Contracting Information Security in the Presence of Double Moral Hazard

Cited 45 time in webofscience Cited 48 time in scopus
  • Hit : 643
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLee, Chul Hoko
dc.contributor.authorGeng, Xianjunko
dc.contributor.authorRaghunathan, Srinivasanko
dc.date.accessioned2016-06-30T00:37:57Z-
dc.date.available2016-06-30T00:37:57Z-
dc.date.created2016-04-19-
dc.date.created2016-04-19-
dc.date.created2016-04-19-
dc.date.issued2013-06-
dc.identifier.citationINFORMATION SYSTEMS RESEARCH, v.24, no.2, pp.295 - 311-
dc.identifier.issn1047-7047-
dc.identifier.urihttp://hdl.handle.net/10203/208698-
dc.description.abstractIn information security outsourcing, it is the norm that the outsourcing firms and the outsourcers (commonly called managed security service providers, MSSPs) need to coordinate their efforts for better security. Nevertheless, efforts are often private and thus both firms and MSSPs can suffer from double moral hazard. Furthermore, the double moral hazard problem in security outsourcing is complicated by the existence of strong externality and the multiclient nature of MSSP services. In this prescriptive research, we first show that the prevailing contract structure in security outsourcing, bilateral refund contract, cannot solve double moral hazard. Adding breach-contingent sunk cost or external payment cannot solve double moral hazard either. Furthermore, positive externality can worsen double moral hazard. We then propose a new contract structure termed multilateral contract and show that it can solve double moral hazard and induce first-best efforts from all contractual parties when an MSSP serves two or more client firms, regardless of the externality. Firm-side externality significantly affects how payments flow under a multilateral contract when a security breach happens. When the number of client firms for an MSSP increases, we show that the contingent payments under multilateral contracts for any security breach scenario can be easily calculated using an additive method, and thus are computationally simple to implement.-
dc.languageEnglish-
dc.publisherINFORMS-
dc.subjectSOFTWARE-DEVELOPMENT-
dc.subjectLINEAR CONTRACTS-
dc.subjectMULTIPLE AGENTS-
dc.subjectINCENTIVES-
dc.subjectWARRANTIES-
dc.titleContracting Information Security in the Presence of Double Moral Hazard-
dc.typeArticle-
dc.identifier.wosid000319861400006-
dc.identifier.scopusid2-s2.0-84878838952-
dc.type.rimsART-
dc.citation.volume24-
dc.citation.issue2-
dc.citation.beginningpage295-
dc.citation.endingpage311-
dc.citation.publicationnameINFORMATION SYSTEMS RESEARCH-
dc.identifier.doi10.1287/isre.1120.0447-
dc.contributor.localauthorLee, Chul Ho-
dc.contributor.nonIdAuthorGeng, Xianjun-
dc.contributor.nonIdAuthorRaghunathan, Srinivasan-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorinformation security outsourcing-
dc.subject.keywordAuthormanaged security service providers-
dc.subject.keywordAuthordouble moral hazard-
dc.subject.keywordAuthorexternality-
dc.subject.keywordPlusSOFTWARE-DEVELOPMENT-
dc.subject.keywordPlusLINEAR CONTRACTS-
dc.subject.keywordPlusMULTIPLE AGENTS-
dc.subject.keywordPlusINCENTIVES-
dc.subject.keywordPlusWARRANTIES-
Appears in Collection
MG-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 45 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0