-
1
-
-
33749469503
-
-
Whitepaper, Carnegie Mellon Software Engineering Institute. Available at
-
Allen J, Gabbard D, May C (2003) Outsourcing managed security services. Whitepaper, Carnegie Mellon Software Engineering Institute. Available at http://www.cert.org/archive/pdf/omss.pdf.
-
(2003)
Outsourcing managed security services
-
-
Allen, J.1
Gabbard, D.2
May, C.3
-
2
-
-
0031144907
-
Incentive contracts in two-sided moral hazards with multiple agents
-
Al-Najjar N (1997) Incentive contracts in two-sided moral hazards with multiple agents. J. Econom. Theory 74(1):174-195.
-
(1997)
J. Econom. Theory
, vol.74
, Issue.1
, pp. 174-195
-
-
Al-Najjar, N.1
-
3
-
-
33750440197
-
The economics of information security
-
Anderson R, Moore T (2006) The economics of information security. Science 314(27):610-613.
-
(2006)
Science
, vol.314
, Issue.27
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
4
-
-
3042745793
-
The weakest link revisited
-
Arce I (2003) The weakest link revisited. IEEE Security and Privacy 1(2):72-76.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.2
, pp. 72-76
-
-
Arce, I.1
-
5
-
-
25144467984
-
Quality implications of warranties in a supply chain
-
Balachandran KR, Radhakrishnan S (2005) Quality implications of warranties in a supply chain. Management Sci. 51(8):1266-1277.
-
(2005)
Management Sci.
, vol.51
, Issue.8
, pp. 1266-1277
-
-
Balachandran, K.R.1
Radhakrishnan, S.2
-
7
-
-
85077563618
-
Double-sided hazard and the nature of share contracts
-
Bhattacharyya S, Lafontaine F (1995) Double-sided hazard and the nature of share contracts. RAND J. Econom. 26(4):761-781.
-
(1995)
RAND J. Econom.
, vol.26
, Issue.4
, pp. 761-781
-
-
Bhattacharyya, S.1
Lafontaine, F.2
-
9
-
-
84878871381
-
-
Ninth Workshop on Economics of Information Security, (WEIS 2010), Cambridge, MA
-
Cezar A, Cavusoglu H, Raghunathan S (2010) Outsourcing information security: Contracting issues and security implications. Ninth Workshop on Economics of Information Security, (WEIS 2010), Cambridge, MA.
-
(2010)
Outsourcing information security: Contracting issues and security implications
-
-
Cezar, A.1
Cavusoglu, H.2
Raghunathan, S.3
-
10
-
-
0032172080
-
Outsourcing decisions and managerial incentives
-
Chalos P, Sung J (1998) Outsourcing decisions and managerial incentives. Decision Sci. 29(4):901-919.
-
(1998)
Decision Sci.
, vol.29
, Issue.4
, pp. 901-919
-
-
Chalos, P.1
Sung, J.2
-
11
-
-
0001211661
-
Product warranties and double moral hazard
-
Cooper R, Ross TW (1985) Product warranties and double moral hazard. RAND J. Econom. 16(1):103-113.
-
(1985)
RAND J. Econom.
, vol.16
, Issue.1
, pp. 103-113
-
-
Cooper, R.1
Ross, T.W.2
-
12
-
-
10444237298
-
Optimal shared-savings contracts in supply chains: Linear contracts and double moral hazard
-
Corbett CJ, DeCroix GA, Ha AY (2005) Optimal shared-savings contracts in supply chains: Linear contracts and double moral hazard. Eur. J. Oper. Res. 163(3):653-667.
-
(2005)
Eur. J. Oper. Res.
, vol.163
, Issue.3
, pp. 653-667
-
-
Corbett, C.J.1
DeCroix, G.A.2
Ha, A.Y.3
-
13
-
-
85041863475
-
-
Crothall Healthcare.Available at
-
Crothall Healthcare (2011) Patient Satisfaction News (Jan. 13). Available at http://media.crothall.com/global/news/2011-01_Patient_Satisfaction_News.pdf
-
(2011)
Patient Satisfaction News (Jan 13)
-
-
-
14
-
-
77954267779
-
Design and analysis of contracts for software outsourcing
-
Dey D, Fan M, Zhang C (2010) Design and analysis of contracts for software outsourcing. Inform. Systems Res. 21(1):93-114.
-
(2010)
Inform. Systems Res.
, vol.21
, Issue.1
, pp. 93-114
-
-
Dey, D.1
Fan, M.2
Zhang, C.3
-
15
-
-
84878866971
-
-
Internat. Conf. Telecommunication Systems, Modeling Anal., Dallas, TX
-
Ding W, Yurcik W (2005) Outsourcing Internet security: The effect of transaction costs on managed service providers. Internat. Conf. Telecommunication Systems, Modeling Anal., Dallas, TX, 17-20.
-
(2005)
Outsourcing Internet security: The effect of transaction costs on managed service providers
, pp. 17-20
-
-
Ding, W.1
Yurcik, W.2
-
16
-
-
84878835630
-
-
Fifth Workshop on the Economics of Securing the Information Infrastructure, (WEIS 2006), Washington, DC
-
Ding W, Yurcik W (2006) Economics of Internet security outsourcing: Simulation results based on the Schneider model. Fifth Workshop on the Economics of Securing the Information Infrastructure, (WEIS 2006), Washington, DC, 1-22.
-
(2006)
Economics of Internet security outsourcing: Simulation results based on the Schneider model
, pp. 1-22
-
-
Ding, W.1
Yurcik, W.2
-
17
-
-
33744922914
-
-
First Internat. Workshop on Internet and Network Econom., Hong Kong, China
-
Ding W, Yrucik W, Yin X (2005) Outsourcing Internet security: Economic analysis of incentives for managed security service providers. First Internat. Workshop on Internet and Network Econom., Hong Kong, China, 947-958.
-
(2005)
Outsourcing Internet security: Economic analysis of incentives for managed security service providers
, pp. 947-958
-
-
Ding, W.1
Yrucik, W.2
Yin, X.3
-
18
-
-
84979792294
-
IT security outsourcing: How safe is your IT security?
-
Fenn C, Shooter R, Allan K (2002) IT security outsourcing: How safe is your IT security? Comput. Law and Security Rep. 18(2):109-111.
-
(2002)
Comput. Law and Security Rep.
, vol.18
, Issue.2
, pp. 109-111
-
-
Fenn, C.1
Shooter, R.2
Allan, K.3
-
19
-
-
84878876684
-
-
Game Theory (The MIT Press, Cambridge, MA)
-
Fudenberg D, Tirole J (1998) Game Theory (The MIT Press, Cambridge, MA).
-
(1998)
-
-
Fudenberg, D.1
Tirole, J.2
-
20
-
-
30344462995
-
The economic incentives for sharing security information
-
Gal-Or E, Ghose A (2005) The economic incentives for sharing security information. Inform. Systems Res. 16(2):186-208.
-
(2005)
Inform. Systems Res.
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
22
-
-
77954761265
-
Structure of service level agreements (SLA) in IT outsourcing: The construct and measurement
-
Goo J (2010) Structure of service level agreements (SLA) in IT outsourcing: The construct and measurement. Inform. Systems Frontiers 12(2):185-205.
-
(2010)
Inform. Systems Frontiers
, vol.12
, Issue.2
, pp. 185-205
-
-
Goo, J.1
-
25
-
-
0032382571
-
Monitoring the principal with multiple agents
-
Gupta S, Romano RE (1998) Monitoring the principal with multiple agents. RAND J. Econom. 29(2):427-442.
-
(1998)
RAND J. Econom.
, vol.29
, Issue.2
, pp. 427-442
-
-
Gupta, S.1
Romano, R.E.2
-
27
-
-
79960739079
-
Vendor and client interaction for requirement assessment in software development: Implications for feedback process
-
Jayanth R, Jacob VS, Radhakrishnan S (2010) Vendor and client interaction for requirement assessment in software development: Implications for feedback process. Inform. Systems Res. 22(2):289-305.
-
(2010)
Inform. Systems Res.
