Incentive Alignment and Risk Perception: An Information Security Application

被引:8
|
作者
Farahmand, Fariborz [1 ,3 ]
Atallah, Mikhail J. [2 ]
Spafford, Eugene H. [1 ,3 ]
机构
[1] Purdue Univ, Ctr Educ & Res Informat Assurance & Secur, W Lafayette, IN 47907 USA
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[3] Purdue Univ, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
Alignment; decision-making; incentives; information security; perceptions; risk; ENOUGH;
D O I
10.1109/TEM.2012.2185801
中图分类号
F [经济];
学科分类号
02 ;
摘要
Technologies and procedures for effectively securing the enterprise in cyberspace exist, but are largely underdeployed. Reasons for this shortcoming include the neglect of the role of stakeholder perceptions in organizational reward systems, and misaligned incentives for effective allocation of resources. We present a methodology for practitioners to employ, with examples for identification of perverse incentives-situations where the interests of a manager or employee are not aligned with those of the organization-and for estimation of the damage caused by incentive misalignment. We present our revision to the risk perception model developed by Fischhoff and Slovic. We also present the results of our findings from our interviews of 42 information security executives across the U.S. about the role of risk perception and incentives in information security decisions. We discuss how to identify and to correct misalignments, to develop efficient incentive structures, and to include perceptual principles and security governance in making information security a property of the organizational environment. This research contributes to the practice and theory of information security, and has several implications for practitioners and researchers in the alignment of incentives and symmetrization of information across organizations.
引用
收藏
页码:238 / 246
页数:9
相关论文
共 50 条
  • [21] LIABILITY AND THE INCENTIVE TO OBTAIN INFORMATION ABOUT RISK
    SHAVELL, S
    [J]. JOURNAL OF LEGAL STUDIES, 1992, 21 (02): : 259 - 270
  • [22] Risk Perception and Acceptance of Information Technology Application Based on Numerical Simulation
    Deng, Dengya
    [J]. 2016 INTERNATIONAL CONFERENCE ON SMART CITY AND SYSTEMS ENGINEERING (ICSCSE), 2016, : 277 - 280
  • [23] The Application of OCTAVE in Tobacco Company's Information Security Risk Evaluation
    Yuan, Xiang Zhuo
    Na, Li
    [J]. AEIT 2012: 2012 2ND INTERNATIONAL CONFERENCE ON AEROSPACE ENGINEERING AND INFORMATION TECHNOLOGY, VOL 1, 2012, : 132 - 137
  • [24] Application of the Analytic Network Process in Risk Assessment for Information Systems Security
    Wang, Xuan
    Sun, Lele
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON COOPERATION AND PROMOTION OF INFORMATION RESOURCES IN SCIENCE AND TECHNOLOGY(COINFO 10), 2010, : 285 - 289
  • [25] A risk assessment standard and application method of computer network information security
    Sun, T.
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2018, 123 : 91 - 91
  • [26] Fuzzy Application With Expert System for Conducting Information Security Risk Analysis
    Bartos, Jiri
    Walek, Bogdan
    Klimes, Cyril
    Farana, Radim
    [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 33 - 41
  • [27] Analysis of Information Security Risk and Application Security of Cloud Computing from the Aspect of Hierarchical Protection
    Li, Zhao
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 1521 - 1526
  • [28] SECURITY AND INCENTIVE
    不详
    [J]. BRITISH MEDICAL JOURNAL, 1950, 1 (4665): : 1307 - 1308
  • [29] Alignment of misuse cases with security risk management
    Matulevicius, Raimundas
    Mayer, Nicolas
    Heymans, Patrick
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1397 - +
  • [30] Income Security and the Perception of Disability Risk
    Kawinski, Marcin
    Szumlicz, Tadeusz
    [J]. CONTEMPORARY ECONOMICS, 2021, 15 (04) : 499 - 510