332
Views
43
CrossRef citations to date
0
Altmetric
General Paper

A game-theoretic analysis of information sharing and security investment for complementary firms

, &
Pages 1682-1691 | Received 02 Apr 2012, Accepted 05 Sep 2013, Published online: 21 Dec 2017

References

  • CavusogluHRaghunathanSYueWTDecision-theoretic and game-theoretic approaches to IT security investmentJournal of Management Information Systems200825228130410.2753/MIS0742-1222250211
  • CremoniniMNizovtsevDRisks and benefits of signaling information system characteristics to strategic attackersJournal of Management Information Systems200926324127410.2753/MIS0742-1222260308
  • FudenbergDTiroleJGame Theory1993
  • Gal-OrEGhoseAThe economic incentives for sharing security informationInformation Systems Research200516218620810.1287/isre.1050.0053
  • GaoXZhongWMeiSStochastic evolutionary game dynamics and their selection mechanismsComputational Economics201341223324710.1007/s10614-012-9320-4
  • Gao X, Zhong W and Mei S (2013b). Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers, advance online publication 23 February, doi:10.1007/s10796-013-9411-3.
  • GordonLALoebMPLucyshynWSharing information on computer systems security: An economic analysisJournal of Accounting and Public Policy200322646148510.1016/j.jaccpubpol.2003.09.001
  • HauskenKIncome, interdependence, and substitution effects affecting incentives for security investmentJournal of Accounting and Public Policy200625662966510.1016/j.jaccpubpol.2006.09.001
  • HauskenKInformation sharing among firms and cyber attacksJournal of Accounting and Public Policy200726663968810.1016/j.jaccpubpol.2007.10.001
  • HauskenKWhether to attack a terrorist’s resource stock today or tomorrowGames and Economic Behavior200864254856410.1016/j.geb.2008.02.001
  • HauskenKBierVMDefending against multiple different attackersEuropean Journal of Operational Research2011211237038410.1016/j.ejor.2010.12.013
  • HauskenKZhuangJDefending against a stockpiling terroristThe Engineering Economist2011564321353
  • HuangDBeharaRSEconomics of information security investment in the case of concurrent heterogeneous attacks with budget constraintsInternational Journal of Production Economics2013141125526810.1016/j.ijpe.2012.06.022
  • LevitinGHauskenKDefence and attack of systems with variable attacker system structure detection probabilityJournal of the Operational Research Society201061112413310.1057/jors.2008.158
  • LiuDJiYMookerjeeVKnowledge sharing and investment decisions in information securityDecision Support Systems20115219510710.1016/j.dss.2011.05.007
  • PngIWangQHInformation security: Facilitating user precautions vis-à-vis enforcement against attackersJournal of Management Information Systems20092629712110.2753/MIS0742-1222260205
  • RansbothamSMitraSChoice and chance: A conceptual model of paths to information security compromiseInformation Systems Research200920112113910.1287/isre.1080.0174
  • SkaperdasSContest success functionsEconomic Theory19967228329010.1007/BF01213906
  • ZhuangJBierVMGuptaASubsidies in interdependent security with heterogeneous discount ratesThe Engineering Economist200752111910.1080/00137910601159722

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.