4.6 Article

Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements

Related references

Note: Only part of the references are listed.
Article Information Science & Library Science

Contracting Information Security in the Presence of Double Moral Hazard

Chul Ho Lee et al.

INFORMATION SYSTEMS RESEARCH (2013)

Article Computer Science, Information Systems

Information Security Outsourcing with System Interdependency and Mandatory Security Requirement

Kai-Lung Hui et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2012)

Article Computer Science, Information Systems

Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers

Marco Cremonini et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2009)

Article Information Science & Library Science

Demand Heterogeneity in IT Infrastructure Services: Modeling and Evaluation of a Dynamic Approach to Defining Service Levels

Sagnika Sen et al.

INFORMATION SYSTEMS RESEARCH (2009)

Article Computer Science, Information Systems

Investments in Information Security: A Real Options Perspective with Bayesian Postaudit

Hemantha S. B. Herath et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2008)

Article Computer Science, Information Systems

Decision-theoretic and game-theoretic approaches to IT security investment

Huseyin Cavusoglu et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2008)

Article Computer Science, Information Systems

Understanding the value of countermeasure portfolios in information systems security

Ram L. Kumar et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2008)

Review Multidisciplinary Sciences

The economics of information security

Ross Anderson et al.

SCIENCE (2006)

Article Information Science & Library Science

The economic incentives for sharing security information

E Gal-Or et al.

INFORMATION SYSTEMS RESEARCH (2005)

Article Business

The formation of mutual insurers in markets with adverse selection

JA Ligon et al.

JOURNAL OF BUSINESS (2005)

Article Business, Finance

Interdependent security

H Kunreuther et al.

JOURNAL OF RISK AND UNCERTAINTY (2003)

Article Computer Science, Hardware & Architecture

A framework for using insurance for cyber-risk management

LA Gordon et al.

COMMUNICATIONS OF THE ACM (2003)

Article Engineering, Industrial

An inter-organizational information system for supply chain management

PK Humphreys et al.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2001)

Article Business, Finance

Moral hazard in risk pooling arrangements

W Lee et al.

JOURNAL OF RISK AND INSURANCE (2001)