Cyberattacks are a pervasive threat in the digital economy, with the potential to harm rms and their customers. Larger rms constitute more valuable targets to hackers, thereby creating negative network eects. These can be mitigated by investments in security, which play both a deterrent and a protective role. We study equilibrium investment in information security under imperfect competition in a model where consumers dier in terms of security savviness. We show that the competitive implications of security depend on rms' business models: when rms compete in prices, security intensies competition, which implies that it is always underprovided in equilibrium (unlike in the monopoly case). When rms are advertising-funded, security plays a bus...
Abstract—Recent work in security has illustrated that solutions aimed at detection and elimination o...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...
This paper develops a theory of sequential investments in cybersecurity in which the software vendor...
Cyberattacks are a pervasive threat in the digital economy, with the potential to harm rms and their...
With the continuing growth of the use of the Internet for business purposes, the consequences of a p...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
This paper investigates how competitive cyber-insurers affect network s-curity and welfare of the ne...
The level of firms\u27 information security investment has recently become a critical issue in the m...
Many firms have to decide whether and how much of their business activities they want to digitize. S...
AbstractE‐commerce supply chains and their members face risks from cyber‐attacks. Consumers who purc...
The rapid development of cyber insurance market brings forward the question about the effect of cybe...
Information security is becoming an increasingly serious problem faced by many enterprises and organ...
Recent work in security has illustrated that solutions aimed at detection and elimination of securit...
Abstract—Recent work in security has illustrated that solutions aimed at detection and elimination o...
Hackers evaluate potential targets to identify poorly defended firms to attack, creating competition...
Abstract—Recent work in security has illustrated that solutions aimed at detection and elimination o...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...
This paper develops a theory of sequential investments in cybersecurity in which the software vendor...
Cyberattacks are a pervasive threat in the digital economy, with the potential to harm rms and their...
With the continuing growth of the use of the Internet for business purposes, the consequences of a p...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
This paper investigates how competitive cyber-insurers affect network s-curity and welfare of the ne...
The level of firms\u27 information security investment has recently become a critical issue in the m...
Many firms have to decide whether and how much of their business activities they want to digitize. S...
AbstractE‐commerce supply chains and their members face risks from cyber‐attacks. Consumers who purc...
The rapid development of cyber insurance market brings forward the question about the effect of cybe...
Information security is becoming an increasingly serious problem faced by many enterprises and organ...
Recent work in security has illustrated that solutions aimed at detection and elimination of securit...
Abstract—Recent work in security has illustrated that solutions aimed at detection and elimination o...
Hackers evaluate potential targets to identify poorly defended firms to attack, creating competition...
Abstract—Recent work in security has illustrated that solutions aimed at detection and elimination o...
Information technology (IT) security has emerged as an important issue in the last decade. To promot...
This paper develops a theory of sequential investments in cybersecurity in which the software vendor...