2014
DOI: 10.1057/jors.2013.133
|View full text |Cite
|
Sign up to set email alerts
|

A game-theoretic analysis of information sharing and security investment for complementary firms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 48 publications
(22 citation statements)
references
References 16 publications
0
22
0
Order By: Relevance
“…Their findings showed that higher effectiveness of inhibiting knowledge dissemination did not mean a higher investment. Gao et al (2014) analyzed the information sharing strategies and information security investing strategies of two firms by assuming that their information assets were complementary. They acquired the optimal strategies for the two firms and the attacker.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Their findings showed that higher effectiveness of inhibiting knowledge dissemination did not mean a higher investment. Gao et al (2014) analyzed the information sharing strategies and information security investing strategies of two firms by assuming that their information assets were complementary. They acquired the optimal strategies for the two firms and the attacker.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Considering attacker behavior and leakage costs, Gao et al [7] discussed the relationship between security investment and information sharing. Their findings showed that firms should devote significant attention to their relationship with other firms when strategically choosing security investment.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Gao et al . also analyze the effect of a social planner on social total costs by assuming that it can control information sharing . It is also important to consider the time dimension when studying the interactions between stakeholders in information sharing, such as the sequence of moves of the social planner and agents, as studied by Hauksen …”
Section: Current Information Sharing Architecturesmentioning
confidence: 99%