IN THE FILE UPLOAD, THAT IS FROM THE WEEK 2 ASSIGNMENT TITILED "TOPIC DEFINIITION STATEMENT WM" .. THAT IS WHERE THIS WEEK 4 ASSINMENT WILL STEM FROM!!
INSTRUCTION!!
- Search the literature for scholarly and/or peer-reviewed articles, and/or dissertations on your research topic/problem statement regarding enterprise compliance management with a focus on information security risk management.
- Locate ten current empirical studies (each must be under five years old) addressing your selected issue.
- Analyze and evaluate ten studies in the information security risk management literature.
- Describe what you learned, how it applies to your research topic/problem statement, and what applications apply to your topic.
- Summarize the methodology, research results, and provide an analysis of the empirical studies. Specifically you will summarize each article in your review according to the following criteria:
- For scholarly research (peer-reviewed) articles, identify the following:
- Key words in title and abstract.
- Theory referenced.
- Purpose of research.
- Results.
- Conclusions.
- Implications and recommendations.
- For scholarly articles (no research conducted), identify the following:
- Key words in title and abstract.
- Theory referenced.
- Purpose/objective of the article.
- Summary of article accomplishments.
- Scholarly or practitioner applications.
- For general and practitioner literature, identify the following:
- Common key words in title and abstract.
- Purpose/objective of the article.
- Summary of the article (results, applications, strategy, opportunities).
- For scholarly research (peer-reviewed) articles, identify the following:
- Draw conclusions for the findings in your research.
1
2
Topic Definition Statement WM
Student
Instructor
University affiliation
Class Name
Date
Topic Definition Statement
Research Topic
‘Evaluating Enterprise Compliance Management Mechanisms: Exploratory Study: Risk Management and Information Security Healthcare Organizations
Research Problem
However, limited studies explain how compliance management mechanisms used in healthcare organizations can ensure that information security risks and other risks are well managed (Hashmi et al., 2018). This lack of information presents a problem for organizations that comply with regulatory requirements and information protection.
Research Problem Background
It has been ascertained that Enterprise compliance management (ECOM) is a fundamental form of compliance in enterprise administration, especially in the health sector. Compliance solutions facilitate the implementation of legal, regulatory, and organizational standards so that risks and consequent penalties are avoided (Salim et al., 2018). Compliance is not complete without proper risk management, most especially when it comes to information security. Because cyber threats are on the rise and sophisticated, healthcare organizations must follow good information security measures that ensure patient data security.
Research Questions
1. What are the main compliance management mechanisms used in healthcare organizations?
2. How do these mechanisms solve risk management problems, with a specific focus on information security?
3. What strengths and weaknesses do healthcare organizations' existing compliance management mechanisms have in their eyes?
4. What aspects of contemporary compliance management frameworks could be enhanced to improve information security?
Literature review and the key constructs
Enterprise compliance management literature authorizes compliance frameworks such as ISO 27001, HIPAA, risk management models, and information security. Regulation, evaluation, protection, information security standards, and event management are the most significant concepts in this field.
Several theoretical frameworks have been identified in the study of compliance management. The Compliance Theory is based on governmental regulations to guide organizations' behavior, whereas the Risk Management Theory is concerned with the identification, evaluation, and minimization of risks that can result in unfavorable consequences. The Information Security Management Theory probes into the measures employed in an organization to guard information resources.
Gaps in Knowledge
Reviewing recent papers, it is possible to conclude that there are weaknesses in analyzing compliance management systems and their application. Although many academic papers concern compliance frameworks and risk management approaches, relatively few studies examine their effectiveness in practice, especially in healthcare organizations. Furthermore, more studies are required to explain how information security measures should be implemented under compliance management systems.
Purpose and Scope
This study aims to assess the factors associated with implementing compliance management in healthcare organizations, emphasizing risk management and information security ((Chen et al., 2020). It will establish the best practices within the compliance framework and draw conclusions and recommendations.
Research Methods
The research will use email and online questionnaires followed by face-to-face interviews with the key informants: compliance officers, IS professionals, and other related staff in the healthcare facilities. The quantitative part of the study will consist in administering a questionnaire to determine the probability of using the recognized compliance tools and their efficiency. The qualitative component will provoke questionnaires and interviews to understand the difficulties and achievements of working in this field.
Target Population
This study's population comprises compliance officers, risk management experts, and information security officers serving in healthcare facilities. The research is interested in these people to understand compliance management methods and their implications for information protection and risk control.
References
Chen, P. T., Lin, C. L., & Wu, W. N. (2020). Big data management in healthcare: Adoption challenges and implications. International Journal of Information Management, 53, 102078.
Hashmi, M., Governatori, G., Lam, H. P., & Wynn, M. T. (2018). Are we done with business process compliance: state of the art and challenges ahead. Knowledge and Information Systems, 57(1), 79-133.
Saleem, J., Hammoudeh, M., Raza, U., Adebisi, B., & Ande, R. (2018, June). IoT standardisation: Challenges, perspectives and solution. In Proceedings of the 2nd international conference on future networks and distributed systems (pp. 1-9).