This is an article that was originally published in Journal of Information Systems and Technology Management / Revista de Gestão da Tecnologia e Sistemas de Informação (JISTEM). DOI: 10.4301/S1807-17752015000200004We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and inf...
Criminal-hacker nexus leads to a 2 step target selection process, which begins with a short list of ...
Rising rate of cyber criminal activities has caught the attention of everyone spanning industry, aca...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
We build a game theory model where the market design is such that one firm invests in security to de...
We build a game theory model where the market design is such that one firm invests in security to de...
We build a game theory model where the market design is such that one firm invests in security to de...
One firm invests in security to defend against cyber attacks by two hackers. Each hacker chooses an ...
Acknowledgements We thank Ross Anderson for suggestions that led to some additional analysis, and De...
One firm invests in security to defend against cyber attacks by two hackers. Each hacker chooses an ...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
Criminal-hacker nexus leads to a 2 step target selection process, which begins with a short list of ...
Rising rate of cyber criminal activities has caught the attention of everyone spanning industry, aca...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
We build a game theory model where the market design is such that one firm invests in security to de...
We build a game theory model where the market design is such that one firm invests in security to de...
We build a game theory model where the market design is such that one firm invests in security to de...
One firm invests in security to defend against cyber attacks by two hackers. Each hacker chooses an ...
Acknowledgements We thank Ross Anderson for suggestions that led to some additional analysis, and De...
One firm invests in security to defend against cyber attacks by two hackers. Each hacker chooses an ...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
Criminal-hacker nexus leads to a 2 step target selection process, which begins with a short list of ...
Rising rate of cyber criminal activities has caught the attention of everyone spanning industry, aca...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...