메뉴 건너뛰기




Volumn , Issue , 2011, Pages 646-651

Exploitation of auctions for outsourcing security-critical projects

Author keywords

Auction; IT Security; Outsourcing; Security Critical

Indexed keywords

AUCTION; AUCTION PROCESS; BIDDING PROCESS; IT SECURITY; SECURITY METRICS; SECURITY REQUIREMENTS; SECURITY-CRITICAL; SERVICE PROVIDER;

EID: 80052770275     PISSN: 15301346     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCC.2011.5983912     Document Type: Conference Paper
Times cited : (8)

References (36)
  • 1
    • 33744922914 scopus 로고    scopus 로고
    • Outsourcing internet security: Economic analysis of incentives for managed security service providers
    • W. Ding, W. Yurcik, X. Yin, "Outsourcing internet security: Economic analysis of incentives for managed security service providers", Journal of Internet and Network Economics, pp. 947-958, 2005.
    • (2005) Journal of Internet and Network Economics , pp. 947-958
    • Ding, W.1    Yurcik, W.2    Yin, X.3
  • 4
    • 10144232763 scopus 로고    scopus 로고
    • Validating measures of information technology outsourcing risk factors
    • DOI 10.1016/j.omega.2004.04.003, PII S0305048304000635
    • B. Bahli, S. Rivard, "Validating measures of information technology outsourcing risk factors", Journal Omega, Vol. 33, pp. 175-187, 2005 (Pubitemid 39615362)
    • (2005) Omega , vol.33 , Issue.2 , pp. 175-187
    • Bahli, B.1    Rivard, S.2
  • 5
    • 84979792294 scopus 로고    scopus 로고
    • IT security outsourcing: How safe is your IT security?
    • DOI 10.1016/S0267-3649(02)03009-1, PII S0267364902030091
    • C. Fenn, R. Shooter, K. Allan, "IT Security Outsourcing: How safe is it your IT Security", Computer Law & Security Report, Vol. 18, pp. 109-111, 2002. (Pubitemid 34249783)
    • (2002) Computer Law and Security Report , vol.18 , Issue.2 , pp. 109-111
    • Fenn, C.1    Shooter, R.2    Allan, K.3
  • 6
    • 1242265180 scopus 로고    scopus 로고
    • Information security considerations in IS/IT outsourcing projects: A descriptive case study of two sectors
    • A. Khalfan, "Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors", International Journal of Information Management, Vol. 24, pp. 29-42, 2004.
    • (2004) International Journal of Information Management , vol.24 , pp. 29-42
    • Khalfan, A.1
  • 8
    • 0037004470 scopus 로고    scopus 로고
    • The case for outsourcing security
    • B. Schneier, "The case for outsourcing security", Computer, Vol. 35, pp. 20-26, 2002.
    • (2002) Computer , vol.35 , pp. 20-26
    • Schneier, B.1
  • 9
    • 33751160564 scopus 로고    scopus 로고
    • A framework for information technology outsourcing risk management
    • B. Aubert, M. Patry, S. Rivard, "A framework for information technology outsourcing risk management", ACM SIGMIS Database, Vol. 36, pp. 9-28, 2005.
    • (2005) ACM SIGMIS Database , vol.36 , pp. 9-28
    • Aubert, B.1    Patry, M.2    Rivard, S.3
  • 10
    • 0242611448 scopus 로고    scopus 로고
    • The information technology outsourcing risk: A transaction cost and agency theory-based perspective
    • DOI 10.1080/0268396032000130214
    • B. Bahli, S. Rivard, "The information technology outsourcing risk: A transaction cost and agency theory-based perspective", Journal of Information Technology, Vol. 18, pp. 211-221, 2003. (Pubitemid 37406519)
    • (2003) Journal of Information Technology , vol.18 , Issue.3 , pp. 211-221
    • Bahli, B.1    Rivard, S.2
  • 11
    • 18844385758 scopus 로고    scopus 로고
    • Information systems outsourcing risks: A study of large firms
    • DOI 10.1108/02635570510575180
    • R. Gonzalez, J. Gasco, J. Llopis, "Information systems outsourcing risks: A study of large firms", Industrial Management and Data Systems, Vol. 105, pp. 45-62, 2005. (Pubitemid 40690939)
    • (2005) Industrial Management and Data Systems , vol.105 , Issue.1 , pp. 45-62
