Managing Security Outsourcing in the Presence of Strategic Hackers

被引:14
|
作者
Wu, Yong [1 ]
Duan, Junlin [1 ]
Dai, Tao [1 ]
Cheng, Dong [1 ]
机构
[1] Donghua Univ, Glorious Sun Sch Business & Management, Shanghai 200051, Peoples R China
关键词
strategic hacker; managed security service; decision analysis; security externality; INFORMATION SECURITY; INVESTMENT; GAME; INTERDEPENDENCY; BEHAVIOR; RISKS; FIRMS;
D O I
10.1287/deca.2019.0406
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Nowadays, firms tend to outsource security operations to professional managed security service providers (MSSPs) as a result of the sophistication of strategic hackers. Thus, how an MSSP makes security decisions according to a strategic hacker's action is worth researching. Constructing a contract theory model, this paper examines the interaction between an MSSP and a strategic hacker based on both parties' characteristics. We find that the hacker will give up less valuable information assets, and thus not all information assets are worth protecting for the MSSP. For both parties, their optimal efforts do not necessarily increase with their respective efficiency, and the firm's reputation loss has an opposite effect on its respective efforts. Moreover, we distinguish two types of security externalities including MSSP-side externality and hacker-side externality, and we find that the two types of security externalities have different effects on both parties' optimal efforts and expected payoffs. We also find that as a result of the trade-off between the integration effect of the MSSP and the effect of MSSP-side externality, firms are still willing to outsource their security operations to the MSSP even when an MSSP devotes fewer security efforts than those of firms that manage security in-house. Last, we extend our base model from two aspects to generalize the main results.
引用
收藏
页码:235 / 259
页数:25
相关论文
共 50 条
  • [1] Managing partial outsourcing on information security in the presence of security externality
    Wu, Yong
    Liu, Yihao
    Dai, Tao
    Cheng, Dong
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 246
  • [2] Managing security for outsourcing contracts
    Sherwood, J
    COMPUTERS & SECURITY, 1997, 16 (07) : 603 - 609
  • [3] Managing strategic outsourcing in the healthcare industry
    Roberts, V
    JOURNAL OF HEALTHCARE MANAGEMENT, 2001, 46 (04) : 239 - 249
  • [4] Managing cloud security in the presence of strategic hacker and joint responsibility
    Wu, Yong
    Kang, Zi
    Dai, Tao
    Cheng, Dong
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2024, 75 (07) : 1371 - 1384
  • [5] Impact of strategic decision making for outsourcing on managing manufacturing
    Dekkers, Rob
    INTERNATIONAL JOURNAL OF OPERATIONS & PRODUCTION MANAGEMENT, 2011, 31 (9-10) : 935 - 965
  • [6] Inter-Temporal Reward Strategies in the Presence of Strategic Ethical Hackers
    Hou, Jing
    Wang, Xuyu
    Zeng, Amy Z.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (05) : 4427 - 4440
  • [7] A Strategic Framework for Managing Internet Security
    Sitnikova, Elena
    Asgarkhani, Mehdi
    2014 11TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2014, : 947 - 955
  • [8] Managing Information Security Outsourcing in a Dynamic Cooperation Environment
    Wu, Yong
    Tayi, Giri Kumar
    Feng, Genzhong
    Fung, Richard Y. K.
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2021, 22 (03): : 827 - 850
  • [9] Strategic Management - Managing The Potential Complexity-Risks In Outsourcing
    Rennung, Frank Martin
    Luminosu, Caius Tudor
    Draghici, Anca
    4TH WORLD CONFERENCE ON BUSINESS, ECONOMICS AND MANAGEMENT (WCBEM-2015), 2015, 26 : 757 - 763
  • [10] Managing business processes through outsourcing: a strategic partnering perspective
    Saxena, K. B. C.
    Bharadwaj, Sangeeta S.
    BUSINESS PROCESS MANAGEMENT JOURNAL, 2009, 15 (05) : 687 - 715