期刊文献+

信息安全外包激励契约设计 被引量:8

Design of incentive contracts for information security outsourcing
原文传递
导出
摘要 研究了信息安全外包背景下委托公司如何通过激励措施来协调管理安全服务提供商(MSSP)的努力水平从而有效地控制信息安全风险的问题.基于前人的研究和委托代理理论,提出了三种契约模型,即一般惩罚契约、部分外包契约和奖励-惩罚契约.然后对不同外包模式的均衡结果分别讨论并进行全面比较.研究结果表明,部分外包契约优于一般惩罚契约,但只有奖励-惩罚契约能够诱导MSsP最优努力的同时也使委托公司获得最大的回报.结论对信息安全外包的契约设计和风险控制有一定的管理启示. This paper analyzes how an outsourcing firm develops effective incentive measures to coordinate efforts of managed security service provider(MSSP) in the information security outsourcing project in order to control the risk associated with information security.Based on previous researches and the principal-agency theory,three models of contractual arrangements are introduced,which include general penalty contract,partial outsourcing contract and reward-penalty contract.Then,the equilibrium results of different outsourcing contracts are discussed respectively and compared comprehensively.The results indicate that,partial outsourcing contract is superior to penalty contract.But only the reward-penalty contract is able to induce first-best efforts from MSSP,by which the outsourcing firm can enjoy the maximum payoff as well.The conclusion provides some managerial implications for the contract design and risk control in the information security outsourcing.
出处 《系统工程理论与实践》 EI CSSCI CSCD 北大核心 2016年第2期392-399,共8页 Systems Engineering-Theory & Practice
基金 国家自然科学基金(71071033)~~
关键词 信息安全 管理安全服务 外包 契约设计 information security managed security service outsourcing contract design
  • 相关文献

参考文献14

  • 1Gao X, Zhong W, Mei S. Information security investment when hackers disseminate knowledge[J]. Decision Analysis, 2013, 10(4):352-368.
  • 2Elhag S, Fernandez A, Bawakid A. On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems[J]. Expert Systems with Applications, 2015, 42(1):193-202.
  • 3Huang C D, Behara R S. Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints[J]. International Journal of Production Economics, 2013, 141(1):255-268.
  • 4Elitzur R, Gavious A, Wensley A. Information systems outsourcing projects as a double moral hazard problem[J]. Omega, 2012, 40(3):379-389.
  • 5Bandyopadhyay T, Mookerjee V, Rao R C. Why IT managers don't go for cyberinsurance products[J]. Communications of the ACM, 2009, 52(11):68-73.
  • 6Ogut H, Menon N, Raghunathan S. Cyber security risk management:Public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection[J]. Risk Analysis, 2011, 31(3):497-512.
  • 7Lee C, Geng X, Raghunathan S. Contracting information security in the presence of double moral hazard[J]. Information Systems Research, 2013, 24(2):295-311.
  • 8Hui K, Hui W, Wei T, et al. Information security outsourcing with system interdependency and mandatory security requirement[J]. Journal of Management Information Systems, 2013, 29(3):117-155.
  • 9Cezar A, Cavusoglu H, Raghunathan S. Outsourcing information security:Contracting issues and security implications[J]. Management Science, 2014, 60(3):638-657.
  • 10Cavusoglu H, Raghunathan S. Configuration of and interaction between information security technologies:The case of firewalls and intrusion detection systems[J]. Information Systems Research, 2009, 20(2):198-217.

同被引文献48

引证文献8

二级引证文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部