메뉴 건너뛰기




Volumn 61, Issue 1, 2014, Pages 1-11

Optimal information security investment in a Healthcare Information Exchange: An economic analysis

Author keywords

Healthcare Information Exchange; Healthcare information technology; Information security; Optimal investment; Scale free network

Indexed keywords

COMPLEX NETWORKS; HEALTH CARE; HOSPITAL DATA PROCESSING; INFORMATION DISSEMINATION; INFORMATION TECHNOLOGY; INVESTMENTS; OPTIMIZATION; RISK MANAGEMENT; SECURITY OF DATA;

EID: 84897513600     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2013.10.011     Document Type: Article
Times cited : (58)

References (81)
  • 1
    • 77649185795 scopus 로고    scopus 로고
    • Paperless healthcare: Progress and challenges of an IT-enabled healthcare system
    • J. Adler-Milstein, and Bates Paperless healthcare: progress and challenges of an IT-enabled healthcare system Business Horizon 53 2010 119 130
    • (2010) Business Horizon , vol.53 , pp. 119-130
    • Adler-Milstein, J.1
  • 2
    • 65949102152 scopus 로고    scopus 로고
    • U.S. Regional health information organizations: Progress and challenges
    • J. Adler-Milstein, D.W. Bates, and A.K. Jha U.S. regional health information organizations: progress and challenges Health Affairs 28 2 2009 483 492
    • (2009) Health Affairs , vol.28 , Issue.2 , pp. 483-492
    • Adler-Milstein, J.1    Bates, D.W.2    Jha, A.K.3
  • 5
    • 0033539175 scopus 로고    scopus 로고
    • Diameter of the world-wide web
    • DOI 10.1038/43601
    • R. Albert, H. Jeong, and A.-L. Barabási Diameter of the world-wide web Nature 401 1999 130 131 (Pubitemid 29436307)
    • (1999) Nature , vol.401 , Issue.6749 , pp. 130-131
    • Albert, R.1    Jeong, H.2    Barabasi, A.-L.3
  • 6
    • 29844458140 scopus 로고    scopus 로고
    • Understanding internet topology: Principles, models, and validation
    • DOI 10.1109/TNET.2005.861250
    • D. Alderson, L. Li, W. Wallinger, and J.C. Doyle Understanding internet topology: principles, models, and validation IEEE/ACM Transactions on Networking 13 6 2005 1205 1218 (Pubitemid 43034130)
    • (2005) IEEE/ACM Transactions on Networking , vol.13 , Issue.6 , pp. 1205-1218
    • Alderson, D.1    Li, L.2    Willinger, W.3    Doyle, J.C.4
  • 7
    • 33748597348 scopus 로고    scopus 로고
    • A general, but readily adaptable model of information system risk
    • S. Alter, and S. Sherer A general, but readily adaptable model of information system risk Communications of the AIS 14 1 2004 1 28
    • (2004) Communications of the AIS , vol.14 , Issue.1 , pp. 1-28
    • Alter, S.1    Sherer, S.2
  • 8
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • DOI 10.1126/science.1130992
    • R. Anderson, and T. Moore The economics of information security Science 314 2006 610 613 (Pubitemid 44646376)
    • (2006) Science , vol.314 , Issue.5799 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 10
    • 12844261665 scopus 로고    scopus 로고
    • Measuring the risk-based value of IT security solutions
    • DOI 10.1109/MITP.2004.89
    • A. Arora, D. Hall, C.A. Pinto, D. Ramsey, and R. Telang Measuring the risk-based value of IT security solutions IT Professional 6 6 2004 35 42 (Pubitemid 40168789)
    • (2004) IT Professional , vol.6 , Issue.6 , pp. 35-42
    • Arora, A.1    Hall, D.2    Pinto, C.A.3    Ramsey, D.4    Telang, R.5
  • 11
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • A.-L. Barabási, and R. Albert Emergence of scaling in random networks Science 286 1999 509 512
    • (1999) Science , vol.286 , pp. 509-512
    • Barabási, A.-L.1    Albert, R.2
  • 12
    • 84869494686 scopus 로고    scopus 로고
    • Process-centric risk management framework for information security
    • H. Chen, T.S. Raghu, R. Ramesh, A. Vinze, D. Zeng, Elsevier The Netherlands
    • R.S. Behara, and S. Bhattacharya Process-centric risk management framework for information security H. Chen, T.S. Raghu, R. Ramesh, A. Vinze, D. Zeng, National Security 2007 Elsevier The Netherlands 349 366
    • (2007) National Security , pp. 349-366
    • Behara, R.S.1    Bhattacharya, S.2
  • 13
    • 13444274614 scopus 로고    scopus 로고
