Introduction Customer satisfaction is a commonly used word in marketing (Wirtz & Bateson, 1995). It is an indicator of how well the goods and services provided by an organization meet or exceed customer expectations (Farris, Bendle, Pfeifer, & Reibstein, 1995). In a vibrant market where companies compete for consumers, customer satisfaction is a vital differentiator and has progressively grown to become a major component of business strategy (Gitman and McDaniel, 2005). Therefore, it is crucial for companies to manage customer satisfaction (Wirtz & Bateson, 1995). The purpose of this research is to examine and analyze user satisfaction in determining what level of security is required to reduce the risk of a security breach. Research topics covered include a survey of end users using the legacy EMR system at New York State OMH, an analysis of end user satisfaction with information security risks, needs, and technical and business skills of end users and the measures necessary to improve the functionality of systems and user performance. Customer Satisfaction Engagement research has revealed that legacy programs endure because of the risks and expenses of changing them (Lamb, 2008). Legacy replacement strategies can fail, damaging not only the reliability of the IT unit, but also management's livelihoods (Lamb, 2008). The effort and expense required to test the system and the possibility of a colossal end-user retraining program can be enormous (Lamb, 2008). Funds for upgrades are difficult to acquire because IT budgets are split between keeping things as they are and providing new features (Lamb, 2008). Some of the NASCIO Nation's Top Concerns of 2008...... middle of document ......SCIO-DigitalStatesAtRisk.pdfNYS Office of Mental Health. (January 2014). Empire State VistA: Helping bring electronic mental health records into the 21st century. OMHNews. Retrieved from http://www.omh.ny.gov/omhweb/resources/newsltr/2014/jan/information_technology.ht mlWeber, C. (2006, December). Assessing security risks in legacy systems. Cigittale. Retrieved from https://buildsecurityin.us-cert.gov/articles/best-practices/legacy-systems/assessing-security-risk-in-legacy-systemsWilliams, M. (2011, November). CIOs are looking for ways to replace legacy systems. CIOZone. Retrieved from http://www.govtech.com/policy-management/CIOs-Seek-Ways-to-Replace-Legacy-Systems.htmlWirtz, J., & Bateson, J. (1995). An experimental investigation of halo effects in service attribute satisfaction measures. International Journal of Science Industry Management , 6,84-102.
tags