{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:29Z","timestamp":1763468189352,"version":"3.37.3"},"reference-count":37,"publisher":"American Accounting Association","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n               <jats:p>There are instances where multiple organizations hold data that when considered individually are inconclusive, but collectively are useful to solve complex problems. Yet, frequently there is a hesitation for organizations to share data due to strategic, legal, and policy concerns. To address this hesitation, an electronic market for secure information sharing is described, in which data are contributed to the market by members, and made available from the market to members or preapproved information buyers. In this Secure Information Market (SIM), shared data are secure, and available in granular or aggregate form based on specific requirements of the information providers and consumers. The model is designed to protect member organizations and their shared data, while maximizing member value and incentives to share. The Secure Information Market model is presented, and then its applicability is demonstrated using a variety of examples.<\/jats:p>","DOI":"10.2308\/isys-50705","type":"journal-article","created":{"date-parts":[[2014,1,13]],"date-time":"2014-01-13T16:05:32Z","timestamp":1389629132000},"page":"269-285","source":"Crossref","is-referenced-by-count":8,"title":["Secure Information Market: A Model to Support Information Sharing, Data Fusion, Privacy, and Decisions"],"prefix":"10.2308","volume":"28","author":[{"given":"Bonnie W.","family":"Morris","sequence":"first","affiliation":[{"name":"Duquesne University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Virginia Franke","family":"Kleist","sequence":"additional","affiliation":[{"name":"West Virginia University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Richard B.","family":"Dull","sequence":"additional","affiliation":[{"name":"West Virginia University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cynthia D.","family":"Tanner","sequence":"additional","affiliation":[{"name":"West Virginia University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1112","published-online":{"date-parts":[[2014,1,1]]},"reference":[{"issue":"3","key":"2024082915392044600_i1558-7959-28-1-269-Akerlof1","doi-asserted-by":"crossref","first-page":"488","DOI":"10.2307\/1879431","article-title":"The market for \u201clemons\u201d: Quality uncertainty and the market mechanism","volume":"84","author":"Akerlof","year":"1970","journal-title":"Quarterly Journal of Economics"},{"issue":"7","key":"2024082915392044600_i1558-7959-28-1-269-Anton1","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1145\/1272516.1272522","article-title":"A roadmap for comprehensive online privacy policy management","volume":"50","author":"Anton","year":"2007","journal-title":"Communications of the ACM"},{"issue":"1","key":"2024082915392044600_i1558-7959-28-1-269-Anton2","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MSP.2010.38","article-title":"How internet users' privacy concerns have evolved since 2002","volume":"8","author":"Anton","year":"2010","journal-title":"IEEE Security and Privacy"},{"key":"2024082915392044600_i1558-7959-28-1-269-Arthur1","first-page":"100","article-title":"Increasing returns and the new world of business","author":"Arthur","year":"1996","journal-title":"Harvard Business Review"},{"key":"2024082915392044600_i1558-7959-28-1-269-Aviram1","doi-asserted-by":"crossref","unstructured":"Aviram, A., and A. Tor. \n          2004\n          . Information Sharing in Critical Infrastructure Industries: Understanding the Behavioral and Economic Impediments. Available at: http:\/\/dx.doi.org\/10.2139\/ssrn.427540","DOI":"10.2139\/ssrn.427540"},{"key":"2024082915392044600_i1558-7959-28-1-269-Barnum1","unstructured":"Barnum, S. \n          \n          2013. Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX\u2122). Available at: http:\/\/stix.mitre.org\/about\/documents\/STIX_Whitepaper_v1.0.pdf"},{"issue":"4","key":"2024082915392044600_i1558-7959-28-1-269-Barrett1","doi-asserted-by":"crossref","first-page":"93","DOI":"10.2307\/248993","article-title":"Inter-organization information sharing systems","volume":"6","author":"Barrett","year":"1982","journal-title":"MIS Quarterly"},{"key":"2024082915392044600_i1558-7959-28-1-269-Bellot1","doi-asserted-by":"crossref","first-page":"865","DOI":"10.1109\/ICIF.2002.1020898","article-title":"A new definition of qualified gain in a data fusion process: Application to telemedicine","volume":"2","author":"Bellot","year":"2002","journal-title":"Proceedings of the Fifth International Conference on Information Fusion"},{"issue":"2","key":"2024082915392044600_i1558-7959-28-1-269-Boritz1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.2308\/isys-10090","article-title":"E-commerce and privacy: Exploring what we know and opportunities for future discovery","volume":"25","author":"Boritz","year":"2011","journal-title":"Journal of Information Systems"},{"issue":"2","key":"2024082915392044600_i1558-7959-28-1-269-Boulding1","first-page":"1","article-title":"The economics of knowledge and the knowledge of economics","volume":"56","author":"Boulding","year":"1966","journal-title":"American Economic Review"},{"issue":"1","key":"2024082915392044600_i1558-7959-28-1-269-Clifton1","first-page":"108","article-title":"An approach to identifying beneficial collaboration securely in decentralized logistics systems","volume":"10","author":"Clifton","year":"2008","journal-title":"Management and Service Operations Management"},{"key":"2024082915392044600_i1558-7959-28-1-269-DartmouthCollege1","unstructured":"Dartmouth College. 2014. The Dartmouth Atlas of Health Care. Available at: http:\/\/www.dartmouthatlas.org"},{"issue":"2","key":"2024082915392044600_i1558-7959-28-1-269-Deshpande1","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1111\/j.1937-5956.2010.01188.x","article-title":"Outsourcing manufacturing: Secure price-masking mechanisms for purchasing component parts","volume":"20","author":"Deshpande","year":"2011","journal-title":"Production and Operations Management"},{"issue":"1","key":"2024082915392044600_i1558-7959-28-1-269-Dull1","doi-asserted-by":"crossref","first-page":"81","DOI":"10.2308\/jeta.2006.3.1.81","article-title":"ACTVE: A proposal for an automated continuous transaction verification environment","volume":"3","author":"Dull","year":"2006","journal-title":"Journal of Emerging Technologies in Accounting"},{"key":"2024082915392044600_i1558-7959-28-1-269-Epstein1","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1056\/NEJMe1005212","article-title":"Geographic variation in Medicare spending","volume":"363","author":"Epstein","year":"2010","journal-title":"New England Journal of Medicine"},{"issue":"113","key":"2024082915392044600_i1558-7959-28-1-269-FederalRegister1","first-page":"28780","volume":"78","author":"Federal Register","year":"2013","journal-title":"Detection and Avoidance of Counterfeit Parts"},{"issue":"5","key":"2024082915392044600_i1558-7959-28-1-269-Fiala1","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1016\/j.omega.2004.07.006","article-title":"Information sharing in supply chains","volume":"33","author":"Fiala","year":"2005","journal-title":"Omega"},{"issue":"8","key":"2024082915392044600_i1558-7959-28-1-269-Halligan1","first-page":"19","article-title":"The economic valuation of trade secret assets","volume":"9","author":"Halligan","year":"2006","journal-title":"Journal of Internet Law"},{"key":"2024082915392044600_i1558-7959-28-1-269-He1","first-page":"647","article-title":"Preserving privacy in social networks: A structure-aware approach","volume":"1","author":"He","year":"2009","journal-title":"Proceedings of the IEEE\/WIC\/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology"},{"issue":"2","key":"2024082915392044600_i1558-7959-28-1-269-Johnson1","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1147\/sj.462.0255","article-title":"Compliance with data protection laws using Hippocratic Database active enforcement and auditing","volume":"46","author":"Johnson","year":"2007","journal-title":"IBM Systems Journal"},{"issue":"2","key":"2024082915392044600_i1558-7959-28-1-269-Kauffman1","doi-asserted-by":"crossref","first-page":"47","DOI":"10.2308\/isys-10091","article-title":"A survey of consumer information privacy from the accounting information systems perspective","volume":"25","author":"Kauffman","year":"2011","journal-title":"Journal of Information Systems"},{"key":"2024082915392044600_i1558-7959-28-1-269-Kleist1","unstructured":"Kleist, V., \n            \n              I. Frieze, and W. King. \n          2000. Information Technology and Information Goods as Predictors of Organizational Expansion Activity. Available at: http:\/\/aisel.aisnet.org\/cgi\/viewcontent.cgi?article=1135&context=icis2000"},{"issue":"3\/4","key":"2024082915392044600_i1558-7959-28-1-269-Lee1","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1504\/IJTM.2000.002867","article-title":"Information sharing in a supply chain","volume":"20","author":"Lee","year":"2000","journal-title":"International Journal of Technology Management"},{"issue":"8","key":"2024082915392044600_i1558-7959-28-1-269-Li1","doi-asserted-by":"crossref","first-page":"1467","DOI":"10.1287\/mnsc.1070.0851","article-title":"Confidentiality and information sharing in