211
Views
48
CrossRef citations to date
0
Altmetric
Original Article

Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers

&
Pages 241-274 | Published online: 08 Dec 2014

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (14)

Yong Wu, Zi Kang, Tao Dai & Dong Cheng. (2023) Managing cloud security in the presence of strategic hacker and joint responsibility. Journal of the Operational Research Society 0:0, pages 1-14.
Read now
Amitai Gilad & Asher Tishler. (2023) Mitigating the Risk of Advanced Cyber Attacks: The Role of Quality, Covertness and Intensity of Use of Cyber Weapons. Defence and Peace Economics 34:6, pages 726-746.
Read now
Xing Gao, Siyu Gong, Ying Wang & Yanfang Zhang. (2023) Information security outsourcing in a resource-sharing environment: The impacts of attack modes. Journal of the Operational Research Society 0:0, pages 1-19.
Read now
Xing Gao, Siyu Gong, Ying Wang & Yanfang Zhang. (2023) Information sharing and security investment for substitutable firms: A game-theoretic analysis. Journal of the Operational Research Society 0:0, pages 1-22.
Read now
Yanhui Li & Lu Xu. (2021) Cybersecurity investments in a two-echelon supply chain with third-party risk propagation. International Journal of Production Research 59:4, pages 1216-1238.
Read now
He Li, Sungjin Yoo & William J. Kettinger. (2021) The Roles of IT Strategies and Security Investments in Reducing Organizational Security Breaches. Journal of Management Information Systems 38:1, pages 222-245.
Read now
Victor Benjamin, Bin Zhang, Jay F. Nunamaker$suffix/text()$suffix/text() & Hsinchun Chen. (2016) Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities. Journal of Management Information Systems 33:2, pages 482-510.
Read now
Xing Gao, Weijun Zhong & Shue Mei. (2014) A game-theoretic analysis of information sharing and security investment for complementary firms. Journal of the Operational Research Society 65:11, pages 1682-1691.
Read now
Lara Khansa & Christopher W. Zobel. (2014) Assessing Innovations in Cloud Security. Journal of Computer Information Systems 54:3, pages 45-56.
Read now
Juhee Kwon & M.Eric Johnson. (2013) Health-Care Security Strategies for Data Protection and Regulatory Compliance. Journal of Management Information Systems 30:2, pages 41-66.
Read now
Xia Zhao, Ling Xue & AndrewB. Whinston. (2013) Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements. Journal of Management Information Systems 30:1, pages 123-152.
Read now
Kai-Lung Hui, Wendy Hui & WeiT. Yue. (2012) Information Security Outsourcing with System Interdependency and Mandatory Security Requirement. Journal of Management Information Systems 29:3, pages 117-156.
Read now
Debabrata Dey, Atanu Lahiri & Guoying Zhang. (2012) Hacker Behavior, Network Effects, and the Security Software Market. Journal of Management Information Systems 29:2, pages 77-108.
Read now

Articles from other publishers (34)

