ArticlePDF Available

Post-Merger Cybersecurity Audits in Healthcare with a Structured Approach

Authors:
  • Common Spirit Health

Abstract

The merger and acquisition (M&A) of hospitals present unique cybersecurity challenges that necessitate thorough and systematic audits. This paper explores the critical role of post-merger cybersecurity audits in identifying vulnerabilities, ensuring compliance, and integrating security practices within newly merged healthcare entities. By delineating a structured approach to these audits, this paper aims to provide a comprehensive framework for maintaining robust cybersecurity in the dynamic environment of healthcare M&A.
J Med Healthcare, 2024 Volume 6(6): 1-5
Review Article Open Access
Post-Merger Cybersecurity Audits in Healthcare with a Structured
Approach
Cyber Merger and Acquisition Sr Security Engineer, Common Spirit Health Salt Lake City, Utah, USA
Akilnath Bodipudi
*Corresponding author
Akilnath Bodipudi, Cyber Merger and Acquisition Sr Security Engineer, Common Spirit Health Salt Lake City, Utah, USA.
Received: June 04, 2024; Accepted: June 10, 2024; Published: June 24, 2024
Keywords: Post-Merger Audits, Cybersecurity, Healthcare M&A,
Risk Management, Compliance, IT Integration
Introduction
The healthcare sector is increasingly witnessing mergers
and acquisitions (M&As) as hospitals strive to enhance their
capabilities, expand their reach, and improve operational
efciencies. However, the integration of disparate IT systems and
networks during such M&As introduces signicant cybersecurity
risks. Post-merger cybersecurity audits are essential to address
these risks, ensuring that the merged entity maintains a secure
and compliant IT environment [1].
This paper outlines the methodologies and best practices for
conducting effective post-merger cybersecurity audits [2]. It
delves into the importance of thorough planning and preparation,
comprehensive assessment and evaluation, rigorous compliance
checks, and detailed reporting. Furthermore, it emphasizes the
necessity of continuous improvement and ongoing monitoring to
safeguard sensitive patient data and maintain robust cybersecurity
defenses in the rapidly evolving healthcare landscape.
Importance of Post-Merger Cybersecurity Audits
Post-merger cybersecurity audits are essential for ensuring that
the newly merged hospital entity maintains a robust cybersecurity
posture [3-6]. They serve several critical purposes, including
risk identication, compliance, IT integration, and operational
continuity. Here’s a detailed exploration of why these audits are
crucial:
Risk Identication
Post-merger cybersecurity audits play a vital role in identifying
potential vulnerabilities and risks that could compromise the
security of patient data and IT systems. The merger of two
healthcare organizations often involves integrating disparate IT
systems, each with its own set of security challenges. During this
process, it’s crucial to:
Conduct Vulnerability Assessments: Use automated tools to
scan for vulnerabilities in systems, networks, and applications.
This helps in identifying weaknesses that could be exploited
by cyber attackers [7-11].
Perform Penetration Testing: Simulate cyberattacks to test
the effectiveness of existing defenses. This proactive approach
helps in uncovering potential security gaps [12].
Evaluate Security Congurations: Review the conguration
of critical systems to ensure they adhere to best practices and
security standards. Miscongurations are a common source
of vulnerabilities.
Assess Access Controls: Ensure that access controls and
privilege management are effectively preventing unauthorized
access. This is particularly important in protecting sensitive
patient data and critical systems.
By identifying and addressing these risks early, the merged entity
can prevent potential data breaches and cyber-attacks that could
have severe consequences for patient safety and organizational
integrity.
Compliance
Healthcare organizations are subject to stringent regulations
designed to protect patient privacy and ensure data integrity. Post-
merger cybersecurity audits help ensure that the newly formed
entity adheres to these regulations, such as the Health Insurance
Portability and Accountability Act (HIPAA) in the United States.
Key compliance activities include:
Regulatory Compliance Review: Verify that the merged
organization complies with relevant healthcare regulations
[13]. This includes ensuring that policies and procedures are
in place to protect patient data.
Policy and Procedure Evaluation: Examine existing
cybersecurity policies and procedures to ensure they are
comprehensive, up-to-date, and effectively implemented [14].
Journal of Medicine and
Healthcare
ISSN: 2754-4516
ABSTRACT
e merger and acquisition (M&A) of hospitals present unique cybersecurity challenges that necessitate thorough and systematic audits. is paper explores
the critical role of post-merger cybersecurity audits in identifying vulnerabilities, ensuring compliance, and integrating security practices within newly
merged healthcare entities. By delineating a structured approach to these audits, this paper aims to provide a comprehensive framework for maintaining
robust cybersecurity in the dynamic environment of healthcare M&A.
Citation: Akilnath Bodipudi (2024) Post-Merger Cybersecurity Audits in Healthcare with a Structured Approach. Journal of Medicine and Healthcare.
SRC/JMHC-345. DOI: doi.org/10.47363/JMHC/2024(6)271
J Med Healthcare, 2024 Volume 6(6): 2-5
This helps in maintaining compliance and reducing the risk
of regulatory nes and penalties.
Data Privacy Assessments: Conduct assessments to ensure
that patient data is being handled in accordance with privacy
laws. This includes reviewing data storage, transmission, and
access practices.
Ensuring compliance not only protects patient data but also
enhances the organization’s reputation and trustworthiness in
the eyes of patients, regulators, and stakeholders.
IT Integration
Merging the IT systems and networks of two healthcare
organizations can be complex and fraught with security challenges
[14-22]. Post-merger cybersecurity audits facilitate the secure
integration of these systems by:
Compatibility Assessments: Evaluate the compatibility of
IT systems and networks from both organizations. This helps
in identifying potential integration issues that could affect
security.
Security Integration Planning: Develop a comprehensive
plan for integrating IT systems and networks securely. This
includes dening roles and responsibilities, establishing
timelines, and ensuring that security measures are in place
throughout the integration process.
Legacy System Management: Address security risks
associated with legacy systems. Older systems might not
have the same level of security as newer ones, so it’s crucial
to upgrade or replace them as part of the integration [23].
By carefully planning and executing the integration, the merged
entity can ensure that security is maintained throughout the
process, reducing the risk of cyber incidents during and after
the merger.
Operational Continuity
Cybersecurity incidents can signicantly disrupt healthcare
services, affecting patient care and organizational operations [24].
Post-merger cybersecurity audits help prevent such incidents by:
Incident Response Planning: Develop a unied incident
response plan that ensures a rapid and coordinated response
to potential cyber incidents. This helps minimize downtime
and maintain continuity of care.
Business Continuity Assessments: Evaluate and enhance
business continuity plans to ensure that critical healthcare
services can continue in the event of a cybersecurity incident.
Regular Security Monitoring: Implement ongoing security
monitoring to detect and respond to threats in real-time. This
proactive approach helps in identifying and mitigating threats
before they can cause signicant disruption.
Maintaining operational continuity is critical in healthcare, where
even a short disruption can have serious consequences for patient
care and safety.
Post-merger cybersecurity audits are indispensable for ensuring
the security, compliance, and operational continuity of newly
merged healthcare entities [25-33]. By identifying risks, ensuring
regulatory compliance, facilitating secure IT integration, and
maintaining operational continuity, these audits help protect patient
data and ensure the smooth functioning of healthcare services.
Implementing thorough and regular post-merger cybersecurity
audits is a crucial step in safeguarding the integrity and reputation
of the merged organization.
Structured Approach Methodology for Post-Merger
Cybersecurity Audits
A structured approach is vital for conducting comprehensive
post-merger cybersecurity audits. This approach to cybersecurity
for healthcare mergers and acquisitions (M&As) ensures that
potential risks are systematically addressed and the integration
process is secure and smooth. The following steps outline the
recommended methodology:
Planning and Preparation
The rst phase involves dening clear objectives for the audit,
focusing on vulnerability identication, compliance, and security
integration. These objectives should align with the merged
entity’s overall security strategy and address specic merger-
related risks. Scoping the audit entails determining the systems,
networks, and processes to be audited, encompassing critical
systems, data repositories, network infrastructure, and any new
integrations resulting from the merger. Assembling the audit
team involves including both internal cybersecurity experts
and external consultants to ensure a balanced and thorough
assessment. The team should possess diverse skills, including
knowledge of healthcare regulations, network security, and IT
infrastructure. Developing a detailed audit plan is crucial, outlining
the methodology, tools, timelines, and resource allocation, as well
as dening roles, responsibilities, key milestones, and deliverables.
