Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities
Author
Abstract
Suggested Citation
DOI: 10.1007/s10796-020-10009-4
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Bobby Swar & Junghoon Moon & Junyoung Oh & Cheul Rhee, 2012. "Determinants of relationship quality for IS/IT outsourcing success in public sector," Information Systems Frontiers, Springer, vol. 14(2), pages 457-475, April.
- Eric T. G. Wang & Terry Barron & Abraham Seidmann, 1997. "Contracting Structures for Custom Software Development: The Impacts of Informational Rents and Uncertainty on Internal Development and Outsourcing," Management Science, INFORMS, vol. 43(12), pages 1726-1744, December.
- Fischer, Gregory, 2013. "Contract structure, risk sharing and investment choice," LSE Research Online Documents on Economics 46796, London School of Economics and Political Science, LSE Library.
- Greg Fischer, 2013. "Contract Structure, Risk‐Sharing, and Investment Choice," Econometrica, Econometric Society, vol. 81(3), pages 883-939, May.
- Heidt, Margareta & Gerlach, Jin & Buxmann, Peter, 2019. "Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 118284, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
- Chul Ho Lee & Xianjun Geng & Srinivasan Raghunathan, 2013. "Contracting Information Security in the Presence of Double Moral Hazard," Information Systems Research, INFORMS, vol. 24(2), pages 295-311, June.
- Tawei Wang & Karthik N. Kannan & Jackie Rees Ulmer, 2013. "The Association Between the Disclosure and the Realization of Information Security Risk Factors," Information Systems Research, INFORMS, vol. 24(2), pages 201-218, June.
- Kjell Hausken, 2014. "Returns to information security investment: Endogenizing the expected loss," Information Systems Frontiers, Springer, vol. 16(2), pages 329-336, April.
- Esther Gal-Or & Anindya Ghose, 2005.
"The Economic Incentives for Sharing Security Information,"
Information Systems Research, INFORMS, vol. 16(2), pages 186-208, June.
- Esther Gal-Or & Anindya Ghose, 2005. "The Economic Incentives for Sharing Security Information," Industrial Organization 0503004, University Library of Munich, Germany.
- Daniel Schatz & Rabih Bashroush, 2017. "Economic valuation for information security investment: a systematic literature review," Information Systems Frontiers, Springer, vol. 19(5), pages 1205-1228, October.
- Sagnika Sen & T. S. Raghu & Ajay Vinze, 2009. "Demand Heterogeneity in IT Infrastructure Services: Modeling and Evaluation of a Dynamic Approach to Defining Service Levels," Information Systems Research, INFORMS, vol. 20(2), pages 258-276, June.
- Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
- Margareta Heidt & Jin P. Gerlach & Peter Buxmann, 2019. "Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments," Information Systems Frontiers, Springer, vol. 21(6), pages 1285-1305, December.
- Debabrata Dey & Ming Fan & Conglei Zhang, 2010. "Design and Analysis of Contracts for Software Outsourcing," Information Systems Research, INFORMS, vol. 21(1), pages 93-114, March.
- Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
- Seungjin Whang, 1992. "Contracting for Software Development," Management Science, INFORMS, vol. 38(3), pages 307-324, March.
- Daniel Schatz & Rabih Bashroush, 0. "Economic valuation for information security investment: a systematic literature review," Information Systems Frontiers, Springer, vol. 0, pages 1-24.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 2021. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 23(3), pages 773-790, June.
- Chul Ho Lee & Xianjun Geng & Srinivasan Raghunathan, 2013. "Contracting Information Security in the Presence of Double Moral Hazard," Information Systems Research, INFORMS, vol. 24(2), pages 295-311, June.
- Mazaher Kianpour & Stewart J. Kowalski & Harald Øverby, 2021. "Systematically Understanding Cybersecurity Economics: A Survey," Sustainability, MDPI, vol. 13(24), pages 1-28, December.
- Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
- Yosra Miaoui & Noureddine Boudriga, 2019. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 21(2), pages 261-300, April.
- Yosra Miaoui & Noureddine Boudriga, 0. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 0, pages 1-40.
- Kai-Lung Hui & Ping Fan Ke & Yuxi Yao & Wei T. Yue, 2019. "Bilateral Liability-Based Contracts in Information Security Outsourcing," Information Systems Research, INFORMS, vol. 30(2), pages 411-429, June.
