{"id":"https://openalex.org/W4384343195","doi":"https://doi.org/10.1080/01605682.2023.2233550","title":"Information security outsourcing in a resource-sharing environment: The impacts of attack modes","display_name":"Information security outsourcing in a resource-sharing environment: The impacts of attack modes","publication_year":2023,"publication_date":"2023-07-14","ids":{"openalex":"https://openalex.org/W4384343195","doi":"https://doi.org/10.1080/01605682.2023.2233550"},"language":"en","primary_location":{"id":"doi:10.1080/01605682.2023.2233550","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01605682.2023.2233550","pdf_url":null,"source":{"id":"https://openalex.org/S169988927","display_name":"Journal of the Operational Research Society","issn_l":"0160-5682","issn":["0160-5682","1476-9360"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319703","host_organization_name":"Palgrave Macmillan","host_organization_lineage":["https://openalex.org/P4310319703","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Palgrave Macmillan","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of the Operational Research Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070688951","display_name":"Xing Gao","orcid":"https://orcid.org/0000-0001-9944-3626"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xing Gao","raw_affiliation_strings":["Southeast University, Nanjing City, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, Nanjing City, Jiangsu Province, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030280999","display_name":"Siyu Gong","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siyu Gong","raw_affiliation_strings":["Southeast University, Nanjing City, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, Nanjing City, Jiangsu Province, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092472357","display_name":"Ying Wang","orcid":"https://orcid.org/0009-0003-6381-1775"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Wang","raw_affiliation_strings":["Southeast University, Nanjing City, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, Nanjing City, Jiangsu Province, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100749853","display_name":"Yanfang Zhang","orcid":"https://orcid.org/0000-0003-0119-7741"},"institutions":[{"id":"https://openalex.org/I137056471","display_name":"Nanjing University of Finance and Economics","ror":"https://ror.org/031y8am81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137056471"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanfang Zhang","raw_affiliation_strings":["Nanjing University of Finance &amp; Economics, Nanjing City, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Finance &amp; Economics, Nanjing City, Jiangsu Province, China","institution_ids":["https://openalex.org/I137056471"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100749853"],"corresponding_institution_ids":["https://openalex.org/I137056471"],"apc_list":null,"apc_paid":null,"fwci":1.8327,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.88127202,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"75","issue":"6","first_page":"1092","last_page":"1110"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.8474330306053162},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.7449269890785217},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6182705163955688},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5601509213447571},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.5101068615913391},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5072083473205566},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.48577550053596497},{"id":"https://openalex.org/keywords/information-technology","display_name":"Information technology","score":0.4681050479412079},{"id":"https://openalex.org/keywords/shared-resource","display_name":"Shared resource","score":0.41073551774024963},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3938969671726227},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.36202704906463623},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.257961630821228},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.23549246788024902},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.1310921609401703}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.8474330306053162},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.7449269890785217},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6182705163955688},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5601509213447571},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.5101068615913391},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5072083473205566},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.48577550053596497},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.4681050479412079},{"id":"https://openalex.org/C51332947","wikidata":"https://www.wikidata.org/wiki/Q1172305","display_name":"Shared resource","level":2,"score":0.41073551774024963},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3938969671726227},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.36202704906463623},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.257961630821228},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.23549246788024902},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.1310921609401703},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1080/01605682.2023.2233550","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01605682.2023.2233550","pdf_url":null,"source":{"id":"https://openalex.org/S169988927","display_name":"Journal of the Operational Research Society","issn_l":"0160-5682","issn":["0160-5682","1476-9360"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319703","host_organization_name":"Palgrave Macmillan","host_organization_lineage":["https://openalex.org/P4310319703","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Palgrave Macmillan","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of the Operational Research Society","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:taf:tjorxx:v:75:y:2024:i:6:p:1092-1110","is_oa":false,"landing_page_url":"http://hdl.handle.net/10.1080/01605682.2023.2233550","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W604628271","https://openalex.org/W1512994332","https://openalex.org/W1593741082","https://openalex.org/W1967820237","https://openalex.org/W1975358884","https://openalex.org/W1979074206","https://openalex.org/W1990600682","https://openalex.org/W2028833175","https://openalex.org/W2039133158","https://openalex.org/W2045006695","https://openalex.org/W2053924964","https://openalex.org/W2056075452","https://openalex.org/W2068767363","https://openalex.org/W2085585817","https://openalex.org/W2087821301","https://openalex.org/W2139828324","https://openalex.org/W2286370670","https://openalex.org/W2526441969","https://openalex.org/W2534056287","https://openalex.org/W2570398869","https://openalex.org/W2619152032","https://openalex.org/W2902621595","https://openalex.org/W2987189969","https://openalex.org/W3011497956","https://openalex.org/W3019462794","https://openalex.org/W3123442059","https://openalex.org/W3132384038","https://openalex.org/W4221016031","https://openalex.org/W4236841844","https://openalex.org/W4245970634","https://openalex.org/W4283070977","https://openalex.org/W4311548908","https://openalex.org/W4316467454","https://openalex.org/W4323358735"],"related_works":["https://openalex.org/W2738699531","https://openalex.org/W4210648132","https://openalex.org/W2356121836","https://openalex.org/W2338264035","https://openalex.org/W2045270467","https://openalex.org/W1953627998","https://openalex.org/W2558115332","https://openalex.org/W2078706642","https://openalex.org/W2157004272","https://openalex.org/W2233891767"],"abstract_inverted_index":{"Information":[0],"security":[1,40,69,112,152],"outsourcing":[2,41,111],"has":[3],"become":[4],"an":[5],"emerging":[6],"trend":[7],"in":[8,65],"the":[9,15,66,72,81,108,127,136,148,161,169,175],"operations":[10,113],"of":[11,20,25,42,68,150,171],"information":[12,18,48],"security,":[13],"but":[14],"relation":[16],"between":[17],"assets":[19],"firms":[21,44,73],"and":[22,53,59,80,135,154,174],"attack":[23],"modes":[24],"hackers":[26],"have":[27],"failed":[28],"to":[29,103,107,114],"be":[30,104],"considered.":[31],"Through":[32],"building":[33],"a":[34,76,85,115,131,141],"game-theoretic":[35],"model,":[36],"this":[37],"article":[38],"analyzes":[39],"two":[43],"who":[45],"share":[46],"their":[47],"resource":[49,172],"with":[50,56],"each":[51],"other":[52],"are":[54,100],"confronted":[55],"opportunistic":[57,94],"attacks":[58,91,99,126],"targeted":[60,90,98,125],"attacks.":[61],"We":[62],"find":[63,155],"that":[64,123],"case":[67],"decisions":[70],"in-house,":[71],"may":[74,83,163,165,177],"obtain":[75],"lower":[77,86,142],"expected":[78,87,133,143],"cost":[79],"hacker":[82,137,176],"derive":[84,140],"benefit":[88,134,167],"under":[89,93,124],"than":[92],"attacks,":[95],"even":[96],"though":[97],"widely":[101],"deemed":[102],"more":[105],"harmful":[106],"firms.":[109],"When":[110],"MSSP":[116,128,162],"(Managed":[117],"Security":[118],"Service":[119],"Provider),":[120],"we":[121,146],"reveal":[122],"can":[129,138],"reap":[130],"higher":[132],"still":[139],"benefit.":[144],"Finally,":[145],"examine":[147],"effects":[149],"key":[151],"elements":[153],"some":[156],"interesting":[157],"results.":[158],"In":[159],"particular,":[160],"or":[164],"not":[166],"from":[168,179],"degree":[170],"sharing,":[173],"suffer":[178],"its":[180],"learning":[181],"ability.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
