The Design Of Information Security Services Outsourcing Game Analysis And Management Mechanism

被引:0
|
作者
Wei, Zhong [1 ]
机构
[1] Shanghai Maritime Univ, Econ & Management, Shanghai, Peoples R China
关键词
services outsourcing; Incentive Mechanism; information security; Asymmetric Information;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Use of economics perspective, analysis of information security services outsourcing process under asymmetric information both Owner and Service side Game features; Establish the corresponding game model; Research Focus on the conditions under asymmetric information in the service side of Owner incentive mechanism; Detailed design the e-government services outsourcing management of information security mechanisms; Also summarizes the development of the "information security services outsourcing management approach" in Game mechanism key points.
引用
收藏
页码:724 / 729
页数:6
相关论文
共 50 条
  • [31] Managing partial outsourcing on information security in the presence of security externality
    Wu, Yong
    Liu, Yihao
    Dai, Tao
    Cheng, Dong
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 246
  • [32] Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities
    Zhang, Chenglong
    Feng, Nan
    Chen, Jianjian
    Li, Dahui
    Li, Minqiang
    INFORMATION SYSTEMS FRONTIERS, 2021, 23 (03) : 773 - 790
  • [33] Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities
    Chenglong Zhang
    Nan Feng
    Jianjian Chen
    Dahui Li
    Minqiang Li
    Information Systems Frontiers, 2021, 23 : 773 - 790
  • [34] Management of enterprise services with outsourcing partners
    Huang, Ying
    Chung, Jen-Yao
    Management of E-Commerce and E-Government, 2007, : 5 - 16
  • [35] Economic Outsourcing of Facilities Management Services
    Lam, Terence
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON CONSTRUCTION AND REAL ESTATE MANAGEMENT, VOLS 1-3, 2010, : 50 - 55
  • [36] OUTSOURCING TRANSPORTATION AND TRAFFIC MANAGEMENT SERVICES
    BISHOP, D
    ANNUAL CONFERENCE PROCEEDINGS 1989 : COUNCIL OF LOGISTICS MANAGEMENT, VOLS 1 AND 2, 1989, : A207 - &
  • [37] Information Security Risk Management in IT Outsourcing - A Quarter-century Systematic Literature Review
    Bhatti, Baber Majid
    Mubarak, Sameera
    Nagalingam, Sev
    JOURNAL OF GLOBAL INFORMATION TECHNOLOGY MANAGEMENT, 2021, 24 (04) : 259 - 298
  • [38] Risk Management for Outsourcing to the Cloud Security Risks and Safeguards as Selection Criteria for Extern Cloud Services
    Viehmann, Johannes
    2014 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2014, : 293 - 295
  • [39] Design, Demonstration, and Evaluation of an Information Security Contract and Trading Mechanism to Hedge Information Security Risks
    Pandey, Pankaj
    De Haes, Steven
    SECURITY AND TRUST MANAGEMENT (STM 2015), 2015, 9331 : 283 - 292
  • [40] Game Theory and Information Security
    Meng Xianghong
    Wang Xiaoli
    ADVANCED RESEARCH IN MATERIAL SCIENCE AND MECHANICAL ENGINEERING, PTS 1 AND 2, 2014, 446-447 : 1625 - +