Elsevier

Decision Support Systems

Volume 51, Issue 4, November 2011, Pages 904-920
Decision Support Systems

Profit-maximizing firm investments in customer information security

https://doi.org/10.1016/j.dss.2011.02.009Get rights and content

Abstract

When a customer interacts with a firm, extensive personal information often is gathered without the individual's knowledge. Significant risks are associated with handling this kind of information. Providing protection may reduce the risk of the loss and misuse of private information, but it imposes some costs on both the firm and its customers. Nevertheless, customer information security breaches still may occur. They have several distinguishing characteristics: (1) typically it is hard to quantify monetary damages related to them; (2) customer information security breaches may be caused by intentional attacks, as well as through unintentional organizational and customer behaviors; and (3) the frequency of such incidents typically is low, although they can be very costly when they occur. As a result, predictive models and explanatory statistical analysis using historical data have not been effective. We present a profit optimization model for customer information security investments. Our approach is based on value-at-risk methods and operational risk modeling from financial economics. The main results of this work are that we: (1) provide guidance on the trade-offs between risk and return in customer information security investments; (2) define the range of efficient investments in technology-supported risk indemnification for sellers; (3) model how to handle government-dictated levels of investment versus self-regulation of investments in technology; and (4) characterize customer information security investment levels when the firm is able to pass some of its costs on to consumers. We illustrate our theoretical findings with empirical data from the Open Security Foundation, as a means of grounding our analysis and offering the reader intuition for the managerial interpretation of our theory and main results. The results show that we can narrow the decision set for solution providers and policy-makers based on the estimable risks and losses associated with customer information security. We also discuss the application of our approach in practice.

Introduction

The ubiquity of the Internet, the expansion of data storage space, and revolutionary increases in computing power have enabled firms to collect and analyze massive amounts of wide-ranging customer information at very low costs. Extensive personal information can be gathered either with or without the customer's knowledge, when the person interacts with a firm. Such information is gathered to profile users and provides targeted services, such as tailored advertisements, discount offers and so on. Significant risks are associated with handling such private information about customers, and firms are responsible for the proper treatment of customers when they use their information. When the firm misuses customer information or it falls into the hands of other intruders who misuse it, this may have a significant impact on the firm's reputation, and also may result in large financial losses. Various sources [31], [38] confirm that the number of customer information security breaches has been increasing over time, and more and more individuals are being affected. Firms that collect personal information from consumers should consider the costs and risks of customer information privacy protection, and strive to offer technology solutions and the security policies associated with them to create effective support.

Customer information security breaches have unique characteristics. First, it is hard to quantify the monetary damages that may be involved, even though the severity of the information security breach may be perceived to be high. Firms that suffer from information security breaches face the prospect of customer losses, reputational problems, and fines, while the contingent liabilities often lead to the downgrading of the firm's stock value [12], [16]. Some of the losses may occur over the long term, and, thus, recovery also will take time. The long-term effects also may make it difficult to estimate the related monetary damages accurately. Second, unlike other security intrusions,1 the cause of customer information security breaches may arise due to intentional attacks, as well as unintentional organizational and individual behaviors. The Open Security Foundation [31] has reported that about a half of past information security breaches are due to intentional attacks such as hacking, while accidents under normal operations, such as lost or stolen computers and documents, account for the rest. This wide range of causes makes it hard for a firm to establish effective information security strategy; technical and non-technical means of protection mechanisms are necessary, but may not be easy to implement effectively. Last, although the total number of customer information security breaches has increased over time in the economy, the frequency of such incidents is still low for individual firms. Moreover, there is not much historical data that is publicly available (in part because firms often do not wish to make their information security issues public knowledge), so statistical analysis of historical data is not very feasible.

Since such information security breaches may have a significant negative financial impact, many firms now deploy technology and security policy-based safeguards to protect their customers' private information to prevent becoming victims of such breaches [27]. A firm may implement several information security methods to its customers to reduce the risk of information security breaches. They include software and hardware solutions known as privacy-enhancing technologies and other non-technical information security policies. Examples of software protection methods include intrusion detection add-ons, encryption software, secure socket-layer connections, public-key infrastructure, and anti-virus software. Random-number generators, smart cards and fingerprint readers are examples of hardware solutions for privacy protection. Besides such software and hardware solutions, firms also offer other means of information security to their customers. Examples of non-technical means include providing opt-out choices while collecting personal information, conducting transactions through third-party payment systems such as PayPal or Google Checkout, and using one-time auto-generated credit card numbers that are not linked to personal information. A firm can choose to hire staff to manage use of customer privacy information, too, with a chief privacy officer leading the effort.

Firms face the risks of improper access to, errors with, and theft of their customers' personal information [40]. As a firm invests more in information security, such risks will likely be reduced. However, due to the unforeseen nature of such risks, they may not be controlled completely, even if a firm implements all of the possible technological and security policy protections. Moreover, the firm may not choose to use all of these methods due to customer preferences and incompatible environments, and due to concerns about profit maximization [2]. Previous research suggests that some customers are sensitive about information security, but others are less concerned [8]. Different computing environments also prevent customers from adopting all of the possible methods of protection. Some methods require high-powered computing with advanced technology, some are dependent on the operating systems that customers have implemented, and some require nearly expert knowledge of computing.

Therefore, it is important for a firm to understand the factors affecting the value of its decision to invest in information security. Public policy and regulatory studies have identified several external factors that affect information security strategy [12], [26], [39]. Government regulations and self-regulations are key components that affect an organization's information security strategy [11]. Privacy concerns now have become a major obstacle to attracting customers to e-commerce [19]. However, Hui et al. [21] suggest that the consumers are not fully cautious about sharing their personal information with online merchants even though they are concerned about privacy. Studies by Ashrafi and Kuilboer [2] and Schwaig et al. [39] have revealed that firms selectively adopt the available information security mechanisms based on their own competitive circumstances. Prior research has overlooked the need to understand customer privacy protection more fully in economic terms though. Generally, although firms should respect their customers' rights for information privacy, economic theory predicts that it may not be optimal for a firm to protect them fully — which may be truly unfortunate in some cases.

Providing protection methods for customers may reduce the risk of misuse or the loss of private information, but at the same time, it will impose some costs on the firm, as well as on its customers. Some protection methods involve direct costs to customers. One is the use of hardware solutions that may require users to purchase technology to access services securely. An example is PayPal, which sells a small keychain device – a security fob – that provides a frequently-updated login code that enables the validation of a user's login, and blocks password phishing [36]. Other solutions may not involve direct monetary costs to customers, but some indirect costs may occur. The required time and installation effort, the learning costs for use, and the costs of dealing with malfunctions of software solutions are examples of such indirect costs. Customers' perceptions about the value of information security may vary too. So customers may choose to use protection services to different degrees, depending on how much they value privacy and how much the services cost.

Firms, on the other hand, incur implementation costs to provide customer information security. Although the result of mishandling private information can be costly, most firms will choose to implement only some of the available customer information security protections. In most cases, implementing all of the available protections will be prohibitively expensive. So firms must balance the costs and risks associated with customer information security breaches against the investment required to find a profit-maximizing level of privacy protection.

We will answer the following questions: What are the value-maximizing investment options for firms to protect customer information security? What are the factors that drive firms to invest in information security protection? How can we identify which investment level choices are optimal? We develop a profit optimization model for information security technology investments that considers the risks associated with implementation. We use a profit-at-risk approach based on value-at-risk methods, and operational risk modeling from financial economics. We show that the optimal investment choice is based on the control and expected mitigation of risks due to implementing information security technology solutions, and is affected by other concerns as well. We also provide model-based evidence as to why firms may not choose to implement full protection for their customers, and related empirical evidence of the model findings.

Section snippets

Literature review

Various studies on consumer information privacy have identified several factors that are likely to affect the privacy strategy of an organization. We classify such studies according to three different stakeholders with information privacy interests. Individuals provide their personal information to a number of organizations (businesses, non-profits, and government agencies) that not only use such information themselves but often share it with other organizations. Standard-setters and regulatory

Theory

We next discuss operational risk and a profit-at-risk approach based on value-at-risk theory from financial economics.

Model development

We next introduce a model that can be used to value information security technology solution investment decisions. Our model utilizes a risk management modeling technique suggested by Jorion [23]. Through its use, we are able to evaluate the risk associated with customer information security breaches, based on the idea of profit-at-risk.

Analysis

We next analyze information security investments under alternative circumstances: (1) when there is selective adoption and underestimation of risk; (2) when regulations or standards are implemented; and (3) when a firm is able to pass on implementation costs to its customers. A firm's information security investment level reflects its managers' boundedly-rational understanding about the known sources of threats.

Discussion

We next will offer some clarifications about the boundary conditions of the model we have proposed. We also seek to highlight some of the applications that will be most beneficial to firms and consumers. We will discuss where these risk management techniques should not be used, and the potential dangers that may accompany misuse. We first discuss some issues with the technical assumptions of the model, as a basis for providing full disclosure on what we know about the approach we have developed.

