skip to main content
10.1145/3564858.3564921acmotherconferencesArticle/Chapter ViewAbstractPublication PagesimmsConference Proceedingsconference-collections
research-article

Research on Information Security Investment in Healthcare Institutions Under Medical Treatment Combinations

Authors Info & Claims
Published:08 December 2022Publication History

ABSTRACT

The construction of medical treatment combinations (MTCs) is to promote the subsidence of high-quality medical resources but brings third-party risk propagation. This paper develops two models to optimize information security decisions under two types of MTCs. Based on theoretical and numerical analyses, influences of the participation conditions of hospitals and propagation probability on the optimal security decisions and total expected costs are investigated. We find that the security decision under the loose MTC (L-MTC) differs significantly from that under the tight MTC (T-MTC). We also find that the selection of MTCs can be influenced by the participation conditions of hospitals. When the potential loss is large and the potential loss coefficient of the partner hospital is small, T-MTC prevails in information security cost. However, an increase in the propagation probability can extend the trend of the cost advantage under the T-MTC. In contrast, although the area of the cost advantage under the L-MTC is relatively large, the core hospital with the moderate potential loss and the partner hospital with a large potential loss coefficient are prone to form L-MTC from the perspective of their interests.

References

  1. Ying, C. A. I., Cheng, W. E. N., Long, T. A. N. G., Pufei, L. I. U., Yan, X. U., Suxia, H. U., ... & Junhua, C. A. O. (2018). Exploration and consideration of the medical alliance modes. Iranian Journal of Public Health, 47(8), 1160.Google ScholarGoogle Scholar
  2. Wang, J., & Wang, X. (2021). Research on Chinese integrated medical and health service system: policy evolution and theoretical mechanism. Journal of Public Management, 18(3): 152-167.Google ScholarGoogle Scholar
  3. Sun, S., Jiang, X., Li, W., & Liu, J. (2021) Loose medical consortium empowers the primary medical service system——organization competition and cooperation、policy incentive and promotion of dynamic capacity. Journal of Public Management, 18(03):139-151+175.Google ScholarGoogle Scholar
  4. Wu, Y., Feng, G., Wang, N., & Liang, H. (2015). Game of information security investment: Impact of attack types and network vulnerability. Expert Systems with Applications, 42(15-16), 6132-6146.Google ScholarGoogle Scholar
  5. Li, Y., & Xu, L. (2021). Cybersecurity investments in a two-echelon supply chain with third-party risk propagation. International Journal of Production Research, 59(4), 1216-1238.Google ScholarGoogle Scholar
  6. Wang, J., & Wang, X. (2021) Research on Chinese integrated medical and health service system: policy evolution and theoretical mechanism. Journal of Public Management, 18(3): 152-167.Google ScholarGoogle Scholar
  7. Feng, Q. (2021) Human health community: the value orientation of the development of regional medical association in Yangtze River Delta. Social Sciences in Nanjing, (05):63-70.Google ScholarGoogle Scholar
  8. Claunch, D., & McMillan, M. (2013). Determining the right level for your IT security investment: A rural medical center facing threats of data breaches discovered that hospital IT security investments go beyond just dollars and cents. Healthcare Financial Management, 67(5), 100-104.Google ScholarGoogle Scholar
  9. Kwon, J., & Johnson, M. E. (2014). Proactive versus reactive security investments in the healthcare sector. Mis Quarterly, 38(2), 451-A3.Google ScholarGoogle Scholar
  10. Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438-457.Google ScholarGoogle Scholar
  11. Hausken, K. (2006). Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers, 8(5), 338-349.Google ScholarGoogle Scholar
  12. Huang, C. D., Hu, Q., & Behara, R. S. (2008). An economic analysis of the optimal information security investment in the case of a risk-averse firm. International journal of production economics, 114(2), 793-804.Google ScholarGoogle Scholar
  13. Mayadunne, S., & Park, S. (2016). An economic model to evaluate information security investment of risk-taking small and medium enterprises. International Journal of Production Economics, 182, 519-530.Google ScholarGoogle Scholar
  14. Huang, C. D., Behara, R. S., & Goo, J. (2014). Optimal information security investment in a Healthcare Information Exchange: An economic analysis. Decision Support Systems, 61, 1-11.Google ScholarGoogle Scholar
  15. Kunreuther, H., & Heal, G. (2003). Interdependent security. Journal of risk and uncertainty, 26(2), 231-249.Google ScholarGoogle Scholar
  16. Xu, L., Li, Y., & Fu, J. (2019) Cybersecurity investment allocation for a multi-branch firm: Modeling and optimization. Mathematics, 7(7): 587.Google ScholarGoogle ScholarCross RefCross Ref
  17. Wu, Y., Wang, L., Cheng, D., & Dai, T. (2021). Information security decisions of firms considering security risk interdependency. Expert Systems with Applications, 178, 114990.Google ScholarGoogle Scholar
  18. Cui, Z., & Wang, H. (2019) Can a tight medical alliance operate for a long term: an analysis framework of transaction costs economics. Chinese Health Economics, 38(10): 15-19.Google ScholarGoogle Scholar
  19. Hui, K. L., Hui, W., & Yue, W. T. (2012). Information security outsourcing with system interdependency and mandatory security requirement. Journal of Management Information Systems, 29(3), 117-156.Google ScholarGoogle Scholar
  20. Miura-Ko, R. A., Yolken, B., Mitchell, J., & Bambos, N. (2008, June). Security decision-making among interdependent organizations. In 2008 21st IEEE Computer Security Foundations Symposium. IEEE, Pittsburgh, 66-80.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Hasheminasab, S. A., & Tork Ladani, B. (2018). Security investment in contagious networks. Risk Analysis, 38(8), 1559-1575.Google ScholarGoogle Scholar

Index Terms

  1. Research on Information Security Investment in Healthcare Institutions Under Medical Treatment Combinations

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        IMMS '22: Proceedings of the 5th International Conference on Information Management and Management Science
        August 2022
        457 pages
        ISBN:9781450396721
        DOI:10.1145/3564858

        Copyright © 2022 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 8 December 2022

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)20
        • Downloads (Last 6 weeks)1

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format