usage and IT-security practices), this study addresses 
one of the major concerns surrounding the electronic 
HIE usage: the IT-security practices that are required 
to ensure the trust of both patients and healthcare 
providers. In future works, it would be worthwhile to 
pursue and deepen the analysis of factors that 
determine the levels of HIE usage and IT-security 
practices implementation. 
REFERENCES 
 
Absolute Software Corporation, 2015. The Cost of a Data 
Breach: Healthcare Settlements Involving Lost or 
Stolen Devices. Austin, Texas: Absolute Software 
Corporation. 
Ancker, J. S., Edwards, A. M., Miller, M. C., & Kaushal, 
R., 2012. Consumer perceptions of electronic health 
information exchange. American Journal of Preventive 
Medicine, 43(1), 76-80.  
Bahtiyar, S., & Çaglayan, M. U., 2014. Trust Assessment 
of Security for e-Health Systems. Electronic Commerce 
Research and Applications, 13(3), 164-177.  
Berwick, D.M., Nolan, T. W., & Whittington, J., 2008. The 
Triple Aim: Care, health, and cost. Health Affairs, 
27(3), 759-769. 
Bitton, A., Flier, L. A., & Jha, A. K., 2012. Health 
information technology in the era of care delivery 
reform: To what end? The Journal of the American 
Medical Association, 307(24), 2593-2594.  
Cochran, G. L., Lander, L., Morien, M., Lomelin, D. E., 
Sayles, H., & Klepser, D. G., 2015. Health care 
provider perceptions of a query-based health 
information exchange: barriers and benefits. Journal of 
Innovation in Health Informatics, 22(2), 302-308.  
Dehling, T., & Sunyaev, A., 2014. Secure provision of 
patient-centered health information technology services 
in public networks--leveraging security and privacy 
features provided by the German nationwide health 
information technology infrastructure. Electronic 
Markets, 24(2), 89-99. 
European Commission, 2014. European hospital survey: 
Benchmarking deployment of eHealth services (2012-
2013). Luxembourg: JRC Scientific and Policy Reports 
- Institute for Prospective Technological Studies. 
Häyrinen, K., Saranto, K., & Nykänen, P., 2008. Definition, 
Structure, Content, Use and Impacts of Electronic 
Health Records: A Review of the Research Literature. 
International Journal of Medical Informatics, 77(5), 
291-304.  
HIMSS, 2015. 2015 HIMSS Cybersecurity Survey. 
Chicago, IL: HIMSS. 
Hwang, H.-G., Han, H.-E., Kuo, K.-M., & Liu, C.-F., 2012. 
The differing privacy concerns regarding exchanging 
electronic medical records of Internet users in Taiwan. 
Journal of Medical Systems, 36(6), 3783-3793.  
ISMG, 2014. Healthcare Information Security Today. 2014 
Survey Analysis: Update on HIPAA Omnibus 
Compliance, Protecting Patient Data (pp. 38).  
Retrieved from http://6dbf9d0f8046b8d5551a-
7164cafcaac68bfd3318486ab257f999.r57.cf1.rackcdn.
com/2014-healthcare-information-security-today-
survey-pdf-5-h-53.pdf. 
Kaelber, D. C., & Bates, D. W., 2007. Health information 
exchange and patient safety. Journal of Biomedical 
Informatics, 40(6 SUPPL), S40-S45.  
Ketchen, D. J., & Shook, C., 1996. The Application of 
Cluster Analysis in Strategic Management Research: 
An Analysis and Critique. Strategic Management 
Journal, 17(6), 441-458.  
O’Donnell, H. C., Patel, V., Kern, L. M., Barrón, Y., 
Teixeira, P., Dhopeshwarkar, R., & Kaushal, R., 2011. 
Healthcare consumers’ attitudes towards physician and 
personal use of health information exchange. 
Journal of 
General Internal Medicine, 26(9), 1019-1026.  
Ponemon Institute, 2016.  Sixth annual benchmark study on 
privacy & security of healthcare data. Traverse City, 
MI, USA: Ponemon Institute. 
Simon, S. R., Benjamin, A., Delano, D., & Bates, D. W., 
2009. Patients’ attitudes toward electronic health 
information exchange: Qualitative study. Journal of 
Medical Internet Research, 11(3), e30.  
Tejero, A., & de la Torre, I., 2012. Advances and Current 
State of the Security and Privacy in Electronic Health 
Records: Survey from a Social Perspective. Journal of 
Medical Systems, 36(5), 3019-3027.  
Vogel, J., Brown, J. S., Land, T., Platt, R., & Klompas, M., 
2014. MDPHnet: Secure, distributed sharing of 
electronic health record data for public health 
surveillance, evaluation, and planning. American 
Journal of Public Health, 104(12), 2265-2270.  
von Solms, S. H., 2005. Information security governance: 
Compliance management vs operational management. 
Computers & Security, 24(6), 443-447.  
White, P., 2004. Privacy and security issues in 
teleradiology. Seminars in Ultrasound, CT and MRI, 
25(5), 391-395.  
Yaraghi, N., 2015. An empirical analysis of the financial 
benefits of health information exchange in emergency 
departments.  Journal of the American Medical 
Informatics Association, 22(6), 1169-1172.  
Zwaanswijk, M., Ploem, M. C., Wiesman, F. J., Verheij, R. 
A., Friele, R. D., & Gevers, J. K., 2013. Understanding 
health care providers' reluctance to adopt a national 
electronic patient record: an empirical and legal 
analysis. Medicine And Law, 32(1), 13-31.