journal of Public Management"},{"key":"e_1_3_2_1_7_1","volume-title":"Human health community: the value orientation of the development of regional medical association in Yangtze River Delta. Social Sciences in Nanjing, (05):63-70","author":"Feng Q.","year":"2021","unstructured":"Feng , Q. ( 2021 ) Human health community: the value orientation of the development of regional medical association in Yangtze River Delta. Social Sciences in Nanjing, (05):63-70 . Feng, Q. (2021) Human health community: the value orientation of the development of regional medical association in Yangtze River Delta. Social Sciences in Nanjing, (05):63-70."},{"key":"e_1_3_2_1_8_1","unstructured":"Claunch D. & McMillan M. (2013). Determining the right level for your IT security investment: A rural medical center facing threats of data breaches discovered that hospital IT security investments go beyond just dollars and cents.\u00a0Healthcare Financial Management \u00a067(5) 100-104.  Claunch D. & McMillan M. (2013). Determining the right level for your IT security investment: A rural medical center facing threats of data breaches discovered that hospital IT security investments go beyond just dollars and cents.\u00a0Healthcare Financial Management \u00a067(5) 100-104."},{"key":"e_1_3_2_1_9_1","volume-title":"Proactive versus reactive security investments in the healthcare sector.\u00a0Mis Quarterly,\u00a038(2), 451-A3","author":"Kwon J.","year":"2014","unstructured":"Kwon , J. , & Johnson , M. E. ( 2014 ). Proactive versus reactive security investments in the healthcare sector.\u00a0Mis Quarterly,\u00a038(2), 451-A3 . Kwon, J., & Johnson, M. E. (2014). Proactive versus reactive security investments in the healthcare sector.\u00a0Mis Quarterly,\u00a038(2), 451-A3."},{"key":"e_1_3_2_1_10_1","volume-title":"The economics of information security investment.\u00a0ACM Transactions on Information and System Security (TISSEC),\u00a05(4), 438-457","author":"Gordon L. A.","year":"2002","unstructured":"Gordon , L. A. , & Loeb , M. P. ( 2002 ). The economics of information security investment.\u00a0ACM Transactions on Information and System Security (TISSEC),\u00a05(4), 438-457 . Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment.\u00a0ACM Transactions on Information and System Security (TISSEC),\u00a05(4), 438-457."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Hausken K. (2006). Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability.\u00a0Information Systems Frontiers \u00a08(5) 338-349.  Hausken K. (2006). Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability.\u00a0Information Systems Frontiers \u00a08(5) 338-349.","DOI":"10.1007\/s10796-006-9011-6"},{"key":"e_1_3_2_1_12_1","volume-title":"An economic analysis of the optimal information security investment in the case of a risk-averse firm.\u00a0International journal of production economics,\u00a0114(2), 793-804","author":"Huang C. D.","year":"2008","unstructured":"Huang , C. D. , Hu , Q. , & Behara , R. S. ( 2008 ). An economic analysis of the optimal information security investment in the case of a risk-averse firm.\u00a0International journal of production economics,\u00a0114(2), 793-804 . Huang, C. D., Hu, Q., & Behara, R. S. (2008). An economic analysis of the optimal information security investment in the case of a risk-averse firm.\u00a0International journal of production economics,\u00a0114(2), 793-804."},{"key":"e_1_3_2_1_13_1","volume-title":"An economic model to evaluate information security investment of risk-taking small and medium enterprises.\u00a0International Journal of Production Economics,\u00a0182, 519-530","author":"Mayadunne S.","year":"2016","unstructured":"Mayadunne , S. , & Park , S. ( 2016 ). An economic model to evaluate information security investment of risk-taking small and medium enterprises.\u00a0International Journal of Production Economics,\u00a0182, 519-530 . Mayadunne, S., & Park, S. (2016). An economic model to evaluate information security investment of risk-taking small and medium enterprises.\u00a0International Journal of Production Economics,\u00a0182, 519-530."},{"key":"e_1_3_2_1_14_1","volume-title":"Optimal information security investment in a Healthcare Information Exchange: An economic analysis.