Related references
Note: Only part of the references are listed.A game-theoretic analysis of information security investment for multiple firms in a network
Xiaofei Qian et al.
JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2017)
The value of the CIO in the top management team on performance in the case of information security breaches
Humayun Zafar et al.
INFORMATION SYSTEMS FRONTIERS (2016)
Equilibrium, uncertainty and risk in hydro-thermal electricity systems
Andy Philpott et al.
MATHEMATICAL PROGRAMMING (2016)
Allocation of resources to cyber-security: The effect of misalignment of interest between managers and investors
Bin Srinidhi et al.
DECISION SUPPORT SYSTEMS (2015)
Game of information security investment: Impact of attack types and network vulnerability
Yong Wu et al.
EXPERT SYSTEMS WITH APPLICATIONS (2015)
A system dynamics model for information security management
Derek L. Nazareth et al.
INFORMATION & MANAGEMENT (2015)
Security investment and information sharing under an alternative security breach probability function
Xing Gao et al.
INFORMATION SYSTEMS FRONTIERS (2015)
Improving the Price of Anarchy for Selfish Routing via Coordination Mechanisms
Giorgos Christodoulou et al.
ALGORITHMICA (2014)
Optimal information security investment in a Healthcare Information Exchange: An economic analysis
C. Derrick Huang et al.
DECISION SUPPORT SYSTEMS (2014)
A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis
Nan Feng et al.
INFORMATION SCIENCES (2014)
A game-theoretic analysis of information sharing and security investment for complementary firms
Xing Gao et al.
JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2014)
Efficient Coordination Mechanisms for Unrelated Machine Scheduling
Ioannis Caragiannis
ALGORITHMICA (2013)
Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints
C. Derrick Huang et al.
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2013)
The economic impact of cyber terrorism
Jian Hua et al.
JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2013)
A differential game approach to information security investment under hackers' knowledge dissemination
Xing Gao et al.
OPERATIONS RESEARCH LETTERS (2013)
Coordination in Network Security Games: A Monotone Comparative Statics Approach
Marc Lelarge
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2012)
Managing the investment in information security technology by use of a quantitative modeling
Rok Bojanc et al.
INFORMATION PROCESSING & MANAGEMENT (2012)
Towards a theoretical framework of strategic decision, supporting capability and information sharing under the context of Internet of Things
Yuan Li et al.
INFORMATION TECHNOLOGY & MANAGEMENT (2012)
Game-Theoretic Coordination Mechanisms in Distribution Channels: Integration and Extensions for Models Without Competition
Charles A. Ingene et al.
JOURNAL OF RETAILING (2012)
Firms' information security investment decisions: Stock market evidence of investors' behavior
Sangmi Chai et al.
DECISION SUPPORT SYSTEMS (2011)
Knowledge sharing and investment decisions in information security
Dengpan Liu et al.
DECISION SUPPORT SYSTEMS (2011)
Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest
Tridib Bandyopadhyay et al.
INFORMATION TECHNOLOGY & MANAGEMENT (2010)
Effort, Revenue, and Cost Sharing Mechanisms for Collaborative New Product Development
Sreekumar R. Bhaskaran et al.
MANAGEMENT SCIENCE (2009)
An economic analysis of the optimal information security investment in the case of a risk-averse firm
C. Derrick Huang et al.
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2008)
Decision-theoretic and game-theoretic approaches to IT security investment
Huseyin Cavusoglu et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2008)
A value-at-risk approach to information security investment
Jingguo Wang et al.
INFORMATION SYSTEMS RESEARCH (2008)
Coordination mechanisms of supply chain systems
Xiuhui Li et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2007)
The economics of information security
Ross Anderson et al.
SCIENCE (2006)
Equilibrium directed search with multiple applications
James Albrecht et al.
REVIEW OF ECONOMIC STUDIES (2006)
Credit ratings as coordination mechanisms
AWA Boot et al.
REVIEW OF FINANCIAL STUDIES (2006)
The economic incentives for sharing security information
E Gal-Or et al.
INFORMATION SYSTEMS RESEARCH (2005)
Non-renewable resources and growth with vertical innovations:: optimum, equilibrium and economic policies
A Grimaud et al.
JOURNAL OF ENVIRONMENTAL ECONOMICS AND MANAGEMENT (2003)
Coordination mechanisms for a distribution system with one supplier and multiple retailers
FR Chen et al.
MANAGEMENT SCIENCE (2001)
Discrete choice with social interactions
WA Brock et al.
REVIEW OF ECONOMIC STUDIES (2001)