{"id":"https://openalex.org/W3011497956","doi":"https://doi.org/10.1287/deca.2019.0406","title":"Managing Security Outsourcing in the Presence of Strategic Hackers","display_name":"Managing Security Outsourcing in the Presence of Strategic Hackers","publication_year":2020,"publication_date":"2020-03-18","ids":{"openalex":"https://openalex.org/W3011497956","doi":"https://doi.org/10.1287/deca.2019.0406","mag":"3011497956"},"language":"en","primary_location":{"id":"doi:10.1287/deca.2019.0406","is_oa":false,"landing_page_url":"https://doi.org/10.1287/deca.2019.0406","pdf_url":null,"source":{"id":"https://openalex.org/S33235364","display_name":"Decision Analysis","issn_l":"1545-8490","issn":["1545-8490","1545-8504"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315699","host_organization_name":"Institute for Operations Research and the Management Sciences","host_organization_lineage":["https://openalex.org/P4310315699"],"host_organization_lineage_names":["Institute for Operations Research and the Management Sciences"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Decision Analysis","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022412037","display_name":"Yong Wu","orcid":"https://orcid.org/0000-0002-9831-8089"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yong Wu","raw_affiliation_strings":["Glorious Sun School of Business and Management, Donghua University, Shanghai 200051, China"],"raw_orcid":"https://orcid.org/0000-0002-9831-8089","affiliations":[{"raw_affiliation_string":"Glorious Sun School of Business and Management, Donghua University, Shanghai 200051, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029493555","display_name":"Junlin Duan","orcid":"https://orcid.org/0000-0002-4389-920X"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junlin Duan","raw_affiliation_strings":["Glorious Sun School of Business and Management, Donghua University, Shanghai 200051, China"],"raw_orcid":"https://orcid.org/0000-0002-4389-920X","affiliations":[{"raw_affiliation_string":"Glorious Sun School of Business and Management, Donghua University, Shanghai 200051, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031578191","display_name":"Tao Dai","orcid":"https://orcid.org/0000-0002-3250-7522"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Dai","raw_affiliation_strings":["Glorious Sun School of Business and Management, Donghua University, Shanghai 200051, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Glorious Sun School of Business and Management, Donghua University, Shanghai 200051, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021039244","display_name":"Dong Cheng","orcid":"https://orcid.org/0000-0001-6605-7454"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Cheng","raw_affiliation_strings":["Glorious Sun School of Business and Management, Donghua University, Shanghai 200051, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Glorious Sun School of Business and Management, Donghua University, Shanghai 200051, China","institution_ids":["https://openalex.org/I181326427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022412037"],"corresponding_institution_ids":["https://openalex.org/I181326427"],"apc_list":null,"apc_paid":null,"fwci":4.4538,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.95085377,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"17","issue":"3","first_page":"235","last_page":"259"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.8598282337188721},{"id":"https://openalex.org/keywords/externality","display_name":"Externality","score":0.7097367644309998},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6931322813034058},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5042916536331177},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.5015771389007568},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4754366874694824},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.4623180031776428},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4485546052455902},{"id":"https://openalex.org/keywords/industrial-organization","display_name":"Industrial organization","score":0.4401489496231079},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4132271707057953},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.386745810508728},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.3495771884918213},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2142367660999298},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.16720843315124512},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.11059054732322693},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.08746960759162903}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.8598282337188721},{"id":"https://openalex.org/C16118543","wikidata":"https://www.wikidata.org/wiki/Q275372","display_name":"Externality","level":2,"score":0.7097367644309998},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6931322813034058},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5042916536331177},