Research article

Tripartite evolutionary game study on coordination information security in prescription circulation

  • Received: 23 July 2023 Revised: 23 October 2023 Accepted: 26 October 2023 Published: 27 November 2023
  • To further reform the medical and health care system, regulating multi-level treatment and rationalizing the use of medicine, and securing prescription circulation information, this study explores the evolutionary behavior of three players in terms of information security collaboration under the prescription circulation policy, analyzes the evolutionary paths, and examines the influence of key parameters on evolutionary outcomes by constructing a tripartite evolutionary game model consisting of hospitals, retail pharmacies, and healthcare service platforms. The study shows the following: (1) When the information security costs of prescription circulation increase, the willingness of hospitals to promote information collaboration weakens, the probability of control and regulation by healthcare platforms will be enhanced, and the incentive for retail pharmacies to undertake prescription circulation increases and then decreases. (2) The increased profitability of prescription drug sales can cause a decrease in the likelihood of both parties working together to promote information security. Increasing the collaborative space between hospitals and retail pharmacies is conducive to improving information security in the circulation of prescriptions. (3) A bi-directional constraint relationship exists between the circulation and control subjects. The shorter the technology spillover time from the healthcare service platform is, the higher the probability that hospitals and retail pharmacies will maintain the security of prescription information. (4) In the early stages of prescription circulation, the external regulatory action of the healthcare service platform is essential to improve the coordination of information security. Finally, combined with the tripartite evolutionary game model and simulation analysis results, it offers countermeasures and suggestions for the government to realize the prescription circulation information security collaboration.

    Citation: Xiaochun Chen, Jie Zhao, Yingying Ma, Bo Lv, Xuanjin Du. Tripartite evolutionary game study on coordination information security in prescription circulation[J]. Mathematical Biosciences and Engineering, 2023, 20(12): 21120-21146. doi: 10.3934/mbe.2023934

    Related Papers:

  • To further reform the medical and health care system, regulating multi-level treatment and rationalizing the use of medicine, and securing prescription circulation information, this study explores the evolutionary behavior of three players in terms of information security collaboration under the prescription circulation policy, analyzes the evolutionary paths, and examines the influence of key parameters on evolutionary outcomes by constructing a tripartite evolutionary game model consisting of hospitals, retail pharmacies, and healthcare service platforms. The study shows the following: (1) When the information security costs of prescription circulation increase, the willingness of hospitals to promote information collaboration weakens, the probability of control and regulation by healthcare platforms will be enhanced, and the incentive for retail pharmacies to undertake prescription circulation increases and then decreases. (2) The increased profitability of prescription drug sales can cause a decrease in the likelihood of both parties working together to promote information security. Increasing the collaborative space between hospitals and retail pharmacies is conducive to improving information security in the circulation of prescriptions. (3) A bi-directional constraint relationship exists between the circulation and control subjects. The shorter the technology spillover time from the healthcare service platform is, the higher the probability that hospitals and retail pharmacies will maintain the security of prescription information. (4) In the early stages of prescription circulation, the external regulatory action of the healthcare service platform is essential to improve the coordination of information security. Finally, combined with the tripartite evolutionary game model and simulation analysis results, it offers countermeasures and suggestions for the government to realize the prescription circulation information security collaboration.



    加载中


    [1] L. Liu, L. W. Xie, Risk prevention of online trading of prescription drugs from the perspective of "deregulation and service" (in Chinese), Chin. Admin. Manag., 10 (2021), 33–40. https://doi.org/10.19735/j.issn.1006-0863.2021.10.04 doi: 10.19735/j.issn.1006-0863.2021.10.04
    [2] B. Liu, C. X. Jiang, Can the reform of the two-vote system promote the innovation of pharmaceutical enterprises (in Chinese), Nankai Manag. Rev., 25 (2022), 54–66.
    [3] Y. J. Guo, D. Y. Liu, X. R. Tang, M. Hu, Analysis of influencing factors of prescription circulation and qualitative study on platform construction (in Chinese), China Pharm., 34 (2023), 1307–1312. https://doi.org/10.6039/j.issn.1001-0408.2023.11.05 doi: 10.6039/j.issn.1001-0408.2023.11.05
    [4] H. M. Hussien, S. M. Yasin, N. I. Udzir, M. I. H. Ninggal, S. Salman, Blockchain technology in the healthcare industry: Trends and opportunities, J. Ind. Inform. Integration, 22 (2021), 100217. https://doi.org/10.1016/J.JII.2021.100217 doi: 10.1016/J.JII.2021.100217
    [5] I. Izonin, N. Shakhovska, Informatics & data-driven medicine, Math. Biosci. Eng., 18 (2021), 6430–6433. https://doi.org/10.3934/mbe.2021319 doi: 10.3934/mbe.2021319
    [6] S. A. ElRahman, A. S. Alluhaidan, Blockchain technology and IoT-edge framework for sharing healthcare services, Soft Comput., 21 (2021), 13753–13777. https://doi.org/10.1007/S00500-021-06041-4 doi: 10.1007/S00500-021-06041-4
    [7] F. Hassandoust, M. Subasinghage, A. C. Johnston, A neo-institutional perspective on the establishment of information security knowledge sharing practices, Inf. Manag., 59 (2022), 103574. https://doi.org/10.1016/J.IM.2021.103574 doi: 10.1016/J.IM.2021.103574
    [8] S. Pal, M. Hitchens, V. Varadharajan, T. Rabehaja, Policy-based access control for constrained healthcare resources in the context of the Internet of Things, J. Netw. Comput. Appl., 139 (2019), 57–74. https://doi.org/10.1016/j.jnca.2019.04.013 doi: 10.1016/j.jnca.2019.04.013
    [9] D. B. Hu, S. L. Huang, Research on decision-making of medical service system considering information platform optimization (in Chinese), Chin. J. Manag. Sci., 11 (2022), 352–360. https://doi.org/10.16381/j.cnki.issn1003-207x.2019.2180 doi: 10.16381/j.cnki.issn1003-207x.2019.2180
    [10] Q. T. S. Shen, H. Qian, D. L. Zhang, Attribution model, quantitative assessment and governance path of network medical information risk (in Chinese), J. Ind. Eng. Eng. Manag., 5 (2021), 102–109. https://doi.org/10.13587/j.cnki.jieem.2021.05.009 doi: 10.13587/j.cnki.jieem.2021.05.009
    [11] J. Jiang, X. Yu, Y. Lin, Y. Guan, PercolationDF: A percolation-based medical diagnosis framework, Math. Biosci. Eng., 19 (2022), 5832–5849. https://doi.org/10.3934/MBE.2022273 doi: 10.3934/MBE.2022273
    [12] P. N. Sindhuja, The impact of information security initiatives on supply chain robustness and performance: an empirical study, Inf. Comput. Secur., 2 (2021), 365–391. https://doi.org/10.1108/ICS-07-2020-0128 doi: 10.1108/ICS-07-2020-0128
    [13] Y. Wu, L. L. Wang, G. Z. Feng, Research on incentive contract of information security outsourcing of supply chain complementary enterprises under bilateral moral hazard, Syst. Eng. Theory. Practice, 42 (2022), 2916–2926. https://doi.org/10.12011/SETP2021-2000 doi: 10.12011/SETP2021-2000
    [14] R. Gupta, B. Biswas, I. Biswas, S. S. Sana, Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach, Inf. Comput. Secur., 29 (2021), 73–104. https://doi.org/10.1108/ICS-02-2020-0028 doi: 10.1108/ICS-02-2020-0028
    [15] W. Yang, Y. Yang, H. Chen, How to stimulate Chinese energy companies to comply with emission regulations? Evidence from four-party evolutionary game analysis, Energy, 258 (2022), 124867. https://doi.org/10.1016/j.energy.2022.124867 doi: 10.1016/j.energy.2022.124867
    [16] J. Q. Gu, S. E. Mei, W. j. Zhong, Information system security investment and coordination mechanism considering interdependence (in Chinese), Oper. Res. Manag., 24 (2015), 136–142.
    [17] G. Zhu, F. J. Li, G. F. Cao, Z. Y. Jiang, Research on personal health privacy concern and paradox dissolution based on the theory of belief updating (in chinese), Library Intelligence Work, 67 (2023), 15–28. https://doi.org/10.13266/j.issn.0252-3116.2023.12.002 doi: 10.13266/j.issn.0252-3116.2023.12.002
    [18] J. Cai, H. Sun, X. Hu, W. Zhang, How reverse information sharing supports pricing and sales effort decisions: Signaling game-based incentive mechanism design, Comput. Ind. Eng., 177 (2023), 108992. https://doi.org/10.1016/J.CIE.2023.108992 doi: 10.1016/J.CIE.2023.108992
    [19] Y. Lu, A knowledge-driven decision support system for remote medical management, Math. Biosci. Eng., 20 (2023), 2732–2749. https://doi.org/10.3934/mbe.2023128 doi: 10.3934/mbe.2023128
    [20] J. Ji, Q. Pan, W. Zhu, M. He, The influence of own historical information and environmental historical information on the evolution of cooperation, Appl. Math. Comput., 446 (2023), 127902. https://doi.org/10.1016/J.AMC.2023.127902 doi: 10.1016/J.AMC.2023.127902
    [21] N. Roumeliotis, J. Sniderman, T. Adams-Webber, N. Anand, V. Rochon, C. Parshuram, Effect of electronic prescribing strategies on medication error and harm in hospital: a systematic review and meta-analysis, J. Gen. Intern. Med., 34 (2019), 2210–2223. https://doi.org/10.1007/s11606-019-05236-8 doi: 10.1007/s11606-019-05236-8
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(640) PDF downloads(31) Cited by(0)

Article outline

Figures and Tables

Figures(12)  /  Tables(5)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog