The Design Of Information Security Services Outsourcing Game Analysis And Management Mechanism

被引:0
|
作者
Wei, Zhong [1 ]
机构
[1] Shanghai Maritime Univ, Econ & Management, Shanghai, Peoples R China
关键词
services outsourcing; Incentive Mechanism; information security; Asymmetric Information;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Use of economics perspective, analysis of information security services outsourcing process under asymmetric information both Owner and Service side Game features; Establish the corresponding game model; Research Focus on the conditions under asymmetric information in the service side of Owner incentive mechanism; Detailed design the e-government services outsourcing management of information security mechanisms; Also summarizes the development of the "information security services outsourcing management approach" in Game mechanism key points.
引用
收藏
页码:724 / 729
页数:6
相关论文
共 50 条
  • [1] Game theory as a tool for understanding information services outsourcing
    Elitzur, R
    Wensley, A
    JOURNAL OF INFORMATION TECHNOLOGY, 1997, 12 (01) : 45 - 60
  • [2] Incentive mechanism analysis of information security outsourcing based on principal-agent model
    Xiong, Qiang
    Zhong, Weijun
    Mei, Shu'e
    Journal of Southeast University (English Edition), 2014, 30 (01) : 113 - 117
  • [3] Incentive Mechanism Design Based on Repeated Game Theory in Security Information Sharing
    Xiong Qiang
    Chen Xiaoyan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON SCIENCE AND SOCIAL RESEARCH (ICSSR 2013), 2013, 64 : 399 - 401
  • [4] Outsourcing information services
    Petry-Eberle, Anne
    Bieg, Monika
    LIBRARY HI TECH, 2009, 27 (04) : 602 - 609
  • [5] Game analysis and mechanism design on information sharing in virtual enterprise
    CAD Center, Huazhong University of Science and Technology, Wuhan 430074, China
    不详
    Jisuanji Jicheng Zhizao Xitong, 2007, 8 (1566-1571):
  • [6] Addressing cultural dissimilarity in the Information Security Management Outsourcing relationship
    Tsohou, Aggeliki
    Theoharidou, Marianthi
    Kokolakis, Spyros
    Gritzalis, Dimitris
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2007, 4657 : 24 - +
  • [7] Game Theory Meets Information Security Management
    Fielder, Andrew
    Panaousis, Emmanouil
    Malacaria, Pasquale
    Hankin, Chris
    Smeraldi, Fabrizio
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 15 - 29
  • [8] An economic analysis of information security outsourcing with competitive firms
    Gao, Xing
    Gong, Siyu
    MANAGERIAL AND DECISION ECONOMICS, 2022, 43 (07) : 2748 - 2758
  • [9] The design of presence information management mechanism for IMPP services based on SIP
    Huh, MY
    Hyun, W
    Park, SO
    Han, JC
    Kang, SG
    6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 644 - 647
  • [10] Information Security Risk Management in a World of Services
    Lalanne, Vincent
    Munier, Manuel
    Gabillon, Alban
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 586 - 593