2013
DOI: 10.1007/s10796-013-9411-3
|View full text |Cite
|
Sign up to set email alerts
|

Security investment and information sharing under an alternative security breach probability function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 58 publications
(24 citation statements)
references
References 60 publications
0
24
0
Order By: Relevance
“…These range from improved information and knowledge sharing network (Bian et al, 2014;Sicari et al, 2014;Barkataki and Zeineddine, 2013;Gao et al, 2013;Tse et al, 2011) through strategic supply chain integration practices (Frohlich and Westbrook 2001;Zhao et al, 2008;Flynn et al, 2010) to the extended enterprise (Owen et al, 2008;Spekman and Davis, 2004). In adopting these collaborative strategies to support businesses, companies might however become exposed to greater supply chain risks.…”
Section: Introductionmentioning
confidence: 99%
“…These range from improved information and knowledge sharing network (Bian et al, 2014;Sicari et al, 2014;Barkataki and Zeineddine, 2013;Gao et al, 2013;Tse et al, 2011) through strategic supply chain integration practices (Frohlich and Westbrook 2001;Zhao et al, 2008;Flynn et al, 2010) to the extended enterprise (Owen et al, 2008;Spekman and Davis, 2004). In adopting these collaborative strategies to support businesses, companies might however become exposed to greater supply chain risks.…”
Section: Introductionmentioning
confidence: 99%
“…The cybersecurity problem among interconnected firms could be seen as the typical interdependent security (IDS) problem, proposed firstly by Kunreuther and Heal [29], who conducted a case study of security investment behaviors among firms in airline security and found that there is a "free-riding problem" of firms' security investment, also denoted as negative externality. Later, some research committed to solving such a negative external issue [10,17,30,31]. For example, Zhao, Xue, and Whinston [9] explored the effects of three risk management methods including cyberinsurance, managed security services (MSSs), and risk pooling arrangements (RPAs) in addressing the investment inefficiency, and the results showed that MSSs has the best effect on security risk management, followed by RPAs and cyberinsurance.…”
Section: Interdependent Cybersecurity Investmentmentioning
confidence: 99%
“…In the field of economics of information security, game theory has been used as a key research approach. For example, Cavusoglu & Raghunathan, Cavusoglu et al and Levitin & Hausken give a game-theory analysis of the optimal configurations for security devices [1][2][3], Gao et al and Hausken provide a game framework to discuss the investment of information security [4][5].…”
Section: Introductionmentioning
confidence: 99%