Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information

被引:36
作者
Anderson, Chad [1 ]
Baskerville, Richard L. [2 ,3 ]
Kaul, Mala [4 ]
机构
[1] Northern Kentucky Univ, Business & Hlth Informat, Highland Hts, KY 41076 USA
[2] Georgia State Univ, Dept Comp Informat Syst, Robinson Coll Business, Atlanta, GA 30303 USA
[3] Curtin Univ, Sch Informat Syst, Perth, WA, Australia
[4] Univ Nevada, Coll Business, Informat Syst, Reno, NV 89557 USA
关键词
ethical control; health care; health information exchange; information security; security control theory; security exposure control; security policy development; HEALTH-CARE; SYSTEMS; POLICY; DEFENSE; RISK; INTEGRATION; CHALLENGES; LEADERSHIP; BARRIERS; EXCHANGE;
D O I
10.1080/07421222.2017.1394063
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Contemporary organizations operate in highly interconnected environments where they are frequently confronted by the challenge of balancing the protection of information resources with the need for sharing information. This tension between the expected benefits and the potential security risks inherent in the information sharing process, exists in many domains, including business, health care, law enforcement, and military-yet it is not well-understood. We propose an information security control theory to explain and manage this tension. We evaluate this theory through a longitudinal case study of the iterative development of the information security policies for a health information exchange in the western United States. Our study shows that the theory offers a good framework through which to understand the information security policy development process, and a way to reconcile the tension between information sharing and information protection. The theory has practical applicability to many business domains.
引用
收藏
页码:1082 / 1112
页数:31
相关论文
共 75 条
  • [1] [Anonymous], 1993, Decisions with Multiple Objectives
  • [2] [Anonymous], 2016, Healthcare IT News
  • [3] [Anonymous], MED DAT BREACH COM H
  • [4] [Anonymous], 1979, MULTIPE OBJECTIVE DE
  • [5] [Anonymous], 2002, Managing Information Security Risks: The OCTAVE Approach
  • [6] [Anonymous], BREACH REP 2016 PROT
  • [7] [Anonymous], 2015 CYB ATT SETTL A
  • [8] [Anonymous], 2006, INFORM MANAGEMENT CO
  • [9] [Anonymous], EXP 3 ANN 2016 DAT B
  • [10] [Anonymous], DIG TRUST AR YOU ON