This article examines the role of espionage in defending against cyber-attacks on infrastructural firms. We analyze the problem using a game between a government, an infrastructural firm and an attacker. If the attacker successfully breaches the IT security defenses of the infrastructural firm, primary losses accrue to that firm while widespread collateral losses accrue to the rest of the economy. The government assists the infrastructural firm by providing intelligence inputs about an impending attack. We find that subject to some conditions, expenditure on intelligence adds value only when its amount exceeds a threshold level. Also, the nature of the equilibrium depends on the level of government expenditure in intelligence. We find that ...
We build a game theory model where the market design is such that one firm invests in security to de...
In the new cyber landscape, the legal rules apply only to defenders. Even nonprimary countries and c...
Most of the actions that fall under the trilogy of cyber crime, terrorism, and war exploit pre-exist...
This article examines the role of espionage in defending against cyber-attacks on infrastructural fi...
This article examines the role of espionage in defending against cyber attacks on infrastructural fi...
The level of firms\u27 information security investment has recently become a critical issue in the m...
As information security shifts from the realm of computer science to national security, the priority...
Much attention has been focused on the potential consequences of cyber attacks against critical infr...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
Recent efforts to address cybersecurity risks have focused on leveraging the immense technical capac...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
The paper uses a game-theoretic setting to examine the interaction between strategic attackers who t...
Changes in the information technology have generated new challenges in the security of nations. In t...
This article provides an analysis of the potential opportunities and threats for modern civilization...
While there are significant advances in information technology and infrastructure which offer new op...
We build a game theory model where the market design is such that one firm invests in security to de...
In the new cyber landscape, the legal rules apply only to defenders. Even nonprimary countries and c...
Most of the actions that fall under the trilogy of cyber crime, terrorism, and war exploit pre-exist...
This article examines the role of espionage in defending against cyber-attacks on infrastructural fi...
This article examines the role of espionage in defending against cyber attacks on infrastructural fi...
The level of firms\u27 information security investment has recently become a critical issue in the m...
As information security shifts from the realm of computer science to national security, the priority...
Much attention has been focused on the potential consequences of cyber attacks against critical infr...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
Recent efforts to address cybersecurity risks have focused on leveraging the immense technical capac...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
The paper uses a game-theoretic setting to examine the interaction between strategic attackers who t...
Changes in the information technology have generated new challenges in the security of nations. In t...
This article provides an analysis of the potential opportunities and threats for modern civilization...
While there are significant advances in information technology and infrastructure which offer new op...
We build a game theory model where the market design is such that one firm invests in security to de...
In the new cyber landscape, the legal rules apply only to defenders. Even nonprimary countries and c...
Most of the actions that fall under the trilogy of cyber crime, terrorism, and war exploit pre-exist...