, vol.22
, Issue.2
, pp. 289-305
-
-
Jayanth, R.1
Jacob, V.S.2
Radhakrishnan, S.3
-
28
-
-
0000817448
-
Linear contracts and the double moralhazard
-
Kim SK, Wang S (1998) Linear contracts and the double moralhazard. J. Econom. Theory 82(2):342-378.
-
(1998)
J. Econom. Theory
, vol.82
, Issue.2
, pp. 342-378
-
-
Kim, S.K.1
Wang, S.2
-
29
-
-
0003210974
-
-
Proc. 3rd ACM Conf. Electronic Commerce, New York, NY
-
Liu Z, Squillante MS, Wolf JL (2001) On maximizing service-levelagreement profits. Proc. 3rd ACM Conf. Electronic Commerce, New York, NY, 213-223.
-
(2001)
On maximizing service-levelagreement profits
, pp. 213-223
-
-
Liu, Z.1
Squillante, M.S.2
Wolf, J.L.3
-
30
-
-
85041805035
-
-
SC Magazine (December 1) 26. Available at
-
Mayne M (2008) Outsourcing made easy. SC Magazine (December 1) 26. Available at http://www.scmagazineuk.com/outsourcing-made-easy/article/121804/.
-
(2008)
Outsourcing made easy
-
-
Mayne, M.1
-
31
-
-
0026912051
-
Incomplete contracting issues in information systems development outsourcing
-
Richmond W, Seidmann A, Whinston A (1992) Incomplete contracting issues in information systems development outsourcing. Decision Support Systems 8(5):459-477.
-
(1992)
Decision Support Systems
, vol.8
, Issue.5
, pp. 459-477
-
-
Richmond, W.1
Seidmann, A.2
Whinston, A.3
-
34
-
-
0037004470
-
The case for outsourcing security
-
Schneier B (2002) The case for outsourcing security. Computer 35(4):20-26.
-
(2002)
Computer
, vol.35
, Issue.4
, pp. 20-26
-
-
Schneier, B.1
-
35
-
-
67649538926
-
Demand heterogeneity in IT infrastructure services: Modeling and evaluation of a dynamic approach to defining service levels
-
Sen S, Raghu TS, Vinze A (2009) Demand heterogeneity in IT infrastructure services: Modeling and evaluation of a dynamic approach to defining service levels. Inform. Systems Res. 20(2):258-276.
-
(2009)
Inform. Systems Res.
, vol.20
, Issue.2
, pp. 258-276
-
-
Sen, S.1
Raghu, T.S.2
Vinze, A.3
-
36
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub DW, Welke RJ (1998) Coping with systems risk: Security planning models for management decision making. MIS Quart. 22(4):441-469.
-
(1998)
MIS Quart.
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
37
-
-
84878873091
-
Hired guns
-
(August 3)
-
Vanauken J (2006) Hired guns. Network Comput. (August 3):39-50.
-
(2006)
Network Comput.
, pp. 39-50
-
-
Vanauken, J.1
-
38
-
-
38149082970
-
-
NewYork Times (June 1)
-
Varian HR (2000) Managing online security risks. NewYork Times (June 1), http://people.ischool.berkeley.edu/~hal/people/hal/NYTimes/2000-06-01.html
-
(2000)
Managing online security risks
-
-
Varian, H.R.1
-
40
-
-
0031377838
-
Contracting structures for custom software development: The impacts of informational rents and uncertainty on internal development and outsourcing
-
Wang ET, Barron T, Seidmann A (1997) Contracting structures for custom software development: The impacts of informational rents and uncertainty on internal development and outsourcing. Management Sci. 43(12):1726-1744.
-
(1997)
Management Sci.
, vol.43
, Issue.12
, pp. 1726-1744
-
-
Wang, E.T.1
Barron, T.2
Seidmann, A.3
-
41
-
-
0002271555
-
Contracting for software development
-
Whang S (1992) Contracting for software development. Management Sci. 38(3):307-324.
-
(1992)
Management Sci.
, vol.38
, Issue.3
, pp. 307-324
-
-
Whang, S.1
|