Security investment and information sharing under an alternative security breach probability function

作者: Xing Gao , Weijun Zhong , Shue Mei

DOI: 10.1007/S10796-013-9411-3

关键词:

摘要: Nowadays, in order to protect information assets, many firms have gradually realized the importance of security investment and information sharing. It is worth pointing out that security …

参考文章(67)
Esther Gal-Or, Anindya Ghose, The Economic Consequences of Sharing Security Information Economics of Information Security. pp. 95- 104 ,(2004) , 10.1007/1-4020-8090-5_8
Kjell Hausken, Strategic Defense and Attack of Complex Networks International journal of performability engineering. ,vol. 5, pp. 13- ,(2009)
Martin P. Loeb, Lawrence A. Gordon, William Lucyshyn, Information Security Expenditures and Real Options: A Wait-and-See Approach Social Science Research Network. ,(2003)
R. Anderson, Why information security is hard - an economic perspective annual computer security applications conference. pp. 358- 365 ,(2001) , 10.1109/ACSAC.2001.991552
Huseyin Cavusoglu, Birendra Mishra, Srinivasan Raghunathan, The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers International Journal of Electronic Commerce. ,vol. 9, pp. 70- 104 ,(2004) , 10.1080/10864415.2004.11044320
Michael R. Galbreth, Mikhael Shor, The impact of malicious agents on the enterprise software industry Management Information Systems Quarterly. ,vol. 34, pp. 595- 612 ,(2010) , 10.5555/2017470.2017480
Katherine Campbell, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou, The economic cost of publicly announced information security breaches: empirical evidence from the stock market Journal of Computer Security. ,vol. 11, pp. 431- 448 ,(2003) , 10.3233/JCS-2003-11308
Peter T. Leeson, Christopher J. Coyne, THE ECONOMICS OF COMPUTER HACKING Social Science Research Network. ,(2005)
Nir Kshetri, Positive externality, increasing returns, and the rise in cybercrimes Communications of the ACM. ,vol. 52, pp. 141- 144 ,(2009) , 10.1145/1610252.1610288
Hideyuki Tanaka, Kanta Matsuura, Osamu Sudoh, Vulnerability and information security investment: An empirical analysis of e-local government in Japan Journal of Accounting and Public Policy. ,vol. 24, pp. 37- 59 ,(2005) , 10.1016/J.JACCPUBPOL.2004.12.003