    • Evaluating information security investments using the analytic hierarchy process
    • L.D. Bodin, L.A. Gordon, and M.P. Loeb Evaluating information security investments using the analytic hierarchy process Communications of the ACM 48 2 2005 79 83
    • (2005) Communications of the ACM , vol.48 , Issue.2 , pp. 79-83
    • Bodin, L.D.1    Gordon, L.A.2    Loeb, M.P.3
  • 14
    • 39749181513 scopus 로고    scopus 로고
    • Towards a standard approach for quantifying an ICT security investment
    • DOI 10.1016/j.csi.2007.10.013, PII S0920548907000876
    • R. Bojanc, and B.J. Blazic Towards a standard approach for quantifying an ICT security investment Computer Standards & Interface 30 2008 216 222 (Pubitemid 351308028)
    • (2008) Computer Standards and Interfaces , vol.30 , Issue.4 , pp. 216-222
    • Bojanc, R.1    Jerman-Blazic, B.2
  • 16
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • DOI 10.1287/isre.1050.0041
    • H. Cavusoglu, B. Mishra, and S. Raghunathan The value of intrusion detection systems in information technology security architecture Information Systems Research 16 1 2005 28 46 (Pubitemid 40701107)
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 17
    • 84897494360 scopus 로고    scopus 로고
    • Center For Medicare And Medicaid Services (cms) available at
    • Center for Medicare and Medicaid Services (CMS) Stage 1 vs. stage 2 comparison table for eligible hospitals and CAHs available at http://www.cms.gov/Regulations-and-Guidance/Legislation/EHRIncentivePrograms/ Downloads/Stage1vsStage2CompTablesforHospitals.pdf 2012
    • (2012) Stage 1 Vs. Stage 2 Comparison Table for Eligible Hospitals and CAHs
  • 18
    • 79151484723 scopus 로고    scopus 로고
    • Form's information security investment decisions: Stock market evidence of investors' behavior
    • S. Chai, M. Kim, and H.R. Rao Form's information security investment decisions: stock market evidence of investors' behavior Decision Support Systems 50 2011 651 661
    • (2011) Decision Support Systems , vol.50 , pp. 651-661
    • Chai, S.1    Kim, M.2    Rao, H.R.3
  • 20
    • 19944417270 scopus 로고    scopus 로고
    • Infection dynamics on the Internet
    • DOI 10.1016/j.cose.2005.03.004, PII S0167404805000453
    • D.B. Chang, and C.S. Young Infection dynamics on the internet Computers & Security 24 2005 280 286 (Pubitemid 40752311)
    • (2005) Computers and Security , vol.24 , Issue.4 , pp. 280-286
    • Chang, D.B.1    Young, C.S.2
  • 22
    • 47849124657 scopus 로고    scopus 로고
    • Applying real options thinking to information security in networked organizations
    • Centre for Telematics and Information Technology, University of Twente The Netherlands
    • M. Daneva Applying real options thinking to information security in networked organizations CTIT Technical Report TR-CTIT-06-11 2006 Centre for Telematics and Information Technology, University of Twente The Netherlands
    • (2006) CTIT Technical Report TR-CTIT-06-11
    • Daneva, M.1
  • 25
    • 0033204106 scopus 로고    scopus 로고
    • On power-law relationships of the Internet topology
    • DOI 10.1145/316194.316229
    • M. Faloutsos, P. Faloutsos, and C. Faloutsos On power-law relationships of the internet topology ACM SIGCOMM Computer Communication Review 29 4 1999 251 262 (Pubitemid 32081870)
    • (1999) Computer Communication Review , vol.29 , Issue.4 , pp. 251-262
    • Faloutsos, M.1    Faloutsos, P.2    Faloutsos, C.3
  • 27
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • DOI 10.1287/isre.1050.0053
    • E. Gal-Or, and A. Ghose The economic incentives for sharing security information Information Systems Research 16 2 2005 186 208 (Pubitemid 43057222)
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Chose, A.2
  • 29
    • 4944234006 scopus 로고    scopus 로고
    • Return on information security investments: Myths vs. Realities
    • L.A. Gordon, and M.P. Loeb Return on information security investments: myths vs. realities Strategic Finance 84 5 2002 26 31
    • (2002) Strategic Finance , vol.84 , Issue.5 , pp. 26-31
    • Gordon, L.A.1    Loeb, M.P.2
  • 31
