Hackers evaluate potential targets to identify poorly defended firms to attack, creating competition in IT security between firms that possess similar information assets. We utilize a differential game framework to analyze the continuous time IT security investment decisions of firms in such a target group. We derive the steady state equilibrium of the duopolistic differential game, show how implicit competition induces overspending in IT defense, and then demonstrate how such overinvestment can be combated by innovatively managing the otherwise misaligned incentives for coordination. We show that in order to achieve cooperation, the firm with the higher asset value must take the lead and provide appropriate incentives to elicit participati...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
Today, information security in defender-attacker game models is getting more attention from the rese...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Hackers evaluate potential targets to identify poorly defended firms to attack, creating competition...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
Criminal-hacker nexus leads to a 2 step target selection process, which begins with a short list of ...
The level of firms\u27 information security investment has recently become a critical issue in the m...
We build a game theory model where the market design is such that one firm invests in security to de...
We build a game theory model where the market design is such that one firm invests in security to de...
The level of firms\u27 information security investment has recently become a critical issue in the m...
The level of firms\u27 information security investment has recently become a critical issue in the m...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
Today, information security in defender-attacker game models is getting more attention from the rese...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Hackers evaluate potential targets to identify poorly defended firms to attack, creating competition...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
Criminal-hacker nexus leads to a 2 step target selection process, which begins with a short list of ...
The level of firms\u27 information security investment has recently become a critical issue in the m...
We build a game theory model where the market design is such that one firm invests in security to de...
We build a game theory model where the market design is such that one firm invests in security to de...
The level of firms\u27 information security investment has recently become a critical issue in the m...
The level of firms\u27 information security investment has recently become a critical issue in the m...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
Today, information security in defender-attacker game models is getting more attention from the rese...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...