366
Views
13
CrossRef citations to date
0
Altmetric
Articles

Comparison of information security decisions under different security and business environments

, &
Pages 747-761 | Received 01 Aug 2016, Accepted 30 May 2017, Published online: 18 Jan 2018

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (4)

Lu Xu, Yanhui Li, Yanwei Lin, Chaofeng Tang & Qi Yao. (2024) Supply chain cybersecurity investments with interdependent risks under different information exchange modes. International Journal of Production Research 62:6, pages 2034-2059.
Read now
Yong Wu, Zi Kang, Tao Dai & Dong Cheng. (2023) Managing cloud security in the presence of strategic hacker and joint responsibility. Journal of the Operational Research Society 0:0, pages 1-14.
Read now
Xing Gao, Siyu Gong, Ying Wang & Yanfang Zhang. (2023) Information sharing and security investment for substitutable firms: A game-theoretic analysis. Journal of the Operational Research Society 0:0, pages 1-22.
Read now
Yong Wu, Haocheng Xiao, Tao Dai & Dong Cheng. (2022) A game-theoretical model of firm security reactions responding to a strategic hacker in a competitive industry. Journal of the Operational Research Society 73:4, pages 716-740.
Read now

Articles from other publishers (9)

Xiaomin Wu, Yong Wu, Qingying Li & Tao Dai. (2023) How to react to hacker types and asset types in security decision-making. Expert Systems with Applications 231, pages 120654.
Crossref
Victor Krasnobayev, Alina Yanko & Alina Hlushko. (2023) Information Security of the National Economy Based on an Effective Data Control Method. Journal of International Commerce, Economics and Policy 14:03.
Crossref
艺浩 刘. (2023) Managing Partial Outsourcing on Information Security under Security Standard Constraint—Based on Asymmetric Externality. Management Science and Engineering 12:01, pages 1-18.
Crossref
Xing Gao & Siyu Gong. (2022) An economic analysis of information security outsourcing with competitive firms. Managerial and Decision Economics 43:7, pages 2748-2758.
Crossref
Yong Wu, Mengyao Xu, Dong Cheng & Tao Dai. (2022) Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker. Decision Analysis 19:2, pages 99-122.
Crossref
Suyuan Luo & Tsan‐Ming Choi. (2022) E‐commerce supply chains with considerations of cyber‐security: Should governments play a role?. Production and Operations Management 31:5, pages 2107-2126.
Crossref
Xiaofei Qian, Wujuan Yang, Jun Pei, Xinbao Liu & Panos M. Pardalos. (2021) A game of information security investment considering security insurance and complementary information assets. International Transactions in Operational Research 29:3, pages 1791-1824.
Crossref
Yong Wu, Junlin Duan, Tao Dai & Dong Cheng. (2020) Managing Security Outsourcing in the Presence of Strategic Hackers. Decision Analysis 17:3, pages 235-259.
Crossref
Xiaofei Qian, Jun Pei, Xinbao Liu, Mi Zhou & Panos M. Pardalos. (2019) Information security decisions for two firms in a market with different types of customers. Journal of Combinatorial Optimization 38:4, pages 1263-1285.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.