    • 0344899914 scopus 로고    scopus 로고
    • Sharing information on computer systems security: An economic analysis
    • DOI 10.1016/j.jaccpubpol.2003.09.001, PII S0278425403000632
    • L.A. Gordon, M.P. Loeb, and W. Lucyshyn Sharing information on computer systems security: an economic analysis Journal of Accounting and Public Policy 22 2003 461 485 (Pubitemid 37491796)
    • (2003) Journal of Accounting and Public Policy , vol.22 , Issue.6 , pp. 461-485
    • Gordon, L.A.1    Loeb, M.P.2    Lucyshyn, W.3
  • 34
    • 0000505726 scopus 로고
    • On a portion of the well-known collaboration graph
    • W. Grossman, and P.D.F. Ion On a portion of the well-known collaboration graph Congressus Numerantium 108 1995 129 131
    • (1995) Congressus Numerantium , vol.108 , pp. 129-131
    • Grossman, W.1    Ion, P.D.F.2
  • 35
    • 53949123562 scopus 로고    scopus 로고
    • A framework for security analysis of internet technology components enabling globally distributed workplaces
    • M. Gupta, S. Banerjee, M. Agrawal, and H.R. Rao A framework for security analysis of internet technology components enabling globally distributed workplaces ACM Transactions on Internet Technology 8 4 2008 17:2 17:38
    • (2008) ACM Transactions on Internet Technology , vol.8 , Issue.4 , pp. 172-1738
    • Gupta, M.1    Banerjee, S.2    Agrawal, M.3    Rao, H.R.4
  • 36
    • 84897491554 scopus 로고    scopus 로고
    • Hhs (department Of Health And Human Services) accessed at
    • HHS (Department of Health and Human Services) HIPPA Security Series, 1. Security 101 for Covered Entities accessed at http://www.hhs.gov/ocr/privacy/ hipaa/administrative/securityrule/security101.pdf 2007
    • (2007) HIPPA Security Series, 1. Security 101 for Covered Entities
  • 37
    • 84869508852 scopus 로고    scopus 로고
    • Economics of information security investment in the case of simultaneous attacks
    • C.D. Huang, and R.S. Behara Economics of information security investment in the case of simultaneous attacks International Journal of Production Economics 141 1 2013 255 268
    • (2013) International Journal of Production Economics , vol.141 , Issue.1 , pp. 255-268
    • Huang, C.D.1    Behara, R.S.2
  • 38
    • 46849085979 scopus 로고    scopus 로고
    • Economics of information security investment in the case of simultaneous attacks
    • C.D. Huang, Q. Hu, and R.S. Behara Economics of information security investment in the case of simultaneous attacks International Journal of Production Economics 114 2 2008 793 804
    • (2008) International Journal of Production Economics , vol.114 , Issue.2 , pp. 793-804
    • Huang, C.D.1    Hu, Q.2    Behara, R.S.3
  • 39
    • 84897535601 scopus 로고    scopus 로고
    • It Pcg (it Policy Compliance Group) accessed at
    • IT PCG (IT Policy Compliance Group) The financial benefits of spend on security accessed at http://www.itpolicycompliance.com/wp-content/uploads/2013/ 02/The-Financial-Benefits-of-Spend-on-Security-Overview.pdf 2012
    • (2012) The Financial Benefits of Spend on Security
  • 40
    • 35548990551 scopus 로고    scopus 로고
    • Security as a contributor to knowledge management success
    • DOI 10.1007/s10796-007-9053-4
    • M.E. Jennex, and S. Zyngier Security as a contributor to knowledge management success Information Systems Frontier 9 2007 493 504 (Pubitemid 350007344)
    • (2007) Information Systems Frontiers , vol.9 , Issue.5 , pp. 493-504
    • Jennex, M.E.1    Zyngier, S.2
  • 41
    • 0035799707 scopus 로고    scopus 로고
    • Lethality and centrality in protein networks
    • DOI 10.1038/35075138
    • H. Jeong, S. Mason, A.-L. Barabasi, and Z.N. Oltival Lethality and centrality in protein networks Nature 411 2001 41 42 (Pubitemid 32428180)
    • (2001) Nature , vol.411 , Issue.6833 , pp. 41-42
    • Jeong, H.1    Mason, S.P.2    Barabasi, A.-L.3    Oltvai, Z.N.4
  • 42
    • 84897524113 scopus 로고    scopus 로고
    • Health-care industry: Heal thyself
    • M.E. Johnson Health-care industry: heal thyself Wall Street Journal September 26 2011 http://online.wsj.com/news/articles/ SB10001424053111904716604576542380296355702.