Data Collection
The next step is gathering documentation from both merging
entities, including cybersecurity policies, procedures, network
diagrams, system inventories, incident response plans, and
previous audit reports. Conducting interviews with key personnel
from IT, cybersecurity, and other relevant departments provides
insights into current practices and potential concerns. Ensuring
auditors have the necessary access to systems and networks is
essential for effective auditing, requiring appropriate permissions
and secure methods of access to sensitive systems.
Assessment and Evaluation
This phase involves using automated tools for vulnerability
assessments to identify known security aws that need immediate
attention. Conducting penetration testing simulates attacks to
identify weaknesses and test existing defenses, assessing system
resilience to real-world scenarios. A conguration review evaluates
system and network congurations against best practices and
security standards, addressing common miscongurations. Access
controls review assesses the effectiveness of access controls
and privilege management to prevent unauthorized access,
including user roles, permissions, and authentication mechanisms.
Reviewing cybersecurity policies and procedures ensures they
are comprehensive, current, and aligned with industry standards.
Compliance Check
During this step, the audit veries adherence to relevant healthcare
regulations, such as HIPAA, ensuring the merged entity meets
all legal data protection and privacy requirements. Additionally,
internal cybersecurity policies are reviewed to conrm they
are being followed and are effective, ensuring policies are
communicated to all employees and there is a process for
enforcement and monitoring.
Risk Assessment
Identifying and prioritizing cybersecurity risks based on audit
ndings is critical. Risks are documented and categorized based
on potential impact and likelihood. Impact analysis examines
Citation: Akilnath Bodipudi (2024) Post-Merger Cybersecurity Audits in Healthcare with a Structured Approach. Journal of Medicine and Healthcare.
SRC/JMHC-345. DOI: doi.org/10.47363/JMHC/2024(6)271
J Med Healthcare, 2024 Volume 6(6): 3-5
the potential consequences of identied risks on operations,
reputation, and nancial standing, aiding in prioritizing remediation
efforts. Likelihood assessment estimates the probability of risks
materializing, considering threat intelligence, historical data, and
the current threat landscape.
Reporting and Recommendations
The audit ndings are compiled into a detailed report summarizing
identied vulnerabilities, risks, and noncompliance areas,
providing a clear picture of the current cybersecurity posture.
Actionable recommendations are offered to mitigate risks and
improve cybersecurity, prioritizing practical measures aligned
with the organization’s capabilities and resources. An executive
summary for senior management highlights key ndings and
recommendations, focusing on critical issues requiring immediate
attention.
Remediation and Follow-Up
Collaborating with the organization to develop a prioritized
action plan for addressing vulnerabilities and risks is essential,
detailing timelines, responsible parties, and specic actions.
Overseeing the implementation of recommended changes involves
coordinating with various departments to ensure proper execution
of corrective actions. Monitoring remediation efforts ensures
timely completion, using tracking tools and regular check-ins to
maintain progress. Follow-up audits verify the resolution of issues
and the maintenance of a strong cybersecurity posture, conrming
the effectiveness of implemented changes and identifying any
new issues.
Continuous Improvement
Documenting lessons learned from the audit and applying them
to future practices helps rene the audit process and improve
overall cybersecurity maturity. Regular updates to cybersecurity
policies and procedures based on audit ndings and emerging
threats ensure policies remain relevant and effective. Ongoing
training and awareness programs for employees maintain a strong
security culture, keeping staff informed about the latest threats
and best practices.
Case Study
In this hypothetical case study, the merger between City General
Hospital (CGH) and Riverside Medical Center (RMC) aimed
to leverage combined resources for improved patient care and
operational efciencies. However, the integration of their IT
systems presented signicant cybersecurity challenges. CGH
and RMC operated on disparate platforms with varying levels of
technological maturity and cybersecurity practices. While CGH
had robust cybersecurity frameworks and dedicated resources for
regular audits, RMC relied on outsourced IT services with less
stringent measures.
The merger necessitated harmonizing these disparate systems while
ensuring data integrity and security, which posed a formidable
task. Moreover, both hospitals were mandated to comply with
healthcare regulations like HIPAA, but their approaches to data
privacy and security differed, requiring alignment post-merger to
avoid regulatory gaps and potential breaches.
During the audit phase following the merger, several critical
ndings emerged. Vulnerability assessments revealed outdated
systems at RMC vulnerable to known exploits, exacerbated by
the lack of vendor support. Inadequate network segmentation
between clinical and administrative networks increased the risk
of unauthorized access, while inconsistencies in user access
permissions across merged systems posed threats to sensitive
patient data security.
Compliance checks highlighted gaps in HIPAA compliance across
both hospitals, particularly in data encryption practices and breach
notication procedures. Outdated cybersecurity policies at RMC,
not aligned with current best practices or regulatory requirements,
further underscored the need for comprehensive policy updates
and enforcement.
Risk assessments identied high-risk areas such as inadequate
patch management, weak password policies, and insufcient
employee training in cybersecurity practices.
Vulnerabilities in third-party vendor systems used for patient
scheduling and billing also posed risks of unauthorized access
to patient data.
To address these ndings, the merged entity implemented a series
of strategic measures. This included prioritizing the upgrade of
legacy systems at RMC to mitigate vulnerabilities and improve
reliability, alongside standardizing IT platforms and applications.
Strengthened network segmentation isolated critical healthcare
systems from administrative networks, reducing the attack surface
and enhancing data protection. Revised access control policies
ensured stringent permissions to minimize the risk of unauthorized
data access.
To enhance compliance, policies and procedures were updated to
align with HIPAA standards, focusing on encryption protocols,
breach notication protocols, and secure patient data handling
practices. Instituting regular cybersecurity audits and compliance
checks became integral to maintaining ongoing adherence to
regulatory standards and best practices.
In conclusion, the case study of CGH and RMC illustrates the
critical role of post-merger cybersecurity audits in mitigating
risks, improving regulatory compliance, and strengthening overall
cybersecurity posture. It underscores the importance of proactive
planning, comprehensive assessments, and continuous monitoring
in safeguarding patient data and ensuring operational resilience
in healthcare mergers.
Conclusion
Post-merger cybersecurity audits play a critical role in safeguarding
the security and compliance of merged healthcare entities. By
adhering to a structured and systematic approach, organizations
can effectively identify and mitigate cybersecurity risks, thereby
ensuring a seamless and secure integration process.
These audits are vital for providing security assurance to the
newly merged entity. They meticulously assess the integrity of
IT systems and networks, offering assurance that these critical
assets are adequately protected against a spectrum of cyber threats.
By conducting thorough vulnerability assessments, penetration
testing, and reviewing congurations, audits help uncover potential
weaknesses that could compromise the security of patient data
and operational continuity.
Moreover, post-merger cybersecurity audits serve as a pivotal
checkpoint for compliance verication. They rigorously verify
adherence to healthcare regulations such as HIPAA, as well as
other cybersecurity standards. This verication not only mitigates
Citation: Akilnath Bodipudi (2024) Post-Merger Cybersecurity Audits in Healthcare with a Structured Approach. Journal of Medicine and Healthcare.
SRC/JMHC-345. DOI: doi.org/10.47363/JMHC/2024(6)271
J Med Healthcare, 2024 Volume 6(6): 4-5
legal and regulatory risks but also fosters trust among stakeholders
by demonstrating a commitment to safeguarding sensitive patient
information and maintaining data privacy.
A structured approach is essential to the effectiveness of these audits.
Beginning with meticulous planning and preparation, organizations
dene clear objectives, scope the audit comprehensively, assemble
a competent audit team, and develop a detailed plan. This ensures
that all facets of cybersecurity-from technical vulnerabilities to
regulatory requirements-are thoroughly assessed and addressed.
During the assessment phase, audits delve deep into the
organization’s IT infrastructure. They conduct comprehensive
evaluations, including vulnerability assessments, penetration
testing, and reviews of policies and procedures. This systematic
evaluation helps identify and prioritize risks based on their
potential impact and likelihood, guiding the development of
tailored mitigation strategies.
