Decisions making in information security outsourcing: Impact of complementary and substitutable firms

被引:19
|
作者
Wu, Yong [1 ,2 ]
Fung, Richard Y. K. [2 ]
Feng, Gengzhong [1 ]
Wang, Nengmin [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Management, Xian, Shaanxi, Peoples R China
[2] City Univ Hong Kong, Dept Syst Engn & Engn Management, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Managed security service providers; Information security investment; Information security outsourcing; Complementary; Substitutable; INVESTMENT; GAME; ECONOMICS; SERVICES; SERIES; ATTACK; RISKS;
D O I
10.1016/j.cie.2017.05.018
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper constructs a contract-theory model to investigate tow an MSSP's (Managed Security Service Provider) operating characteristics of cost efficiency, multiple clients, security externality and firms' information nature affect the MSSP's strategic decisions, including the contract structure and the optimum investment level for firms. The analysis shows that firms' information nature, either complementary or substitutable, plays a crucial role in influencing an MSSP's decisions. First, the MSSP tends to provider a contract with a lower refund and exert a lower security investment level when the degree of complementation is higher while tending to provider a contract with a higher refund and exert a higher security investment level when the degree of substitution is higher. Second, there is a lot of differences that how the security externality affects the decisions of the MSSP who serves complementary firms and that who serves substitutable firms. Third, the MSSP's optimum refund (service fee) to complementary firms is greater than firms' expected loss (expected cost), while the MSSP's optimum refund (service fee) to substitutable firms is smaller than firms' expected loss (expected cost). Fourth, serving a smaller number of substitutable firms is more economic for an MSSP while serving complementary firms the more the better. In addition, the optimum contract structures between an MSSP and complementary (and substitutable) firms are discussed in this paper. These findings give some insights that can guide an MSSP to determine an optimum contract structure and investment level for firms. Future research directions are discussed based on the limitations and possible extensions of this study. (C) 2017 Elsevier Ltd. All rights reserved.
引用
下载
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [21] Firms' information security investment decisions: Stock market evidence of investors' behavior
    Chai, Sangmi
    Kim, Minkyun
    Rao, H. Raghav
    DECISION SUPPORT SYSTEMS, 2011, 50 (04) : 651 - 661
  • [22] The impact of technological innovation on outsourcing decisions
    Yu, Larry
    MIT SLOAN MANAGEMENT REVIEW, 2008, 49 (04) : 12 - 13
  • [23] Triggers of HR outsourcing decisions - an empirical analysis of German firms
    Alewell, Dorothea
    Hauff, Sven
    Thommes, Kirsten
    Weiland, Katrin
    INTERNATIONAL JOURNAL OF HUMAN RESOURCE MANAGEMENT, 2009, 20 (07): : 1599 - 1617
  • [24] Outsourcing Information Security: Contracting Issues and Security Implications
    Cezar, Asunur
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    MANAGEMENT SCIENCE, 2014, 60 (03) : 638 - 657
  • [25] Creating an effective security risk model for outsourcing decisions
    Colwill, C.
    Gray, A.
    BT TECHNOLOGY JOURNAL, 2007, 25 (01) : 79 - 87
  • [26] Strategic outsourcing decisions for manufacturers that produce partially substitutable products in a quantity-setting duopoly situation
    Xiao, Tiaojun
    Xia, Yusen
    Zhang, G. Peter
    DECISION SCIENCES, 2007, 38 (01) : 81 - 106
  • [27] Information systems outsourcing reasons in the largest Spanish firms
    Gonzalez, R
    Gasco, J
    Llopis, J
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2005, 25 (02) : 117 - 136
  • [28] Information systems outsourcing risks: a study of large firms
    Gonzalez, R
    Gasco, J
    Llopis, J
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2005, 105 (1-2) : 45 - 62
  • [29] Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
    Hui, Kai-Lung
    Hui, Wendy
    Yue, Wei T.
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2012, 29 (03) : 117 - 155
  • [30] Managing partial outsourcing on information security in the presence of security externality
    Wu, Yong
    Liu, Yihao
    Dai, Tao
    Cheng, Dong
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 246