    • Gonzalez, R.1    Gasco, J.2    Llopis, J.3
  • 12
  • 13
    • 1542532493 scopus 로고    scopus 로고
    • Auctions Versus Negotiations
    • J. Bulow, P. Klemperer, "Auctions versus Negotiations", The American Economic Review, Vol. 86, No. 1, pp. 180-194, 1996. (Pubitemid 126420170)
    • (1996) American Economic Review , vol.86 , Issue.1 , pp. 180-194
    • Bulow, J.1    Klemperer, P.2
  • 16
    • 80052757814 scopus 로고    scopus 로고
    • Federal Communications Commission (FCC), http://www.fcc.gov
  • 17
    • 0141495795 scopus 로고    scopus 로고
    • San Diego Academic Press, USA
    • V. Krishna, Auction Theory, San Diego Academic Press, USA, 2002.
    • (2002) Auction Theory
    • Krishna, V.1
  • 18
    • 0032804976 scopus 로고    scopus 로고
    • Auction theory: A guide to the literature
    • P. Klemperer, "Auction Theory: A Guide to the Literature", Journal of Economic Surveys, Vol. 13, pp. 227-286, 1999. (Pubitemid 29392123)
    • (1999) Journal of Economic Surveys , vol.13 , Issue.3 , pp. 227-286
    • Klemperer, P.1
  • 19
    • 0000077429 scopus 로고
    • Strategic Analysis of Auctions
    • R. Aumann, et al. (Eds.), USA
    • R. Wilson, "Strategic Analysis of Auctions", in Handbook of Game Theory, R. Aumann, et al. (Eds.), USA, 1990.
    • (1990) Handbook of Game Theory
    • Wilson, R.1
  • 21
    • 21844482630 scopus 로고
    • Design competition through multidimensional auctions
    • Y. Che, "Design competition through multidimensional auctions", RAND Journal of Economics, Vol. 24, pp. 668-680, 1993.
    • (1993) RAND Journal of Economics , vol.24 , pp. 668-680
    • Che, Y.1
  • 23
    • 84980096808 scopus 로고
    • Counterspeculation, Auctions and Competitive Sealed Tenders
    • W. Vickrey, "Counterspeculation, Auctions and Competitive Sealed Tenders", Journal of Finance, Vol. 16, No. 1, pp. 8-37, 1961.
    • (1961) Journal of Finance , vol.16 , Issue.1 , pp. 8-37
    • Vickrey, W.1
  • 24
    • 0000914216 scopus 로고    scopus 로고
    • Auctions: An introduction
    • E. Wolfstetter, "Auctions: An introduction", Journal of Economic Surveys, Vol. 10, No. 4, pp. 367-420, 1996.
    • (1996) Journal of Economic Surveys , vol.10 , Issue.4 , pp. 367-420
    • Wolfstetter, E.1
  • 25
    • 0030305641 scopus 로고    scopus 로고
    • The all-pay auction with complete information
    • M. Baye, D. Kovenock, C. De Vries, "The all-pay auction with complete information", Economic Theory, Vol. 8, pp. 291-305, 1996. (Pubitemid 126172221)
    • (1996) Economic Theory , vol.8 , Issue.2 , pp. 291-305
    • Baye, M.R.1    Kovenock, D.2    De Vries, C.G.3
  • 31
    • 24944573251 scopus 로고    scopus 로고
    • Security Metrics Guide for Information Technology Systems
    • National Institute of Standards & Technology, NIST, USA
    • National Institute of Standards & Technology, Security Metrics Guide for Information Technology Systems, NIST Special Publication 800-55, NIST, USA, 2003.
    • (2003) NIST Special Publication 800-55
  • 33
    • 84867879496 scopus 로고    scopus 로고
    • Managing Risk from Information Systems - An Organizational Perspective
    • National Institute of Standards & Technology, NIST, USA
    • National Institute of Standards & Technology, Managing Risk from Information Systems - An Organizational Perspective, NIST Special Publication 800-39, NIST, USA, 2008.
    • (2008) NIST Special Publication 800-39
  • 36
    • 0034389119 scopus 로고    scopus 로고
    • Mutually Destructive Bidding: The FCC Auction Design Problem
    • M. Bykowsky, R. Cull, J. Ledyard, "Mutually Destructive Bidding: The FCC Auction Design Problem", Journal of Regulatory Economics, Vol. 17, pp. 205-228, 2000.
    • (2000) Journal of Regulatory Economics , vol.17 , pp. 205-228
    • Bykowsky, M.1    Cull, R.2    Ledyard, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.