Franz T. Lohrke & Cynthia Frownfelter-Lohrke. (2023) Cybersecurity research from a management perspective: A systematic literature review and future research agenda. Journal of General Management.
Crossref
Kookyoung Han, Jin Hyuk Choi, Yunsik Choi, Gene Moo Lee & Andrew B. Whinston. (2023) Security defense against long-term and stealthy cyberattacks. Decision Support Systems 166, pages 113912.
Crossref
Diane J. Janvrin & Tawei Wang. (2022) Linking Cybersecurity and Accounting: An Event, Impact, Response Framework. Accounting Horizons 36:4, pages 67-112.
Crossref
Jie Jian, Siqi Chen, Xin Luo, Tien Lee & Xiaoming Yu. (2022) Organized Cyber-Racketeering: Exploring the Role of Internet Technology in Organized Cybercrime Syndicates Using a Grounded Theory Approach. IEEE Transactions on Engineering Management 69:6, pages 3726-3738.
Crossref
Kay-Yut Chen, Jingguo Wang & Yan Lang. (2022) Coping with Digital Extortion: An Experimental Study of Benefit Appeals and Normative Appeals. Management Science 68:7, pages 5269-5286.
Crossref
Xiaotong Li. (2021) An evolutionary game‐theoretic analysis of enterprise information security investment based on information sharing platform. Managerial and Decision Economics 43:3, pages 595-606.
Crossref
Saurabh Kumar, Baidyanath Biswas, Manjot Singh Bhatia & Manoj Dora. (2020) Antecedents for enhanced level of cyber-security in organisations. Journal of Enterprise Information Management 34:6, pages 1597-1629.
Crossref
Nan Feng, Shiyue Zhang, Minqiang Li & Dahui Li. (2021) Contracting managed security service: Double moral hazard and risk interdependency. Electronic Commerce Research and Applications 50, pages 101097.
Crossref
Yong Wu, Junlin Duan, Tao Dai & Dong Cheng. (2020) Managing Security Outsourcing in the Presence of Strategic Hackers. Decision Analysis 17:3, pages 235-259.
Crossref
Gabriel Kuper, Fabio Massacci, Woohyun Shim & Julian Williams. (2020) Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports. Risk Analysis 40:5, pages 1001-1019.
Crossref
Zhiheng Xu & Jun Zhuang. (2019) A Study on a Sequential One‐Defender‐ N ‐Attacker Game . Risk Analysis 39:6, pages 1414-1432.
Crossref
Gerald Onwujekwe, Manoj Thomas & Kweku-Muata Osei-Bryson. (2019) Using Robust Data Governance to Mitigate the Impact of Cybercrime. Using Robust Data Governance to Mitigate the Impact of Cybercrime.
Lars Öbrand, Nils‐Petter Augustsson, Lars Mathiassen & Jonny Holmström. (2018) The interstitiality of IT risk: An inquiry into information systems development practices . Information Systems Journal 29:1, pages 97-118.
Crossref
Lars Öbrand, Jonny Holmström & Mike Newman. (2018) Navigating Rumsfeld's quadrants: A performative perspective on IT risk management. Technology in Society 53, pages 1-8.
Crossref
Kjell Hausken. (2018) Proactivity and Retroactivity of Firms and Information Sharing of Hackers. International Game Theory Review 20:01, pages 1750027.
Crossref
Yong Wu, Richard Y.K. Fung, Gengzhong Feng & Nengmin Wang. (2017) Decisions making in information security outsourcing: Impact of complementary and substitutable firms. Computers & Industrial Engineering 110, pages 1-12.
Crossref
Kjell Hausken. (2017) Information Sharing Among Cyber Hackers in Successive Attacks. International Game Theory Review 19:02, pages 1750010.
Crossref
Kjell Hausken. (2017) Security Investment, Hacking, and Information Sharing between Firms and between Hackers. Games 8:2, pages 23.
Crossref
Xing Gao & Weijun Zhong. (2015) Economic incentives in security information sharing: the effects of market structures. Information Technology and Management 17:4, pages 361-377.
Crossref
Fabio Massacci, Raminder Ruprai, Matthew Collinson & Julian Williams. (2016) Economic Impacts of Rules- versus Risk-Based Cybersecurity Regulations for Critical Infrastructure Providers. IEEE Security & Privacy 14:3, pages 52-60.
Crossref
. 2016. Solving Modern Crime in Financial Markets. Solving Modern Crime in Financial Markets 481 490 .
Marius-Christian Frunza. 2016. Solving Modern Crime in Financial Markets. Solving Modern Crime in Financial Markets 169 181 .
Xing Gao & Weijun Zhong. (2015) Information security investment for competitive firms with hacker behavior and security requirements. Annals of Operations Research 235:1, pages 277-300.
Crossref
Xing Gao, Weijun Zhong & Shue Mei. (2013) Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers 17:2, pages 423-438.
Crossref
Xing Gao, Weijun Zhong & Shue Mei. (2013) Information Security Investment When Hackers Disseminate Knowledge. Decision Analysis 10:4, pages 352-368.
Crossref
Tobias Ackermann, Thomas Widjaja & Peter Buxmann. (2013) Towards the Optimal Security Level: Quantification of Risks in Service-Based Information Systems. Towards the Optimal Security Level: Quantification of Risks in Service-Based Information Systems.
Juhee Kwon & M. Eric Johnson. (2013) Healthcare Security Strategies for Regulatory Compliance and Data Security. Healthcare Security Strategies for Regulatory Compliance and Data Security.
Si Li, Ryan Rickert & Amy Sliva. 2013. Social Computing, Behavioral-Cultural Modeling and Prediction. Social Computing, Behavioral-Cultural Modeling and Prediction 523 532 .
Jan Devos, Hendrik Van Landeghem & Dirk Deschoolmeester. 2012. Information Systems Theory. Information Systems Theory 213 229 .
Qiang Xiong, Wei-jun Zhong & Shu-e Mei. (2011) A signal game model on security defense of information system. A signal game model on security defense of information system.
Mamoru Yoshida & Kiyoshi Kobayashi. (2010) Disclosure strategies for critical infrastructure against terror attacks. Disclosure strategies for critical infrastructure against terror attacks.
HKUST Business School Submitter. (2020) Sleeping with the Enemy: An Economic and Security Analysis of Bug Bounty Programs. SSRN Electronic Journal.
Crossref
Gabriel M. Kuper, Fabio Massacci, Woohyun Shim & Julian M. Williams. (2018) Who Should Pay for Interdependent Risk? Policy Implications for Cyber-Physical Security Interdependence in Aviation. SSRN Electronic Journal.
Crossref
Xia Zhao, Ling Xue & Andrew B. Whinston. (2010) Managing Interdependent Information Security Risks: A Study of Cyberinsurance, Managed Security Service and Risk Pooling. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.