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.5015771389007568},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4754366874694824},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.4623180031776428},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4485546052455902},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.4401489496231079},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4132271707057953},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.386745810508728},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.3495771884918213},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2142367660999298},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.16720843315124512},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.11059054732322693},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.08746960759162903},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1287/deca.2019.0406","is_oa":false,"landing_page_url":"https://doi.org/10.1287/deca.2019.0406","pdf_url":null,"source":{"id":"https://openalex.org/S33235364","display_name":"Decision Analysis","issn_l":"1545-8490","issn":["1545-8490","1545-8504"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315699","host_organization_name":"Institute for Operations Research and the Management Sciences","host_organization_lineage":["https://openalex.org/P4310315699"],"host_organization_lineage_names":["Institute for Operations Research and the Management Sciences"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Decision Analysis","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W604628271","https://openalex.org/W1967820237","https://openalex.org/W1979074206","https://openalex.org/W1990600682","https://openalex.org/W2015057804","https://openalex.org/W2033687483","https://openalex.org/W2036883724","https://openalex.org/W2045006695","https://openalex.org/W2053924964","https://openalex.org/W2056075452","https://openalex.org/W2062493711","https://openalex.org/W2087821301","https://openalex.org/W2098201434","https://openalex.org/W2111962383","https://openalex.org/W2127662031","https://openalex.org/W2131951904","https://openalex.org/W2139828324","https://openalex.org/W2562963317","https://openalex.org/W2570398869","https://openalex.org/W2619152032","https://openalex.org/W2728007126","https://openalex.org/W2752025338","https://openalex.org/W2771049934","https://openalex.org/W3124467526","https://openalex.org/W3125210271"],"related_works":["https://openalex.org/W4241263575","https://openalex.org/W2921504876","https://openalex.org/W2317823609","https://openalex.org/W1982580243","https://openalex.org/W2902287117","https://openalex.org/W2183730421","https://openalex.org/W3130462184","https://openalex.org/W4318256508","https://openalex.org/W2349808627","https://openalex.org/W2551868243"],"abstract_inverted_index":{"Nowadays,":[0],"firms":[1,170,193],"tend":[2],"to":[3,7,31,174,179,207],"outsource":[4,175],"security":[5,10,28,118,134,177,188,196],"operations":[6,178],"professional":[8],"managed":[9],"service":[11],"providers":[12],"(MSSPs)":[13],"as":[14,151],"a":[15,32,40,53,152],"result":[16,153],"of":[17,20,117,133,154,161,167,192],"the":[18,47,64,83,100,130,155,158,162,165,180,209],"sophistication":[19],"strategic":[21,33,54],"hackers.":[22],"Thus,":[23],"how":[24],"an":[25,50,105,184],"MSSP":[26,51,163,181,185],"makes":[27],"decisions":[29],"according":[30],"hacker\u2019s":[34],"action":[35],"is":[36],"worth":[37,80],"researching.":[38],"Constructing":[39],"contract":[41],"theory":[42],"model,":[43],"this":[44],"paper":[45],"examines":[46],"interaction":[48],"between":[49,157],"and":[52,73,99,123,126,144,164],"hacker":[55,65],"based":[56],"on":[57,108,139],"both":[58,86,140],"parties\u2019":[59,141],"characteristics.":[60],"We":[61,147],"find":[62,128,149],"that":[63,129,150,194],"will":[66],"give":[67],"up":[68],"less":[69],"valuable":[70],"information":[71,77],"assets,":[72],"thus":[74],"not":[75,92],"all":[76],"assets":[78],"are":[79,171],"protecting":[81],"for":[82],"MSSP.":[84],"For":[85],"parties,":[87],"their":[88,96,176],"optimal":[89,142],"efforts":[90,143,189],"do":[91],"necessarily":[93],"increase":[94],"with":[95],"respective":[97,110],"efficiency,":[98],"firm\u2019s":[101],"reputation":[102],"loss":[103],"has":[104],"opposite":[106],"effect":[107,160,166],"its":[109],"efforts.":[111],"Moreover,":[112],"we":[113,127,199],"distinguish":[114],"two":[115,131,205],"types":[116,132],"externalities":[119,135],"including":[120],"MSSP-side":[121,168],"externality":[122],"hacker-side":[124],"externality,":[125,169],"have":[136],"different":[137],"effects":[138],"expected":[145],"payoffs.":[146],"also":[148],"trade-off":[156],"integration":[159],"still":[172],"willing":[173],"even":[182],"when":[183],"devotes":[186],"fewer":[187],"than":[190],"those":[191],"manage":[195],"in-house.":[197],"Last,":[198],"extend":[200],"our":[201],"base":[202],"model":[203],"from":[204],"aspects":[206],"generalize":[208],"main":[210],"results.":[211]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