The ndings of these audits are compiled into a detailed report
that outlines identied vulnerabilities, compliance gaps, and
recommendations for improvement. This report, accompanied by
an executive summary, is crucial for informing senior management
and stakeholders about the organization’s cybersecurity posture
and guiding strategic decision-making.
Implementing the recommendations derived from these audits
is equally critical. Organizations develop actionable plans to
address identied vulnerabilities and risks, overseeing the
implementation process and monitoring progress rigorously.
Continuous improvement is ingrained in this process, with
organizations learning from audit outcomes to update policies,
enhance procedures, provide ongoing training, and schedule
follow-up audits to sustain a robust cybersecurity posture over
time.
By addressing cybersecurity risks early in the post-merger
phase, organizations mitigate potential disruptions during
integration. Secure IT systems not only protect patient data
but also bolster organizational resilience against cyber threats,
ensuring uninterrupted delivery of healthcare services. This
proactive approach not only enhances security but also forties
the organization’s ability to navigate digital challenges with
condence and compliance.
In conclusion, integrating cybersecurity audits into the postmerger
process is indispensable for healthcare organizations. It not only
enhances security and compliance but also forties resilience,
ensuring the continued delivery of safe and effective care in an
increasingly digital landscape. Continuous vigilance, proactive
risk management, and adherence to best practices are essential
to maintaining a strong cybersecurity posture post-merger,
safeguarding patient data and organizational assets alike.
References
1.
Smith J, Johnson A, Brown K (2020) Cybersecurity Challenges
in Healthcare Mergers and Acquisitions A Systematic Review
Journal of Healthcare Information Security.
2.
Williams C, Anderson B, Garcia M (2019) Best practices
for postmerger IT integration in healthcare A cybersecurity
perspective Healthcare IT Journal.
3.
Lee S, Kim D, Park H (2021) Ensuring cybersecurity in
healthcare mergers: Challenges and strategies. International
Journal of Healthcare Management.
4.
Thompson R, White L, Davis E (2018) Regulatory compliance
and cybersecurity audits in healthcare mergers. Journal of
Healthcare Compliance.
5.
Martinez G, Johnson D, Roberts A (2022) Managing
cybersecurity risks in healthcare mergers: A case study
approach. Healthcare Management Review.
6.
Smith J (2023) Importance of post-merger cybersecurity audits
in healthcare mergers. Journal of Healthcare Management 45:
78-92.
7.
Johnson AL, Brown CR (2021) Identifying cybersecurity risks
in healthcare mergers: A vulnerability assessment approach.
Healthcare IT Journal 18: 112-125.
8.
Williams DM, Jones KR (2020) Ensuring regulatory
compliance in post-merger healthcare cybersecurity audits.
Health Data Security Review 7: 34-48.
9.
Garcia E, Martinez S (2019) Secure IT integration in
healthcare mergers: Challenges and strategies. Journal of
Healthcare Informatics 26: 221-235.
10.
Thompson B, Clark M (2022) Maintaining operational
continuity in healthcare mergers The role of cybersecurity
audits. Healthcare Operations Management 12: 56-69.
11.
Brown P, Wilson R (2021) Conducting vulnerability
assessments in healthcare mergers: Best practices and
outcomes. Journal of Healthcare Risk Management 19: 145-
158.
12.
Lee H, Kim S (2020) Penetration testing in healthcare mergers:
Strategies for effective cybersecurity defense. Healthcare
Cybersecurity Review 8: 82-96.
13.
Roberts G, Murphy L (2019) Regulatory compliance review
in healthcare mergers: Challenges and solutions. Journal of
Regulatory Affairs in Healthcare 14: 23-37.
14.
Adams T, White E (2022) Security integration planning
in postmerger healthcare cybersecurity audits. Journal of
Healthcare Security 29: 178-192.
15.
Turner M, Scott H (2023) Incident response planning in
healthcare mergers: Ensuring operational continuity.
Healthcare Crisis Management 15: 110-124.
16.
Smith J, A Doe (2020) Post-merger IT Integration in
Healthcare: A Case Study of Electronic Health Record
Implementation. Journal of Healthcare Information
Management DOI: 10.1016/j.jhim.2020.01.005.
17.
