Title: ANALYSING COMMUNICATION SYSTEM FOR SUCCESSFUL OUTSOURCING GAME THEORY PERSPECTIVE
1ANALYSING COMMUNICATION SYSTEM FOR SUCCESSFUL
OUTSOURCING - GAME THEORY PERSPECTIVE
- A. Adnan, G. Williams, S. Arunachalam, A. Cazan
J. Arreymbi - School of Computing Technology
- University of East London, UK
- (A2adnan_at_uel.ac.uk)
2Applying Theory of Games to analyse
sustainability of outsourcing.
AIMS
- OBJECTIVES
- Investigate role of secure communication system
in successful outsourcing - Analysing affects of information loss due to
hacking on outsourcing operations
3Communication activities during Outsourcing
- Information exchange
- Requesting orders
- Confirming order requests
- Order is despatched from the supplier
- Order is received by the company
- Delivery notes
- Despatching Invoices
- Delivery and invoice matching
- Request for money transfer
- Money transfer approval
- Money transfer confirmation
4(No Transcript)
5Abbreviations
- The probability of the message i
being infected after j security sweep - Maximum number of message counts that
a hacker can set for infecting the
communication - Maximum number of messages that can
be transmitted in a given time - Probability distribution chosen by
hacker of message count i - Probability of conducting j
security sweep by the security system
administrator - Size of communication system
- Number of Hackers
- Number exclusive communication
channel or branches -
6The system security administrator assumes
probability distribution that minimises the
summation. The hackers can choose the
distribution that maximise its value. Thus the
hacker insures that the probability of infecting
messages is at least
- system security administrator can use a
strategic distribution and ensures that the
probability of infecting messages is never higher
than
7The target of the hacker is to maximise and that
of system security administrator to minimise it.
If the hacker adopts a mixed strategy, the least
number of messages infected are expressed by
- Both the hacker and the system security
administrator ensure that the result is never
worse than the optimum.
8The probability of un-infected message
transmission
- The probability that the message will be infected
9The case of the simple game with matrix and
having number exclusive communication
channel or branches can be expressed as follow
10The total expected messages lost (TML) due to
hacking or infected files is the product of total
messages transmitted and
- Poisson distribution (Andrews et al. 1976),
having probability of losses is expressed as
follow
11The amount of business loss due to hacking is
given by, then the expected value loss is
formulated as
- The distributions function for total loss of
business
12Let
Revenue or assets at time
Initial balance
Income incoming
Loss of income due to loss of communication due
to hacking
Where the probability that
is true, then the outsourcing operations
is sustainable otherwise may suffer losses.
13Conclusion
- The paper has presented using the application of
game theory to assess the probability of data
loss in the communication system due to hacking
and infection. By applying games theory, the
outcome of hacking and expected loss is
interpreted in more than one way and concludes
the sustainability or failure of the outsourcing
operations. It has been shown that the original
simple concepts can be successively refined step
by step until a reasonable working model is
obtained.
14References
- Adnan, A., Arunachalam, S. (2007a), Improving
outsourcing framework by integrating with lean,
Advances in Computing and Technology 2nd Annual
Conference, London.UK.pp.137-144. - Adnan, A., Arunachalam, S., Cazan, A. (2007b),
The Importance of Secured Internet in World
Class Outsourcing, International Conference for
Internet Technology and Secured Transactions,
London.UK.pp.123-124. - Andrews, J.G., McLone, R.R. (1976), Mathematical
Modelling, Butterworth Co (Publishers) Ltd,
London.UK.pp.174-198. - Aris, R. (1978), Mathematical modelling
techniques, Pitman Publishing Limited, London.UK. - Bertrand, J.W.M., Fransoo, J.C. (2002),
Operations management research methodologies
using quantitative modeling, International
Journal of Operations Production Management,
Vol.22.No.2 2002.pp.241-264. - Caffyn, S. (1999), Development of a continuous
improvement self-assessment tool, International
Journal of Operations Production Management,
Vol.19.No.11.pp.1138-1153. - Cardinali, R. (2001), Does the future of
military logistics lie in outsourcing and
privatization? Accountants the new gatekeepers
of war-time operations, Work Study,
Vol.50.No.3.pp.105-110. - Dewettinck, K., Buyens, D. (2002), Downsizing
employee threat or opportunity? An empirical
study on external and internal reorientation
practices in Belgian companies, Employee
Relations, Vol.24.No.4.pp.389-402. - Franceschini, F., Galetto, M., Pignatelli, A.,
Varetto, M. (2003), Outsourcing guidelines for
a structured approach, Benchmarking An
International Journal, Vol.10.No.3
2003.pp.246-260. - Gottschalk, P., Solli-Saether, H. (2006),
Maturity model for IT outsourcing relationship,
Industrial Management Data Systems,
Vol.106.No.2.pp.200-212. - Harland, C., Kinight, L., Lamminh, R., Walker, H.
(2005), Outsourcing assessing the risks and
benefits for organisations, sectors and nations,
International Journal of - Operations Production Management, Vol.25.No.9
2005.pp.831-850. - Harvey, A.C. (1981), Time Series Models, Phillip
Allan Publishers Limited, Oxford.UK. - Hassanain, M.A., Al-Saadi, S. (2005), A
framework model for outsourcing asset management
services, Facilities, Vol.23.No.1/2
2005.pp.73-81. - Hoecht, A., Trott, P. (2006), Outsourcing,
information leakage and the risk of losing
technology-based competencies, European Business
Review, Vol.18.No.5 2006.pp.395-412. - Koong, K.S, Liu, L.C., Wang, Y.J. (2007),
Taxonomy development and assessment of global
information technology outsourcing decisions,
Industrial Management Data Systems,
Vol.107.No.3 1007.pp.397-414. - Kremic, T., Tukel, O.I., Rom, W.O. (2006),
Outsourcing decision support a survey of
benefits, risks, and decision factors, Supply
Chain Management An International Journal,
Vol.11.No.6 2006.pp.467-482. - Luthy, D., Forcht, K. (2006), Laws and
regulations affecting information management and
frameworks for assessing compliance, Information
Management Computer Security,
Vol.14.No.2.pp.155-166. - McIvor, R. (2000), A practical framework for
understanding the outsourcing process, Supply
Chain Management An International Journal,
Vol.5.No.1 2000.pp.22-36.