\u00a0Decision Support Systems,\u00a061, 1-11","author":"Huang C. D.","year":"2014","unstructured":"Huang , C. D. , Behara , R. S. , & Goo , J. ( 2014 ). Optimal information security investment in a Healthcare Information Exchange: An economic analysis.\u00a0Decision Support Systems,\u00a061, 1-11 . Huang, C. D., Behara, R. S., & Goo, J. (2014). Optimal information security investment in a Healthcare Information Exchange: An economic analysis.\u00a0Decision Support Systems,\u00a061, 1-11."},{"key":"e_1_3_2_1_15_1","volume-title":"Interdependent security.\u00a0Journal of risk and uncertainty,\u00a026(2), 231-249","author":"Kunreuther H.","year":"2003","unstructured":"Kunreuther , H. , & Heal , G. ( 2003 ). Interdependent security.\u00a0Journal of risk and uncertainty,\u00a026(2), 231-249 . Kunreuther, H., & Heal, G. (2003). Interdependent security.\u00a0Journal of risk and uncertainty,\u00a026(2), 231-249."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/math7070587"},{"key":"e_1_3_2_1_17_1","volume-title":"Information security decisions of firms considering security risk interdependency.\u00a0Expert Systems with Applications,\u00a0178, 114990","author":"Wu Y.","year":"2021","unstructured":"Wu , Y. , Wang , L. , Cheng , D. , & Dai , T. ( 2021 ). Information security decisions of firms considering security risk interdependency.\u00a0Expert Systems with Applications,\u00a0178, 114990 . Wu, Y., Wang, L., Cheng, D., & Dai, T. (2021). Information security decisions of firms considering security risk interdependency.\u00a0Expert Systems with Applications,\u00a0178, 114990."},{"issue":"10","key":"e_1_3_2_1_18_1","first-page":"15","article-title":"Can a tight medical alliance operate for a long term: an analysis framework of transaction costs economics","volume":"38","author":"Cui Z.","year":"2019","unstructured":"Cui , Z. , & Wang , H. ( 2019 ) Can a tight medical alliance operate for a long term: an analysis framework of transaction costs economics . Chinese Health Economics , 38 ( 10 ): 15 - 19 . Cui, Z., & Wang, H. (2019) Can a tight medical alliance operate for a long term: an analysis framework of transaction costs economics. Chinese Health Economics, 38(10): 15-19.","journal-title":"Chinese Health Economics"},{"key":"e_1_3_2_1_19_1","volume-title":"Information security outsourcing with system interdependency and mandatory security requirement.\u00a0Journal of Management Information Systems,\u00a029(3), 117-156","author":"Hui K. L.","year":"2012","unstructured":"Hui , K. L. , Hui , W. , & Yue , W. T. ( 2012 ). Information security outsourcing with system interdependency and mandatory security requirement.\u00a0Journal of Management Information Systems,\u00a029(3), 117-156 . Hui, K. L., Hui, W., & Yue, W. T. (2012). Information security outsourcing with system interdependency and mandatory security requirement.\u00a0Journal of Management Information Systems,\u00a029(3), 117-156."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2008.25"},{"key":"e_1_3_2_1_21_1","volume-title":"Security investment in contagious networks.\u00a0Risk Analysis,\u00a038(8), 1559-1575","author":"Hasheminasab S. A.","year":"2018","unstructured":"Hasheminasab , S. A. , & Tork Ladani , B. ( 2018 ). Security investment in contagious networks.\u00a0Risk Analysis,\u00a038(8), 1559-1575 . Hasheminasab, S. A., & Tork Ladani, B. (2018). Security investment in contagious networks.\u00a0Risk Analysis,\u00a038(8), 1559-1575."}],"event":{"name":"IMMS 2022: 2022 the 5th International Conference on Information Management and Management Science","acronym":"IMMS 2022","location":"Chengdu China"},"container-title":["2022 the 5th International Conference on Information Management and Management Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564858.3564921","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564858.3564921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:23Z","timestamp":1750182683000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564858.3564921"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,26]]},"references-count":21,"alternative-id":["10.1145\/3564858.3564921","10.1145\/3564858"],"URL":"https:\/\/doi.org\/10.1145\/3564858.3564921","relation":{},"subject":[],"published":{"date-parts":[[2022,8,26]]}}}