IS

Geng, Xianjun

Topic Weight Topic Terms
0.857 contract contracts incentives incentive outsourcing hazard moral contracting agency contractual asymmetry incomplete set cost client
0.550 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.521 knowledge transfer management technology creation organizational process tacit research study organization processes work organizations implications
0.490 research information systems science field discipline researchers principles practice core methods area reference relevance conclude
0.373 consumer consumers model optimal welfare price market pricing equilibrium surplus different higher results strategy quality
0.276 piracy goods digital property intellectual rights protection presence legal consumption music consumers enforcement publisher pirate
0.233 firms firm financial services firm's size examine new based result level including results industry important
0.194 dimensions electronic multidimensional game transactions relative contrast channels theory sustained model predict dimension mixture evolutionary
0.184 content providers sharing incentive delivery provider net incentives internet service neutrality broadband allow capacity congestion
0.176 community communities online members participants wikipedia social member knowledge content discussion collaboration attachment communication law
0.171 process problem method technique experts using formation identification implicit analysis common proactive input improvements identify
0.165 information types different type sources analysis develop used behavior specific conditions consider improve using alternative
0.147 dynamic time dynamics model change study data process different changes using longitudinal understanding decisions develop
0.147 resource resources allocation chargeback manager effectiveness problem firms case gap allocating diverse dependence just bridge
0.146 service services delivery quality providers technology information customer business provider asp e-service role variability science
0.130 information environment provide analysis paper overall better relationships outcomes increasingly useful valuable available increasing greater
0.126 research researchers framework future information systems important present agenda identify areas provide understanding contributions using
0.123 strategic benefits economic benefit potential systems technology long-term applications competitive company suggest additional companies industry
0.120 services service network effects optimal online pricing strategies model provider provide externalities providing base providers
0.115 decision making decisions decision-making makers use quality improve performance managers process better results time managerial
0.108 options real investment option investments model valuation technology value analysis uncertainty portfolio models using context
0.102 standards interorganizational ios standardization standard systems compatibility effects cooperation firms industry benefits open interoperability key
0.102 structure organization structures organizational centralized decentralized study organizations forms decentralization processing communication sharing cbis activities
0.101 arguments retailers manufacturers retailer internet claim manufacturer consumer argumentation referral agency store third-party upstream argument

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Whinston, Andrew B. 5 Lee, Chul Ho 2 Lin, Lihui 2 Raghunathan, Srinivasan 2
Du, Anna Ye 1 Gopal, Ram D. 1 Lee, Young-Jin 1 Ramesh, Ram 1
Zhang, Han 1
Knowledge transfer 2 asymmetric information 1 capacity provision networks 1 channel competition 1
distributed computation 1 double moral hazard 1 dynamic process 1 digital good 1
digital piracy 1 externality 1 electronic community 1 evolutionary game theory 1
economic analysis 1 gray area 1 game theory 1 information security outsourcing 1
IS discipline 1 IT artifact 1 incomplete information 1 investment under uncertainty 1
information security 1 knowledge management 1 managed security service providers 1 online market 1
organizational learning 1 price dispersion 1 quality of service 1 resource sharing 1
strategic ambiguity 1 sender-receiver game 1 signal jamming 1 search costs 1
security regulation 1 trust in e-commerce 1 trust status 1 unverifiability 1

Articles (8)

