ABSTRACT
The construction of medical treatment combinations (MTCs) is to promote the subsidence of high-quality medical resources but brings third-party risk propagation. This paper develops two models to optimize information security decisions under two types of MTCs. Based on theoretical and numerical analyses, influences of the participation conditions of hospitals and propagation probability on the optimal security decisions and total expected costs are investigated. We find that the security decision under the loose MTC (L-MTC) differs significantly from that under the tight MTC (T-MTC). We also find that the selection of MTCs can be influenced by the participation conditions of hospitals. When the potential loss is large and the potential loss coefficient of the partner hospital is small, T-MTC prevails in information security cost. However, an increase in the propagation probability can extend the trend of the cost advantage under the T-MTC. In contrast, although the area of the cost advantage under the L-MTC is relatively large, the core hospital with the moderate potential loss and the partner hospital with a large potential loss coefficient are prone to form L-MTC from the perspective of their interests.
- Ying, C. A. I., Cheng, W. E. N., Long, T. A. N. G., Pufei, L. I. U., Yan, X. U., Suxia, H. U., ... & Junhua, C. A. O. (2018). Exploration and consideration of the medical alliance modes. Iranian Journal of Public Health, 47(8), 1160.Google Scholar
- Wang, J., & Wang, X. (2021). Research on Chinese integrated medical and health service system: policy evolution and theoretical mechanism. Journal of Public Management, 18(3): 152-167.Google Scholar
- Sun, S., Jiang, X., Li, W., & Liu, J. (2021) Loose medical consortium empowers the primary medical service system——organization competition and cooperation、policy incentive and promotion of dynamic capacity. Journal of Public Management, 18(03):139-151+175.Google Scholar
- Wu, Y., Feng, G., Wang, N., & Liang, H. (2015). Game of information security investment: Impact of attack types and network vulnerability. Expert Systems with Applications, 42(15-16), 6132-6146.Google Scholar
- Li, Y., & Xu, L. (2021). Cybersecurity investments in a two-echelon supply chain with third-party risk propagation. International Journal of Production Research, 59(4), 1216-1238.Google Scholar
- Wang, J., & Wang, X. (2021) Research on Chinese integrated medical and health service system: policy evolution and theoretical mechanism. Journal of Public Management, 18(3): 152-167.Google Scholar
- Feng, Q. (2021) Human health community: the value orientation of the development of regional medical association in Yangtze River Delta. Social Sciences in Nanjing, (05):63-70.Google Scholar
- Claunch, D., & McMillan, M. (2013). Determining the right level for your IT security investment: A rural medical center facing threats of data breaches discovered that hospital IT security investments go beyond just dollars and cents. Healthcare Financial Management, 67(5), 100-104.Google Scholar
- Kwon, J., & Johnson, M. E. (2014). Proactive versus reactive security investments in the healthcare sector. Mis Quarterly, 38(2), 451-A3.Google Scholar
- Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438-457.Google Scholar
- Hausken, K. (2006). Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers, 8(5), 338-349.Google Scholar
- Huang, C. D., Hu, Q., & Behara, R. S. (2008). An economic analysis of the optimal information security investment in the case of a risk-averse firm. International journal of production economics, 114(2), 793-804.Google Scholar
- Mayadunne, S., & Park, S. (2016). An economic model to evaluate information security investment of risk-taking small and medium enterprises. International Journal of Production Economics, 182, 519-530.Google Scholar
- Huang, C. D., Behara, R. S., & Goo, J. (2014). Optimal information security investment in a Healthcare Information Exchange: An economic analysis. Decision Support Systems, 61, 1-11.Google Scholar
- Kunreuther, H., & Heal, G. (2003). Interdependent security. Journal of risk and uncertainty, 26(2), 231-249.Google Scholar
- Xu, L., Li, Y., & Fu, J. (2019) Cybersecurity investment allocation for a multi-branch firm: Modeling and optimization. Mathematics, 7(7): 587.Google ScholarCross Ref
- Wu, Y., Wang, L., Cheng, D., & Dai, T. (2021). Information security decisions of firms considering security risk interdependency. Expert Systems with Applications, 178, 114990.Google Scholar
- Cui, Z., & Wang, H. (2019) Can a tight medical alliance operate for a long term: an analysis framework of transaction costs economics. Chinese Health Economics, 38(10): 15-19.Google Scholar
- Hui, K. L., Hui, W., & Yue, W. T. (2012). Information security outsourcing with system interdependency and mandatory security requirement. Journal of Management Information Systems, 29(3), 117-156.Google Scholar
- Miura-Ko, R. A., Yolken, B., Mitchell, J., & Bambos, N. (2008, June). Security decision-making among interdependent organizations. In 2008 21st IEEE Computer Security Foundations Symposium. IEEE, Pittsburgh, 66-80.Google ScholarDigital Library
- Hasheminasab, S. A., & Tork Ladani, B. (2018). Security investment in contagious networks. Risk Analysis, 38(8), 1559-1575.Google Scholar
Index Terms
- Research on Information Security Investment in Healthcare Institutions Under Medical Treatment Combinations
Recommendations
Healthcare information system: a facilitator of primary care for underprivileged elderly via mobile clinic
ICSH'13: Proceedings of the 2013 international conference on Smart HealthAgeing is a global challenge. As health conditions gradually deteriorate, elders are prone to suffering from multiple chronic diseases. The impact of ageing on the heath system is therefore unprecedented. Primary and preventive care is important to ...
Comments