Information security research: External hacking, insider breach, and profound technologies
dc.contributor.advisor | Elizabeth Hoffman | |
dc.contributor.advisor | Dan Zhu | |
dc.contributor.author | Li, Yuanxiang | |
dc.contributor.department | Theses & dissertations (College of Business) | |
dc.date | 2018-08-11T22:02:29.000 | |
dc.date.accessioned | 2020-06-30T03:04:52Z | |
dc.date.available | 2020-06-30T03:04:52Z | |
dc.date.copyright | Sun Jan 01 00:00:00 UTC 2017 | |
dc.date.embargo | 2001-01-01 | |
dc.date.issued | 2017-01-01 | |
dc.description.abstract | <p>Information assets are one of the most valuable intangible productive capital for a company to compete with its rivals, to learn consumers’ shopping habits, to guide its development directions, and to standout to retain its profitability. However, with the Internet’s characteristic of pervasiveness, information breaches from both external hacking and internal corruption are continuously encroaching a company’s economic profit. This dissertation consists of three studies where each study investigates the different aspects of information security, and it is aimed to address the growing concern of securing a company’s information assets. The first study examines the external hackers’ behaviors and models a Bayesian game between a firm and two discrete types of hackers (domestic and international) based on the framework of Inspection Game. This study explains why external hackings, especially the international ones, are hard to prevent effectively. The second study is an empirical work and explores the other side of information security data breach, which is mainly due to insiders’ (e.g., employee) malicious deeds or noncompliance with information security policy. This study shows that individual reward and punishment together with 100% detection is the best incentive structure to reduce insider data breaches. In addition, the second study finds that individual reward is more effective than individual punishment, which can better explain why employees are more willing to spend time to comply with security policy when a reward is present. Lastly, the third study is a conceptual work and relies on the Theory of Bounded Rationality to discuss how the Blockchain technology can undermine the motivations of both external and internal intruders in order to prevent information breaches. Overall, this dissertation discusses the current issues of hacking, constructs a payment/incentive structure to regulate noncompliance, empirically tests the validity of the proposed structure, points out a solution to advance information security defense, and provides some managerial recommendations to practitioners.</p> | |
dc.format.mimetype | application/pdf | |
dc.identifier | archive/lib.dr.iastate.edu/etd/15566/ | |
dc.identifier.articleid | 6573 | |
dc.identifier.contextkey | 11058009 | |
dc.identifier.doi | https://doi.org/10.31274/etd-180810-5183 | |
dc.identifier.s3bucket | isulib-bepress-aws-west | |
dc.identifier.submissionpath | etd/15566 | |
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/29749 | |
dc.language.iso | en | |
dc.source.bitstream | archive/lib.dr.iastate.edu/etd/15566/Li_iastate_0097E_16718.pdf|||Fri Jan 14 20:43:06 UTC 2022 | |
dc.subject.disciplines | Behavioral Neurobiology | |
dc.subject.disciplines | Databases and Information Systems | |
dc.subject.disciplines | Economics | |
dc.subject.disciplines | Social and Behavioral Sciences | |
dc.subject.keywords | behavioral economics | |
dc.subject.keywords | Blockchain | |
dc.subject.keywords | game theory | |
dc.subject.keywords | hacking behavioral | |
dc.subject.keywords | information security | |
dc.subject.keywords | policy compliance | |
dc.title | Information security research: External hacking, insider breach, and profound technologies | |
dc.type | dissertation | |
dc.type.genre | dissertation | |
dspace.entity.type | Publication | |
thesis.degree.discipline | Business and Technology | |
thesis.degree.level | dissertation | |
thesis.degree.name | Doctor of Philosophy |
File
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Li_iastate_0097E_16718.pdf
- Size:
- 4.33 MB
- Format:
- Adobe Portable Document Format
- Description: