Using data envelopment analysis and decision trees for efficiency analysis and recommendation of B2C controls

被引:36
作者
Lee, Sangjae [1 ]
机构
[1] Sejong Univ, Coll Business Adm, Sch Management, Seoul 143747, South Korea
关键词
B2C applications; B2C controls; Data envelopment analysis (DEA); Decision trees; Implementation of B2C applications; INFORMATION-SYSTEMS; NEURAL-NETWORK; SECURITY; DEA; INVESTMENTS;
D O I
10.1016/j.dss.2010.06.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Appropriate guidelines for controls in B2C (business-to-consumer) applications (hereafter B2C controls) should be provided such that these guidelines accomplish efficiency of controls in the context of specific system environments, given that many resources and skills are required for the implementation of such controls. This study uses a two-step process for the assessment of B2C controls, i.e., efficiency analysis and recommendation of controls. First, using a data envelopment analysis (DEA) model, the study analyzes the efficiency of B2C controls installed by three groups of organizations: financial firms, retail firms, and information service providers. The B2C controls are composed of controls for system continuity, access controls, and communication controls. DEA model uses B2C controls as input and three variables of implementation of B2C applications, i.e., volume, sophistication, and information contents as output. Second, decision trees are used to determine efficient firms and generate rules for recommending levels of controls. The results of the investigation of the DEA model indicate that retail firms and information service providers implement B2C controls more efficiently than financial firms do. Controls for system continuity are implemented more efficiently than access controls. In financial firms, controls for system continuity, communication controls, and access controls, in a descending order, are efficiently adopted in B2C applications. Every company can determine its relative level of reduction in each component of controls in order to make the control system efficient. The firms that efficiently implement B2C controls are determined using a decision tree model. The decision tree model is further used to recommend the level of controls and suggest rules for controls recommendation. This suggests the possibility of using decision trees for controls assessment in B2C applications. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:486 / 497
页数:12
相关论文
共 37 条
[1]  
Anderson K., 2008, Information Systems Control Journal, V3, P51
[2]   Exploring the characteristics of Internet security breaches that impact the market value of breached firms [J].
Andoh-Baidoo, Francis K. ;
Osei-Bryson, Kweku-Muata .
EXPERT SYSTEMS WITH APPLICATIONS, 2007, 32 (03) :703-725
[3]  
BAKMAN A, 2007, INFORM SYSTEMS CONTR, V5, P37
[4]  
BAKSHI S, 2004, INFORM SYSTEMS CONTR, V1, P55
[5]  
BERNSTEIN A, IS0101 CEDER
[6]  
Busta B., 2006, Information Systems Control Journal, V6, P22
[7]   A model for evaluating IT security investments [J].
Cavusoglu, H ;
Mishra, B ;
Raghunathan, S .
COMMUNICATIONS OF THE ACM, 2004, 47 (07) :87-92
[8]   An integrated neural network and data envelopment analysis for supplier evaluation under incomplete information [J].
Celebi, Dilay ;
Bayraktar, Demet .
EXPERT SYSTEMS WITH APPLICATIONS, 2008, 35 (04) :1698-1710
[9]  
Cerullo M. J., 2005, Information Systems Control Journal, V1, P35
[10]  
Charnes A., 1995, Data envelopment analysis: Theory, methodology and applications