메뉴 건너뛰기




Volumn 24, Issue 2, 2013, Pages 295-311

Contracting information security in the presence of double moral hazard

Author keywords

Double moral hazard; Externality; Information security outsourcing; Managed security service providers

Indexed keywords

OUTSOURCING; RISK MANAGEMENT; SECURITY OF DATA;

EID: 84878838952     PISSN: 10477047     EISSN: 15265536     Source Type: Journal    
DOI: 10.1287/isre.1120.0447     Document Type: Article
Times cited : (74)

References (44)
  • 1
    • 33749469503 scopus 로고    scopus 로고
    • Whitepaper, Carnegie Mellon Software Engineering Institute. Available at
    • Allen J, Gabbard D, May C (2003) Outsourcing managed security services. Whitepaper, Carnegie Mellon Software Engineering Institute. Available at http://www.cert.org/archive/pdf/omss.pdf.
    • (2003) Outsourcing managed security services
    • Allen, J.1    Gabbard, D.2    May, C.3
  • 2
    • 0031144907 scopus 로고    scopus 로고
    • Incentive contracts in two-sided moral hazards with multiple agents
    • Al-Najjar N (1997) Incentive contracts in two-sided moral hazards with multiple agents. J. Econom. Theory 74(1):174-195.
    • (1997) J. Econom. Theory , vol.74 , Issue.1 , pp. 174-195
    • Al-Najjar, N.1
  • 3
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • Anderson R, Moore T (2006) The economics of information security. Science 314(27):610-613.
    • (2006) Science , vol.314 , Issue.27 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 4
    • 3042745793 scopus 로고    scopus 로고
    • The weakest link revisited
    • Arce I (2003) The weakest link revisited. IEEE Security and Privacy 1(2):72-76.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.2 , pp. 72-76
    • Arce, I.1
  • 5
    • 25144467984 scopus 로고    scopus 로고
    • Quality implications of warranties in a supply chain
    • Balachandran KR, Radhakrishnan S (2005) Quality implications of warranties in a supply chain. Management Sci. 51(8):1266-1277.
    • (2005) Management Sci. , vol.51 , Issue.8 , pp. 1266-1277
    • Balachandran, K.R.1    Radhakrishnan, S.2
  • 7
    • 85077563618 scopus 로고
    • Double-sided hazard and the nature of share contracts
    • Bhattacharyya S, Lafontaine F (1995) Double-sided hazard and the nature of share contracts. RAND J. Econom. 26(4):761-781.
    • (1995) RAND J. Econom. , vol.26 , Issue.4 , pp. 761-781
    • Bhattacharyya, S.1    Lafontaine, F.2
  • 10
    • 0032172080 scopus 로고    scopus 로고
    • Outsourcing decisions and managerial incentives
    • Chalos P, Sung J (1998) Outsourcing decisions and managerial incentives. Decision Sci. 29(4):901-919.
    • (1998) Decision Sci. , vol.29 , Issue.4 , pp. 901-919
    • Chalos, P.1    Sung, J.2
  • 11
    • 0001211661 scopus 로고
    • Product warranties and double moral hazard
    • Cooper R, Ross TW (1985) Product warranties and double moral hazard. RAND J. Econom. 16(1):103-113.
    • (1985) RAND J. Econom. , vol.16 , Issue.1 , pp. 103-113
    • Cooper, R.1    Ross, T.W.2
  • 12
    • 10444237298 scopus 로고    scopus 로고
    • Optimal shared-savings contracts in supply chains: Linear contracts and double moral hazard
    • Corbett CJ, DeCroix GA, Ha AY (2005) Optimal shared-savings contracts in supply chains: Linear contracts and double moral hazard. Eur. J. Oper. Res. 163(3):653-667.
    • (2005) Eur. J. Oper. Res. , vol.163 , Issue.3 , pp. 653-667
    • Corbett, C.J.1    DeCroix, G.A.2    Ha, A.Y.3
  • 13
    • 85041863475 scopus 로고    scopus 로고
    • Crothall Healthcare.Available at
    • Crothall Healthcare (2011) Patient Satisfaction News (Jan. 13). Available at http://media.crothall.com/global/news/2011-01_Patient_Satisfaction_News.pdf
    • (2011) Patient Satisfaction News (Jan 13)
  • 14
    • 77954267779 scopus 로고    scopus 로고
    • Design and analysis of contracts for software outsourcing
    • Dey D, Fan M, Zhang C (2010) Design and analysis of contracts for software outsourcing. Inform. Systems Res. 21(1):93-114.
    • (2010) Inform. Systems Res. , vol.21 , Issue.1 , pp. 93-114
    • Dey, D.1    Fan, M.2    Zhang, C.3
  • 18
    • 84979792294 scopus 로고    scopus 로고
    • IT security outsourcing: How safe is your IT security?
    • Fenn C, Shooter R, Allan K (2002) IT security outsourcing: How safe is your IT security? Comput. Law and Security Rep. 18(2):109-111.
    • (2002) Comput. Law and Security Rep. , vol.18 , Issue.2 , pp. 109-111
    • Fenn, C.1    Shooter, R.2    Allan, K.3
  • 19
    • 84878876684 scopus 로고    scopus 로고
    • Game Theory (The MIT Press, Cambridge, MA)
    • Fudenberg D, Tirole J (1998) Game Theory (The MIT Press, Cambridge, MA).
    • (1998)
    • Fudenberg, D.1    Tirole, J.2
  • 20
