References
- CavusogluHRaghunathanSYueWTDecision-theoretic and game-theoretic approaches to IT security investmentJournal of Management Information Systems200825228130410.2753/MIS0742-1222250211
- CremoniniMNizovtsevDRisks and benefits of signaling information system characteristics to strategic attackersJournal of Management Information Systems200926324127410.2753/MIS0742-1222260308
- FudenbergDTiroleJGame Theory1993
- Gal-OrEGhoseAThe economic incentives for sharing security informationInformation Systems Research200516218620810.1287/isre.1050.0053
- GaoXZhongWMeiSStochastic evolutionary game dynamics and their selection mechanismsComputational Economics201341223324710.1007/s10614-012-9320-4
- Gao X, Zhong W and Mei S (2013b). Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers, advance online publication 23 February, doi:10.1007/s10796-013-9411-3.
- GordonLALoebMPLucyshynWSharing information on computer systems security: An economic analysisJournal of Accounting and Public Policy200322646148510.1016/j.jaccpubpol.2003.09.001
- HauskenKIncome, interdependence, and substitution effects affecting incentives for security investmentJournal of Accounting and Public Policy200625662966510.1016/j.jaccpubpol.2006.09.001
- HauskenKInformation sharing among firms and cyber attacksJournal of Accounting and Public Policy200726663968810.1016/j.jaccpubpol.2007.10.001
- HauskenKWhether to attack a terrorist’s resource stock today or tomorrowGames and Economic Behavior200864254856410.1016/j.geb.2008.02.001
- HauskenKBierVMDefending against multiple different attackersEuropean Journal of Operational Research2011211237038410.1016/j.ejor.2010.12.013
- HauskenKZhuangJDefending against a stockpiling terroristThe Engineering Economist2011564321353
- HuangDBeharaRSEconomics of information security investment in the case of concurrent heterogeneous attacks with budget constraintsInternational Journal of Production Economics2013141125526810.1016/j.ijpe.2012.06.022
- LevitinGHauskenKDefence and attack of systems with variable attacker system structure detection probabilityJournal of the Operational Research Society201061112413310.1057/jors.2008.158
- LiuDJiYMookerjeeVKnowledge sharing and investment decisions in information securityDecision Support Systems20115219510710.1016/j.dss.2011.05.007
- PngIWangQHInformation security: Facilitating user precautions vis-à-vis enforcement against attackersJournal of Management Information Systems20092629712110.2753/MIS0742-1222260205
- RansbothamSMitraSChoice and chance: A conceptual model of paths to information security compromiseInformation Systems Research200920112113910.1287/isre.1080.0174
- SkaperdasSContest success functionsEconomic Theory19967228329010.1007/BF01213906
- ZhuangJBierVMGuptaASubsidies in interdependent security with heterogeneous discount ratesThe Engineering Economist200752111910.1080/00137910601159722