Skip to main content
Erschienen in:
Buchtitelbild

2017 | OriginalPaper | Buchkapitel

1. Information Sharing and Risk Management

verfasst von : Xinbao Liu, Jun Pei, Lin Liu, Hao Cheng, Mi Zhou, Panos M. Pardalos

Erschienen in: Optimization and Management in Manufacturing Engineering

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The manufacturing industry plays an important role in the economy and society. In traditional environment, the manufacturing industry is at a standstill or even in recession in the United States [1]. Thus, it is crucial to identify new drivers to boost the manufacturing industry. In recent years, the development of Internet of Things (IoT) has brought a great opportunity as well as a challenge for modern manufacturing enterprises. The application of IoT in manufacturing industry not only brings economic benefits for manufacturing enterprises, but also promotes the upstream and downstream industries. Unfortunately, the employment of the wireless transmission technologies in the IoT environment also introduces significant information security issues.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bi, Z., Xu, L.D., Wang, C.: Internet of things for enterprise systems of modern manufacturing. IEEE Trans. Ind. Inform. 10, 1537–1546 (2014)CrossRef Bi, Z., Xu, L.D., Wang, C.: Internet of things for enterprise systems of modern manufacturing. IEEE Trans. Ind. Inform. 10, 1537–1546 (2014)CrossRef
2.
Zurück zum Zitat Houyou, A.M., Huth, H.P., Kloukinas, C., Trsek, H., Rotondi, D.: Agile manufacturing: general challenges and an IoT@Work perspective. In: Proceedings of 2012 I.E. 17th International Conference on Emerging Technologies & Factory Automation, pp. 1–7 (2012) Houyou, A.M., Huth, H.P., Kloukinas, C., Trsek, H., Rotondi, D.: Agile manufacturing: general challenges and an IoT@Work perspective. In: Proceedings of 2012 I.E. 17th International Conference on Emerging Technologies & Factory Automation, pp. 1–7 (2012)
3.
Zurück zum Zitat Qian, X., Liu, X., Yang, S., Zuo, C.: Security and privacy analysis of tree-LSHB+ protocol. Wirel. Pers. Commun. 77, 3125–3141 (2014)CrossRef Qian, X., Liu, X., Yang, S., Zuo, C.: Security and privacy analysis of tree-LSHB+ protocol. Wirel. Pers. Commun. 77, 3125–3141 (2014)CrossRef
4.
Zurück zum Zitat Anderson, R.: Why information security is hard—an economic perspective. In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC’01), IEEE, pp. 358–365 (2001) Anderson, R.: Why information security is hard—an economic perspective. In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC’01), IEEE, pp. 358–365 (2001)
5.
Zurück zum Zitat Anderson, R., Moore, T.: The economics of information security. Science. 314, 610–613 (2006)CrossRef Anderson, R., Moore, T.: The economics of information security. Science. 314, 610–613 (2006)CrossRef
6.
Zurück zum Zitat Gordon, L., Loeb, M.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5, 438–457 (2002)CrossRef Gordon, L., Loeb, M.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5, 438–457 (2002)CrossRef
7.
Zurück zum Zitat Shirtz, D., Elovici, Y.: Optimizing investment decisions in selecting information security remedies. Inf. Manag. Comput. Secur. 19, 95–112 (2011)CrossRef Shirtz, D., Elovici, Y.: Optimizing investment decisions in selecting information security remedies. Inf. Manag. Comput. Secur. 19, 95–112 (2011)CrossRef
8.
Zurück zum Zitat Huang, C.D., Behara, R.S.: Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints. Int. J. Prod. Econ. 141, 255–268 (2013)CrossRef Huang, C.D., Behara, R.S.: Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints. Int. J. Prod. Econ. 141, 255–268 (2013)CrossRef
9.
Zurück zum Zitat Wu, Y., Feng, G., Wang, N., Liang, H.: Game of information security investment: impact of attack types and network vulnerability. Expert Syst. Appl. 42, 6132–6146 (2015)CrossRef Wu, Y., Feng, G., Wang, N., Liang, H.: Game of information security investment: impact of attack types and network vulnerability. Expert Syst. Appl. 42, 6132–6146 (2015)CrossRef
10.
Zurück zum Zitat Kong, H.K., Kim, T.S., Kim, J.: An analysis on effects of information security investments: a BSC perspective. J. Intell. Manuf. 23, 941–953 (2012)CrossRef Kong, H.K., Kim, T.S., Kim, J.: An analysis on effects of information security investments: a BSC perspective. J. Intell. Manuf. 23, 941–953 (2012)CrossRef
11.
Zurück zum Zitat Khouzani, M.H.R., Sen, S., Shroff, N.B.: An Economic Analysis of Regulating Security Investments in the Internet, 2013 Proceedings IEEE INFOCOM, pp. 818–826 (2013) Khouzani, M.H.R., Sen, S., Shroff, N.B.: An Economic Analysis of Regulating Security Investments in the Internet, 2013 Proceedings IEEE INFOCOM, pp. 818–826 (2013)
12.
Zurück zum Zitat Huang, C.D., Hu, Q., Behara, R.S.: An economic analysis of the optimal information security investment in the case of a risk-averse firm. Int. J. Prod. Econ. 114, 793–804 (2008)CrossRef Huang, C.D., Hu, Q., Behara, R.S.: An economic analysis of the optimal information security investment in the case of a risk-averse firm. Int. J. Prod. Econ. 114, 793–804 (2008)CrossRef
13.
Zurück zum Zitat Bojanc, R., Jerman-Blažič, B.: An economic modelling approach to information security risk management. Int. J. Inf. Manag. 28, 413–422 (2008)CrossRef Bojanc, R., Jerman-Blažič, B.: An economic modelling approach to information security risk management. Int. J. Inf. Manag. 28, 413–422 (2008)CrossRef
14.
Zurück zum Zitat Bojanc, R., Jerman-Blažič, B., Tekavčič, M.: Managing the investment in information security technology by use of a quantitative modeling. Inf. Process. Manag. 48, 1031–1052 (2012)CrossRef Bojanc, R., Jerman-Blažič, B., Tekavčič, M.: Managing the investment in information security technology by use of a quantitative modeling. Inf. Process. Manag. 48, 1031–1052 (2012)CrossRef
15.
Zurück zum Zitat Lelarge, M.: Coordination in network security games: a monotone comparative statics approach. IEEE J. Sel. Areas Commun. 30, 2210–2219 (2012)CrossRef Lelarge, M.: Coordination in network security games: a monotone comparative statics approach. IEEE J. Sel. Areas Commun. 30, 2210–2219 (2012)CrossRef
16.
Zurück zum Zitat Chai, S., Kim, M., Rao, H.R.: Firms’ information security investment decisions: stock market evidence of investors’ behavior. Decis. Support. Syst. 50, 651–661 (2011)CrossRef Chai, S., Kim, M., Rao, H.R.: Firms’ information security investment decisions: stock market evidence of investors’ behavior. Decis. Support. Syst. 50, 651–661 (2011)CrossRef
17.
Zurück zum Zitat Bandyopadhyay, T., Jacob, V., Raghunathan, S.: Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest. Inf. Technol. Manag. 11, 7–23 (2010)CrossRef Bandyopadhyay, T., Jacob, V., Raghunathan, S.: Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest. Inf. Technol. Manag. 11, 7–23 (2010)CrossRef
18.
Zurück zum Zitat Eisenga, A., Jones, T.L., Rodriguez, W.: Investing in IT security: how to determine the maximum threshold. Int. J. Inf. Secur. Priv. 6, 75–87 (2012)CrossRef Eisenga, A., Jones, T.L., Rodriguez, W.: Investing in IT security: how to determine the maximum threshold. Int. J. Inf. Secur. Priv. 6, 75–87 (2012)CrossRef
19.
Zurück zum Zitat Huang, C.D., Behara, R.S., Goo, J.: Optimal information security investment in a healthcare information exchange: an economic analysis. Decis. Support. Syst. 61, 1–11 (2014)CrossRef Huang, C.D., Behara, R.S., Goo, J.: Optimal information security investment in a healthcare information exchange: an economic analysis. Decis. Support. Syst. 61, 1–11 (2014)CrossRef
20.
Zurück zum Zitat Lee, Y.J., Kauffman, R.J., Sougstad, R.: Profit-maximizing firm investments in customer information security. Decis. Support. Syst. 51, 904–920 (2011)CrossRef Lee, Y.J., Kauffman, R.J., Sougstad, R.: Profit-maximizing firm investments in customer information security. Decis. Support. Syst. 51, 904–920 (2011)CrossRef
21.
Zurück zum Zitat Wang, S., Chen, J., Stirpe, P.A., Hong, T.: Risk-neutral evaluation of information security investment on data centers. J. Intell. Inf. Syst. 36, 329–345 (2011)CrossRef Wang, S., Chen, J., Stirpe, P.A., Hong, T.: Risk-neutral evaluation of information security investment on data centers. J. Intell. Inf. Syst. 36, 329–345 (2011)CrossRef
22.
Zurück zum Zitat Gordon, L.A., Loeb, M.P., Lucyshyn, W.: Sharing information on computer systems security: an economic analysis. J. Account. Public Policy. 22, 461–485 (2003)CrossRef Gordon, L.A., Loeb, M.P., Lucyshyn, W.: Sharing information on computer systems security: an economic analysis. J. Account. Public Policy. 22, 461–485 (2003)CrossRef
23.
Zurück zum Zitat Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Inf. Syst. Res. 16, 186–208 (2005)CrossRef Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Inf. Syst. Res. 16, 186–208 (2005)CrossRef
24.
Zurück zum Zitat Hausken, K.: Information sharing among firms and cyber attacks. J. Account. Public Policy. 26, 639–688 (2007)CrossRef Hausken, K.: Information sharing among firms and cyber attacks. J. Account. Public Policy. 26, 639–688 (2007)CrossRef
25.
Zurück zum Zitat Liu, D., Ji, Y., Mookerjee, V.: Knowledge sharing and investment decisions in information security. Decis. Support. Syst. 52, 95–107 (2011)CrossRef Liu, D., Ji, Y., Mookerjee, V.: Knowledge sharing and investment decisions in information security. Decis. Support. Syst. 52, 95–107 (2011)CrossRef
26.
Zurück zum Zitat Gao, X., Zhong, W., Mei, S.: A game-theoretic analysis of information sharing and security investment for complementary firms. J. Oper. Res. Soc. 65, 1682–1691 (2014)CrossRef Gao, X., Zhong, W., Mei, S.: A game-theoretic analysis of information sharing and security investment for complementary firms. J. Oper. Res. Soc. 65, 1682–1691 (2014)CrossRef
27.
Zurück zum Zitat Gao, X., Zhong, W., Mei, S.: Security investment and information sharing under an alternative security breach probability function. Inf. Syst. Front. 17, 423–438 (2015)CrossRef Gao, X., Zhong, W., Mei, S.: Security investment and information sharing under an alternative security breach probability function. Inf. Syst. Front. 17, 423–438 (2015)CrossRef
Metadaten
Titel
Information Sharing and Risk Management
verfasst von
Xinbao Liu
Jun Pei
Lin Liu
Hao Cheng
Mi Zhou
Panos M. Pardalos
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-64568-1_1