Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information

被引:36
|
作者
Anderson, Chad [1 ]
Baskerville, Richard L. [2 ,3 ]
Kaul, Mala [4 ]
机构
[1] Northern Kentucky Univ, Business & Hlth Informat, Highland Hts, KY 41076 USA
[2] Georgia State Univ, Dept Comp Informat Syst, Robinson Coll Business, Atlanta, GA 30303 USA
[3] Curtin Univ, Sch Informat Syst, Perth, WA, Australia
[4] Univ Nevada, Coll Business, Informat Syst, Reno, NV 89557 USA
关键词
ethical control; health care; health information exchange; information security; security control theory; security exposure control; security policy development; HEALTH-CARE; SYSTEMS; POLICY; DEFENSE; RISK; INTEGRATION; CHALLENGES; LEADERSHIP; BARRIERS; EXCHANGE;
D O I
10.1080/07421222.2017.1394063
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Contemporary organizations operate in highly interconnected environments where they are frequently confronted by the challenge of balancing the protection of information resources with the need for sharing information. This tension between the expected benefits and the potential security risks inherent in the information sharing process, exists in many domains, including business, health care, law enforcement, and military-yet it is not well-understood. We propose an information security control theory to explain and manage this tension. We evaluate this theory through a longitudinal case study of the iterative development of the information security policies for a health information exchange in the western United States. Our study shows that the theory offers a good framework through which to understand the information security policy development process, and a way to reconcile the tension between information sharing and information protection. The theory has practical applicability to many business domains.
引用
收藏
页码:1082 / 1112
页数:31
相关论文
共 50 条
  • [1] Privacy and Security - Protecting Patients' Health Information
    Hoffman, Sharona
    NEW ENGLAND JOURNAL OF MEDICINE, 2022, 387 (21): : 1913 - 1916
  • [2] Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing
    Loehr, Hans
    Sadeghi, Ahmad-Reza
    Vishik, Claire
    Winandy, Marcel
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 396 - +
  • [3] PROTECTING PRIVACY IN THE INFORMATION AGE
    TRUBOW, GB
    IEEE SOFTWARE, 1992, 9 (03) : 106 - 107
  • [4] Dealing with Privacy for Protecting Information
    Larrucea, Xabier
    Santamaria, Izaskun
    SYSTEMS, SOFTWARE AND SERVICES PROCESS IMPROVEMENT, EUROSPI 2021, 2021, 1442 : 518 - 530
  • [5] Information security and privacy
    Pieprzyk, J
    Safavi-Naini, R
    AUSTRALIAN COMPUTER JOURNAL, 1999, 31 (02): : 33 - 33
  • [6] INFORMATION SECURITY AND PRIVACY
    Bui, Tung
    Clemons, Eric
    Streff, Kevin
    PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 4702 - 4702
  • [7] Linking information reconciliation and privacy amplification
    Christian Cachin
    Ueli M. Maurer
    Journal of Cryptology, 1997, 10 : 97 - 110
  • [8] Linking information reconciliation and privacy amplification
    Cachin, C
    Maurer, UM
    JOURNAL OF CRYPTOLOGY, 1997, 10 (02) : 97 - 110
  • [9] Information security and sharing
    Liddy, E.
    Online (Wilton, Connecticut), 2001, 25 (03):
  • [10] Information security and sharing
    Liddy, E
    ONLINE, 2001, 25 (03): : 28 - 30