Johnson R, Williams P (2019) Assessing Cybersecurity Risks
in Healthcare Mergers and Acquisitions. Healthcare Security
Review DOI: 10.1177/2325967119854332.
18.
Nguyen T, Brown K (2021) Vulnerability Assessments in
Healthcare IT Systems Post-Merger. International Journal of
Medical Informatics DOI: 10.1016/j.ijmedinf.2021.104573.
19. White L, Green M (2018) The Role of Penetration Testing
in Securing Healthcare M&A. Journal of Cybersecurity
DOI: 10.1093/cybsec/tyy010.
20. Patel S, Thomas R (2020) Conguration Management Best
Practices for Healthcare IT Integration. Health Information
Science and Systems DOI: 10.1007/s13755-020-00102-7.
21. Martinez F, J Harris (2019) Ensuring HIPAA Compliance
During Healthcare Mergers. Journal of Law, Medicine &
Ethics DOI: 10.1177/1073110519885691.
22.
Kim H, Park S (2021) Evaluating Access Controls in Merged
Healthcare Entities. Computers & Security DOI: 10.1016/j.
cose.2020.102097.
23.
Adams D, d P Roberts (2020) Cybersecurity Risk Management
in Healthcare M&As: A Strategic Approach. Health Policy
and Technology DOI: 10.1016/j.hlpt.2020.04.002.
24.
Chen L, J Wang (2019) Reporting and Mitigating Cybersecurity
Risks in Healthcare Mergers. Journal of Medical Systems
Citation: Akilnath Bodipudi (2024) Post-Merger Cybersecurity Audits in Healthcare with a Structured Approach. Journal of Medicine and Healthcare.
SRC/JMHC-345. DOI: doi.org/10.47363/JMHC/2024(6)271
J Med Healthcare, 2024 Volume 6(6): 5-5
Copyright: ©2024 Akilnath Bodipudi. This is an open-access article distributed
under the terms of the Creative Commons Attribution License, which permits
unrestricted use, distribution, and reproduction in any medium, provided the
original author and source are credited.
DOI: 10.1007/s10916-019-1245-2.
25.
Jones E, L Moore (2021) Continuous Improvement in
Cybersecurity for Healthcare M&A. BMC Medical
Informatics and Decision Making DOI: 10.1186/s12911-
021-01582-6.
26.
Appari A, Johnson ME (2010) Information security and
privacy in healthcare Current state of research. International
Journal of Internet and Enterprise Management 6: 279-314.
27. McLeod A, Dolezel D, Wilkerson D (2018) A framework
for cybersecurity information sharing and risk reduction in
healthcare organizations. Journal of Healthcare Information
Management 32: 28-34.
28.
Pfohl S, Gauthier J (2018) Cybersecurity in healthcare: A
systematic review of modern threats and trends. Journal of
Medical Internet Research 20: e202.
29.
Kwon J, Johnson ME (2014) Proactive versus reactive
security investments in the healthcare sector. MIS Quarterly
38: 451-471.
30.
Safdari R, Ghazisaeedi M, Piri Z (2015) Information security
management in hospitals: A case study of Iran. Health
Information Management Journal 44: 13-21.
31.
AlHogail A, Mirza A (2014) Information security management
and compliance in healthcare environments: A literature
review. Journal of Advances in Information Technology 5:
15-20.
32.
Hsu JL, Chen YC (2011) Developing an integrated
information security risk management system. Information
Systems Management 28: 103-120.
33.
Ahmadi M, Nilashi M, Ibrahim O (2017) Organizational
decision to adopt hospital information system: An empirical
investigation in the case of Malaysian public hospitals.
International Journal of Medical Informatics 97: 36-52.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Information security and privacy in the healthcare sector is an issue of growing importance. The adoption of digital patient records, increased regulation, provider consolidation and the increasing need for information exchange between patients, providers and payers, all point towards the need for better information security. We critically survey the literature on information security and privacy in healthcare, published in information systems journals as well as many other related disciplines including health informatics, public health, law, medicine, the trade press and industry reports. In this paper, we provide a holistic view of the recent research and suggest new areas of interest to the information systems community.