- Yong Wu & Mengyao Xu & Dong Cheng & Tao Dai, 2022. "Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker," Decision Analysis, INFORMS, vol. 19(2), pages 99-122, June.
- Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.
- Margareta Heidt & Jin P. Gerlach & Peter Buxmann, 2019. "Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments," Information Systems Frontiers, Springer, vol. 21(6), pages 1285-1305, December.
- Xing Gao & Siyu Gong, 2022. "An economic analysis of information security outsourcing with competitive firms," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(7), pages 2748-2758, October.
- Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
- Tejaswini C. Herath & Hemantha S. B. Herath & David Cullum, 2023. "An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks," Information Systems Frontiers, Springer, vol. 25(2), pages 681-721, April.
- Thorsten Beck & Patrick Behr, 2017. "Individual versus Village Lending: Evidence from Montenegro," Review of Development Economics, Wiley Blackwell, vol. 21(4), pages 67-87, November.
- Renate Strobl & Conny Wunsch, 2021. "Risky choices and solidarity: disentangling different behavioural channels," Experimental Economics, Springer;Economic Science Association, vol. 24(4), pages 1185-1214, December.
- Sommarat Chantarat & Chayanee Chawanote & Lathaporn Ratanavararak & Chonnakan Rittinon & Boontida Sa-ngimnet & Narongrit Adultananusak, 2023. "Financial Lives and the Vicious Cycle of Debt among Thai Agricultural Households," PIER Discussion Papers 204, Puey Ungphakorn Institute for Economic Research.
- Mingwen Yang & Varghese S. Jacob & Srinivasan Raghunathan, 2021. "Cloud Service Model’s Role in Provider and User Security Investment Incentives," Production and Operations Management, Production and Operations Management Society, vol. 30(2), pages 419-437, February.
- Maitra, Pushkar & Mitra, Sandip & Mookherjee, Dilip & Motta, Alberto & Visaria, Sujata, 2017.
"Financing smallholder agriculture: An experiment with agent-intermediated microloans in India,"
Journal of Development Economics, Elsevier, vol. 127(C), pages 306-337.
- Pushkar Maitra & Sandip Mitra & Dilip Mookherjee & Alberto Motta & Sujata Visaria, 2014. "Financing Smallholder Agriculture: An Experiment with Agent-Intermediated Microloans in India," NBER Working Papers 20709, National Bureau of Economic Research, Inc.
- Pushkar Maitra & Sandip Mitra & Dilip Mookherjee & Alberto Motta & Sujata Visaria, 2014. "Financing Smallholder Agriculture: An Experiment with Agent-Intermediated Microloans in India," Monash Economics Working Papers 35-14, Monash University, Department of Economics.
- Mookherjee, Dilip & Maitra, Pushkar & Mitra, Sandip & Motta, Alberto & Visaria, Sujata, 2016. "Financing Smallholder Agriculture: An Experiment wth Agent-Intermediated Microloans in India," CEPR Discussion Papers 11549, C.E.P.R. Discussion Papers.
- Pushkar Maitra & Sandip Mitra & Dilip Mookherjee & Alberto Motta & Sujata Visaria, 2015. "Financing Smallholder Agriculture: An Experiment with Agent-Intermediated Microloans in India," HKUST IEMS Working Paper Series 2015-23, HKUST Institute for Emerging Market Studies, revised Apr 2015.
- Dasgupta, Dyotona & Mookherjee, Dilip, 2023.
"A theory of progressive lending,"
Games and Economic Behavior, Elsevier, vol. 137(C), pages 211-227.
- Dyotona Dasgupta & Dilip Mookherjee, 2020. "A Theory of Progressive Lending," Boston University - Department of Economics - The Institute for Economic Development Working Papers Series dp-348, Boston University - Department of Economics.
- Dyotona Dasgupta & Dilip Mookherjee, 2020. "A Theory of Progressive Lending," Working papers 310, Centre for Development Economics, Delhi School of Economics.
- Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
More about this item
Keywords
Information security; Outsourcing strategy; Correlated loss; Security externality; Moral hazard;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v::y::i::d:10.1007_s10796-020-10009-4. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.