Information security research: External hacking, insider breach, and profound technologies

dc.contributor.advisor Elizabeth Hoffman
dc.contributor.advisor Dan Zhu
dc.contributor.author Li, Yuanxiang
dc.contributor.department Theses & dissertations (College of Business)
dc.date 2018-08-11T22:02:29.000
dc.date.accessioned 2020-06-30T03:04:52Z
dc.date.available 2020-06-30T03:04:52Z
dc.date.copyright Sun Jan 01 00:00:00 UTC 2017
dc.date.embargo 2001-01-01
dc.date.issued 2017-01-01
dc.description.abstract <p>Information assets are one of the most valuable intangible productive capital for a company to compete with its rivals, to learn consumers’ shopping habits, to guide its development directions, and to standout to retain its profitability. However, with the Internet’s characteristic of pervasiveness, information breaches from both external hacking and internal corruption are continuously encroaching a company’s economic profit. This dissertation consists of three studies where each study investigates the different aspects of information security, and it is aimed to address the growing concern of securing a company’s information assets. The first study examines the external hackers’ behaviors and models a Bayesian game between a firm and two discrete types of hackers (domestic and international) based on the framework of Inspection Game. This study explains why external hackings, especially the international ones, are hard to prevent effectively. The second study is an empirical work and explores the other side of information security data breach, which is mainly due to insiders’ (e.g., employee) malicious deeds or noncompliance with information security policy. This study shows that individual reward and punishment together with 100% detection is the best incentive structure to reduce insider data breaches. In addition, the second study finds that individual reward is more effective than individual punishment, which can better explain why employees are more willing to spend time to comply with security policy when a reward is present. Lastly, the third study is a conceptual work and relies on the Theory of Bounded Rationality to discuss how the Blockchain technology can undermine the motivations of both external and internal intruders in order to prevent information breaches. Overall, this dissertation discusses the current issues of hacking, constructs a payment/incentive structure to regulate noncompliance, empirically tests the validity of the proposed structure, points out a solution to advance information security defense, and provides some managerial recommendations to practitioners.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/etd/15566/
dc.identifier.articleid 6573
dc.identifier.contextkey 11058009
dc.identifier.doi https://doi.org/10.31274/etd-180810-5183
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath etd/15566
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/29749
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/etd/15566/Li_iastate_0097E_16718.pdf|||Fri Jan 14 20:43:06 UTC 2022
dc.subject.disciplines Behavioral Neurobiology
dc.subject.disciplines Databases and Information Systems
dc.subject.disciplines Economics
dc.subject.disciplines Social and Behavioral Sciences
dc.subject.keywords behavioral economics
dc.subject.keywords Blockchain
dc.subject.keywords game theory
dc.subject.keywords hacking behavioral
dc.subject.keywords information security
dc.subject.keywords policy compliance
dc.title Information security research: External hacking, insider breach, and profound technologies
dc.type dissertation
dc.type.genre dissertation
dspace.entity.type Publication
thesis.degree.discipline Business and Technology
thesis.degree.level dissertation
thesis.degree.name Doctor of Philosophy
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Li_iastate_0097E_16718.pdf
Size:
4.33 MB
Format:
Adobe Portable Document Format
Description: