Information security outsourcing strategies in the supply chain considering security externality

被引:0
|
作者
Wu, Yong [1 ]
Wang, Nan [1 ]
Dai, Tao [1 ]
Cheng, Dong [1 ]
机构
[1] Donghua Univ, Glorious Sun Sch Business & Management, Shanghai, Peoples R China
关键词
Security outsourcing; complementation; security externality; supply chain; INVESTMENT; RISK; SERVICES; INTERDEPENDENCY; ECONOMICS;
D O I
10.1080/01605682.2024.2368611
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Information assets that complement each other capture the information security characteristics of supply chain firms. Supply chain firms usually outsource security services to Managed Security Service Providers (MSSPs) to protect their information. Considering the security externality and information leakage risk in security outsourcing, this article investigates four security management scenarios faced by two supply chain firms. We try to answer whether both firms should outsource security to the same or different MSSPs. We find that no matter under which scenario, as the complementation degree increases, both firms and MSSPs decrease the security quality, and MSSPs offer a contract with lower compensation. We show that information leakage risk and security externality have different effects on the MSSP's optimal strategy selections. Besides, the MSSP tends to serve both firms when the security externality is positive but prefers serving only one firm when the security externality is negative. Moreover, we find that the strategy that one firm outsources to an MSSP and its partner manages it in-house can be the optimal selection for the social planner but not the MSSP's optimal strategy. We also extend the model and find that the results are robust to the situations of uncertain loss and asymmetric loss.
引用
收藏
页码:482 / 497
页数:16
相关论文
共 50 条
  • [1] Managing partial outsourcing on information security in the presence of security externality
    Wu, Yong
    Liu, Yihao
    Dai, Tao
    Cheng, Dong
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 246
  • [2] Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities
    Zhang, Chenglong
    Feng, Nan
    Chen, Jianjian
    Li, Dahui
    Li, Minqiang
    INFORMATION SYSTEMS FRONTIERS, 2021, 23 (03) : 773 - 790
  • [3] Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities
    Chenglong Zhang
    Nan Feng
    Jianjian Chen
    Dahui Li
    Minqiang Li
    Information Systems Frontiers, 2021, 23 : 773 - 790
  • [4] Sourcing Information Security Operations: The Role of Risk Interdependency and Competitive Externality in Outsourcing Decisions
    Cezar, Asunur
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    PRODUCTION AND OPERATIONS MANAGEMENT, 2017, 26 (05) : 860 - 879
  • [5] Blockchain as supply chain technology: considering transparency and security
    Xu, Pei
    Lee, Joonghee
    Barth, James R.
    Richey, Robert Glenn
    INTERNATIONAL JOURNAL OF PHYSICAL DISTRIBUTION & LOGISTICS MANAGEMENT, 2021, 51 (03) : 305 - 324
  • [6] THE POLICY INFORMATION AS A DETERMINANT OF SECURITY IN THE SUPPLY CHAIN
    Zywiolek Justyna
    CARPATHIAN LOGISTICS CONGRESS (CLC' 2016), 2017, : 77 - 81
  • [7] Outsourcing Information Security: Contracting Issues and Security Implications
    Cezar, Asunur
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    MANAGEMENT SCIENCE, 2014, 60 (03) : 638 - 657
  • [8] Security Supply Chain
    Dias, Eduardo Mario
    Fontana, Caio Fernando
    Mori, Fabio Hideo
    Facioli, Luiz Paulo
    Zancul, Paulo Jose
    NEW ASPECTS OF SYSTEMS, PTS I AND II, 2008, : 771 - +
  • [9] Supply chain security
    Tejero, Hector
    Electronics World, 2023, 128 (2030):
  • [10] AN INFORMATION TECHNOLOGY MODEL FOR PHARMACEUTICAL SUPPLY CHAIN SECURITY
    Sultanow, Eldar
    Brockmann, Carsten
    ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES, 2013, 57 (01):