2017
DOI: 10.1016/j.ejor.2016.12.034
|View full text |Cite
|
Sign up to set email alerts
|

Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
31
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 61 publications
(33 citation statements)
references
References 17 publications
2
31
0
Order By: Relevance
“…First, researchers have studied cybersecurity investment strategies in general (e.g., see [18][19][20]), in addition to the more specific question of trade-offs between proactive and reactive…”
Section: Research Contributionsmentioning
confidence: 99%
“…First, researchers have studied cybersecurity investment strategies in general (e.g., see [18][19][20]), in addition to the more specific question of trade-offs between proactive and reactive…”
Section: Research Contributionsmentioning
confidence: 99%
“…Firstly, the intersection of information security and decisionmaking gives rise to new questions on the effects of decision making in configurations of cybersecurity capabilities in industry, which may vary due to the uncertainty of cyber risk. Researchers have studied cybersecurity investment strategies in general (e.g., see [20][21][22]), in addition to the more specific question of trade-offs between proactive and reactive investment strategies, e.g., [19]; however, individuals' biases and misconceptions regarding proactive and reactive investment decisions receive little attention. Our simulation game experiment allows us to analyze this aspect of cybersecurity capability investment.…”
Section: Introductionmentioning
confidence: 99%
“…Further, an analysis of the dual problem and its associated Lagrange multipliers has been performed, together with the study of the marginal expected transaction utility for each retailer. Other cybersecurity models have been introduced by Daras and Rassias in [3], by Nagurney A., Nagurney L.S., Alvarez Flores and Shukla in [10,11,13,14,15] and by Shetty, Schwartz, Felegehazy, and Walrand in [17].…”
Section: Introductionmentioning
confidence: 99%