Author:
Smith Kane J.,Dhillon Gurpreet,Hedström Karin
Abstract
Purpose
In this paper, using values of individuals in a Swedish health-care organization, electronic identity management objectives related to security are defined.
Design/methodology/approach
By using value-focused thinking, eliciting values from interviews of three groups of health-care staff’s objective hierarchies for three stakeholder groups are identified and defined. Objective hierarchies allow comparison across multiple stakeholder groups such that strategic objectives for identity management can be compared and contrasted.
Findings
This qualitative investigation, which used value-focused thinking, revealed 94 subobjectives, grouped into 12 fundamental and 14 means objectives, which are essential for developing measures that address potential value conflicts in a health-care organization around electronic identity management. The objectives developed in this study are grounded socioorganizationally and provide a way forward in developing measures aimed to reducing potential conflicts at a policy level.
Originality/value
In a final synthesis, congruence (or lack thereof) in the electronic identity management approach for a Swedish health organization is suggested. This also creates a foundation to evaluate and weight different objectives for strategic decision management.
Subject
Management of Technology and Innovation,Information Systems and Management,Computer Networks and Communications,Information Systems,Software,Management Information Systems
Reference53 articles.
1. Vicious and virtuous cycles in ERP implementation: a case study of interrelations between critical success factors;European Journal of Information Systems,2002
2. Privacy, confidentiality: and electronic medical records;Journal of the American Medical Informatics Association,1996
3. Big data analytics in healthcare;BioMed Research International,2015
4. Editorial note;Information Systems Research,2001
5. Snowball sampling: problems and techniques of chain referral sampling;Sociological Methods & Research,1981
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献