scispace - formally typeset
Search or ask a question

Showing papers on "Information sharing published in 2016"


Journal ArticleDOI
TL;DR: Examining the security of SNS by taking a look at the influence of users’ perceived control of information over their information-sharing behaviors, perceived control has been found to be negatively related to perceived privacy risk and attitude toward information sharing and gender has been shown to be an important factor that moderates the influences.
Abstract: Social networking sites (SNS) have challenged ethical issues about users’ information security and privacy. SNS users are concerned about their privacy and need to control the information they share and its use. This paper examines the security of SNS by taking a look at the influence of users’ perceived control of information over their information-sharing behaviors. Employing an empirical study, this paper demonstrates the importance of perceived control in SNS users’ information-sharing behaviors. Specifically, perceived control has been found to be negatively related to perceived privacy risk and attitude toward information sharing, which in turn has an impact on their information-sharing behaviors. In addition, gender has been shown to be an important factor that moderates the influences of both perceived control and perceived privacy risk on SNS users’ attitudes toward information sharing. Theoretical and practical implications are discussed.

230 citations


Journal ArticleDOI
TL;DR: A structured overview about the dimensions of cyber security information sharing is provided, motivated in more detail and work out the requirements for an information sharing system, and a critical review of the state of the art is reviewed.

166 citations


Proceedings ArticleDOI
24 Oct 2016
TL;DR: The aim of MISP is to help in setting up preventive actions and counter-measures used against targeted attacks, and to Enable detection via collaborative-knowledge-sharing about existing malware and other threats.
Abstract: The IT community is confronted with incidents of all kinds and nature, new threats appear on a daily basis. Fighting these security incidents individually is almost impossible. Sharing information about threats among the community has become a key element in incident response to stay on top of the attackers. Reliable information resources, providing credible information, are therefore essential to the IT community, or even at broader scale, to intelligence communities or fraud detection groups. This paper presents the Malware Information Sharing Platform (MISP) and threat sharing project, a trusted platform, that allows the collection and sharing of important indicators of compromise (IoC) of targeted attacks, but also threat information like vulnerabilities or financial indicators used in fraud cases. The aim of MISP is to help in setting up preventive actions and counter-measures used against targeted attacks. Enable detection via collaborative-knowledge-sharing about existing malware and other threats.

166 citations


ReportDOI
04 Oct 2016
TL;DR: This guidance helps organizations establish information sharing goals, identify cyber threat information sources, scope information sharing activities, develop rules that control the publication and distribution of threat information, engage with existing sharing communities, and make effective use of threat Information in support of the organization’s overall cybersecurity practices.

161 citations


Journal ArticleDOI
TL;DR: It is shown that when the retailer is risk-neutral, both firms are indifferent between voluntary and mandatory sharing, and it is found that a more accurate forecast benefits both firms under voluntary- and mandatory-shari...
Abstract: This paper studies information sharing in a distribution channel where the manufacturer possesses better demand-forecast information than the downstream retailer. We examine three information-sharing formats: no information sharing (i.e., the manufacturer ex ante commits to not sharing its forecast), voluntary information sharing (i.e., the manufacturer makes the sharing decision ex post after receiving the forecast), and mandatory information sharing (i.e., the manufacturer is mandated to share its forecast). We characterize the equilibrium outcomes under the three sharing formats and investigate the firms’ preferences regarding these formats. It is shown that when the retailer is risk-neutral, both firms are indifferent between voluntary and mandatory sharing. Among the three formats, ex ante, the retailer prefers the no-sharing format whereas the manufacturer prefers the mandatory-sharing format. In addition, we find that a more accurate forecast benefits both firms under voluntary- and mandatory-shari...

156 citations


Journal ArticleDOI
TL;DR: In this article, the authors identify a generic mechanism to route information on top of collective dynamical reference states in complex networks, and demonstrate the power of this mechanism specifically for oscillatory dynamics and analyse how individual unit properties, the network topology and external inputs co-act to systematically organize information routing.
Abstract: Flexible information routing fundamentally underlies the function of many biological and artificial networks. Yet, how such systems may specifically communicate and dynamically route information is not well understood. Here we identify a generic mechanism to route information on top of collective dynamical reference states in complex networks. Switching between collective dynamics induces flexible reorganization of information sharing and routing patterns, as quantified by delayed mutual information and transfer entropy measures between activities of a network's units. We demonstrate the power of this mechanism specifically for oscillatory dynamics and analyse how individual unit properties, the network topology and external inputs co-act to systematically organize information routing. For multi-scale, modular architectures, we resolve routing patterns at all levels. Interestingly, local interventions within one sub-network may remotely determine nonlocal network-wide communication. These results help understanding and designing information routing patterns across systems where collective dynamics co-occurs with a communication function.

153 citations


Journal ArticleDOI
TL;DR: A comprehensive theoretical model for customer information sharing behavior is proposed and empirically validated through analysis of online survey data as well as network and behavioral usage data of over four months from 1177 customers in a SCS.

137 citations


Journal ArticleDOI
TL;DR: The authors found that use of proattitudinal partisan news online is associated with increased anger, but not anxiety, directed at the opposing party's presidential candidate and that anger subsequently facilitated information sharing about the election on social media.
Abstract: Citizens increasingly rely on social media to consume and disseminate news and information about politics, but the factors that drive political information sharing on these sites are not well understood. This study focused on how online partisan news use influences political information sharing in part because of the distinct negative emotions it arouses in its audience. Using panel survey data collected during the 2012 U.S. presidential election, we found that use of proattitudinal partisan news online is associated with increased anger, but not anxiety, directed at the opposing party's presidential candidate and that anger subsequently facilitated information sharing about the election on social media. The results suggest partisan media may drive online information sharing by generating anger in its audience.

131 citations


Journal ArticleDOI
TL;DR: In this paper, an optimal shipment size and buyer's price are determined mathematically for the case of with-and without-sharing-information in a two-level sustainable supply chain model.

128 citations


Journal ArticleDOI
TL;DR: Investigating social networking communities users' social capital elements and information sharing behaviors indicated that social capital element factors significantly affect the attachment, and identity-based attachment showed much stronger impact on information sharing.

111 citations


Journal ArticleDOI
TL;DR: In this paper, the authors study the operational motivation of a retailer to publicly announce its forecast information, and they show that by making forecast information publicly available to both his manufacturer and to the competitor, a retailer is able to credibly share his forecast information-an outcome that cannot be achieved by merely exchanging information within the supply chain.
Abstract: Studying the operational motivation of a retailer to publicly announce his forecast information, this paper shows that by making forecast information publicly available to both his manufacturer and to the competitor, a retailer is able to credibly share his forecast information-an outcome that cannot be achieved by merely exchanging information within the supply chain. We model a market comprised of an incumbent supply chain facing the possible entry of a competing supply chain. In each supply chain, a retailer sources the product from a manufacturer, and the manufacturers must secure capacity prior to the beginning of the selling season. Due to the superior knowledge of the incumbent retailer about the consumer market, he privately observes a signal about the consumer's demand, which may be high or low. We first confirm that the retailer cannot credibly share this forecast information only with his manufacturer within the supply chain, since, regardless of the observed signal, the retailer has an incentive to inflate to induce the manufacturer to secure a high capacity level. However, when the information is also shared with the competitor, the incumbent retailer faces the trade-off between the desire to secure an ample capacity level and the fear of intense competition. By making information publicly available, it is possible to achieve truthful information sharing; an incumbent retailer observing a high forecast benefits from the increased capacity level to such an extent that he is willing to engage in intense competition to prove his accountability for the shared information. On the other hand, an incumbent retailer with a low forecast is not willing to engage in intense competition in exchange for the high level of capacity; thus, he truthfully reveals his low forecast to weaken competition. Moreover, we demonstrate that this public information sharing can benefit all the firms in the market as well as consumers. In addition, we show that compared to the advance purchase contract, all the firms except the incumbent manufacturer can be better off using public information sharing under a simple wholesale price contract. This paper was accepted by Yossi Aviv, operations management.

Journal ArticleDOI
TL;DR: In this paper, the authors determine if internal integration, information sharing, and training constitute direct antecedents to organizations' warning and recovery capabilities, in both a direct and indirect manner.
Abstract: Purpose The purpose of this paper is to determine if internal integration, information sharing, and training constitute direct antecedents to organizations’ warning and recovery capabilities. Assuming that organizations periodically face various supply chain risks, the authors intend to show that managers can develop these antecedent competencies in ways that bolster their supply chain risk management (SCRM) capabilities. Design/methodology/approach To understand the relationships between the antecedents and SCRM capabilities, the authors used Q-sorts and confirmatory factor analysis to develop new warning and recovery measures. The authors then collected survey data from 231 hospital supply managers and analyzed these records using structural equation modeling. Findings The results indicate that internal integration and training positively affect organizations’ warning and recovery capabilities, in both a direct and indirect manner. The authors also illustrate how managers can leverage their SCRM capabilities to affect operational performance. Research limitations/implications These results suggest that by developing antecedent competencies like internal integration and training, firms may bolster their warning and recovery capabilities, and ultimately operational performance of the organization. Originality/value The findings provide hospital supply organizations and other inventory management teams with a novel approach to managing an evolving array of supply chain risks. Rather than investing in costly risk management techniques, like inventory stocks, organizations can use internal integration and training to improve their SCRM capabilities.

14 Jan 2016
TL;DR: Most Americans see privacy issues in commercial settings as contingent and context-dependent as discussed by the authors, and they are often cautious about disclosing their information and frequently unhappy about what happens to that information once companies have collected it.
Abstract: Most Americans see privacy issues in commercial settings as contingent and context-dependent. A new Pew Research Center study based on a survey of 461 U.S. adults and nine online focus groups of 80 people finds that there are a variety of circumstances under which many Americans would share personal information or permit surveillance in return for getting something of perceived value. For instance, a majority of Americans think it would be acceptable (by a 54% to 24% margin) for employers to install monitoring cameras following a series of workplace thefts. Nearly half (47%) say the basic bargain offered by retail loyalty cards – namely, that stores track their purchases in exchange for occasional discounts – is acceptable to them, even as a third (32%) call it unacceptable. Still, while many Americans are willing to share personal information in exchange for tangible benefits, they are often cautious about disclosing their information and frequently unhappy about what happens to that information once companies have collected it. For example, when presented with a scenario in which they might save money on their energy bill by installing a “smart thermostat” that would monitor their movements around the home, most adults consider this an unacceptable tradeoff (by a 55% to 27% margin). As one survey respondent explained: “There will be no 'SMART' anythings in this household. I have enough personal data being stolen by the government and sold [by companies] to spammers now.” In online focus groups and in open-ended responses to a nationally representative online survey, many people expressed concerns about the safety and security of their personal data in light of numerous high-profile data breaches. They also regularly expressed anger about the barrage of unsolicited emails, phone calls, customized ads or other contacts that inevitably arises when they elect to share some information about themselves. In response to a question about having their online behavior tracked in exchange for getting access to a free online service, one survey respondent wrote: “I want control over what ads are being ‘pushed back’ to me: I have no interest in ‘puppy portraits’ but I may be interested in cameras, equipment, etc. In an effort to ‘target’ my preferences, my inbox gets full of [expletive] that is not relevant to me.”

Journal ArticleDOI
TL;DR: This study systematically identifies and tests some important determinants of the success of inter-organizational collaboration and information sharing initiatives through quantitative empirical analysis and found compatibility of technical infrastructure and formally assigned project managers as the two most important predictors explaining the success.

Journal ArticleDOI
TL;DR: This study incorporates health literacy into a model explaining how perceived health knowledge, information sharing, attitudes, and behavior are related, showing that health information sharing explains 33% of the variance in behavioral intentions, indicating that the communicative practice of sharing information can positively impact health outcomes.
Abstract: Low health literacy remains an extremely common and problematic issue, given that individuals with lower health literacy are more likely to experience health challenges and negative health outcomes. In this study, we use the first three stages of the innovation-decision process found in the theory of diffusion of innovations (Rogers, 2003). We incorporate health literacy into a model explaining how perceived health knowledge, information sharing, attitudes, and behavior are related. Results show that health information sharing explains 33% of the variance in behavioral intentions, indicating that the communicative practice of sharing information can positively impact health outcomes. Further, individuals with high health literacy tend to share less information about heart health than those with lower health literacy. Findings also reveal that perceived heart-health knowledge operates differently than health literacy to predict health outcomes.