    • (2011) Wall Street Journal
    • Johnson, M.E.1
  • 46
    • 66549103101 scopus 로고    scopus 로고
    • Understanding the value of countermeasure portfolios in information security
    • R.L. Kumar, S. Park, and C. Subramniam Understanding the value of countermeasure portfolios in information security Journal of Management Information Systems 25 20 2008 241 279
    • (2008) Journal of Management Information Systems , vol.25 , Issue.20 , pp. 241-279
    • Kumar, R.L.1    Park, S.2    Subramniam, C.3
  • 51
    • 84878838952 scopus 로고    scopus 로고
    • Contracting Information Security in the Presence of Double Moral Hazard
    • C.H. Lee, X. Geng, and S. Raghunathan Contracting Information Security in the Presence of Double Moral Hazard Information Systems Research 24 2 June 2013 295 311
    • (2013) Information Systems Research , vol.24 , Issue.2 , pp. 295-311
    • Lee, C.H.1    Geng, X.2    Raghunathan, S.3
  • 55
    • 84873139978 scopus 로고    scopus 로고
    • Managing security risk: Organization, mission, and information system view
    • National Institute Of Standards And Technology U.S. Department of Commerce
    • National Institute of Standards and Technology Managing security risk: organization, mission, and information system view NIST Special Publication 800-39 2011 U.S. Department of Commerce
    • (2011) NIST Special Publication 800-39
  • 56
    • 0038718854 scopus 로고    scopus 로고
    • The structure and function of complex networks
    • M.E.J. Newman The structure and function of complex networks SIAM Review 45 2 2003 167 256
    • (2003) SIAM Review , vol.45 , Issue.2 , pp. 167-256
    • Newman, M.E.J.1
  • 58
    • 0035794256 scopus 로고    scopus 로고
    • Epidemic spreading in scale-free networks
    • DOI 10.1103/PhysRevLett.86.3200
    • R. Pastor-Satorras, and A. Vespignani Epidemic spreading in scale-free networks Physical Review Letters 86 14 2001 3200 3203 (Pubitemid 32317894)
    • (2001) Physical Review Letters , vol.86 , Issue.14 , pp. 3200-3203
    • Pastor-Satorras, R.1    Vespignani, A.2
  • 59
    • 84894276356 scopus 로고    scopus 로고
    • (accessed 4 April 2011)
    • Ponemon Institute Benchmark study on patient privacy and data security http://www2.idexpertscorp.com/resources/healthcare/healthcare-articles- whitepapers/ponemon-benchmark-study-on-patient-data-security-practices/? utm-source=Ponemon%2BRedirect&utm-medium=Online&utm-campaign= Ponemon%2BRedirect/ November 2010 (accessed 4 April 2011)
    • (2010) Benchmark Study on Patient Privacy and Data Security
    • Institute, P.1
  • 61
    • 77949314934 scopus 로고    scopus 로고
    • How popular is your paper? An empirical study of the citation distribution
    • S. Redner How popular is your paper? An empirical study of the citation distribution European Physics Journal B 23 1998 267 271
    • (1998) European Physics Journal B , vol.23 , pp. 267-271
    • Redner, S.1
  • 62
    • 84877741992 scopus 로고    scopus 로고
    • Selection of optimal countermeasure portfolio in IT security planning
    • 10.1016/j.dss.2013.01.001
    • T. Sawik Selection of optimal countermeasure portfolio in IT security planning Decision Support Systems 2013 10.1016/j.dss.2013.01.001
    • (2013) Decision Support Systems
    • Sawik, T.1
  • 63
    • 14744281156 scopus 로고    scopus 로고
    • Toward econometric models of the security risk from remote attacks
    • DOI 10.1109/MSP.2005.30
    • S.E. Schechter Toward econometric models of the security risk from remote attacks IEEE Security & Privacy 3 1 2005 40 44 (Pubitemid 40325581)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1 , pp. 40-44
    • Schechter, S.E.1
  • 64
    • 33846810148 scopus 로고    scopus 로고
    • Trust in health infomediaries
    • DOI 10.1016/j.dss.2006.11.011, PII S0167923606001606
