4.5 Article Proceedings Paper

Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size

Related references

Note: Only part of the references are listed.
Article Engineering, Manufacturing

Strategic Analysis of the Agency Model for Digital Goods

Yinliang (Ricky) Tan et al.

PRODUCTION AND OPERATIONS MANAGEMENT (2017)

Article Information Science & Library Science

Economic incentives in security information sharing: the effects of market structures

Xing Gao et al.

INFORMATION TECHNOLOGY & MANAGEMENT (2016)

Article Management

The Agency Model for Digital Goods

Yinliang Tan et al.

DECISION SCIENCES (2016)

Article Computer Science, Artificial Intelligence

Game of information security investment: Impact of attack types and network vulnerability

Yong Wu et al.

EXPERT SYSTEMS WITH APPLICATIONS (2015)

Article Management

The Demand Effects of Joint Product Advertising in Online Videos

Anuj Kumar et al.

MANAGEMENT SCIENCE (2015)

Article Computer Science, Information Systems

Security investment and information sharing under an alternative security breach probability function

Xing Gao et al.

INFORMATION SYSTEMS FRONTIERS (2015)

Article Management

A game-theoretic analysis of information sharing and security investment for complementary firms

Xing Gao et al.

JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2014)

Article Engineering, Industrial

Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints

C. Derrick Huang et al.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2013)

Article Operations Research & Management Science

A differential game approach to information security investment under hackers' knowledge dissemination

Xing Gao et al.

OPERATIONS RESEARCH LETTERS (2013)

Article Engineering, Electrical & Electronic

Coordination in Network Security Games: A Monotone Comparative Statics Approach

Marc Lelarge

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2012)

Article Computer Science, Software Engineering

Investing in IT Security: How to Determine the Maximum Threshold

Amanda Eisenga et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY (2012)

Article Computer Science, Artificial Intelligence

Firms' information security investment decisions: Stock market evidence of investors' behavior

Sangmi Chai et al.

DECISION SUPPORT SYSTEMS (2011)

Article Computer Science, Artificial Intelligence

Knowledge sharing and investment decisions in information security

Dengpan Liu et al.

DECISION SUPPORT SYSTEMS (2011)

Article Engineering, Industrial

A Stackelberg model of pricing of complementary goods under information asymmetry

Samar K. Mukhopadhyay et al.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2011)

Article Business

The profit benefits of bundle pricing of complementary products

Ruiliang Yan et al.

JOURNAL OF RETAILING AND CONSUMER SERVICES (2011)

Article Information Science & Library Science

Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest

Tridib Bandyopadhyay et al.

INFORMATION TECHNOLOGY & MANAGEMENT (2010)

Article Engineering, Industrial

An economic analysis of the optimal information security investment in the case of a risk-averse firm

C. Derrick Huang et al.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2008)

Article Information Science & Library Science

The economic incentives for sharing security information

E Gal-Or et al.

INFORMATION SYSTEMS RESEARCH (2005)

Article Economics

A differential game approach to investment in product differentiation

R Cellini et al.

JOURNAL OF ECONOMIC DYNAMICS & CONTROL (2002)