Governance Models Preferences for Security Information Sharing: An Institutional Economics Perspective for Critical Infrastructure Protection
Autor: | Alain Mermoud, Marcus Matthias Keupp, Dimitri Percia David |
---|---|
Rok vydání: | 2018 |
Předmět: |
Knowledge management
Computer science business.industry Corporate governance Information sharing Institutional economics Critical infrastructure protection 02 engineering and technology Information security Information assurance Empirical research 020204 information systems 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing New institutional economics business |
Zdroj: | Critical Information Infrastructures Security ISBN: 9783030058487 CRITIS |
DOI: | 10.1007/978-3-030-05849-4_14 |
Popis: | Empirical studies have analyzed the incentive mechanisms for sharing security information between human agents, a key activity for critical infrastructure protection. However, recent research shows that most Information Sharing and Analysis Centers do not perform optimally, even when properly regulated. Using a meso-level of analysis, we close an important research gap by presenting a theoretical framework that links institutional economics and security information sharing. We illustrate this framework with a dataset collected through an online questionnaire addressed to all critical infrastructures (N = 262) operating at the Swiss Reporting and Analysis Centre for Information Security (MELANI). Using descriptive statistics, we investigate how institutional rules offer human agents an institutional freedom to self-design an efficient security information sharing artifact. Our results show that a properly designed artifact can positively reinforces human agents to share security information and find the right balance between three governance models: (A) public-private partnership, (B) private, and (C) government-based. Overall, our work lends support to a better institutional design of security information sharing and the formulation of policies that can avoid non-cooperative and free-riding behaviors that plague cybersecurity. |
Databáze: | OpenAIRE |
Externí odkaz: |