The rapid growth of computer networks has led to proliferation of information security standards. To meet these security standards, some organizations outsource security protection to a managed security service provider (MSSP). However, this may give rise to system interdependency risks. This paper analyzes how such system interdependency risks interact with a mandatory security requirement to affect the equilibrium behaviors of an MSSP and its clients. We show that a mandatory security requirement will increase the MSSP’s effort and motivate it to serve more clients. Although more clients can benefit from the MSSP’s protection, they are also subjected to greater system interdependency risks. Social welfare will decrease if the mandatory se...
As organizations increasingly deploy Inter-organizational Information Systems (IOS), the interdepend...
Within the modern and globally connected business landscape, the information assets of organizations...
Managing information security in Information Technology (IT) outsourcing is important. We conduct a ...
The rapid growth of computer networks has led to a proliferation of information security standards. ...
As computer attack patterns shift and threats to networks change and grow almost daily, it is critic...
A unique challenge in information security outsourcing is that neither the outsourcing firm nor the ...
The issue of trust and risk in outsourced relationships was extended beyond traditional outsourcing ...
Firms hesitate to outsource their network security to outside security providers (called Managed Se...
The interdependency of information security risks poses a significant challenge for firms to manage ...
With increasing use of information systems, many organizations are outsourcing information security ...
Managed Security Service Provider (MSSP) networks are a form of extended enterprises where several f...
Security breaches often stem from business partner failures within the value chain. There have been ...
The interdependency of information security risks often induces firms to invest inefficiently in inf...
Information security management is becoming a more critical and, simultaneously, a challenging funct...
IT security outsourcing is the establishment of a contractual relationship with an outside vendor to...
As organizations increasingly deploy Inter-organizational Information Systems (IOS), the interdepend...
Within the modern and globally connected business landscape, the information assets of organizations...
Managing information security in Information Technology (IT) outsourcing is important. We conduct a ...
The rapid growth of computer networks has led to a proliferation of information security standards. ...
As computer attack patterns shift and threats to networks change and grow almost daily, it is critic...
A unique challenge in information security outsourcing is that neither the outsourcing firm nor the ...
The issue of trust and risk in outsourced relationships was extended beyond traditional outsourcing ...
Firms hesitate to outsource their network security to outside security providers (called Managed Se...
The interdependency of information security risks poses a significant challenge for firms to manage ...
With increasing use of information systems, many organizations are outsourcing information security ...
Managed Security Service Provider (MSSP) networks are a form of extended enterprises where several f...
Security breaches often stem from business partner failures within the value chain. There have been ...
The interdependency of information security risks often induces firms to invest inefficiently in inf...
Information security management is becoming a more critical and, simultaneously, a challenging funct...
IT security outsourcing is the establishment of a contractual relationship with an outside vendor to...
As organizations increasingly deploy Inter-organizational Information Systems (IOS), the interdepend...
Within the modern and globally connected business landscape, the information assets of organizations...
Managing information security in Information Technology (IT) outsourcing is important. We conduct a ...