Incentive contracts research of information security outsourcing for complementary firms in supply chain under double moral hazard

被引:0
|
作者
Wu Y. [1 ]
Wang L. [1 ]
Feng G. [2 ]
机构
[1] Glorious Sun School of Business & Management, Donghua University, Shanghai
[2] School of Management, Xi’an Jiaotong University, Xi’an
基金
中国国家自然科学基金;
关键词
complementary information; double moral hazard; information security outsourcing; liability contract; supply chain security;
D O I
10.12011/SETP2021-2000
中图分类号
学科分类号
摘要
In this paper, we study how firms in the supply chain can cooperate with managed security service providers (MSSP), to solve the double moral hazard (DMH) problem in security outsourcing when the firms’ information assets are complementary. The results show that the complementation degree between the firms will reduce their expected loss to some extent, thus not only suppressing the investment incentive of both the firms and the MSSP but also reducing the compensation amount of the MSSP to the firms, whereas increasing the probability of firms being breached. Furthermore, our study shows that both firms and the MSSP would suffer from the DMH problem in a bilateral refund contract, which is commonly used in the information security outsourcing industry, and the DMH problem becomes complicated due to the information complementation of firms. Therefore, we propose the liability contract to solve the DMH problem. Unlike the bilateral refund contract, the implementation of the liability contract is according to the security states of firms. Specifically, when both complementary firms are breached, the MSSP compensates for the two firms, while the MSSP penalizes the breached firm and rewards the un-breached firm if only one firm is breached. Our results show that the liability contract can solve the DMH problem effectively, and the MSSP would like the liability contract when the implementation cost is less than a threshold. These findings give some insights that can guide complementary firms in the supply chain to make an information security outsourcing strategy. © 2022 Systems Engineering Society of China. All rights reserved.
引用
收藏
页码:2916 / 2926
页数:10
相关论文
共 26 条
  • [21] Li J B, Guo P Q, Tao Z Y., Bilateral revenue sharing and two-part tariff contracts for omnichannel coordination strategy[J], Systems Engineering — Theory & Practice, 41, 11, pp. 2887-2901, (2021)
  • [22] Qian X, Liu X, Pei J, Et al., A new game of information sharing and security investment between two allied firms[J], International Journal of Production Research, 56, 12, pp. 4069-4086, (2017)
  • [23] Zhang C, Feng N, Chen J, Et al., Outsourcing strategies for information security: Correlated losses and security externalities[J], Information Systems Frontiers, 23, 3, pp. 773-790, (2021)
  • [24] Cavusoglu H, Raghunathan S, Yue W T., Decision-theoretic and game-theoretic approaches to IT security investment[J], Journal of Management Information Systems, 25, 2, pp. 281-304, (2008)
  • [25] Kong X Y, Liu S Q, Shen X B, Et al., The optimal joint incentive contract designs and inventory decisions with an overconfident agent[J], Systems Engineering — Theory & Practice, 42, 1, pp. 123-137, (2022)
  • [26] Zetter K., In legal first, data-breach suit targets auditor