Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information

被引:36
|
作者
Anderson, Chad [1 ]
Baskerville, Richard L. [2 ,3 ]
Kaul, Mala [4 ]
机构
[1] Northern Kentucky Univ, Business & Hlth Informat, Highland Hts, KY 41076 USA
[2] Georgia State Univ, Dept Comp Informat Syst, Robinson Coll Business, Atlanta, GA 30303 USA
[3] Curtin Univ, Sch Informat Syst, Perth, WA, Australia
[4] Univ Nevada, Coll Business, Informat Syst, Reno, NV 89557 USA
关键词
ethical control; health care; health information exchange; information security; security control theory; security exposure control; security policy development; HEALTH-CARE; SYSTEMS; POLICY; DEFENSE; RISK; INTEGRATION; CHALLENGES; LEADERSHIP; BARRIERS; EXCHANGE;
D O I
10.1080/07421222.2017.1394063
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Contemporary organizations operate in highly interconnected environments where they are frequently confronted by the challenge of balancing the protection of information resources with the need for sharing information. This tension between the expected benefits and the potential security risks inherent in the information sharing process, exists in many domains, including business, health care, law enforcement, and military-yet it is not well-understood. We propose an information security control theory to explain and manage this tension. We evaluate this theory through a longitudinal case study of the iterative development of the information security policies for a health information exchange in the western United States. Our study shows that the theory offers a good framework through which to understand the information security policy development process, and a way to reconcile the tension between information sharing and information protection. The theory has practical applicability to many business domains.
引用
收藏
页码:1082 / 1112
页数:31
相关论文
共 50 条
  • [41] Information and medical ethics: Protecting patient privacy
    Cushman, R
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 1996, 15 (03) : 32 - 39
  • [42] Choice or consequences: Protecting privacy in commercial information
    Beales, J. Howard, III
    Muris, Timothy J.
    UNIVERSITY OF CHICAGO LAW REVIEW, 2008, 75 (01): : 109 - 135
  • [43] Optimal policies for information sharing in information system security
    Solak, Senay
    Zhuo, Yueran
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2020, 284 (03) : 934 - 950
  • [44] Security grid technology based on information security control theory
    Yuan, Jia-Bin
    Gu, Kai-Kai
    Yao, Li
    Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2007, 31 (04): : 422 - 425
  • [45] Psychological information: Protecting the right to privacy.
    Stobart, K
    JOURNAL OF ANALYTICAL PSYCHOLOGY, 2003, 48 (03) : 394 - 395
  • [46] Simple and tight bounds for information reconciliation and privacy amplification
    Renner, R
    Wolf, S
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 199 - 216
  • [47] Protecting personal information online: A survey of user privacy concerns and control techniques
    Chen, KC
    Rea, AI
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2004, 44 (04) : 85 - 92
  • [48] Protecting Information Sharing in Distributed Collaborative Environment
    Li, Min
    Wang, Hua
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, 2008, 4977 : 192 - 200
  • [49] A SECURE AND PRIVACY-PROTECTING PROTOCOL FOR TRANSMITTING PERSONAL INFORMATION BETWEEN ORGANIZATIONS
    CHAUM, D
    EVERTSE, JH
    LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 118 - 167
  • [50] Security and privacy in emerging information technologies
    Lin, Xiaodong
    Liu, Jianwei
    Gritzalis, Stefanos
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (01) : 1 - 2