ANALYSING COMMUNICATION SYSTEM FOR SUCCESSFUL OUTSOURCING GAME THEORY PERSPECTIVE - PowerPoint PPT Presentation

1 / 14
About This Presentation
Title:

ANALYSING COMMUNICATION SYSTEM FOR SUCCESSFUL OUTSOURCING GAME THEORY PERSPECTIVE

Description:

The amount of business loss due to hacking is given by, ... assessing compliance', Information Management & Computer Security, Vol.14.No.2.pp.155-166. ... – PowerPoint PPT presentation

Number of Views:44
Avg rating:3.0/5.0
Slides: 15
Provided by: adn55
Category:

less

Transcript and Presenter's Notes

Title: ANALYSING COMMUNICATION SYSTEM FOR SUCCESSFUL OUTSOURCING GAME THEORY PERSPECTIVE


1
ANALYSING COMMUNICATION SYSTEM FOR SUCCESSFUL
OUTSOURCING - GAME THEORY PERSPECTIVE
  • A. Adnan, G. Williams, S. Arunachalam, A. Cazan
    J. Arreymbi
  • School of Computing Technology
  • University of East London, UK
  • (A2adnan_at_uel.ac.uk)

2
Applying Theory of Games to analyse
sustainability of outsourcing.
AIMS
  • OBJECTIVES
  • Investigate role of secure communication system
    in successful outsourcing
  • Analysing affects of information loss due to
    hacking on outsourcing operations

3
Communication activities during Outsourcing
  • Information exchange
  • Requesting orders
  • Confirming order requests
  • Order is despatched from the supplier
  • Order is received by the company
  • Delivery notes
  • Despatching Invoices
  • Delivery and invoice matching
  • Request for money transfer
  • Money transfer approval
  • Money transfer confirmation

4
(No Transcript)
5
Abbreviations
  • The probability of the message i
    being infected after j security sweep
  • Maximum number of message counts that
    a hacker can set for infecting the
    communication
  • Maximum number of messages that can
    be transmitted in a given time
  • Probability distribution chosen by
    hacker of message count i
  • Probability of conducting j
    security sweep by the security system
    administrator
  • Size of communication system
  • Number of Hackers
  • Number exclusive communication
    channel or branches

6
The system security administrator assumes
probability distribution that minimises the
summation. The hackers can choose the
distribution that maximise its value. Thus the
hacker insures that the probability of infecting
messages is at least
  • system security administrator can use a
    strategic distribution and ensures that the
    probability of infecting messages is never higher
    than

7
The target of the hacker is to maximise and that
of system security administrator to minimise it.
If the hacker adopts a mixed strategy, the least
number of messages infected are expressed by
  • Both the hacker and the system security
    administrator ensure that the result is never
    worse than the optimum.

8
The probability of un-infected message
transmission
  • The probability that the message will be infected

9
The case of the simple game with matrix and
having number exclusive communication
channel or branches can be expressed as follow
  • 1

10
The total expected messages lost (TML) due to
hacking or infected files is the product of total
messages transmitted and
  • Poisson distribution (Andrews et al. 1976),
    having probability of losses is expressed as
    follow

11
The amount of business loss due to hacking is
given by, then the expected value loss is
formulated as
  • The distributions function for total loss of
    business

12
Let
Revenue or assets at time
Initial balance
Income incoming
Loss of income due to loss of communication due
to hacking
Where the probability that
is true, then the outsourcing operations
is sustainable otherwise may suffer losses.
13
Conclusion
  • The paper has presented using the application of
    game theory to assess the probability of data
    loss in the communication system due to hacking
    and infection. By applying games theory, the
    outcome of hacking and expected loss is
    interpreted in more than one way and concludes
    the sustainability or failure of the outsourcing
    operations. It has been shown that the original
    simple concepts can be successively refined step
    by step until a reasonable working model is
    obtained.

14
References
  • Adnan, A., Arunachalam, S. (2007a), Improving
    outsourcing framework by integrating with lean,
    Advances in Computing and Technology 2nd Annual
    Conference, London.UK.pp.137-144.
  • Adnan, A., Arunachalam, S., Cazan, A. (2007b),
    The Importance of Secured Internet in World
    Class Outsourcing, International Conference for
    Internet Technology and Secured Transactions,
    London.UK.pp.123-124.
  • Andrews, J.G., McLone, R.R. (1976), Mathematical
    Modelling, Butterworth Co (Publishers) Ltd,
    London.UK.pp.174-198.
  • Aris, R. (1978), Mathematical modelling
    techniques, Pitman Publishing Limited, London.UK.
  • Bertrand, J.W.M., Fransoo, J.C. (2002),
    Operations management research methodologies
    using quantitative modeling, International
    Journal of Operations Production Management,
    Vol.22.No.2 2002.pp.241-264.
  • Caffyn, S. (1999), Development of a continuous
    improvement self-assessment tool, International
    Journal of Operations Production Management,
    Vol.19.No.11.pp.1138-1153.
  • Cardinali, R. (2001), Does the future of
    military logistics lie in outsourcing and
    privatization? Accountants the new gatekeepers
    of war-time operations, Work Study,
    Vol.50.No.3.pp.105-110.
  • Dewettinck, K., Buyens, D. (2002), Downsizing
    employee threat or opportunity? An empirical
    study on external and internal reorientation
    practices in Belgian companies, Employee
    Relations, Vol.24.No.4.pp.389-402.
  • Franceschini, F., Galetto, M., Pignatelli, A.,
    Varetto, M. (2003), Outsourcing guidelines for
    a structured approach, Benchmarking An
    International Journal, Vol.10.No.3
    2003.pp.246-260.
  • Gottschalk, P., Solli-Saether, H. (2006),
    Maturity model for IT outsourcing relationship,
    Industrial Management Data Systems,
    Vol.106.No.2.pp.200-212.
  • Harland, C., Kinight, L., Lamminh, R., Walker, H.
    (2005), Outsourcing assessing the risks and
    benefits for organisations, sectors and nations,
    International Journal of
  • Operations Production Management, Vol.25.No.9
    2005.pp.831-850.
  • Harvey, A.C. (1981), Time Series Models, Phillip
    Allan Publishers Limited, Oxford.UK.
  • Hassanain, M.A., Al-Saadi, S. (2005), A
    framework model for outsourcing asset management
    services, Facilities, Vol.23.No.1/2
    2005.pp.73-81.
  • Hoecht, A., Trott, P. (2006), Outsourcing,
    information leakage and the risk of losing
    technology-based competencies, European Business
    Review, Vol.18.No.5 2006.pp.395-412.
  • Koong, K.S, Liu, L.C., Wang, Y.J. (2007),
    Taxonomy development and assessment of global
    information technology outsourcing decisions,
    Industrial Management Data Systems,
    Vol.107.No.3 1007.pp.397-414.
  • Kremic, T., Tukel, O.I., Rom, W.O. (2006),
    Outsourcing decision support a survey of
    benefits, risks, and decision factors, Supply
    Chain Management An International Journal,
    Vol.11.No.6 2006.pp.467-482.
  • Luthy, D., Forcht, K. (2006), Laws and
    regulations affecting information management and
    frameworks for assessing compliance, Information
    Management Computer Security,
    Vol.14.No.2.pp.155-166.
  • McIvor, R. (2000), A practical framework for
    understanding the outsourcing process, Supply
    Chain Management An International Journal,
    Vol.5.No.1 2000.pp.22-36.
Write a Comment
User Comments (0)
About PowerShow.com