15 results on '"Kai Lung Hui"'
Search Results
2. Bilateral Liability-Based Contracts in Information Security Outsourcing
- Author
-
Kai Lung Hui, Ping Fan Ke, Wei Thoo Yue, and Yuxi Yao
- Subjects
Service (business) ,Finance ,Information Systems and Management ,Computer Networks and Communications ,Limited liability ,business.industry ,media_common.quotation_subject ,05 social sciences ,Liability ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,02 engineering and technology ,Information security ,Library and Information Sciences ,Managed security service ,Management Information Systems ,Outsourcing ,020204 information systems ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,050211 marketing ,Quality (business) ,business ,Information Systems ,media_common - Abstract
We study the efficiency of bilateral liability-based contracts in managed security services (MSSs). We model MSS as a collaborative service with the protection quality shaped by the contribution of both the service provider and the client. We adopt the negligence concept from the legal profession to design two novel contracts: threshold-based liability contract and variable liability contract. We find that they can achieve the first best outcome when postbreach effort verification is feasible. More importantly, they are more efficient than a multilateral contract when the MSS provider assumes limited liability. Our results show that bilateral liability-based contracts can work in the real world. Hence, more research is needed to explore their properties. We discuss the related implications. The online appendix is available at https://doi.org/10.1287/isre.2018.0806 .
- Published
- 2019
- Full Text
- View/download PDF
3. See No Evil, Hear No Evil? Dissecting the Impact of Online Hacker Forums
- Author
-
Qiu-Hong Wang, Kai Lung Hui, and Wei Thoo Yue
- Subjects
Online discussion ,Information Systems and Management ,business.industry ,05 social sciences ,Internet privacy ,Botnet ,Denial-of-service attack ,02 engineering and technology ,Computer Science Applications ,Management Information Systems ,Content analysis ,020204 information systems ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,050211 marketing ,Meaning (existential) ,Psychology ,business ,Information Systems ,Hacker - Abstract
Online hacker forums offer a prominent avenue for sharing hacking knowledge. Using a field dataset culled from multiple sources, we find that online discussion of distributed denial of service (DDOS) attacks in hackforums.net decreases the number of DDOS-attack victims. A 1% increase in discussion decreases DDOS attacks by 0.032% to 0.122%. This means that two DDOS-attack posts per day could reduce the number of victims by 700 to 2,600 per day. We find that discussion topics with similar keywords can variously increase or decrease DDOS attacks, meaning we cannot ascertain the impact of the discussion just by the post nature. Mentioning botnets, especially new botnets, increases the attacks, but the follow-up discussion decreases the attacks. Our results suggest that online-hacker-forum discussion may exhibit the dual-use characteristic. That is, it can be used for both good and bad purposes. We draw related managerial implications.
- Published
- 2019
- Full Text
- View/download PDF
4. An Economic Analysis of Peer Disclosure in Online Social Communities
- Author
-
Hong Xu, Zike Cao, Kai Lung Hui, and Department of Technology and Operations Management
- Subjects
Information privacy ,Information Systems and Management ,Computer Networks and Communications ,business.industry ,05 social sciences ,Library and Information Sciences ,Public relations ,Management Information Systems ,0502 economics and business ,Economics ,ComputingMilieux_COMPUTERSANDSOCIETY ,Economic analysis ,050211 marketing ,050207 economics ,business ,Personally identifiable information ,Externality ,Information Systems - Abstract
We study a novel privacy concern, i.e., peer disclosure of sensitive personal information in online social communities. We model peer disclosure as the imposition of a negative externality on other people. Our model encompasses the benefits of posting information, positive externalities in the form of recognition and entertainment benefits due to others’ sharing of information, and heterogeneous privacy preferences. We find that regulation of peer disclosure is necessary. We consider two candidate regulations, i.e., nudging and quotas. Nudging reduces user participation and privacy harm and sometimes improves social welfare. By contrast, imposing a quota often improves user participation, privacy protection, and social welfare. Adding a nudge on top of a quota does not bring additional benefits. We show that any regulation that uniformly controls the disclosure of sensitive and nonsensitive information will not serve the triple objectives of reducing privacy harm, increasing social welfare, and increasing information contribution. We derive a necessary condition for solutions that can fulfill these three objectives. We also compare the incentives of the platform owner and social planner and draw related managerial and policy implications. The online appendix is available at https://doi.org/10.1287/isre.2017.0744 .
