相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Modeling bluffing behavior in signaling security games
Ling Chen et al.
INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH (2022)
Cybersecurity investments in a two-echelon supply chain with third-party risk propagation
Yanhui Li et al.
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2021)
Optimal policies for information sharing in information system security
Senay Solak et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2020)
Managing Security Outsourcing in the Presence of Strategic Hackers
Yong Wu et al.
DECISION ANALYSIS (2020)
Information security decisions for two firms in a market with different types of customers
Xiaofei Qian et al.
JOURNAL OF COMBINATORIAL OPTIMIZATION (2019)
A new game of information sharing and security investment between two allied firms
Xiaofei Qian et al.
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2018)
Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size
Xinbao Liu et al.
JOURNAL OF GLOBAL OPTIMIZATION (2018)
Information security investments: An exploratory multiple case study on decision-making, evaluation and learning
Eva Weishaeupl et al.
COMPUTERS & SECURITY (2018)
Comparison of information security decisions under different security and business environments
Yong Wu et al.
JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2018)
Cybersecurity investments with nonlinear budget constraints and conservation laws: variational equilibrium, marginal expected utilities, and Lagrange multipliers
Gabriella Colajanni et al.
INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH (2018)
Cybersecurity insurance and risk-sharing
Lawrence D. Bodin et al.
JOURNAL OF ACCOUNTING AND PUBLIC POLICY (2018)
A game-theoretic analysis of information security investment for multiple firms in a network
Xiaofei Qian et al.
JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2017)
Decisions making in information security outsourcing: Impact of complementary and substitutable firms
Yong Wu et al.
COMPUTERS & INDUSTRIAL ENGINEERING (2017)
Information security investment for competitive firms with hacker behavior and security requirements
Xing Gao et al.
ANNALS OF OPERATIONS RESEARCH (2015)
Game of information security investment: Impact of attack types and network vulnerability
Yong Wu et al.
EXPERT SYSTEMS WITH APPLICATIONS (2015)
Security investment and information sharing under an alternative security breach probability function
Xing Gao et al.
INFORMATION SYSTEMS FRONTIERS (2015)
A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management
Sivadon Chaisiri et al.
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1 (2015)
Optimal information security investment in a Healthcare Information Exchange: An economic analysis
C. Derrick Huang et al.
DECISION SUPPORT SYSTEMS (2014)
A game-theoretic analysis of information sharing and security investment for complementary firms
Xing Gao et al.
JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2014)
The economic impact of cyber terrorism
Jian Hua et al.
JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2013)
A differential game approach to information security investment under hackers' knowledge dissemination
Xing Gao et al.
OPERATIONS RESEARCH LETTERS (2013)
An information systems security risk assessment model under uncertain environment
Nan Feng et al.
APPLIED SOFT COMPUTING (2011)
Knowledge sharing and investment decisions in information security
Dengpan Liu et al.
DECISION SUPPORT SYSTEMS (2011)
Risk-neutral evaluation of information security investment on data centers
Shyue-Liang Wang et al.
JOURNAL OF INTELLIGENT INFORMATION SYSTEMS (2011)
Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest
Tridib Bandyopadhyay et al.
INFORMATION TECHNOLOGY & MANAGEMENT (2010)
An economic analysis of the optimal information security investment in the case of a risk-averse firm
C. Derrick Huang et al.
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2008)
Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
Kjell Hausken
INFORMATION SYSTEMS FRONTIERS (2006)
The economic incentives for sharing security information
E Gal-Or et al.
INFORMATION SYSTEMS RESEARCH (2005)
Market for software vulnerabilities? Think again
K Kannan et al.
MANAGEMENT SCIENCE (2005)
Real options with constant relative risk aversion
V Henderson et al.
JOURNAL OF ECONOMIC DYNAMICS & CONTROL (2002)
Optimal portfolio and background risk: an exact and an approximated solution
F Menoncin
INSURANCE MATHEMATICS & ECONOMICS (2002)