An economic mechanism to manage operational security risks for inter-organizational information systems

被引:13
作者
Fang, Fang [1 ]
Parameswaran, Manoj [2 ]
Zhao, Xia [3 ]
Whinston, Andrew B. [4 ]
机构
[1] Calif State Univ San Marcos, Dept ISOM, San Marcos, CA 92096 USA
[2] Univ Washington, Dept ISOM, Seattle, WA 98195 USA
[3] Univ N Carolina, Dept ISOM, Greensboro, NC 27402 USA
[4] Univ Texas Austin, Dept IROM, Austin, TX 78712 USA
基金
美国国家科学基金会;
关键词
Inter-organizational information systems; Information security; Risk management; Economics of information systems; Economic mechanisms; ELECTRONIC DATA INTERCHANGE; INTERNET; MARKET; MODEL;
D O I
10.1007/s10796-012-9348-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As organizations increasingly deploy Inter-organizational Information Systems (IOS), the interdependent security risk they add is a problem affecting market efficiency. Connected organizations become part of entire networks, and are subject to threats from the entire network; but members' security profile information is private, members lack incentives to minimize impact on peers and are not accountable. We model the problem as a signaling-screening game, and outline an incentive mechanism that addresses these problems. Our mechanism proposes formation of secure communities of organizations anchored by Security Compliance Consortium (SCC), with members held accountable to the community for security failures. We study the interconnection decisions with and without the mechanism, and characterize conditions where the mechanism plays roles of addressing moral hazard and hidden information issues by screening the organizations' security types and/or by providing them incentives to improve. We also discuss the welfare gains and the broad impact of the mechanism.
引用
收藏
页码:399 / 416
页数:18
相关论文
共 29 条
[1]  
[Anonymous], 1992, Microeconomic analysis
[2]  
Bakos Y., 1997, INFORM SYST RES, V8, P321
[3]   Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest [J].
Bandyopadhyay, Tridib ;
Jacob, Varghese ;
Raghunathan, Srinivasan .
INFORMATION TECHNOLOGY & MANAGEMENT, 2010, 11 (01) :7-23
[4]   An economic analysis of the introduction of an electronic data interchange system [J].
Barua, A ;
Lee, B .
INFORMATION SYSTEMS RESEARCH, 1997, 8 (04) :398-422
[5]   The value of intrusion detection systems in information technology security architecture [J].
Cavusoglu, H ;
Mishra, B ;
Raghunathan, S .
INFORMATION SYSTEMS RESEARCH, 2005, 16 (01) :28-46
[6]  
Fang F, 2008, J ASSOC INF SYST, V9, P98
[7]   Evaluation of inter-organizational business process solutions: A conceptual model-based approach [J].
Ghattas, Johny ;
Soffer, Pnina .
INFORMATION SYSTEMS FRONTIERS, 2009, 11 (03) :273-291
[8]  
Gordon L. A., 2002, ACM Transactions on Information and Systems Security, V5, P438, DOI 10.1145/581271.581274
[9]   Economic aspects of information security: An emerging field of research [J].
Gordon, Lawrence A. ;
Loeb, Martin P. .
INFORMATION SYSTEMS FRONTIERS, 2006, 8 (05) :335-337
[10]  
Grean M., 2000, SUPPLY CHAIN INTEGRA