Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information

被引:36
|
作者
Anderson, Chad [1 ]
Baskerville, Richard L. [2 ,3 ]
Kaul, Mala [4 ]
机构
[1] Northern Kentucky Univ, Business & Hlth Informat, Highland Hts, KY 41076 USA
[2] Georgia State Univ, Dept Comp Informat Syst, Robinson Coll Business, Atlanta, GA 30303 USA
[3] Curtin Univ, Sch Informat Syst, Perth, WA, Australia
[4] Univ Nevada, Coll Business, Informat Syst, Reno, NV 89557 USA
关键词
ethical control; health care; health information exchange; information security; security control theory; security exposure control; security policy development; HEALTH-CARE; SYSTEMS; POLICY; DEFENSE; RISK; INTEGRATION; CHALLENGES; LEADERSHIP; BARRIERS; EXCHANGE;
D O I
10.1080/07421222.2017.1394063
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Contemporary organizations operate in highly interconnected environments where they are frequently confronted by the challenge of balancing the protection of information resources with the need for sharing information. This tension between the expected benefits and the potential security risks inherent in the information sharing process, exists in many domains, including business, health care, law enforcement, and military-yet it is not well-understood. We propose an information security control theory to explain and manage this tension. We evaluate this theory through a longitudinal case study of the iterative development of the information security policies for a health information exchange in the western United States. Our study shows that the theory offers a good framework through which to understand the information security policy development process, and a way to reconcile the tension between information sharing and information protection. The theory has practical applicability to many business domains.
引用
收藏
页码:1082 / 1112
页数:31
相关论文
共 50 条
  • [21] Protecting Privacy in an Information Age: The Problem of Privacy in Public
    Helen Nissenbaum
    Law and Philosophy, 1998, 17 : 559 - 596
  • [22] Protecting privacy in an information age: The problem of privacy in public
    Nissenbaum, H
    LAW AND PHILOSOPHY, 1998, 17 (5-6) : 559 - 596
  • [23] Adaptive Information Security and Privacy
    Nuseibeh, Bashar
    2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2017, : 17 - 17
  • [24] Security and privacy in the information economy
    Feigenbaum, J
    Rudich, S
    Blaze, M
    McCurley, K
    PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 1997, 94 (07) : 2789 - 2792
  • [25] Privacy and security of medical information
    Jobes, KE
    White, ER
    Antonelli, PJ
    OTOLARYNGOLOGIC CLINICS OF NORTH AMERICA, 2002, 35 (06) : 1203 - +
  • [26] Advances in Information Security and Privacy
    Lax, Gianluca
    Russo, Antonia
    APPLIED SCIENCES-BASEL, 2022, 12 (16):
  • [27] Evaluating the Balance Between Privacy and Access in Digital Information Sharing
    Beesley, Sarah J.
    Powell, Alex
    Groat, Danielle
    Butler, Jorie
    Hopkins, Ramona O.
    Rozenblum, Ronen
    Aboumatar, Hanan
    Butler, Allison M.
    Sugarman, Jeremy
    Francis, Leslie
    Brown, Samuel M.
    CRITICAL CARE MEDICINE, 2022, 50 (02) : E109 - E116
  • [28] Achieving information flow security through monadic control of effects
    Harrison, William L.
    Hook, James
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (05) : 599 - 653
  • [29] Achieving information flow security through precise control of effects
    Harrison, WL
    Hook, J
    18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 16 - 30
  • [30] Sharing information with heightened security
    Schoenberg, S
    INTECH, 2001, 48 (11) : 84 - 84