Information security investment with budget constraint and security information sharing in resource-sharing environments

X Gao, M Qiu, Y Wang, X Wang - Journal of the Operational …, 2023 - Taylor & Francis
Nowadays, business connection between firms becomes rather common so that one firm
stores not only its information asset but also some of other firms' information asset. The …

An economic analysis of information security decisions with mandatory security standards in resource sharing environments

X Gao, S Gong, Y Wang, X Wang, M Qiu - Expert Systems with Applications, 2022 - Elsevier
While mandatory security standards are salient in the management of information security,
the related theoretic studies are scarce, especially when strategic hackers are considered …

Information security strategies for information-sharing firms considering a strategic hacker

Y Wu, M Xu, D Cheng, T Dai - Decision Analysis, 2022 - pubsonline.informs.org
Information resources have been shared to promote the business operations of firms.
However, the connection of business information sharing interfaces between firms has …

Information sharing and security investment for substitutable firms: A game-theoretic analysis

X Gao, S Gong, Y Wang, Y Zhang - Journal of the Operational …, 2024 - Taylor & Francis
There are several types of relations between information assets of two firms, among which
substitutable relation is such that even when one of the firms is successfully breached by …

Information security outsourcing in a resource-sharing environment: The impacts of attack modes

X Gao, S Gong, Y Wang, Y Zhang - Journal of the Operational …, 2024 - Taylor & Francis
Abstract Information security outsourcing has become an emerging trend in the operations of
information security, but the relation between information assets of firms and attack modes of …

Information security investment for competitive firms with hacker behavior and security requirements

X Gao, W Zhong - Annals of Operations Research, 2015 - Springer
This paper investigates information security investment strategies under both targeted
attacks and mass attacks by considering strategic interactions between two competitive firms …

[HTML][HTML] A strategic analysis of information sharing among cyber hackers

K Hausken - JISTEM-Journal of Information Systems and …, 2015 - SciELO Brasil
We build a game theory model where the market design is such that one firm invests in
security to defend against cyber attacks by two hackers. The firm has an asset, which is …

A game-theoretic analysis of information sharing and security investment for complementary firms

X Gao, W Zhong, S Mei - Journal of the Operational Research …, 2014 - Taylor & Francis
This paper investigates information sharing and security investments by two firms provided
that their information assets are complementary in the sense that their combined information …

A differential game approach to security investment and information sharing in a competitive environment

X Gao, W Zhong - IIE Transactions, 2016 - Taylor & Francis
Information security economics, an emerging and thriving research topic, attempts to
address the problems of distorted incentives for stakeholders in an Internet environment …

A differential game approach to information security investment under hackers' knowledge dissemination

X Gao, W Zhong, S Mei - Operations Research Letters, 2013 - Elsevier
We investigate how firms invest in information security under Cournot and Bertrand
competition, constructing a differential game where over time hackers become …