Pages that link to "Item:Q256635"
From MaRDI portal
The following pages link to Information security investment for competitive firms with hacker behavior and security requirements (Q256635):
Displaying 14 items.
- Valuing the flexibility of investing in security process innovations (Q948666) (← links)
- Security investment, hacking, and information sharing between firms and between hackers (Q1656936) (← links)
- Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size (Q1702872) (← links)
- Information security decisions for two firms in a market with different types of customers (Q2279760) (← links)
- A differential game approach to information security investment under hackers' knowledge dissemination (Q2450680) (← links)
- A Tullock-contest-based approach for cyber security investments (Q2678588) (← links)
- Competitive information security investment under hacker knowledge dissemination (Q2691378) (← links)
- Optimal Information Security Investment with Penetration Testing (Q3056848) (← links)
- Information investment strategies for two risk-averse firms under heterogeneous attacks (Q3306955) (← links)
- Information Security Investment When Hackers Disseminate Knowledge (Q4691973) (← links)
- Managing Security Outsourcing in the Presence of Strategic Hackers (Q4991762) (← links)
- When Hackers Err: The Impacts of False Positives on Information Security Games (Q5118194) (← links)
- Open Source or Closed Source? A Competitive Analysis with Software Security (Q5120276) (← links)
- A game of information security investment considering security insurance and complementary information assets (Q6071097) (← links)