Information Sharing and Risk Management

  • Xinbao Liu
  • Jun Pei
  • Lin Liu
  • Hao Cheng
  • Mi Zhou
  • Panos M. Pardalos
Chapter
Part of the Springer Optimization and Its Applications book series (SOIA, volume 126)

Abstract

The manufacturing industry plays an important role in the economy and society. In traditional environment, the manufacturing industry is at a standstill or even in recession in the United States [1]. Thus, it is crucial to identify new drivers to boost the manufacturing industry. In recent years, the development of Internet of Things (IoT) has brought a great opportunity as well as a challenge for modern manufacturing enterprises. The application of IoT in manufacturing industry not only brings economic benefits for manufacturing enterprises, but also promotes the upstream and downstream industries. Unfortunately, the employment of the wireless transmission technologies in the IoT environment also introduces significant information security issues.

References

  1. 1.
    Bi, Z., Xu, L.D., Wang, C.: Internet of things for enterprise systems of modern manufacturing. IEEE Trans. Ind. Inform. 10, 1537–1546 (2014)CrossRefGoogle Scholar
  2. 2.
    Houyou, A.M., Huth, H.P., Kloukinas, C., Trsek, H., Rotondi, D.: Agile manufacturing: general challenges and an IoT@Work perspective. In: Proceedings of 2012 I.E. 17th International Conference on Emerging Technologies & Factory Automation, pp. 1–7 (2012)Google Scholar
  3. 3.
    Qian, X., Liu, X., Yang, S., Zuo, C.: Security and privacy analysis of tree-LSHB+ protocol. Wirel. Pers. Commun. 77, 3125–3141 (2014)CrossRefGoogle Scholar
  4. 4.
    Anderson, R.: Why information security is hard—an economic perspective. In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC’01), IEEE, pp. 358–365 (2001)Google Scholar
  5. 5.
    Anderson, R., Moore, T.: The economics of information security. Science. 314, 610–613 (2006)CrossRefGoogle Scholar
  6. 6.
    Gordon, L., Loeb, M.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5, 438–457 (2002)CrossRefGoogle Scholar
  7. 7.
    Shirtz, D., Elovici, Y.: Optimizing investment decisions in selecting information security remedies. Inf. Manag. Comput. Secur. 19, 95–112 (2011)CrossRefGoogle Scholar
  8. 8.
    Huang, C.D., Behara, R.S.: Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints. Int. J. Prod. Econ. 141, 255–268 (2013)CrossRefGoogle Scholar
  9. 9.
    Wu, Y., Feng, G., Wang, N., Liang, H.: Game of information security investment: impact of attack types and network vulnerability. Expert Syst. Appl. 42, 6132–6146 (2015)CrossRefGoogle Scholar
  10. 10.
    Kong, H.K., Kim, T.S., Kim, J.: An analysis on effects of information security investments: a BSC perspective. J. Intell. Manuf. 23, 941–953 (2012)CrossRefGoogle Scholar
  11. 11.
    Khouzani, M.H.R., Sen, S., Shroff, N.B.: An Economic Analysis of Regulating Security Investments in the Internet, 2013 Proceedings IEEE INFOCOM, pp. 818–826 (2013)Google Scholar
  12. 12.
    Huang, C.D., Hu, Q., Behara, R.S.: An economic analysis of the optimal information security investment in the case of a risk-averse firm. Int. J. Prod. Econ. 114, 793–804 (2008)CrossRefGoogle Scholar
  13. 13.
    Bojanc, R., Jerman-Blažič, B.: An economic modelling approach to information security risk management. Int. J. Inf. Manag. 28, 413–422 (2008)CrossRefGoogle Scholar
  14. 14.
    Bojanc, R., Jerman-Blažič, B., Tekavčič, M.: Managing the investment in information security technology by use of a quantitative modeling. Inf. Process. Manag. 48, 1031–1052 (2012)CrossRefGoogle Scholar
  15. 15.
    Lelarge, M.: Coordination in network security games: a monotone comparative statics approach. IEEE J. Sel. Areas Commun. 30, 2210–2219 (2012)CrossRefGoogle Scholar
  16. 16.
    Chai, S., Kim, M., Rao, H.R.: Firms’ information security investment decisions: stock market evidence of investors’ behavior. Decis. Support. Syst. 50, 651–661 (2011)CrossRefGoogle Scholar
  17. 17.
    Bandyopadhyay, T., Jacob, V., Raghunathan, S.: Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest. Inf. Technol. Manag. 11, 7–23 (2010)CrossRefGoogle Scholar
  18. 18.
    Eisenga, A., Jones, T.L., Rodriguez, W.: Investing in IT security: how to determine the maximum threshold. Int. J. Inf. Secur. Priv. 6, 75–87 (2012)CrossRefGoogle Scholar
  19. 19.
    Huang, C.D., Behara, R.S., Goo, J.: Optimal information security investment in a healthcare information exchange: an economic analysis. Decis. Support. Syst. 61, 1–11 (2014)CrossRefGoogle Scholar
  20. 20.
    Lee, Y.J., Kauffman, R.J., Sougstad, R.: Profit-maximizing firm investments in customer information security. Decis. Support. Syst. 51, 904–920 (2011)CrossRefGoogle Scholar
  21. 21.
    Wang, S., Chen, J., Stirpe, P.A., Hong, T.: Risk-neutral evaluation of information security investment on data centers. J. Intell. Inf. Syst. 36, 329–345 (2011)CrossRefGoogle Scholar
  22. 22.
    Gordon, L.A., Loeb, M.P., Lucyshyn, W.: Sharing information on computer systems security: an economic analysis. J. Account. Public Policy. 22, 461–485 (2003)CrossRefGoogle Scholar
  23. 23.
    Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Inf. Syst. Res. 16, 186–208 (2005)CrossRefGoogle Scholar
  24. 24.
    Hausken, K.: Information sharing among firms and cyber attacks. J. Account. Public Policy. 26, 639–688 (2007)CrossRefGoogle Scholar
  25. 25.
    Liu, D., Ji, Y., Mookerjee, V.: Knowledge sharing and investment decisions in information security. Decis. Support. Syst. 52, 95–107 (2011)CrossRefGoogle Scholar
  26. 26.
    Gao, X., Zhong, W., Mei, S.: A game-theoretic analysis of information sharing and security investment for complementary firms. J. Oper. Res. Soc. 65, 1682–1691 (2014)CrossRefGoogle Scholar
  27. 27.
    Gao, X., Zhong, W., Mei, S.: Security investment and information sharing under an alternative security breach probability function. Inf. Syst. Front. 17, 423–438 (2015)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Xinbao Liu
    • 1
  • Jun Pei
    • 1
  • Lin Liu
    • 1
  • Hao Cheng
    • 1
  • Mi Zhou
    • 1
  • Panos M. Pardalos
    • 2
  1. 1.School of ManagementHefei University of TechnologyHefeiChina
  2. 2.Department of Industrial and Systems EngineeringUniversity of FloridaGainesvilleUSA

Personalised recommendations