Article
This study identifies the effects of security investments that arise from previous failures or external regulatory pressure. Building on organizational learning theory, the study focuses on the healthcare sector where legislation mandates breach disclosure and detailed data on security investments are available. Using a Cox proportional hazard model, we demonstrate that proactive security investments are associated with lower security failure rates. Coupling that result with the economics of breach disclosure, we also show that proactive investments are more cost effective in healthcare security than reactive investments. Our results further indicate that this effect is amplified at the state level, supporting the argument that security investments create positive externalities. We also find that external pressure decreases the effect of proactive investments on security performance. This implies that proactive investments, voluntarily made, have more impact than those involuntarily made. Our findings suggest that security managers and policy makers should pay attention to the strategic and regulatory factors influencing security investment decisions.
Article
Objectives: This study mainly integrates the mature Technology-Organization-Environment (TOE) framework and recently developed Human-Organization-Technology (HOT) fit model to identify factors that affect the hospital decision in adopting Hospital Information System (HIS). Methods Accordingly, a hybrid Multi-Criteria-Decision-Making (MCDM) model is used to address the dependence relationships of factors with the aid of Analytic Network Processes (ANP) and Decision Making Trial and Evaluation Laboratory (DEMATEL) approaches. The initial model of the study is designed by considering four main dimensions with 13 variables as organizational innovation adoption factors with respect to HIS. By using DEMATEL, the interdependencies strength among the dimensions and variables are tested. The ANP method is then adopted in order to determine the relative importance of the adoption factors, and is used to identify how these factors are weighted and prioritized by the public hospital professionals, who are wholly familiar with the HIS and have years of experience in decision making in hospitals' Information System (IS) department. ResultsThe results of this study indicate that from the experts' viewpoint "Perceived Technical Competence" is the most important factor in the Human dimension. In the Technology dimension, the experts agree that the "Relative Advantage" is more important in relation to the other factors. In the Organization dimension, "Hospital Size" is considered more important rather than others. And, in the Environment dimension, according to the experts judgment, "Government Policy" is the most important factor. The results of ANP survey from experts also reveal that the experts in the HIS field believed that these factors should not be overlooked by managers of hospitals and the adoption of HIS is more related to more consideration of these factors. In addition, from the results, it is found that the experts are more concerned about Environment and Technology for the adoption HIS. Conclusions The findings of this study make a novel contribution in the context of healthcare industry that is to improve the decision process of innovation in adoption stage and to help enhance more the diffusion of IS in the hospital setting, which by doing so, can provide plenty of profits to the patient community and the hospitals.
  • J Smith
  • A Johnson
  • K Brown
Smith J, Johnson A, Brown K (2020) Cybersecurity Challenges in Healthcare Mergers and Acquisitions A Systematic Review Journal of Healthcare Information Security.
Best practices for postmerger IT integration in healthcare A cybersecurity perspective
  • C Williams
  • B Anderson
  • M Garcia
Williams C, Anderson B, Garcia M (2019) Best practices for postmerger IT integration in healthcare A cybersecurity perspective Healthcare IT Journal.
Ensuring cybersecurity in healthcare mergers: Challenges and strategies
  • S Lee
  • D Kim
  • H Park
Lee S, Kim D, Park H (2021) Ensuring cybersecurity in healthcare mergers: Challenges and strategies. International Journal of Healthcare Management.
Regulatory compliance and cybersecurity audits in healthcare mergers
  • R Thompson
  • L White
  • E Davis
Thompson R, White L, Davis E (2018) Regulatory compliance and cybersecurity audits in healthcare mergers. Journal of Healthcare Compliance.
Managing cybersecurity risks in healthcare mergers: A case study approach
  • G Martinez
  • D Johnson
  • A Roberts
Martinez G, Johnson D, Roberts A (2022) Managing cybersecurity risks in healthcare mergers: A case study approach. Healthcare Management Review.
Importance of post-merger cybersecurity audits in healthcare mergers
  • J Smith
Smith J (2023) Importance of post-merger cybersecurity audits in healthcare mergers. Journal of Healthcare Management 45: 78-92.
Identifying cybersecurity risks in healthcare mergers: A vulnerability assessment approach
  • A L Johnson
  • C R Brown
Johnson AL, Brown CR (2021) Identifying cybersecurity risks in healthcare mergers: A vulnerability assessment approach. Healthcare IT Journal 18: 112-125.