- Published
- 2018
- Full Text
- View/download PDF
5. When Discounts Hurt Sales: The Case of Daily-Deal Markets
- Author
-
Kai Lung Hui, Zike Cao, Hong Xu, and Department of Technology and Operations Management
- Subjects
Battery (electricity) ,Information Systems and Management ,Computer Networks and Communications ,05 social sciences ,Library and Information Sciences ,Management Information Systems ,Identification (information) ,0502 economics and business ,050211 marketing ,Business ,Tracking (education) ,050207 economics ,Marketing ,Price promotion ,Information Systems - Abstract
We investigate whether the discounts offered by online daily deals help attract consumer purchases. By tracking the sales of 19,978 deals on Groupon.com and conducting a battery of identification and falsification tests, we find that deep discounts reduce sales. A 1% increase in a deal’s discount decreases sales by 0.035%–0.256%. If a merchant offers an additional 10% discount from the sample mean of 55.6%, sales could decrease by 0.63%–4.60%, or 0.80–5.24 units and $42–$275 in revenue. This negative effect of discount is more prominent among credence goods and deals with low sales, and when the deals are offered in cities with higher income and better education. Our findings suggest that consumers are concerned about product quality, and excessive discounts may reduce sales immediately. A follow-up lab experiment provides further support to this quality-concern explanation. Furthermore, it suggests the existence of a “threshold” effect: the negative effect on sales is present only when the discount is sufficiently high. Additional empirical analysis shows that deals displaying favorable third-party support, such as Facebook fans and online reviews, are more susceptible to this adverse discount effect. We draw related managerial implications. The online appendix is available at https://doi.org/10.1287/isre.2017.0772 .
- Published
- 2018
6. Technology Mergers and Acquisitions in the Presence of an Installed Base: A Strategic Analysis
- Author
-
Qiu-Hong Wang and Kai Lung Hui
- Subjects
Information Systems and Management ,Computer Networks and Communications ,business.industry ,05 social sciences ,Information technology ,Social Welfare ,Price discrimination ,Library and Information Sciences ,Profit (economics) ,Management Information Systems ,Microeconomics ,Upgrade ,0502 economics and business ,Mergers and acquisitions ,New product development ,Economics ,050211 marketing ,050207 economics ,Installed base ,business ,Information Systems - Abstract
We study the strategic benefits of mergers and acquisitions (M&As) when competing information technology vendors sell different generations of the same product with different quality. We assume the new product arrives unexpectedly when an installed base of the old product exists. We show that the combination of consumers’ purchase history and heterogeneity leads to new demand complexity that gives rise to innovative product strategies. We find that shelving the old product is an important motivation for M&A. The acquirer may exercise static or intertemporal price discrimination depending on whether it can exercise upgrade pricing. M&A may speed up or slow down new product consumption, and it can lead to delayed new product introduction in some markets. However, it always increases the acquirer’s profit and can sometimes help maximize social welfare. We discuss relevant managerial and policy implications. The online appendix is available at https://doi.org/10.1287/isre.2016.0659 .
- Published
- 2017
- Full Text
- View/download PDF
7. Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks
- Author
-
Seung Hyun Kim, Kai Lung Hui, and Qiu-Hong Wang
- Subjects
Information Systems and Management ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,Law enforcement ,Denial-of-service attack ,Sample (statistics) ,Legislation ,02 engineering and technology ,Computer security ,computer.software_genre ,Convention on Cybercrime ,Computer Science Applications ,Management Information Systems ,Cybercrime ,020204 information systems ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Deterrence theory ,Business ,050207 economics ,computer ,Information Systems - Abstract
In this paper, we estimate the impact of enforcing the Convention on Cybercrime (COC) on deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of real, random spoo...
- Published
- 2017
- Full Text
- View/download PDF
8. Research Note—Migration of Service to the Internet: Evidence from a Federal Natural Experiment
- Author
-
Ivan P. L. Png and Kai Lung Hui
- Subjects
Service (business) ,Government ,Information Systems and Management ,Tiered service ,Computer Networks and Communications ,business.industry ,Consumer choice ,Advertising ,Library and Information Sciences ,Service provider ,Management Information Systems ,FRIACO ,The Internet ,Business ,Service guarantee ,Marketing ,Information Systems - Abstract
Previous research into consumer choice of service channels studied the impact of online access as an addition to conventional service. Here, we study the impact of a compulsory migration to an online channel. We exploit a natural experiment in the implementation of a new federal government service to identify the causal effect of access channel on consumer choice. The government served western states through the Internet and telephone at all times. However, for the first 10 days, the government served the East through the Internet only. Comparing consumer responses in the East (only Internet service available) and West (both Internet and telephone service available), we find robust evidence that some consumers preferred telephone access. The unavailability of telephone service in the first 10 days resulted in a 4.3% loss of consumers who were otherwise interested in the service.
