NotesFAQContact Us
Search Tips
ERIC Number: ED545940
Record Type: Non-Journal
Publication Date: 2012
Pages: 174
Abstractor: As Provided
ISBN: 978-1-2675-6657-7
Incentive Issues in Information Security Management
Lee, Chul Ho
ProQuest LLC, Ph.D. Dissertation, The University of Texas at Dallas
This dissertation studies three incentive issues in information security management. The first essay studies contract issues between a firm that outsources security functions and a managed security service provider (MSSP) that provides security functions to the firm. Since MSSP and firms cannot observe each other's actions, both can suffer from the double moral hazard. The first essay reflects the unique characteristics of security outsourcing: the externality and multi-client nature. A refund serves the dual roles of punishment and reward between MSSP and client firms. We first show that the prevailing contract structure in security outsourcing cannot solve the double moral hazard, and furthermore positive externality can worsen the double moral hazard. We then propose a new contract structure that induces first-best efforts. The second essay studies when and how standards can harm firm security. We consider a setting where a firm has two security controls-one regulated and the other one not-that are either serially or parallelly linked. We also consider strategic attacker and liability issues. Our findings are as follows. First, under a serial configuration, firm security can decrease in the standard when this standard is low. Second, this decrease is more likely to happen when the firm is more concerned with security. Third, under a parallel configuration, firm security can decrease in the standard only when both standard is high and the liability is sufficiently low. Fourth, when the standard is low then strategic attacking behavior can augment the effectiveness of the standard. The third essay deals with security strategy in the cloud. While a standardized cloud service with uniform security is the current practice, security experts argue that differentiated security offerings are required to serve consumers' diverse needs. We uncover the conditions under which the differentiation strategy is optimal. Furthermore, we show that as the service model becomes closer to software-as-a-service then differentiated services become optimal. If joint efforts of the cloud provider and users become less complementary then a differentiation strategy becomes attractive. Finally, an increase in externality encourages cloud providers to adopt a differentiation strategy. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page:]
ProQuest LLC. 789 East Eisenhower Parkway, P.O. Box 1346, Ann Arbor, MI 48106. Tel: 800-521-0600; Web site:
Publication Type: Dissertations/Theses - Doctoral Dissertations
Education Level: N/A
Audience: N/A
Language: English
Sponsor: N/A
Authoring Institution: N/A