Abstract
As data breaches become an increasingly common risk, they are now a matter of “when” rather than “if.” While there has been active research on breaches, much of the work has focused on the antecedents and prevention of breaches, leaving the quantitative ramifications and variations in breach impact relatively unexplored. To address this gap, our study quantifies the impact of breaches on operational performance and identifies how operational, technological, and market factors moderate the impact. Using a quasi-experimental design with a difference-in-differences technique and propensity score matching, we analyzed a matched sample of 1,766 US hospitals, consisting of 883 breached hospitals and their non-breached peers from 2010 to 2017. We find that breached hospitals experience a 2.1% reduction in hospital admissions and a 0.28% decrease in market share. Moreover, network affiliation, decentralized governance, and cloud-based information technology services negatively moderate breach impacts, while IT security systems for detection, identity governance, and recovery provide mitigating effects. Additionally, we find that breaches in one hospital spillover to affect non-breached hospitals in the same local market. Our findings contribute to the operations management and security literature and provide managerial insights for enhancing breach resilience. Understanding these moderating factors can help hospital managers and policymakers formulate tailored mitigation strategies.
Get full access to this article
View all access options for this article.
References
Supplementary Material
Please find the following supplemental material available below.
For Open Access articles published under a Creative Commons License, all supplemental material carries the same license as the article it is associated with.
For non-Open Access articles published, all supplemental material carries a non-exclusive license, and permission requests for re-use of supplemental material or any part of supplemental material shall be sent directly to the copyright owner as specified in the copyright notice associated with the article.