- Published
- 2015
- Full Text
- View/download PDF
9. Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
- Author
-
Kai Lung Hui, Wendy Hui, and Wei Thoo Yue
- Subjects
Information Systems and Management ,Cloud computing security ,Certified Information Security Manager ,Management Science and Operations Research ,Computer security ,computer.software_genre ,Security information and event management ,Computer Science Applications ,Management Information Systems ,Information security management ,Security service ,Information security standards ,Security through obscurity ,Security convergence ,Business ,computer - Abstract
The rapid growth of computer networks has led to a proliferation of information security standards. To meet these security standards, some organizations outsource security protection to a managed security service provider (MSSP). However, this may give rise to system interdependency risks. This paper analyzes how such system interdependency risks interact with a mandatory security requirement to affect the equilibrium behaviors of an MSSP and its clients. We show that a mandatory security requirement will increase the MSSP's effort and motivate it to serve more clients. Although more clients can benefit from the MSSP's protection, they are also subjected to greater system interdependency risks. Social welfare will decrease if the mandatory security requirement is high, and imposing verifiability may exacerbate social welfare losses. Our results imply that recent initiatives such as issuing certification to enforce computer security protection, or encouraging auditing of managed security services, may not ...
- Published
- 2012
- Full Text
- View/download PDF
10. Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach
- Author
-
Ivan P. L. Png, Sang-Yong Tom Lee, Kai Lung Hui, and IIhorn Hann
- Subjects
Expectancy theory ,Information privacy ,Information Systems and Management ,Privacy by Design ,Privacy software ,business.industry ,Computer science ,Privacy policy ,Internet privacy ,Context (language use) ,Management Science and Operations Research ,Public relations ,Computer Science Applications ,Management Information Systems ,Information processing theory ,The Internet ,business ,Personally identifiable information - Abstract
The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that companies misuse their information. Firms have tried to mitigate this concern in two ways: (1) offering privacy policies regarding the handling and use of personal information, (2) offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information processing theory of motivation. Information processing theories, in the context of motivated behavior also known as expectancy theories, are built on the premise that people process information about behavior-outcome relationships. We empirically validate predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. Further, we investigate these means in trade-off situation, where a firm may only offer partially complete privacy protection and/or some benefits
- Published
- 2007
- Full Text
- View/download PDF
11. Software Functionality: A Game Theoretic Analysis
- Author
-
Kar Yan Tam and Kai Lung Hui
- Subjects
Game testing ,Information Systems and Management ,business.industry ,Computer science ,Software development ,Management Science and Operations Research ,computer.software_genre ,Software metric ,Computer Science Applications ,Management Information Systems ,World Wide Web ,Software development process ,Software framework ,Market segmentation ,Software deployment ,business ,Duopoly ,computer ,Industrial organization - Abstract
Digital products are now widely traded over the Internet. Many researchers have started to investigate the optimal competitive strategies and market environments for such products. This paper studies the competitive decisions made about software, a major class of digital products that can be easily sold through computer networks. Instead of focusing on traditional competitive dimensions, such as price or quantity, we study the number of functions that should be incorporated into the software. Using game theoretic analysis, we show that there is no fixed strategy that is optimal for software developers in a duopoly market with one-stage simultaneous moves. This happens because, given one developer's decision, there is always an incentive for the other developer to deviate and achieve higher payoffs. Nevertheless, a unique reactive equilibrium does emerge if we consider the two-stage variation of the model, where the two developers both enjoy substantial profits by serving different segments of the market. Essentially, the first mover commits himself to a certain functionality level that induces a rational follower to target his software to the (previously) unattended segment. We discuss our results in light of scale economies in the software development process and market segmentation.
- Published
- 2002
- Full Text
- View/download PDF
12. A Choice Model for the Selection of Computer Vendors and Its Empirical Estimation
- Author
-
Kai Lung Hui and Kar Yan Tam
- Subjects
Discrete choice ,Information Systems and Management ,Operations research ,Computer science ,Process (engineering) ,Vendor ,Management Science and Operations Research ,Outcome (game theory) ,Computer Science Applications ,Management Information Systems ,Variety (cybernetics) ,Product (category theory) ,Marketing ,Time series ,Network effect - Abstract
Despite the important role of vendors in the IT procurement process, very few studies have considered vendor characteristics and their effects on the decision outcome of IT managers. In this paper,we present a discrete choice model to examine the effects of vendor characteristics on the purchase decisions of IT managers. Our intent is to empirically assess the effects of product variety, brand name, average price, and network externalities in the selection of computer vendors. To ensure that the effects are not technology-dependent, we deliberately use long time series data to calibrate the model.Annual data at the vendor level from 1965 to 1993 is used to infer the choice criteria of IT managers in three computer categories: mainframe, minis, and small systems. Our empirical findings indicate that a broader product line and a strong brand can effectively enhance the choice probability of a vendor. Implications of these findings and possible extensions are also discussed.
- Published
- 2001
- Full Text
- View/download PDF
13. Identifying early adopters of new IT products: A case of Windows 95
- Author
-
Kai Lung Hui and Patrick Y. K. Chau
- Subjects
Engineering ,Information Systems and Management ,business.industry ,Perspective (graphical) ,Opinion leadership ,Information technology ,Field (computer science) ,Management Information Systems ,Test (assessment) ,Early adopter ,Empirical research ,Consumer innovativeness ,Marketing ,business ,Information Systems - Abstract
This paper presents the findings of an empirical study into factors identifying early adopters of new IT products. Drawing two well-researched concepts (opinion leadership and consumer innovativeness) developed in the marketing field, several hypotheses were formulated to test against data collected from 145 microcomputer users who had or had not adopted Windows 95. The findings indicate that early adopters tend to be younger males who are of opinion leadership type, like to seek novel information, and have a lot of computer experience. Implications of the findings, from both a research and a managerial perspective are discussed.
- Published
- 1998
- Full Text
- View/download PDF
14. The Value of Privacy Assurance: An Exploratory Field Experiment
- Author
-
Kai Lung Hui, Hock-Hai Teo, and Sang-Yong Tom Lee
- Subjects
Information privacy ,Information Systems and Management ,Data collection ,Privacy by Design ,Privacy software ,business.industry ,Privacy policy ,Internet privacy ,Computer Science Applications ,Management Information Systems ,Incentive ,ComputingMilieux_COMPUTERSANDSOCIETY ,Privacy for research participants ,business ,Psychology ,Personally identifiable information ,Information Systems - Abstract
This paper reports the results of an exploratory field experiment in Singapore that assessed the values of two types of privacy assurance: privacy statements and privacy seals. We collaborated with a local firm to host the experiment on its website with its real domain name, and the subjects were not informed of the experiment. Hence, the study provided a field observation of the subjects' behavioral responses toward privacy assurances. We found that (1) the existence of a privacy statement induced more subjects to disclose their personal information but that of a privacy seal did not; (2) monetary incentive had a positive influence on disclosure; and (3) information request had a negative influence on disclosure. These results were robust in other specifications that used alternative measures for some of our model variables. We discuss this study in relation to the extant privacy literature, most of which employs surveys and laboratory experiments for data collection, and draw related managerial implications.
- Published
- 2007
- Full Text
- View/download PDF
15. Delayed product introduction
- Author
-
Kai Lung Hui and Qiu-Hong Wang
- Subjects
Information Systems and Management ,Quality management ,business.industry ,Durable good ,Management Information Systems ,jel:L ,Microeconomics ,Upgrade ,Incentive ,Arts and Humanities (miscellaneous) ,New product development ,Developmental and Educational Psychology ,Economics ,Dynamic inconsistency ,Product (category theory) ,Marketing ,delayed introduction, durable goods monopolist, cannibalization, durability, time inconsistency, upgrade, product innovation, three-period model ,business ,Information Systems ,Pace - Abstract
We investigate the incentives of a monopolistic seller to delay the introduction of a new and improved version of his product. By analyzing a three-period model, we show that the seller may prefer to delay introducing a new product, even though the enabling technologies for the product are already available. The underlying motivation is analogous to that found in the durable goods monopolist literature – the seller suffers from a time inconsistency problem that causes his old and new products to cannibalize each other. Without the ability to remove existing stock of the old product from the market, shorten product durability, or pace research and development (R&D), he may respond by selling the new product later. We characterize the equilibria with delayed introduction, and study their changes with respect to market and product parameters. In particular, we show that delayed introduction could occur regardless of whether the seller can offer upgrade discounts to consumers, that instead, it is related to quality improvement brought about by the new product, durabilities, and discount factors. Further, we show that contrary to previous studies, delayed introduction could bring socially efficient outcomes as well. Based on the insights of the model, we provide practical suggestions on pricing and policies.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.