2015
DOI: 10.1016/j.jaccpubpol.2015.05.001
|View full text |Cite
|
Sign up to set email alerts
|

The impact of information sharing on cybersecurity underinvestment: A real options perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
47
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 82 publications
(50 citation statements)
references
References 27 publications
2
47
1
Order By: Relevance
“…It does not consider supplemental or tangential papers published on this topic. Notably, Gordon et al (2015) extend the ROT approach with the aspect of sharing cybersecurity related information among firms, thus addressing some of the reported challenges on this approach (such as difficulties predicting threat timing/occurrence and key parameters needing to be estimated or simulated based on historical data).…”
Section: Results Review Question (4) and (5)mentioning
confidence: 99%
See 2 more Smart Citations
“…It does not consider supplemental or tangential papers published on this topic. Notably, Gordon et al (2015) extend the ROT approach with the aspect of sharing cybersecurity related information among firms, thus addressing some of the reported challenges on this approach (such as difficulties predicting threat timing/occurrence and key parameters needing to be estimated or simulated based on historical data).…”
Section: Results Review Question (4) and (5)mentioning
confidence: 99%
“…Hausken (2006b) analyses different classes of information security breach functions in order to examine the robustness of the Gordon-Loeb model, which is recognised in this paper under the Utility Maximization approach. Gordon et al (2015) extends the ROT approach by assessing the impact of information sharing at the example of a firm deciding on security investment timing. The authors find that sharing reduces a firm's uncertainty concerning a cybersecurity investment and decreases the value of the deferment option associated with the investment.…”
Section: Figure 3 -Primary Studies By Categorymentioning
confidence: 99%
See 1 more Smart Citation
“…This new kind of economy has created a business model that is characterized by large quantities of information being instantaneously transmitted through cyberspace and stored in a variety of electronic devices. 15 Although the interconnected digital world has resulted in many benefits to businesses, as well as individuals, a downside of this new way of operating and interacting with one and other has been the rapid growth of cybersecurity breaches. Unfortunately, no organization is immune to potential cybersecurity breaches.…”
Section: Concluding Commentsmentioning
confidence: 99%
“…Although we did not carry out the example to the point where one would not wish to invest more for those information sets, one can easily carry out the example to verify that one would want to invest less 37% of the expected loss for those sets as well. 15 The term cyberspace refers to the environment where digital communication, especially via the Internet and other computer networks, takes place. 16 For a 3-minute-and-34 second YouTube video providing a succinct overview of the Gordon-Loeb Model, see: https://www.youtube.com/watch?v=cd8dT0FuqQ4.…”
Section: Concluding Commentsmentioning
confidence: 99%