    • J. Song, and F.M. Zahedi Trust in health infomediaries Decision Support Systems 43 2007 390 407 (Pubitemid 46216543)
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 390-407
    • Song, J.1    Zahedi, F..2
  • 65
    • 35549003593 scopus 로고    scopus 로고
    • An interorganizational knowledge-sharing security model with breach propagation detection
    • DOI 10.1007/s10796-007-9055-2
    • D.S. Soper, H. Demirkan, and M. Goul An interorganizational knowledge sharing security model with breach propagation detection Information Systems Frontier 9 2007 469 479 (Pubitemid 350007343)
    • (2007) Information Systems Frontiers , vol.9 , Issue.5 , pp. 469-479
    • Soper, D.S.1    Demirkan, H.2    Goul, M.3
  • 67
    • 17844396492 scopus 로고    scopus 로고
    • The economic approach of information security
    • DOI 10.1016/j.cose.2005.02.001, PII S0167404805000209
    • T. Tsiakis, and G. Stephanides The economic approach of information security Computer & Security 24 2005 105 108 (Pubitemid 40583822)
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 105-108
    • Tsiakis, T.1    Stephanides, G.2
  • 73
    • 61349180141 scopus 로고    scopus 로고
    • A value-at-risk approach to information security investment
    • J. Wang, A. Chaudhury, and H.R. Rao A value-at-risk approach to information security investment Information Systems Research 19 1 2008 106 120
    • (2008) Information Systems Research , vol.19 , Issue.1 , pp. 106-120
    • Wang, J.1    Chaudhury, A.2    Rao, H.R.3
  • 74
    • 0032482432 scopus 로고    scopus 로고
    • Collective dynamics of "small-world" networks
    • D.J. Watts, and S.H. Strogatz Collective dynamics of "small- world" networks Nature 393 1998 440 442
    • (1998) Nature , vol.393 , pp. 440-442
    • Watts, D.J.1    Strogatz, S.H.2
  • 75
    • 77949570640 scopus 로고    scopus 로고
    • A knowledgeable security model for distributed health information systems
    • L. Xiao, B. Hu, M. Croitoru, P. Lewis, and S. Dasmahapatra A knowledgeable security model for distributed health information systems Computer & Security 29 2010 331 349
    • (2010) Computer & Security , vol.29 , pp. 331-349
    • Xiao, L.1    Hu, B.2    Croitoru, M.3    Lewis, P.4    Dasmahapatra, S.5
  • 76
    • 34548477450 scopus 로고    scopus 로고
    • Network externalities, layered protection and IT security risk management
    • DOI 10.1016/j.dss.2006.08.009, PII S0167923606001217
    • W.T. Yue, M. Cakanyildirim, Y.U. Ryu, and D. Liu Network externalities, layered protection and IT security risk management Decision Support Systems 44 2007 1 16 (Pubitemid 47374296)
    • (2007) Decision Support Systems , vol.44 , Issue.1 , pp. 1-16
    • Yue, W.T.1    Cakanyildirim, M.2    Ryu, Y.U.3    Liu, D.4
  • 78
    • 33751017682 scopus 로고    scopus 로고
    • Behaviors of susceptible-infected epidemics on scale-free networks with identical infectivity
    • T. Zhou, J.G. Liu, W.J. Bai, G.C. Chen, and B. Wang Behaviors of susceptible-infected epidemics on scale-free networks with identical infectivity Physical Review E 74 2006 056109
    • (2006) Physical Review e , vol.74 , pp. 056109
    • Zhou, T.1    Liu, J.G.2    Bai, W.J.3    Chen, G.C.4    Wang, B.5
  • 79
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • DOI 10.1038/35019019
    • R. Albert, H. Jeong, and A.L. Barabási Error and Attack Tolerance of Complex Networks Nature 406 2000 378 382 (Pubitemid 30625551)
    • (2000) Nature , vol.406 , Issue.6794 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabasi, A.-L.3
  • 80
    • 84897518611 scopus 로고    scopus 로고
    • Hitech Act Three Years Later: Are Health Records Safe?
    • (Kaufman Russin & Co., 2012)
    • Kaufman Rossin & Co Hitech Act Three Years Later: Are Health Records Safe? White paper Series 2012 (Kaufman Russin & Co., 2012)
    • (2012) White Paper Series
    • Rossin, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.