Information technology (IT) security has emerged as an important issue in the last decade. To promote the disclosure and sharing of cyber-security information amongst firms, the US federal government has encouraged the establishment of many industry based Information Sharing & Analysis Centers(ISACs) under Presidential Decision Directive/NSC-63. We develop an analytical framework to investigate the competitive implications of sharing information about security breaches and investments in technologies which promote security. Using a game-theoretic model, we point out how firm and industry characteristics affect the incentives for information sharing amongst competing firms and their impact on firms ’ profits. We find that security techno...
The U.S. federal government has fostered a movement toward sharing information concerning computer s...
As the Sarbanes-Oxley Act strengthens internal controls, and the government encourages information s...
The level of firms\u27 information security investment has recently become a critical issue in the m...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Given that information technology (IT) security has emerged as an important issue in the last few ye...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Given that information technology (IT) security has emerged as an important issue in the last few ye...
Information technology (IT) related security crimes are on the rise, and are beginning to have a cri...
Traditionally, IT firms closely guard the management and control of critical information assets. A g...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
The U.S. federal government has fostered a movement toward sharing information concerning computer s...
As the Sarbanes-Oxley Act strengthens internal controls, and the government encourages information s...
The level of firms\u27 information security investment has recently become a critical issue in the m...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Given that information technology (IT) security has emerged as an important issue in the last few ye...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Given that information technology (IT) security has emerged as an important issue in the last few ye...
Information technology (IT) related security crimes are on the rise, and are beginning to have a cri...
Traditionally, IT firms closely guard the management and control of critical information assets. A g...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
The U.S. federal government has fostered a movement toward sharing information concerning computer s...
As the Sarbanes-Oxley Act strengthens internal controls, and the government encourages information s...
The level of firms\u27 information security investment has recently become a critical issue in the m...