Mandatory Standards and Organizational Information Security (Information Systems Research, 2016)
Authors: Abstract:
    Mandatory security standards that force firms to establish minimum levels of security controls are enforced in many domains, including information security. The information security domain is characterized by multiple intertwined security controls, not all of which can be regulated by standards, but compliance with existing security standards is often used by firms to deflect liability if a security breach occurs. We analyze a stylized setting where a firm has two security controls that are linked in either a serial or a parallel configuration. One control is directly regulated by a security standard, whereas the other one is not. We show that a higher security standard does not necessarily lead to a higher firm security. Furthermore, the conditions under which a higher standard hurts the firm security are sharply different in the twoÑserial and parallelÑconfigurations. If standard compliance leads to reduced liability for a firm following a breach, such liability reduction in turn weakens the tie between the standard and firm security. Under a setting in which the firm meets the optimal standard set by a policy maker, both firm security and social welfare are higher when the damage to the firm following a breach takes a higher share of the total damage to social welfare, and also when the firm takes a larger share of liability.
Contracting Information Security in the Presence of Double Moral Hazard. (Information Systems Research, 2013)
Authors: Abstract:
    In information security outsourcing, it is the norm that the outsourcing firms and the outsourcers (commonly called managed security service providers, MSSPs) need to coordinate their efforts for better security. Nevertheless, efforts are often private and thus both firms and MSSPs can suffer from double moral hazard. Furthermore, the double moral hazard problem in security outsourcing is complicated by the existence of strong externality and the multiclient nature of MSSP services. In this prescriptive research, we first show that the prevailing contract structure in security outsourcing, bilateral refund contract, cannot solve double moral hazard. Adding breach-contingent sunk cost or external payment cannot solve double moral hazard either. Furthermore, positive externality can worsen double moral hazard. We then propose a new contract structure termed multilateral contract and show that it can solve double moral hazard and induce first-best efforts from all contractual parties when an MSSP serves two or more client firms, regardless of the externality. Firm-side externality significantly affects how payments flow under a multilateral contract when a security breach happens. When the number of client firms for an MSSP increases, we show that the contingent payments under multilateral contracts for any security breach scenario can be easily calculated using an additive method, and thus are computationally simple to implement.
Competing with Piracy: A Multichannel Sequential Search Approach. (Journal of Management Information Systems, 2013)
Authors: Abstract:
    We consider an online market where consumers may obtain digital goods from two mutually exclusive channels: a legitimate channel consisting of many law-abiding retailers and a piracy channel consisting of many piracy services. We analyze consumer choice, retailer strategy, and piracy control using a sequential-search approach where information acquisition is costly for some consumers (nonshoppers), yet costless for others (shoppers). First, we show that a nonshopper's channel choice is determined by a simple comparison of two reservation prices. Second, we analyze how piracy threats affect in-channel pricing among retailers. If the in-channel competition intensity among retailers is high, piracy does not affect retailer pricing. If the intensity is medium, retailers respond to piracy by giving up some shoppers and, surprisingly, raising prices. If the intensity is low, the legitimate channel loses some shoppers as well as some nonshoppers to the piracy channel. Third, we consider several mechanisms for fighting piracy and analyze their effects on firm profit and consumer surplus. Reducing piracy quality and increasing piracy search costs are both effective in controlling piracy, yet they affect consumer surplus differently. Reducing the number of piracy services is less effective in controlling piracy.
Effects of Organizational Learning and Knowledge Transfer on Investment Decisions Under Uncertainty. (Journal of Management Information Systems, 2009)
Authors: Abstract:
    Because uncertainties around innovative technologies resolve over time, investments in such technologies are often made in stages so that organizations can use the knowledge gained from earlier stages to decide the next step. Previous studies usually assume that once some uncertainty is resolved, it becomes common knowledge within the investing organization. We develop a game-theoretical model to study how different parties within an organization gain and transfer knowledge about new technologies while investing in these technologies, and how the learning process may affect the investment decisions. We show that managers with incentives misaligned with the organization may transfer their knowledge untruthfully and distort the learning process of decision makers. Such behavior may lead to inefficient investment decisions. We also study the effect of uncertainty on the misreporting problem and the investment decisions. Mechanisms to mitigate or prevent untruthful knowledge transfer are also proposed. In particular, powerful incentive schemes may alleviate, but not prevent, the misreporting problem; punishing managers who are caught misreporting may deter the misreporting behavior, but in practice such mechanisms are difficult to implement.
Capacity Provision Networks: Foundations of Markets for Sharable Resources in Distributed Computational Economies. (Information Systems Research, 2008)
Authors: Abstract:
    With the rapid growth of rich-media content over the Internet, content and service providers (SP) are increasingly facing the problem of managing their service resources cost-effectively while ensuring a high quality of service (QoS) delivery at the same time. In this research we conceptualize and model an Internetbased storage provisioning network for rich-media content delivery. This is modeled as a capacity provision network (CPN) where participants possess service infrastructures and leverage their topographies to effectively serve specific customer segments. A CPN is a network of SPs coordinated through an allocation hub. We first develop the notion of discounted QoS capabilities of storage resources. We then investigate the stability of the discount factors over time and the network topography using a test-bed on the Internet through a longitudinal empirical study. Finally, we develop a market maker mechanism for optimal multilateral allocation and surplus sharing in a network. The proposed CPN is closely tied to two fundamental properties of Internet service technology: positive network externality among cooperating SPs and the property of effective multiplication of capacity allocation among several distributed service sites. We show that there exist significant incentives for SPs to engage in cooperative allocation and surplus sharing. We further demonstrate that intermediation can enhance the allocation effectiveness and that the opportunity to allocation and surplus sharing can play an important role in infrastructure planning. In conclusion, this study demonstrates the practical business viability of a cooperative CPN market.
A SENDER-RECEIVER FRAMEWORK FOR KNOWLEDGE TRANSFER. (MIS Quarterly, 2005)
Authors: Abstract:
    The shift to more distributed forms of organizations and the prevalence of interorganizational relationships have led to an increase in the transfer of knowledge between parties with asymmetric and incomplete information about each other. Because of this asymmetry and incompleteness, parties seeking knowledge may not be able to identify qualified knowledge providers, and the appropriate experts may fail to be motivated to engage in knowledge transfer. We propose a sender-receiver framework for studying knowledge transfer under asymmetric and/or incomplete information. We outline four types of information structures for knowledge transfer, and focus on the sender-advantage asymmetric information structure and the symmetric incomplete information structure. We develop formal game-theoretical models, show how information incompleteness and asymmetry may negatively influence knowledge transfer, and propose solutions to alleviate these negative impacts. Implications for knowledge transfer research and practice are also discussed.
Health of Electronic Communities: An Evolutionary Game Approach. (Journal of Management Information Systems, 2004)
Authors: Abstract:
    Creating electronic communities is a critical venture in the digital economy. However, fraud and misrepresentation have led to widespread skepticism and distrust of electronic communities. We develop an evolutionary model to explore the issue of trust within an electronic community from a dynamic process perspective. This model emphasizes large populations, continuous change in community memberships, and imperfect information and memory. As the term trust is often used in the context of individual interaction, at a group level we propose using the term health to measure the sustained competitive advantages of honest members over cheaters throughout the evolution of a community. We find conditions under which an electronic community is healthy and attracts outside population. We find that many factors, such as information dissemination speed, honest players' payoffs and possible losses, new community members' initial trust status, and the replacement rate of community members, all affect the health of an electronic community, and that some of them also affect a community's size. We then discuss the implications of our research for e-community practices.
OPERATIONALIZING THE ESSENTIAL ROLE OF THE INFORMATION TECHNOLOGY ARTIFACT IN INFORMATION SYSTEMS RESEARCH: GRAY AREA, PITFALLS, AND THE IMPORTANCE OF STRATEGIC AMBIGUITY. (MIS Quarterly, 2004)
Authors: Abstract:
    In this paper we argue that a large gray area of information systems research exists, whose relevance to the information technology artifact is subject to significant debate even among IS scholars who support the essential role of the IT artifact. As we explain, not explicitly addressing this gray area can have negative, although often inadvertent, effects on the innovative nature of IS research; we explore this danger through three pitfalls. We then propose a stance of strategic ambiguity to deal with the gray area. Strategic ambiguity calls for deliberately withholding judgment on the relevance of research in the gray area and acceptance of gray-area research provided it meets the excellence required by professional journals. We believe that strategic ambiguity benefits innovative IS research without harming the essential role of the IT artifact.