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Gal-Or E, Ghose A (2005) The economic incentives for sharing security information. Inform. Systems Res. 16(2):186-208.
    • (2005) Inform. Systems Res. , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 22
    • 77954761265 scopus 로고    scopus 로고
    • Structure of service level agreements (SLA) in IT outsourcing: The construct and measurement
    • Goo J (2010) Structure of service level agreements (SLA) in IT outsourcing: The construct and measurement. Inform. Systems Frontiers 12(2):185-205.
    • (2010) Inform. Systems Frontiers , vol.12 , Issue.2 , pp. 185-205
    • Goo, J.1
  • 23
  • 25
    • 0032382571 scopus 로고    scopus 로고
    • Monitoring the principal with multiple agents
    • Gupta S, Romano RE (1998) Monitoring the principal with multiple agents. RAND J. Econom. 29(2):427-442.
    • (1998) RAND J. Econom. , vol.29 , Issue.2 , pp. 427-442
    • Gupta, S.1    Romano, R.E.2
  • 27
    • 79960739079 scopus 로고    scopus 로고
    • Vendor and client interaction for requirement assessment in software development: Implications for feedback process
    • Jayanth R, Jacob VS, Radhakrishnan S (2010) Vendor and client interaction for requirement assessment in software development: Implications for feedback process. Inform. Systems Res. 22(2):289-305.
    • (2010) Inform. Systems Res. , vol.22 , Issue.2 , pp. 289-305
    • Jayanth, R.1    Jacob, V.S.2    Radhakrishnan, S.3
  • 28
    • 0000817448 scopus 로고    scopus 로고
    • Linear contracts and the double moralhazard
    • Kim SK, Wang S (1998) Linear contracts and the double moralhazard. J. Econom. Theory 82(2):342-378.
    • (1998) J. Econom. Theory , vol.82 , Issue.2 , pp. 342-378
    • Kim, S.K.1    Wang, S.2
  • 30
    • 85041805035 scopus 로고    scopus 로고
    • SC Magazine (December 1) 26. Available at
    • Mayne M (2008) Outsourcing made easy. SC Magazine (December 1) 26. Available at http://www.scmagazineuk.com/outsourcing-made-easy/article/121804/.
    • (2008) Outsourcing made easy
    • Mayne, M.1
  • 31
    • 0026912051 scopus 로고
    • Incomplete contracting issues in information systems development outsourcing
    • Richmond W, Seidmann A, Whinston A (1992) Incomplete contracting issues in information systems development outsourcing. Decision Support Systems 8(5):459-477.
    • (1992) Decision Support Systems , vol.8 , Issue.5 , pp. 459-477
    • Richmond, W.1    Seidmann, A.2    Whinston, A.3
  • 34
    • 0037004470 scopus 로고    scopus 로고
    • The case for outsourcing security
    • Schneier B (2002) The case for outsourcing security. Computer 35(4):20-26.
    • (2002) Computer , vol.35 , Issue.4 , pp. 20-26
    • Schneier, B.1
  • 35
    • 67649538926 scopus 로고    scopus 로고
    • Demand heterogeneity in IT infrastructure services: Modeling and evaluation of a dynamic approach to defining service levels
    • Sen S, Raghu TS, Vinze A (2009) Demand heterogeneity in IT infrastructure services: Modeling and evaluation of a dynamic approach to defining service levels. Inform. Systems Res. 20(2):258-276.
    • (2009) Inform. Systems Res. , vol.20 , Issue.2 , pp. 258-276
    • Sen, S.1    Raghu, T.S.2    Vinze, A.3
  • 36
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub DW, Welke RJ (1998) Coping with systems risk: Security planning models for management decision making. MIS Quart. 22(4):441-469.
    • (1998) MIS Quart. , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 37
    • 84878873091 scopus 로고    scopus 로고
    • Hired guns
    • (August 3)
    • Vanauken J (2006) Hired guns. Network Comput. (August 3):39-50.
    • (2006) Network Comput. , pp. 39-50
    • Vanauken, J.1
  • 38
    • 38149082970 scopus 로고    scopus 로고
    • NewYork Times (June 1)
    • Varian HR (2000) Managing online security risks. NewYork Times (June 1), http://people.ischool.berkeley.edu/~hal/people/hal/NYTimes/2000-06-01.html
    • (2000) Managing online security risks
    • Varian, H.R.1
  • 40
    • 0031377838 scopus 로고    scopus 로고
    • Contracting structures for custom software development: The impacts of informational rents and uncertainty on internal development and outsourcing
    • Wang ET, Barron T, Seidmann A (1997) Contracting structures for custom software development: The impacts of informational rents and uncertainty on internal development and outsourcing. Management Sci. 43(12):1726-1744.
    • (1997) Management Sci. , vol.43 , Issue.12 , pp. 1726-1744
    • Wang, E.T.1    Barron, T.2    Seidmann, A.3
  • 41
    • 0002271555 scopus 로고
    • Contracting for software development
    • Whang S (1992) Contracting for software development. Management Sci. 38(3):307-324.
    • (1992) Management Sci. , vol.38 , Issue.3 , pp. 307-324
    • Whang, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.