We investigate the economic ramifications of strategic IT security information sharing among firms in the financial services industry. An IT security information sharing system can potentially minimize security breaches. However, although the Presidential Decision Directive/NSC-63 encouraged the establishment of such a system in the form of industry based information sharing and analysis centers (ISACs), it is injudicious to assume that firms will be willing to naively share their security information with their strategic competitors. We argue that without a proper mechanism some firms will try to put in minimum effort, potentially reducing the system’s reliability, and aim to answer the following research question: “What will it take for a...
Investments to protect against known vulnerabilities are necessary but not sufficient to assure a fi...
Information technology (IT) related security crimes are on the rise, and are beginning to have a cri...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...
We investigate the economic ramifications of strategic IT security information sharing among firms i...
This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing all...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing all...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Given that information technology (IT) security has emerged as an important issue in the last few ye...
Given that information technology (IT) security has emerged as an important issue in the last few ye...
This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing all...
This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing all...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Investments to protect against known vulnerabilities are necessary but not sufficient to assure a fi...
Investments to protect against known vulnerabilities are necessary but not sufficient to assure a fi...
Information technology (IT) related security crimes are on the rise, and are beginning to have a cri...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...
We investigate the economic ramifications of strategic IT security information sharing among firms i...
This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing all...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing all...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Given that information technology (IT) security has emerged as an important issue in the last few ye...
Given that information technology (IT) security has emerged as an important issue in the last few ye...
This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing all...
This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing all...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Investments to protect against known vulnerabilities are necessary but not sufficient to assure a fi...
Investments to protect against known vulnerabilities are necessary but not sufficient to assure a fi...
Information technology (IT) related security crimes are on the rise, and are beginning to have a cri...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...