4.5 Article

A game of information security investment considering security insurance and complementary information assets

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Management

Modeling bluffing behavior in signaling security games

Ling Chen et al.

Summary: In some security domains, the defender may hold more private information than the attacker, allowing for opportunities to bluff. Researchers have proposed a bluffing security game model and a method to solve it. Experiments show that the model outperforms the no-signaling model in terms of the defender's utility.

INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH (2022)

Article Engineering, Industrial

Cybersecurity investments in a two-echelon supply chain with third-party risk propagation

Yanhui Li et al.

Summary: Cybersecurity poses challenges for supply chains, requiring investments to consider third-party risk propagation. Research findings suggest that joint decision-making and security risk compensation are more effective than security information sharing in stimulating investments and reducing costs.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2021)

Article Management

Optimal policies for information sharing in information system security

Senay Solak et al.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2020)

Article Management

Managing Security Outsourcing in the Presence of Strategic Hackers

Yong Wu et al.

DECISION ANALYSIS (2020)

Article Computer Science, Interdisciplinary Applications

Information security decisions for two firms in a market with different types of customers

Xiaofei Qian et al.

JOURNAL OF COMBINATORIAL OPTIMIZATION (2019)

Article Engineering, Industrial

A new game of information sharing and security investment between two allied firms

Xiaofei Qian et al.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2018)

Article Operations Research & Management Science

Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size

Xinbao Liu et al.

JOURNAL OF GLOBAL OPTIMIZATION (2018)

Article Computer Science, Information Systems

Information security investments: An exploratory multiple case study on decision-making, evaluation and learning

Eva Weishaeupl et al.

COMPUTERS & SECURITY (2018)

Article Management

Comparison of information security decisions under different security and business environments

Yong Wu et al.

JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2018)

Article Business, Finance

Cybersecurity insurance and risk-sharing

Lawrence D. Bodin et al.

JOURNAL OF ACCOUNTING AND PUBLIC POLICY (2018)

Article Management

A game-theoretic analysis of information security investment for multiple firms in a network

Xiaofei Qian et al.

JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2017)

Article Computer Science, Interdisciplinary Applications

Decisions making in information security outsourcing: Impact of complementary and substitutable firms

Yong Wu et al.

COMPUTERS & INDUSTRIAL ENGINEERING (2017)

Article Operations Research & Management Science

Information security investment for competitive firms with hacker behavior and security requirements

Xing Gao et al.

ANNALS OF OPERATIONS RESEARCH (2015)

Article Computer Science, Artificial Intelligence

Game of information security investment: Impact of attack types and network vulnerability

Yong Wu et al.

EXPERT SYSTEMS WITH APPLICATIONS (2015)

Article Computer Science, Information Systems

Security investment and information sharing under an alternative security breach probability function

Xing Gao et al.

INFORMATION SYSTEMS FRONTIERS (2015)

Proceedings Paper Computer Science, Theory & Methods

A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management

Sivadon Chaisiri et al.

2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1 (2015)

Article Computer Science, Artificial Intelligence

Optimal information security investment in a Healthcare Information Exchange: An economic analysis

C. Derrick Huang et al.

DECISION SUPPORT SYSTEMS (2014)

Article Management

A game-theoretic analysis of information sharing and security investment for complementary firms

Xing Gao et al.

JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2014)

Article Computer Science, Information Systems

The economic impact of cyber terrorism

Jian Hua et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2013)

Article Operations Research & Management Science

A differential game approach to information security investment under hackers' knowledge dissemination

Xing Gao et al.

OPERATIONS RESEARCH LETTERS (2013)

Article Computer Science, Artificial Intelligence

An information systems security risk assessment model under uncertain environment

Nan Feng et al.

APPLIED SOFT COMPUTING (2011)

Article Computer Science, Artificial Intelligence

Knowledge sharing and investment decisions in information security

Dengpan Liu et al.

DECISION SUPPORT SYSTEMS (2011)

Article Computer Science, Artificial Intelligence

Risk-neutral evaluation of information security investment on data centers

Shyue-Liang Wang et al.

JOURNAL OF INTELLIGENT INFORMATION SYSTEMS (2011)

Article Information Science & Library Science

Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest

Tridib Bandyopadhyay et al.

INFORMATION TECHNOLOGY & MANAGEMENT (2010)

Article Engineering, Industrial

An economic analysis of the optimal information security investment in the case of a risk-averse firm

C. Derrick Huang et al.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2008)

Article Information Science & Library Science

The economic incentives for sharing security information

E Gal-Or et al.

INFORMATION SYSTEMS RESEARCH (2005)

Article Management

Market for software vulnerabilities? Think again

K Kannan et al.

MANAGEMENT SCIENCE (2005)

Article Economics

Real options with constant relative risk aversion

V Henderson et al.

JOURNAL OF ECONOMIC DYNAMICS & CONTROL (2002)

Article Economics

Optimal portfolio and background risk: an exact and an approximated solution

F Menoncin

INSURANCE MATHEMATICS & ECONOMICS (2002)