A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more disadvantaged hacker receives less information, and mixed motives may exist between information sharing and own reputation gain. The second hacker’s attack is deterred by the first hacker’s reputation gain. Increasing information sharing effectiveness causes firms to subst...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
As the Sarbanes-Oxley Act strengthens internal controls, and the government encourages information s...
The level of firms\u27 information security investment has recently become a critical issue in the m...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
We build a game theory model where the market design is such that one firm invests in security to de...
We build a game theory model where the market design is such that one firm invests in security to de...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
Acknowledgements We thank Ross Anderson for suggestions that led to some additional analysis, and De...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
We build a game theory model where the market design is such that one firm invests in security to de...
One firm invests in security to defend against cyber attacks by two hackers. Each hacker chooses an ...
The level of firms\u27 information security investment has recently become a critical issue in the m...
The level of firms\u27 information security investment has recently become a critical issue in the m...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
As the Sarbanes-Oxley Act strengthens internal controls, and the government encourages information s...
The level of firms\u27 information security investment has recently become a critical issue in the m...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
We build a game theory model where the market design is such that one firm invests in security to de...
We build a game theory model where the market design is such that one firm invests in security to de...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
Acknowledgements We thank Ross Anderson for suggestions that led to some additional analysis, and De...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
Reprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing am...
We build a game theory model where the market design is such that one firm invests in security to de...
One firm invests in security to defend against cyber attacks by two hackers. Each hacker chooses an ...
The level of firms\u27 information security investment has recently become a critical issue in the m...
The level of firms\u27 information security investment has recently become a critical issue in the m...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
As the Sarbanes-Oxley Act strengthens internal controls, and the government encourages information s...
The level of firms\u27 information security investment has recently become a critical issue in the m...