skip to main content
10.1145/1655084.1655087acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

HIPAA compliance in home health: a neo-institutional theoretic perspective

Published:13 November 2009Publication History

ABSTRACT

As the baby boomers age and the focus of healthcare shifts from acute care to chronic care, home healthcare will become increasingly important in controlling cost and improving quality. Health IT will undoubtedly play critical role toward these goals. Yet, growing adoption of Health IT raises important questions related to privacy and security of protected health information, necessitating a better understanding of compliance to HIPAA regulation, which mandates privacy and security safeguards by care providers. In this research we investigate the prevalence of HIPAA compliance in home healthcare to identify drivers influencing HIPAA compliance in home health agencies. The research design involves a model of regulatory compliance comprising institutional and market forces that may have a bearing on home healthcare. We develop hypotheses guided by neo-institutional theory, and conduct quantitative analysis with the goal of generating insights on the primary drivers and barriers of HIPAA compliance.

References

  1. Adler, P.S. 2005 "The Evolving Object of Software Development," Organization 12,3.Google ScholarGoogle ScholarCross RefCross Ref
  2. Agrawal, A. 2002. "Return on Investment Analysis for a Computer-based Patient Record in the Outpatient Clinic Setting," Journal of the Association for Academic Minority Physicians 13, p 61Google ScholarGoogle Scholar
  3. Agresti, A. 2003. Categorical Data Analysis. Wiley, NYGoogle ScholarGoogle Scholar
  4. AHIMA - The American Health Information Management Association. 2006. "The State of HIPAA Privacy and Security Compliance," last accessed on Nov. 2008,Google ScholarGoogle Scholar
  5. Anthony, D.L., and Banaszak-Holl, J. 2003. "Organizational Variation in the Managed Care Industry in the 1990s: Implications for Institutional Change," Research in the Sociology of Health Care 21, pp 21--38Google ScholarGoogle ScholarCross RefCross Ref
  6. Appari, A., Anthony, D.L., Johnson, E.M., 2009 "HIPAA Compliance: An Examination of Institutional and Market Forces," The 8th Workshop on Economics of Information Security, London, August 24-25Google ScholarGoogle Scholar
  7. Aspden, P., Corrigan, J.M., Wolcott, J., and Erickson, S. M. 2003. Patient Safety: Achieving a New Standard for Care. Washington, DC: National Academies PressGoogle ScholarGoogle Scholar
  8. Baron, B.R., and Baron, P. 1980. "A Regulatory Compliance Model," Journal of Contemporary Business 92, pp 139--150Google ScholarGoogle Scholar
  9. Bellman, S., Johnson, E.J., Kobrin, S.J., and Lohse, G.L. 2002 "Regional Differences in Privacy Preferences: Implications for the Globalization of Electronic Commerce," working paper, Columbia UniversityGoogle ScholarGoogle Scholar
  10. Benders, J., Batenberg, R. and Blonk, H. 2006 "Sticking to Standards; Technical and other Isomorphic Pressures in Deploying ERP-Systems," Information & Management 43:2, pp 124 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Björck, F. 2004 "Institutional Theory: A New Perspective for Research into IS/IT Security in Organizations," Proceedings of the 37th Annual Hawaii International Conference on System Sciences, Hawaii, January 5-6 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Chaiken, B. P. 2003 "Clinical ROI: Not Just Costs Versus Benefits," Journal of Healthcare Information Management 17:4, pp 36--41Google ScholarGoogle Scholar
  13. Chao, H., Twu, S., and Hsu, C. 2005 "A Patient-Identity Security Mechanism for Electronic Medical Records during Transit and at Rest," Medical Informatics and the Internet in Medicine 30: 3, pp 227--240Google ScholarGoogle ScholarCross RefCross Ref
  14. CHCF -- California HealthCare Foundation 2005, "National Consumer Health Privacy Survey 2005: Executive Summary," available at www.chcf.orgGoogle ScholarGoogle Scholar
  15. Computer World, May 2001. "Beware of Predatory HIPAA Consultants," last accessed on 11/27/2008 at http://www.computerworld.com/securitytopics/security/privacy/story/0,10801,60250,00.htmlGoogle ScholarGoogle Scholar
  16. Covaleski, M.A., Dirsmith, M.W., and Michelman, J.E. 1993 "An Institutional Theory Perspective on the DRG Framework, Case-Mix Accounting Systems and Healthcare Organizations," Accounting, Organization and Society 18:1, pp 65--80.Google ScholarGoogle ScholarCross RefCross Ref
  17. D'Aunno, T., Succi, M., Alexander, J. A. 2000 "The Role of Institutional and Market Forces in Divergent Organizational Change," Administrative Science Quarterly 45:4, pp 679.Google ScholarGoogle ScholarCross RefCross Ref
