Managing information security risks during new technology adoption

被引:12
|
作者
Qian, Ying [2 ]
Fang, Yulin [1 ]
Gonzalez, Jose J. [3 ]
机构
[1] City Univ Hong Kong, Dept Informat Syst, Hong Kong, Hong Kong, Peoples R China
[2] Shanghai Univ, Sch Management, Shanghai 200041, Peoples R China
[3] Univ Agder, Fac Sci & Engn, Agder, Norway
基金
中国国家自然科学基金;
关键词
Information security management; System dynamics; Integrated Operations; Delay; Proactive investment; Reactive investment;
D O I
10.1016/j.cose.2012.09.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the present study, we draw on previous system dynamics research on operational transition and change of vulnerability to investigate the role of incident response capability in controlling the severity of incidents during the adoption of new technology. Toward this end, we build a system dynamics model using the Norwegian Oil and Gas Industry as the context. The Norwegian Oil and Gas Industry has started to adopt new information communication technology to connect its offshore platforms, onshore control centers, and suppliers. In oil companies, the management is generally aware of the increasing risks associated with operational transition; however, to date, investment in incident response capability has not been highly prioritized because of the uncertainty related to risks and the present reactive mental model of security risk management. The model simulation shows that a reactive approach to security risk management might trap the organization into blindness to minor incidents and low incident response capability, which can lead to severe incidents. The system dynamics model can serve as a means to promote proactive investment in incident response capability. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:859 / 869
页数:11
相关论文
共 50 条
  • [21] MANAGING TRANSPORTATION SAFETY AND SECURITY RISKS
    Fuller, Brad A.
    CHEMICAL ENGINEERING PROGRESS, 2009, 105 (10) : 23 - 27
  • [22] Kofenya: The Role of Accounting Information in Managing the Risks of a New Business
    Ballou, Brian
    Heitger, Dan L.
    ISSUES IN ACCOUNTING EDUCATION, 2008, 23 (02): : 211 - 228
  • [23] The Impact of Customer Perceptions of Information Privacy and Security Risks on the Adoption of Residual RFID Technologies
    Cazier, Joseph A.
    Jensen, Andrew S.
    Dave, Dinesh S.
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2008, 23 : 235 - 256
  • [24] Blockchain technology adoption for managing risks in operations and supply chain management: evidence from the UK
    Chowdhury, Soumyadeb
    Rodriguez-Espindola, Oscar
    Dey, Prasanta
    Budhwar, Pawan
    ANNALS OF OPERATIONS RESEARCH, 2023, 327 (01) : 539 - 574
  • [25] Blockchain technology adoption for managing risks in operations and supply chain management: evidence from the UK
    Soumyadeb Chowdhury
    Oscar Rodriguez-Espindola
    Prasanta Dey
    Pawan Budhwar
    Annals of Operations Research, 2023, 327 : 539 - 574
  • [26] NEW THINKING ABOUT INFORMATION TECHNOLOGY SECURITY
    ABRAMS, MD
    JOYCE, MV
    COMPUTERS & SECURITY, 1995, 14 (01) : 69 - 81
  • [27] A New Technology for An Information Network of Security and Authorization
    Hirata, Kazuko
    Aoki, Hiroyuki
    ISCE: 2009 IEEE 13TH INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2009, : 985 - +
  • [29] Special Issue on Managing Information Security Risks in Digital Business Guest Editorial Preface
    Luo, Xin
    Hsu, Carol
    Demetis, Dionysios
    JOURNAL OF DATABASE MANAGEMENT, 2019, 30 (03) : VII - VIII
  • [30] CAESAR8: An agile enterprise architecture approach to managing information security risks
    Loft, Paul
    He, Ying
    Yevseyeva, Iryna
    Wagner, Isabel
    COMPUTERS & SECURITY, 2022, 122