IDEAS home Printed from https://ideas.repec.org/a/igg/jrcm00/v1y2012i1p12-28.html
   My bibliography  Save this article

Employing Cost Effective Internet-Based Networking Technologies to Manage B2B Relationship: The Strategic Impact on IT Security Risk

Author

Listed:
  • Tridib Bandyopadhyay

    (Kennesaw State University, USA)

Abstract

Using Internet-based technologies to establish network connectivity between firms can create conduit for propagation of threat vectors. Sharing data and information assets with other firms may give rise to external seats of loss exposure. Together, these practices complicate the IT security risk in business relationship: misaligned incentive for IT security investment and free rider behavior arise. Naïve pursuit to enter into business relationships using Internet-based technologies can prove myopic because the IT security risk profile of the resultant B2B network may be untenable. This research exhibits the impact of sharing and linking of information and network assets on IT security risk in modern business relationship with the help of a 2-firm symmetric B2B. This work demonstrates why managers should consider expanding their business relationship to include IT security initiatives as well, especially when they employ Internet-based technologies to interlink their networks.

Suggested Citation

  • Tridib Bandyopadhyay, 2012. "Employing Cost Effective Internet-Based Networking Technologies to Manage B2B Relationship: The Strategic Impact on IT Security Risk," International Journal of Risk and Contingency Management (IJRCM), IGI Global, vol. 1(1), pages 12-28, January.
  • Handle: RePEc:igg:jrcm00:v:1:y:2012:i:1:p:12-28
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijrcm.2012010102
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jrcm00:v:1:y:2012:i:1:p:12-28. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.