Discussion of Integrated Information Systems, Alliance Formation, and the Risk of Information Exchange between Partners

2016 ◽  
Vol 28 (3) ◽  
pp. 19-23
Author(s):  
Alexandra Van den Abbeele

ABSTRACT Christ and Nicolaou (2016) develop a model predicting that when firms are engaged in alliances with multiple objectives, they are more likely to use Integrated Information Systems (IIS) and more extensive formal controls to manage alliance risk. In addition, they hypothesize that higher levels of IIS are associated with lower information exchange risk and subsequently lower overall alliance risk. Finally, they argue that the relationship between IIS and information exchange risk is mediated by alliance formalization (i.e., the use of formal controls). They test the model using a survey of 116 chief financial officers from U.S. public companies with strategic alliance activity. In this discussion paper, I highlight the main contributions of Christ and Nicolaou (2016), discuss some concerns, and provide some suggestions for future studies.

2016 ◽  
Vol 28 (3) ◽  
pp. 1-18 ◽  
Author(s):  
Margaret H. Christ ◽  
Andreas I. Nicolaou

ABSTRACT Alliances are an important strategic tool for many companies. However, they are inherently risky and a large percentage of alliances fail. We examine the effects of integrated information systems (IISs) and alliance formalization (i.e., formal alliance controls) on information exchange risk and overall alliance risk. We develop a model that predicts that when firms are engaged in alliances with greater collaboration intensity (i.e., alliances with multiple objectives) they are more likely to use an IIS and a broad portfolio of formal controls to manage alliance risk. Using a survey of chief financial officers, we find that collaboration intensity is positively associated with IIS and alliance formalization. IISs are negatively associated with information exchange risk, but this effect is mediated by alliance formalization, suggesting that the formal controls implemented throughout the alliance, and within the IIS, are integral to reducing information exchange risk and, subsequently, overall alliance risk. Our study adds to the literature examining tools and strategies for effectively managing strategic alliances. JEL Classifications: B20; C31; C42; M40.


2020 ◽  
Vol 29 (01) ◽  
pp. 104-114
Author(s):  
Ursula H. Hübner ◽  
Nicole Egbert ◽  
Georg Schulte

Objective: The more people there are who use clinical information systems (CIS) beyond their traditional intramural confines, the more promising the benefits are, and the more daunting the risks will be. This review thus explores the areas of ethical debates prompted by CIS conceptualized as smart systems reaching out to patients and citizens. Furthermore, it investigates the ethical competencies and education needed to use these systems appropriately. Methods: A literature review covering ethics topics in combination with clinical and health information systems, clinical decision support, health information exchange, and various mobile devices and media was performed searching the MEDLINE database for articles from 2016 to 2019 with a focus on 2018 and 2019. A second search combined these keywords with education. Results: By far, most of the discourses were dominated by privacy, confidentiality, and informed consent issues. Intertwined with confidentiality and clear boundaries, the provider-patient relationship has gained much attention. The opacity of algorithms and the lack of explicability of the results pose a further challenge. The necessity of sociotechnical ethics education was underpinned in many studies including advocating education for providers and patients alike. However, only a few publications expanded on ethical competencies. In the publications found, empirical research designs were employed to capture the stakeholders’ attitudes, but not to evaluate specific implementations. Conclusion: Despite the broad discourses, ethical values have not yet found their firm place in empirically rigorous health technology evaluation studies. Similarly, sociotechnical ethics competencies obviously need detailed specifications. These two gaps set the stage for further research at the junction of clinical information systems and ethics.


2020 ◽  
pp. 2-13
Author(s):  
Vadim Kuchurov ◽  
◽  
Roman Maximov ◽  
Roman Sherstobitov ◽  
◽  
...  

Regulators charge to counter information security threats against the structural and functional characteristics of the information system to ensure the information security requirements. These requirements include information system structure and composition, information technologies and functioning characteristics, physical and logical, functional and technological interconnections between information system segments. They order false components of information system emulation as a basic step of protection, as well as information technologies hiding, information system configuration management and its switching to predetermined configuration that provides a protection. However that steps are not included into basic set and they protection aims are reached with compensative assets, formalizing and implementing inhibitory orders and set of organizational and technical measures on threat source. The purpose of research – to disclose and to state main ways of search of new technical solutions for structure masking of distributed information systems in cyberspace implementing masking traffic taking into account the requirements for the timeliness of information exchange. The method of research – operations research in the face of uncertainty, the application of the theory of Markov processes and Kolmogorov equation for solving the problem of increasing the efficiency of masking exchange. The result of research – finding the probabilistic and temporal characteristics of the functioning process of the data transmission network when applying technical solutions for information systems masking in cyberspace. The results obtained make it possible to explicitly implement protection measures aimed at forming persistent false stereotypes among violators about information systems and control processes implemented with their help.


Sign in / Sign up

Export Citation Format

Share Document