supply chain coordination","volume":"54","author":"Li","year":"2008","journal-title":"Management Science"},{"key":"2024082915392044600_i1558-7959-28-1-269-Maxwell1","article-title":"A legal cross-references taxonomy for identifying conflicting software requirements","author":"Maxwell","year":"2011","journal-title":". Proceedings of the"},{"key":"2024082915392044600_i1558-7959-28-1-269-Morris1","doi-asserted-by":"crossref","DOI":"10.1109\/ITNG.2010.172","article-title":"Enabling trust through continuous compliance assurance","author":"Morris","year":"2010"},{"key":"2024082915392044600_i1558-7959-28-1-269-Moyer1","unstructured":"Moyer, P. \n          \n          2009. Bringing Transparency to the Mortgage Backed Securities Market. Available at: http:\/\/xbrl.us\/Learn\/Pages\/CaseStudies.aspx"},{"issue":"September 5","key":"2024082915392044600_i1558-7959-28-1-269-Perlroth1","first-page":"1","article-title":"N.S.A. able to foil basic safeguards of privacy on web","author":"Perlroth","year":"2013","journal-title":"The New York Times"},{"issue":"2","key":"2024082915392044600_i1558-7959-28-1-269-Perols1","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2308\/isys-50216","article-title":"Information fusion in continuous assurance","volume":"26","author":"Perols","year":"2012","journal-title":"Journal of Information Systems"},{"issue":"4","key":"2024082915392044600_i1558-7959-28-1-269-Pipino1","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1145\/505248.506010","article-title":"Data quality assessment","volume":"45","author":"Pipino","year":"2002","journal-title":"Communications of the ACM"},{"key":"2024082915392044600_i1558-7959-28-1-269-PonemonInstitute1","unstructured":"Ponemon Institute. 2012. 2011 Cost of Data Breach: United States. Available at: http:\/\/www.ponemon.org\/library\/2011-cost-of-data-breach-united-states"},{"key":"2024082915392044600_i1558-7959-28-1-269-Prosch1","unstructured":"Prosch, M. \n          \n          2006. Outsourcing and Privacy: 10 Critical Questions Top Management Should Ask. Available at: http:\/\/www.aicpa.org\/interestareas\/informationtechnology\/resources\/privacy\/privacyservices\/pages\/outsourcingandprivacy.aspx"},{"key":"2024082915392044600_i1558-7959-28-1-269-Safran1","unstructured":"Safran, C., \n            \n              M. Bloomrosen, \n            \n              W. E. Hammond, \n            \n              S. Labkoff, \n            \n              S. Markel-Fox, \n            \n              P. Tang, and D. Detmer. \n          2007. Toward a National Framework for the Secondary Use of Health Data. Available at: http:\/\/www.amia.org\/sites\/amia.org\/files\/2006-Policy-Meeting-Final-Report.pdf"},{"key":"2024082915392044600_i1558-7959-28-1-269-Schneier1","unstructured":"Schneier, B. \n          \n          2013. What We Don't Know about Spying on Citizens: Scarier than What We Know. Available at: http:\/\/www.theatlantic.com\/politics\/archive\/2013\/06\/what-we-dont-know-about-spying-on-citizens-scarier-than-what-we-know\/276607\/"},{"key":"2024082915392044600_i1558-7959-28-1-269-U.S.DepartmentofJustice1","unstructured":"U.S. Department of Justice. 2013a. Global Justice Information Sharing Initiative. Available at: https:\/\/it.ojp.gov\/global"},{"key":"2024082915392044600_i1558-7959-28-1-269-U.S.DepartmentofJustice2","unstructured":"U.S. Department of Justice. 2013b. Fusion Centers and Intelligence Sharing. Available at: https:\/\/it.ojp.gov\/default.aspx?area=nationalInitiatives&page=1181"},{"issue":"3","key":"2024082915392044600_i1558-7959-28-1-269-Vail1","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1109\/TEM.2008.922634","article-title":"An empirical study of consumer perceptions and comprehension of web site privacy policies","volume":"55","author":"Vail","year":"2008","journal-title":"IEEE Transactions on Engineering Management"}],"container-title":["Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/28\/1\/269\/12036\/isys-50705.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/28\/1\/269\/12036\/isys-50705.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T17:30:58Z","timestamp":1724952658000},"score":1,"resource":{"primary":{"URL":"https:\/\/publications.aaahq.org\/jis\/article\/28\/1\/269\/1588\/Secure-Information-Market-A-Model-to-Support"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,1]]},"references-count":37,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2014,1,1]]},"published-print":{"date-parts":[[2014,6,1]]}},"URL":"https:\/\/doi.org\/10.2308\/isys-50705","relation":{},"ISSN":["1558-7959","0888-7985"],"issn-type":[{"type":"electronic","value":"1558-7959"},{"type":"print","value":"0888-7985"}],"subject":[],"published":{"date-parts":[[2014,1,1]]}}}