  18. Dacin, M. T. (1997). Isomorphism in context: The power and prescription of institutional norms. Academy of Management Journal, 40(1), 46--81.Google ScholarGoogle Scholar
  19. Davis, G.F., and Marquis, C. 2005. "Prospects for Organizations Theory in the Early Twenty--First Century: Institutional Fields and Mechanisms," Organization Science, pp 1--12 Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. DiMaggio, P., W. Powell. 1983 "The Iron Cage Revisited: Institutional isomorphism and collective rationality in organizational fields," American Sociological Review 48,147--160Google ScholarGoogle ScholarCross RefCross Ref
  21. Dynes, S. 2009 "Emergent Risks in Critical Infrastructure," in Papa, M. and Shenoi, S. Eds. Critical Infrastructure Protection II, Springer, pp 3--16Google ScholarGoogle ScholarCross RefCross Ref
  22. Edelman, L.B. and Suchman, M.C. 1997 "The Legal Environments of Organizations," Annual Review of Sociology 23, pp 479--515.Google ScholarGoogle ScholarCross RefCross Ref
  23. Eldridge, S.W. and Kealey, B.T. 2005 "SOX Costs: Auditor Attestation under Section 404," Available at SSRN: http://ssrn.com/abstract=743285Google ScholarGoogle Scholar
  24. Fazzi Associates. 2007. Phillips National Study on the Future of Technology and Telehealth in Home Care -- Presentation at National Association for Home Care and Hospice: October 2007. Northampton, MA.Google ScholarGoogle Scholar
  25. Fedorowicz, J., and Ray, A.W. 2004 "Impact of HIPAA on the Integrity of Healthcare Information," International Journal of Healthcare Technology and Management 6:2, pp 142--157.Google ScholarGoogle ScholarCross RefCross Ref
  26. Fortinsky, R.H., Garcia, R.I., Sheehan, T.J., Madigan, E.A. and Tullai-McGuinness, S. 2003. Measuring Disability in Medicare HomeCare Patients: Application of Rasch Modeling to the Outcome and Assessment Information Set. Medical Care, 41, 5, 601--15.Google ScholarGoogle ScholarCross RefCross Ref
  27. Gosain, S. 2004 "Enterprise Information Systems as Objects and Carriers of Institutional Forces: The Iron Cage Revisited," Journal of AIS 5:4, pp 151--182.Google ScholarGoogle Scholar
  28. Greenway, K.E., and Chan, Y.E. 2005 "Theoretical Explanations for Firms' Information Privacy Behaviors," Journal of AIS 6:6, pp 171--198Google ScholarGoogle Scholar
  29. Gunningham, N.A., Thornton, D., and Kagan, R.A. 2005 "Motivating Management: Corporate Compliance in Environmental Protection," Law & Policy 27, pp. 289--316Google ScholarGoogle ScholarCross RefCross Ref
  30. Hannan, M., Carroll, G., Dundon, E. A., & Torres, J. C. (1995). Organizational evolution in a multinational context: Entries of automobile manufacturers in Belgium, Britain, France, Germany and Italy. American Sociological Review 60, pp 509--528.Google ScholarGoogle ScholarCross RefCross Ref
  31. Hasan, R., and Yurcik, W. 2006. "A Statistical Analysis of Disclosed Storage Security Breaches," ACM workshop on Storage security and survivability. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Haveman, H., and Rao, H. (1997). Structuring a theory of moral sentiments: Institutional and organizational coevolution in the early thrift industry. American Journal of Sociology 102, 1606--1651Google ScholarGoogle ScholarCross RefCross Ref
  33. Health Privacy Project 2007. "Health Privacy Stories," http://www.healthprivacy.orgGoogle ScholarGoogle Scholar
  34. Heugens, P.P.M.A.R., and Lander, M.W. 2009. "Structure! Agency! (And Other Quarrels): A meta-Analysis of Institutional Theories of Organizations," Academy of Management Journal 52:1, pp 61--85Google ScholarGoogle ScholarCross RefCross Ref
  35. Hu, Q., Hart, P. Cooke, D. 2007. The role of external and internal influences on information security -- a neo-institutional perspective. Journal of Strategic Information Systems, 16, 153--172. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Huston, T. 2001 "Security Issues for Implementation of E-Medical Records." Communications of the ACM 44: 9 Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Johnson, M.E. 2009 "Data Hemorrhages in the Healthcare Sector," Financial Cryptography and Data Security, Thirteenth International Conference, February 23-26, 2009 Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Johnston, A.C. and Warkentin, M., 2008. "Information Privacy Compliance in the Healthcare Industry" Information Management and Computer Security, 16, 1, pp 5--19Google ScholarGoogle ScholarCross RefCross Ref
  39. Kalorama Information a division of MarketResearch.com 2007. "Wireless Opportunities in Healthcare".Google ScholarGoogle Scholar
  40. Kemper, P. 2003 "Long-Term Care Research and Policy," The Gerontologist 43:4, pp 436--446.Google ScholarGoogle ScholarCross RefCross Ref