Conclusion

We developed a model based on current theoretical perspectives in financial risk management to analyze how information security investments result in tradeoffs between expected financial losses and the firm's risk mitigation efforts on behalf of its customers. Our model has the potential for real-world application in a variety of scenarios where information security breach frequency and financial loss severity distributions can be estimated qualitatively or quantitatively. In addition to our

Acknowledgments

An earlier version of this paper appeared at the 2009 Hawaii International Conference on Systems Science, Waikoloa, HI, January 2009 under a different title. We thank Yabing Jiang, Avi Seidmann and the anonymous DSS reviewers for their input, and Jennifer Zhang for her creative guidance with the refinement of our modeling approach. We appreciated earlier input from Michel Benaroch, Qizhi Dai, Haluk Demirkan, Michael Goul, Gezinus Hidding, Paul Maglio, Paul Steinbart, Marilyn Prosch, three

Yong J. Lee is in the Information Systems Ph.D. program at the W. P. Carey School of Business at Arizona State University. He earned a B.A. in Computer Science and Engineering from Hongik University in Seoul, South Korea, and an MBA in Information Systems from the University of Washington. His research interest is information privacy and security issues in business and e-commerce. He has been working with financial economics, and a risk valuation approach known as value-at-risk. He has explored

References (45)

  • M.J. Culnan

    How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use

    MIS Quarterly

    (1993)
  • M.J. Culnan

    Protecting privacy online: is self-regulation working?

    Journal of Public Policy and Marketing

    (2000)
  • M.J. Culnan et al.

    Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation

    Organization Science

    (1999)
  • M.J. Culnan et al.

    Consumer privacy: balancing economic and justice considerations

    Journal of Social Issues

    (2003)
  • M.J. Culnan et al.

    How ethics can enhance organizational privacy: lessons from the ChoicePoint and TJX data breaches

    MIS Quarterly

    (2009)
  • T. Dinev et al.

    An extended privacy calculus model for e-commerce transactions

    Information Systems Research

    (2006)
  • Self-regulation and privacy online

  • On-going targeted attacks against U.S. military contractors, blog post, San Jose, CA, January 18, 2010

  • K.M. Gatzlaff et al.

    The effect of data breaches on shareholder wealth

    Risk Management and Insurance Review

    (2010)
  • L.A. Gordon et al.

    The economics of information security investment

    ACM Transactions on Information and System Security

    (2002)
  • V. Gurbaxani et al.

    The impact of information systems on organizations and markets

    Communications of the ACM

    (1991)
  • I. Hann et al.

    Overcoming online information privacy concerns: an information processing theory approach

    Journal of Management Information Systems

    (2007)
  • Cited by (39)

    • Shall we follow? Impact of reputation concern on information security managers’ investment decisions

      2020, Computers and Security
      Citation Excerpt :

      Furthermore, the cost of infosec breaches is also often ambiguous. Lee et al. (2011) argue that it is difficult to quantify monetary damages related to customers. When an organization's system is hacked, it is difficult to know with absolute certainty who the hacker is and what information was accessed.

    • Decision support approaches for cyber security investment

      2016, Decision Support Systems
      Citation Excerpt :

      The main message of this work is that to maximise the expected benefit from information security investment, an organisation should spend only a small fraction of the expected loss due to a security breach. Inspired by [14], Lee et al. apply the profit-at-risk and operational risk modelling approaches to propose a model that facilitates optimal customer information security investments by providing undertaking trade-off analysis between risk and return [15]. The authors define a minimum information security protection level that must be achieved in order for investments in a customer privacy protection to be effective.

    View all citing articles on Scopus

    Yong J. Lee is in the Information Systems Ph.D. program at the W. P. Carey School of Business at Arizona State University. He earned a B.A. in Computer Science and Engineering from Hongik University in Seoul, South Korea, and an MBA in Information Systems from the University of Washington. His research interest is information privacy and security issues in business and e-commerce. He has been working with financial economics, and a risk valuation approach known as value-at-risk. He has explored economic and financial perspectives on organizational strategy and decision-making for investments in IT and business processes that are used to protect consumer information security.

    Robert J. Kauffman is a Visiting Professor of IS and Strategy at the School of Information and the Lee Kong Chian School of Business at Singapore University. He is also a Distinguished Visiting Fellow at the Glassmeyer-McNamee Center for Digital Strategies, Tuck School of Business, Dartmouth College. Previously, he served on the faculty at New York University, the University of Minnesota and Arizona State University. He also visited the University of Rochester and the Federal Reserve Bank of Philadelphia, and worked in international banking and finance in New York City prior to beginning his academic career. His graduate degrees are from Cornell University and Carnegie Mellon University, and his undergraduate degree is from the University of Colorado, Boulder. His research interests span the economics of IS, pricing and mechanism design on the Internet, competitive strategy, and theory development, modeling and empirical methods for IS and e-commerce research, all in contexts that emphasize senior management issues. His publications have appeared in Management Science, Information Systems Research, MIS Quarterly, the Journal of Management Information Systems, Organization Science, the Review of Economics and Statistics, Decision Sciences, and other journals.

    Ryan Sougstad is an Assistant Professor of Business Administration at Augustana College in Sioux Falls, South Dakota, which he joined in 2009. He spent seven years with IBM in client sales and marketing, and at IBM Research's Business Informatics group. His research on the valuation and risk management of IT-enabled services has appeared in the Journal of Management Information Systems and International Journal of Services Science. He holds a B.A. degree from the University of Kansas, an MBA from the UT Dallas, and a Ph.D. in Information and Decision Sciences from the University of Minnesota.

    View full text