<p>Information security economics, an emerging and thriving research topic, attempts to address the problems of distorted incentives for stakeholders in an Internet environment, including firms, hackers, the public sector, and other participants, using economic approaches. To alleviate consumer anxiety about the loss of sensitive information, and to further increase consumer demand, firms usually integrate their information security investment strategies to capture market share from competitors and their security information sharing strategies to increase consumer demand across all member firms in industry-based information sharing centers. Using differential game theory, this article investigates dynamic strategies for security investment ...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...
We build a game theory model where the market design is such that one firm invests in security to de...
We build a game theory model where the market design is such that one firm invests in security to de...
We build a game theory model where the market design is such that one firm invests in security to de...
Hackers evaluate potential targets to identify poorly defended firms to attack, creating competition...
Hackers evaluate potential targets to identify poorly defended firms to attack, creating competition...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
The level of firms\u27 information security investment has recently become a critical issue in the m...
The level of firms\u27 information security investment has recently become a critical issue in the m...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...
The level of firms\u27 information security investment has recently become a critical issue in the m...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...
We build a game theory model where the market design is such that one firm invests in security to de...
We build a game theory model where the market design is such that one firm invests in security to de...
We build a game theory model where the market design is such that one firm invests in security to de...
Hackers evaluate potential targets to identify poorly defended firms to attack, creating competition...
Hackers evaluate potential targets to identify poorly defended firms to attack, creating competition...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
The level of firms\u27 information security investment has recently become a critical issue in the m...
The level of firms\u27 information security investment has recently become a critical issue in the m...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...
The level of firms\u27 information security investment has recently become a critical issue in the m...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...
We build a game theory model where the market design is such that one firm invests in security to de...