4.7 Article

A new game of information sharing and security investment between two allied firms

Related references

Note: Only part of the references are listed.
Article Management

A game-theoretic analysis of information security investment for multiple firms in a network

Xiaofei Qian et al.

JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2017)

Article Computer Science, Information Systems

The value of the CIO in the top management team on performance in the case of information security breaches

Humayun Zafar et al.

INFORMATION SYSTEMS FRONTIERS (2016)

Article Computer Science, Software Engineering

Equilibrium, uncertainty and risk in hydro-thermal electricity systems

Andy Philpott et al.

MATHEMATICAL PROGRAMMING (2016)

Article Computer Science, Artificial Intelligence

Allocation of resources to cyber-security: The effect of misalignment of interest between managers and investors

Bin Srinidhi et al.

DECISION SUPPORT SYSTEMS (2015)

Article Computer Science, Artificial Intelligence

Game of information security investment: Impact of attack types and network vulnerability

Yong Wu et al.

EXPERT SYSTEMS WITH APPLICATIONS (2015)

Article Computer Science, Information Systems

A system dynamics model for information security management

Derek L. Nazareth et al.

INFORMATION & MANAGEMENT (2015)

Article Computer Science, Information Systems

Security investment and information sharing under an alternative security breach probability function

Xing Gao et al.

INFORMATION SYSTEMS FRONTIERS (2015)

Article Computer Science, Software Engineering

Improving the Price of Anarchy for Selfish Routing via Coordination Mechanisms

Giorgos Christodoulou et al.

ALGORITHMICA (2014)

Article Computer Science, Artificial Intelligence

Optimal information security investment in a Healthcare Information Exchange: An economic analysis

C. Derrick Huang et al.

DECISION SUPPORT SYSTEMS (2014)

Article Management

A game-theoretic analysis of information sharing and security investment for complementary firms

Xing Gao et al.

JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2014)

Article Computer Science, Software Engineering

Efficient Coordination Mechanisms for Unrelated Machine Scheduling

Ioannis Caragiannis

ALGORITHMICA (2013)

Article Engineering, Industrial

Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints

C. Derrick Huang et al.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2013)

Article Computer Science, Information Systems

The economic impact of cyber terrorism

Jian Hua et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2013)

Article Operations Research & Management Science

A differential game approach to information security investment under hackers' knowledge dissemination

Xing Gao et al.

OPERATIONS RESEARCH LETTERS (2013)

Article Engineering, Electrical & Electronic

Coordination in Network Security Games: A Monotone Comparative Statics Approach

Marc Lelarge

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2012)

Article Computer Science, Information Systems

Managing the investment in information security technology by use of a quantitative modeling

Rok Bojanc et al.

INFORMATION PROCESSING & MANAGEMENT (2012)

Article Computer Science, Artificial Intelligence

Firms' information security investment decisions: Stock market evidence of investors' behavior

Sangmi Chai et al.

DECISION SUPPORT SYSTEMS (2011)

Article Computer Science, Artificial Intelligence

Knowledge sharing and investment decisions in information security

Dengpan Liu et al.

DECISION SUPPORT SYSTEMS (2011)

Article Information Science & Library Science

Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest

Tridib Bandyopadhyay et al.

INFORMATION TECHNOLOGY & MANAGEMENT (2010)

Article Management

Effort, Revenue, and Cost Sharing Mechanisms for Collaborative New Product Development

Sreekumar R. Bhaskaran et al.

MANAGEMENT SCIENCE (2009)

Article Engineering, Industrial

An economic analysis of the optimal information security investment in the case of a risk-averse firm

C. Derrick Huang et al.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2008)

Article Computer Science, Information Systems

Decision-theoretic and game-theoretic approaches to IT security investment

Huseyin Cavusoglu et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2008)

Article Information Science & Library Science

A value-at-risk approach to information security investment

Jingguo Wang et al.

INFORMATION SYSTEMS RESEARCH (2008)

Review Management

Coordination mechanisms of supply chain systems

Xiuhui Li et al.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2007)

Review Multidisciplinary Sciences

The economics of information security

Ross Anderson et al.

SCIENCE (2006)

Article Economics

Equilibrium directed search with multiple applications

James Albrecht et al.

REVIEW OF ECONOMIC STUDIES (2006)

Article Business, Finance

Credit ratings as coordination mechanisms

AWA Boot et al.

REVIEW OF FINANCIAL STUDIES (2006)

Article Information Science & Library Science

The economic incentives for sharing security information

E Gal-Or et al.

INFORMATION SYSTEMS RESEARCH (2005)

Article Business

Non-renewable resources and growth with vertical innovations:: optimum, equilibrium and economic policies

A Grimaud et al.

JOURNAL OF ENVIRONMENTAL ECONOMICS AND MANAGEMENT (2003)

Article Economics

Discrete choice with social interactions

WA Brock et al.

REVIEW OF ECONOMIC STUDIES (2001)