  41. King, J. L., Gurbaxani, V., Kraemer, K. L., McFarlan, F. W., Raman, K. S., and Yap, C. S. 1994. "Institutional factors in information technology innovation." Information Systems Research 52, 139--169.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Lorence, D.H., and Richards, M.C. 2003. "Adoption of Regulatory Compliance Programs Across United States Health Care Organizations: A view of Institutional Disobedience," Health Services Management Research 16:3, pp 167--178Google ScholarGoogle ScholarCross RefCross Ref
  43. Lounsbury, M. (2001). Institutional sources of practice variation: Staffing college and university recycling programs. Administrative Science Quarterly, 46, 29--56.Google ScholarGoogle ScholarCross RefCross Ref
  44. Lounsbury, M. 2008. "Institutional Rationality and Practice Variation: New Directions in the Institutional Analysis of Practice," Accounting, Organizations and Society 33, pp 349--361.Google ScholarGoogle ScholarCross RefCross Ref
  45. March, J.G. and Olsen, J.P. 1976 Ambiguity and Choice in Organizations, NorwayGoogle ScholarGoogle Scholar
  46. Mercuri, R.T. 2004. "The HIPAA-potamus in Health Care Data Security," Communications of the ACM 47:7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Meyer, J.W. and Rowan, B. (1977) "Institutionalized Ceremonies: Formal Structure as Myth and Ceremony", American Journal of Sociology (83:2), pp. 340--363.Google ScholarGoogle Scholar
  48. Miller, A.R., and Tucker, C.E. 2009 "Privacy Protection and Technology Diffusion: The Case of Electronic Medical Records," Management Science (55:7), pp 1077--1093. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Mor, V. 2005 "Improving the Quality of Long-Term Care with Better Information," The Milibank Quarterly 83:3, pp 333--364.Google ScholarGoogle ScholarCross RefCross Ref
  50. NIST -- National Institute of Standards and Technology. 2005. "An Introductory Resource Guide for Implementing the Health Information Portability and Accountability ACT HIPAA Security Rule," NIST Special publication 800--66.Google ScholarGoogle Scholar
  51. Oliver, C. 1991 "Strategic Responses to Institutional Processes", Academy of Management Review, 16, pp. 145Google ScholarGoogle ScholarCross RefCross Ref
  52. Pedersen, D.M., and Frances, S. 1990 "Regional Differences in Privacy Preferences" Psychological Reports 66, pp 731Google ScholarGoogle ScholarCross RefCross Ref
  53. Peterson, Z. and Burns, R. 2005 "Ext3cow: A Time-Shifting File System for Regulatory Compliance," ACM Transactions on Storage 1:2, pp. 190--212 Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Powell, W.W., DiMaggio, P.J. eds., 1991 The New Institutionalism in Organizational Analysis, Chicago: University of Chicago Press.Google ScholarGoogle Scholar
  55. Pritts, J., Choy, A., Emmart, L., Hustead, J. 2002 "The State of Health Privacy Second Edition: A Survey of State Health Privacy Statute," Volume I and II, http://ihcrp.georgetown.edu/papers.htmlGoogle ScholarGoogle Scholar
  56. Rye, C.B., Kimberly, J.R. 2007 "The Adoption of Innovations by Provider Organizations in Health Care," Medical Care Research and Review 64:3; pp 235Google ScholarGoogle ScholarCross RefCross Ref
  57. Scott, R.W. 2001. Institutions and Organizations, Second Edition. Thousand Oaks, CA: Sage PublicationsGoogle ScholarGoogle Scholar
  58. Scott, R.W., Ruef, M., Mendel, P.J., and Caronna, C.A. 2000 Institutional Change and Healthcare Organizations: From Professional Dominance to Managed Care. Chicago: University of Chicago Press.Google ScholarGoogle Scholar
  59. Silverman, M.G. 2008. Compliance Management for Public, Private, or Non-Profit Organizations, McGraw-Hill, NYGoogle ScholarGoogle Scholar
  60. Suchman, M. C. 1995. Managing legitimacy: Strategic and institutional approaches. Academy of Management Review 20:3, 571--610.Google ScholarGoogle ScholarCross RefCross Ref
  61. Varian, H.R., Woroch, G. and Wallenburg, F. 2005 "The Demographics of the Do-Not-Call List," IEEE Security and Privacy 3:1, pp 34--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Wade, J. B., Swaminathan, A., and Saxon, M. S. 1998. Normative and resource flow consequences of local regulations in the American brewing industry, 1845--1918. Administrative Science Quarterly, 43, 905--935.Google ScholarGoogle ScholarCross RefCross Ref
  63. Weidenbaum, M.L. 1979. The Future of Business Regulation Amacom, NYGoogle ScholarGoogle Scholar
  64. Zucker, L.G. 1987 "Institutional Theories of Organizations," Annual Review of Sociology 13, pp 443--464Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. HIPAA compliance in home health: a neo-institutional theoretic perspective

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SPIMACS '09: Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
          November 2009
          72 pages
          ISBN:9781605587905
          DOI:10.1145/1655084

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 November 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader