Related references
Note: Only part of the references are listed.Contracting Information Security in the Presence of Double Moral Hazard
Chul Ho Lee et al.
INFORMATION SYSTEMS RESEARCH (2013)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
Kai-Lung Hui et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2012)
Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers
Marco Cremonini et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2009)
Demand Heterogeneity in IT Infrastructure Services: Modeling and Evaluation of a Dynamic Approach to Defining Service Levels
Sagnika Sen et al.
INFORMATION SYSTEMS RESEARCH (2009)
Investments in Information Security: A Real Options Perspective with Bayesian Postaudit
Hemantha S. B. Herath et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2008)
Decision-theoretic and game-theoretic approaches to IT security investment
Huseyin Cavusoglu et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2008)
Understanding the value of countermeasure portfolios in information systems security
Ram L. Kumar et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2008)
The economics of information security
Ross Anderson et al.
SCIENCE (2006)
The economic incentives for sharing security information
E Gal-Or et al.
INFORMATION SYSTEMS RESEARCH (2005)
The formation of mutual insurers in markets with adverse selection
JA Ligon et al.
JOURNAL OF BUSINESS (2005)
Interdependent security
H Kunreuther et al.
JOURNAL OF RISK AND UNCERTAINTY (2003)
A framework for using insurance for cyber-risk management
LA Gordon et al.
COMMUNICATIONS OF THE ACM (2003)
An inter-organizational information system for supply chain management
PK Humphreys et al.
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2001)
Moral hazard in risk pooling arrangements
W Lee et al.
JOURNAL OF RISK AND INSURANCE (2001)