A competitive analysis of information security investment: the role of hacker attacks
From MaRDI portal
Publication:2691502
DOI10.3934/JIMO.2022208OpenAlexW4312606315MaRDI QIDQ2691502
Publication date: 29 March 2023
Published in: Journal of Industrial and Management Optimization (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3934/jimo.2022208
Cites Work
- Security investment, hacking, and information sharing between firms and between hackers
- Optimal policies for information sharing in information system security
- Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments
- Information Sharing in Oligopoly
- Exchange of Cost Information in Oligopoly
- Proactivity and Retroactivity of Firms and Information Sharing of Hackers
- Managing Security Outsourcing in the Presence of Strategic Hackers
- Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker
This page was built for publication: A competitive analysis of information security investment: the role of hacker attacks