Journal ArticleDOI
Chen Zhang1, Suhong Li1
TL;DR: Through an extensive literature review, the possible security threats/attacks in a SCM system are examined and the key technologies and techniques for securing the information shared in SCM are identified with the goal of improving organizations' capabilities in sharing secure information.
Abstract: Information sharing is a key element in any Supply Chain Management (SCM) system and is critical for improving supply chain performance and enhancing the competitive advantage of an organization. However, many organizations are reluctant to share information with their supply chain partners because of lack of trust, the fear of information leakage and security attacks from malicious individuals or groups. Through an extensive literature review, this paper examines the possible security threats/attacks in a SCM system. Then the key technologies and techniques for securing the information shared in SCM are identified with the goal of improving organizations' capabilities in sharing secure information.

Journal ArticleDOI
TL;DR: It is shown that the efficient exploration of billions of molecules requires the development of smart strategies, and the importance of education in “Big Data” for further progress of this area is highlighted.
Abstract: The increasing volume of biomedical data in chemistry and life sciences requires the development of new methods and approaches for their handling. Here, we briefly discuss some challenges and opportunities of this fast growing area of research with a focus on those to be addressed within the BIGCHEM project. The article starts with a brief description of some available resources for "Big Data" in chemistry and a discussion of the importance of data quality. We then discuss challenges with visualization of millions of compounds by combining chemical and biological data, the expectations from mining the "Big Data" using advanced machine-learning methods, and their applications in polypharmacology prediction and target de-convolution in phenotypic screening. We show that the efficient exploration of billions of molecules requires the development of smart strategies. We also address the issue of secure information sharing without disclosing chemical structures, which is critical to enable bi-party or multi-party data sharing. Data sharing is important in the context of the recent trend of "open innovation" in pharmaceutical industry, which has led to not only more information sharing among academics and pharma industries but also the so-called "precompetitive" collaboration between pharma companies. At the end we highlight the importance of education in "Big Data" for further progress of this area.

Proceedings Article
01 Jan 2016
TL;DR: A methodology that is able to detect client- and server-side flows of information between arbitrary ad exchanges is developed and leveraged to give users more control over what kind of ads they see and how their information is shared between ad exchanges.
Abstract: Numerous surveys have shown that Web users are concerned about the loss of privacy associated with online tracking. Alarmingly, these surveys also reveal that people are also unaware of the amount of data sharing that occurs between ad exchanges, and thus underestimate the privacy risks associated with online tracking. In reality, the modern ad ecosystem is fueled by a flow of user data between trackers and ad exchanges. Although recent work has shown that ad exchanges routinely perform cookie matching with other exchanges, these studies are based on brittle heuristics that cannot detect all forms of information sharing, especially under adversarial conditions. In this study, we develop a methodology that is able to detect clientand server-side flows of information between arbitrary ad exchanges. Our key insight is to leverage retargeted ads as a tool for identifying information flows. Intuitively, our methodology works because it relies on the semantics of how exchanges serve ads, rather than focusing on specific cookie matching mechanisms. Using crawled data on 35,448 ad impressions, we show that our methodology can successfully categorize four different kinds of information sharing behavior between ad exchanges, including cases where existing heuristic methods fail. We conclude with a discussion of how our findings and methodologies can be leveraged to give users more control over what kind of ads they see and how their information is shared between ad exchanges.

Book ChapterDOI
13 Sep 2016
TL;DR: Basic concepts, properties and models proposed for the trust management in SIOT environments are exposed and discussed and unsolved issues and future research trends are discussed.
Abstract: Social Internet of Things is a new paradigm where Internet of Things merges with Social Networks, allowing people and devices to interact, facilitating information sharing and enabling a variety of at-tractive applications. However, face to this new paradigm, users remain suspicious and careful. They fear disclosure of their data and violation of their privacy. Without trustworthy technologies to ensure user’s safe communications and trustworthy interactions, the SIoT will not reach enough popularity to be considered as a well-established technology. Accordingly, trust management becomes a major challenge to ensure reliable data analysis, qualified services and enhanced security. It helps people exceed their fears and promotes their acceptance and consumption on IoT services. However, current research still lacks a comprehensive study on trust management in SIoT. In this paper, we expose basic concepts, properties and models proposed for the trust management in SIOT environments. Furthermore, we discuss unsolved issues and future research trends.

Journal ArticleDOI
TL;DR: An investigation of implicit communication strategies for anticipatory information sharing during team performance of tasks with varying degrees of complexity found that the five teams with the fastest task completion times and lowest idle times exhibited higher rates of deliberative communication versus reactive communication during high-complexity tasks.
Abstract: ObjectiveWe investigated implicit communication strategies for anticipatory information sharing during team performance of tasks with varying degrees of complexity. We compared the strategies used by teams with the highest level of performance to those used by the lowest-performing teams to evaluate the frequency and methods of communications used as a function of task structure.BackgroundHigh-performing teams share information by anticipating the needs of their teammates rather than explicitly requesting the exchange of information. As the complexity of a task increases to involve more interdependence among teammates, the impact of coordination on team performance also increases. This observation motivated us to conduct a study of anticipatory information sharing as a function of task complexity.MethodWe conducted an experiment in which 13 teams of four people performed collaborative search-and-deliver tasks with varying degrees of complexity in a simulation environment. We elaborated upon prior characte...

Journal ArticleDOI
TL;DR: The EPC Information Services (EPCIS) system of agricultural products is analyzed and designed, and the design of tracking and tracing of the agricultural supply chain based on the IoT is proposed.
Abstract: Purpose – The Internet of Things (IoT) is one of the efficient ways to solve the problems on information sharing in the supply chain of agricultural products. The paper aims to discuss this issue. Design/methodology/approach – In this paper, a scheme of information sharing in the supply chain of agricultural products is developed and the information of agricultural products is designed and described with Physical Markup Language. Findings – In addition, the EPC Information Services (EPCIS) system of agricultural products is analyzed and designed, and the design of tracking and tracing of the agricultural supply chain based on the IoT is proposed. Meanwhile, EPCDS registration is discussed, and two methods of information inquiry are proposed, especially the processes of inquiries for the static and dynamic information based on Object Name Service are emphasized. Originality/value – Once a food safety incident occurs, the model can be used for tracking, tracing, and monitoring so as to deal with related pro...

Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper developed a finite Bayesian Stackelberg game to analyze the two-way information sharing problem under horizontal supply chain (SC) competition, and they found that sharing demand forecast voluntarily in a SC benefits the manufacturer but hurts the retailer.

Journal ArticleDOI
TL;DR: The results suggest that both strong tie and bridging tie of SMEs can lead to a positive effect on information sharing in supply chain, which can further enhance the credit quality for SMEs.
Abstract: – The purpose of this paper is to examine the effect of small and medium enterprises (SMEs)’ supply chain network on influencing credit quality, or more specifically, whether bridging tie (structural network) or strong tie (relational network) of SMEs in the supply chain can improve the availability of equity and debt capital through information sharing. , – A survey was conducted in manufacturing industry in China and 208 valid questionnaires were used to test all the hypotheses. The data were then analyzed by employing partial least squares path modeling. , – The results suggest that both strong tie and bridging tie of SMEs can lead to a positive effect on information sharing in supply chain, which can further enhance the credit quality for SMEs. However, without information sharing, the strong tie has not significant influence on SMEs’ credit quality, while bridging tie can directly impact on credit quality. , – Despite their crucial role in sustaining national economies, SMEs are beset by the critical constraint of risk-free financing. Based on a survey, this research finds that the credit quality of SMEs is affected by two important factors: one concerns information sharing in supply chain and the other relates to the attributes of SMEs’ supply chain network. This study implies that a SME may have a financing advantage for better embedding in the supply chain network, but different effects will be experienced according to constraints associated with information asymmetry in the supply chain.

Journal ArticleDOI
TL;DR: In this article, the authors investigate the interrelationship between trust, socialization, and information sharing on the buying firm's innovation capability in the context of the buyer-supplier relationship.
Abstract: Purpose The purpose of this paper is to investigate the interrelationship between trust, socialization, and information sharing on the buying firm’s innovation capability in the context of the buyer-supplier relationship (BSR). A nomological model is developed that examines the mediating role of relational capital (supplier trust) on the relationship between structural capital (socialization and information sharing) and innovation capability. Design/methodology/approach A survey was conducted on 357 US executives. Structural equation modeling was used to analyze the hypothesized relationships. Findings Information sharing and formal socialization activities increased the buying firm’s trust in its key supplier. However, formal socialization activities within the context of the business environment did not have a significant direct impact on buyer’s innovative capabilities; but when mediated by trust, it positively impacted innovation capabilities. Informal socialization within the context of the social environment directly impacted innovation capabilities but trust did not mediate the relationship. Information sharing impacted trust and innovation significantly and trust mediated the impact of information sharing on innovation capabilities. Originality/value This study defines the formal and informal aspects of socialization and investigates its impact on trust and buyer innovation capabilities. This is one of the few studies that highlights the mediating role of trust between firms to facilitate innovation capability.

Journal ArticleDOI
TL;DR: In this article, a lean team leader's work values are assumed to affect his or her team members' behaviors and, through them, to attain team effectiveness, and the positive relationship between lean-team effectiveness and leaders' self-transcendence values were partly mediated by information sharing behavior within the team.
Abstract: Purpose Although empirical tests of effective lean-team leadership are scarce, leaders are often blamed when lean work-floor initiatives fail. In the present study, a lean-team leader’s work values are assumed to affect his or her team members’ behaviors and, through them, to attain team effectiveness. Specifically, two of Schwartz et al.’s (2012) values clusters (i.e. self-transcendence and conservation) are hypothesized to be linked to team members’ degree of information and idea sharing and, in turn, to lean-team effectiveness. The paper aims to report the examination of these hypotheses. Design/methodology/approach Survey responses (n=429) of both leaders and members of 25 lean-teams in services and manufacturing organizations were aggregated, thereby curbing common-source bias. To test the six hypotheses, structural equation modeling was performed, with bootstrapping, linear regression analyses, and Sobel tests. Findings The positive relationship between lean-team effectiveness and leaders’ self-transcendence values, and the negative relationship between lean-team effectiveness and leaders’ conservation values were partly mediated by information sharing behavior within the team. Research limitations/implications Future research must compare the content of effective lean-team values and behaviors to similar non-lean teams. Practical implications Appoint lean-team leaders with predominantly self-transcendence rather than conservation values: to promote work-floor sharing of information and lean-team effectiveness. Originality/value Human factors associated with effective lean-teams were examined, thereby importing organization-behavioral insights into the operations management literature: with HRM-type implications.

Journal ArticleDOI
TL;DR: In this paper, a systematic review on M-Internet based construction supply chain management (CSCM) via descriptive and thematic analyses of publications retrieved from four major databases is presented.

Journal ArticleDOI
TL;DR: In this article, the authors investigate how managers perceive risks associated with sharing information with trading partners, and how they attempt to mitigate them, and the role played by interpersonal relationships and trust as key enablers of interorganizational cooperation.
Abstract: Purpose The purpose of this paper is to investigate how managers perceive risks associated with sharing information with trading partners, and how they attempt to mitigate them. Design/methodology/approach In this exploratory New Zealand study, qualitative research was conducted involving semi-structured interviews with boundary spanning managers who are responsible for inter-organizational interfaces. Multiple case studies in different industries are used to highlight managers’ perceptions of risks in data exchange process throughout the supply network, and their underlying reasoning. Findings Managers perceive several types of risks when exchanging information across external supply chain interfaces, and adopt different approaches to handling them. The research also reinforces the vital role played by interpersonal relationships and trust as key enablers of inter-organizational cooperation. Research limitations/implications The findings are based on a small sample of 11 case companies based in a single New Zealand province, thereby potentially restricting generalizability. Future work could usefully extend the sample size in order to investigate the correlations between firm sizes, levels of trust, and degrees of data integration within particular industry sectors. Practical implications The findings will help managers understand and evaluate different types of risks in the data exchange process, and enable them to make better decisions that enhance information sharing and supply chain performance. Originality/value Perceived information sharing risks are peculiar to the individual actors, and as such need to be mitigated through changes to their socially constructed perceptions. This work extends the literature on understanding the various dimensions of inter-organizational information sharing.

Journal ArticleDOI
TL;DR: While enjoying the information sharing on Social Medias, yet it requires a great deal for security and privacy, the users’ information that are to be kept undisclosed, should be made private.

Journal ArticleDOI
TL;DR: In this article, the authors conducted semistructured interviews with 40 policymakers, community and enterprise HIE leaders, and health care executives from 19 different organizations to identify factors influencing participation in, and the success of, each approach to health information exchange.
Abstract: Policy Points: Community health information exchanges have the characteristics of a public good, and they support population health initiatives at the state and national levels. However, current policy equally incentivizes health systems to create their own information exchanges covering more narrowly defined populations. Noninteroperable electronic health records and vendors’ expensive custom interfaces are hindering health information exchanges. Moreover, vendors are imposing the costs of interoperability on health systems and community health information exchanges. Health systems are creating networks of targeted physicians and facilities by funding connections to their own enterprise health information exchanges. These private networks may change referral patterns and foster more integration with outpatient providers. Context The United States has invested billions of dollars to encourage the adoption of and implement the information technologies necessary for health information exchange (HIE), enabling providers to efficiently and effectively share patient information with other providers. Health care providers now have multiple options for obtaining and sharing patient information. Community HIEs facilitate information sharing for a broad group of providers within a region. Enterprise HIEs are operated by health systems and share information among affiliated hospitals and providers. We sought to identify why hospitals and health systems choose either to participate in community HIEs or to establish enterprise HIEs. Methods We conducted semistructured interviews with 40 policymakers, community and enterprise HIE leaders, and health care executives from 19 different organizations. Our qualitative analysis used a general inductive and comparative approach to identify factors influencing participation in, and the success of, each approach to HIE. Findings Enterprise HIEs support health systems' strategic goals through the control of an information technology network consisting of desired trading partners. Community HIEs support obtaining patient information from the broadest set of providers, but with more dispersed benefits to all participants, the community, and patients. Although not an either/or decision, community and enterprise HIEs compete for finite organizational resources like time, skilled staff, and money. Both approaches face challenges due to vendor costs and less-than-interoperable technology. Conclusions Both community and enterprise HIEs support aggregating clinical data and following patients across settings. Although they can be complementary, community and enterprise HIEs nonetheless compete for providers’ attention and organizational resources. Health policymakers might try to encourage the type of widespread information exchange pursued by community HIEs, but the business case for enterprise HIEs clearly is stronger. The sustainability of a community HIE, potentially a public good, may necessitate ongoing public funding and supportive regulation.

Journal ArticleDOI
TL;DR: A novel theoretical model that characterizes information and knowledge leakage in an integrated supply chain is contributed to create a mitigation framework to soften the impact of leakages on performance.
Abstract: The current world of post industrial value generation sees companies increasingly analyzing their internal operations against their external organizations to identify supply/demand fluctuations along the supply chain. Within these integrated relationships between internal and external parties in the supply chain, knowledge and information have become very important production resources. The existence and success of an increasing number of organizations strongly depend on their capabilities to utilize knowledge and information for profit generation. By managing more efficient information sharing, the volume of company confidential information passing through the supply chain increases, and this brings about more incidences of knowledge leakage and information leakage. A survey by PricewaterhouseCoopers in 2014 shows information security spending over the next 12 months would increase 60.27 % in Asia and 48.98 % in all regions. This emphasizes the importance of information privacy and therefore the necessity to study the information and knowledge leakage in integrated supply chain. The objectives of this study are to investigate the factors triggering information and knowledge leakage and create a mitigation framework to soften the impact of leakages on performance. The above objectives will be met by formulating and examining several hypotheses of a conceptualized information leakage (IL) and knowledge leakage (KL) framework. A case study derived from a structured interview is adopted as a methodology in this research. As a result, this paper contributes a novel theoretical model that characterizes information and knowledge leakage in an integrated supply chain. Therefore, it also adds new knowledge of managing information and knowledge leakage to supply chain management.