Information security investment for complementary and substitutable firms: The role of technology similarity

X Gao, M Qiu, S Gong, Y Wang, Y Zhang - Expert Systems with Applications, 2023 - Elsevier
While technology similarity in network security aggravates breach interdependence, it can
improve the efficiency of security information sharing. This paper examines the effect of …

Information security investment with budget constraint and security information sharing in resource-sharing environments

X Gao, M Qiu, Y Wang, X Wang - Journal of the Operational …, 2023 - Taylor & Francis
Nowadays, business connection between firms becomes rather common so that one firm
stores not only its information asset but also some of other firms' information asset. The …

An economic analysis of information security decisions with mandatory security standards in resource sharing environments

X Gao, S Gong, Y Wang, X Wang, M Qiu - Expert Systems with Applications, 2022 - Elsevier
While mandatory security standards are salient in the management of information security,
the related theoretic studies are scarce, especially when strategic hackers are considered …

Information security strategies for information-sharing firms considering a strategic hacker

Y Wu, M Xu, D Cheng, T Dai - Decision Analysis, 2022 - pubsonline.informs.org
Information resources have been shared to promote the business operations of firms.
However, the connection of business information sharing interfaces between firms has …

Information sharing and security investment for substitutable firms: A game-theoretic analysis

X Gao, S Gong, Y Wang, Y Zhang - Journal of the Operational …, 2024 - Taylor & Francis
There are several types of relations between information assets of two firms, among which
substitutable relation is such that even when one of the firms is successfully breached by …

Information security investment for competitive firms with hacker behavior and security requirements

X Gao, W Zhong - Annals of Operations Research, 2015 - Springer
This paper investigates information security investment strategies under both targeted
attacks and mass attacks by considering strategic interactions between two competitive firms …

Game of information security investment: Impact of attack types and network vulnerability

Y Wu, G Feng, N Wang, H Liang - Expert Systems with Applications, 2015 - Elsevier
The level of firms' information security investment has recently become a critical issue in the
management of IT infrastructure. Prior studies have not considered attack types and firms …

[HTML][HTML] A strategic analysis of information sharing among cyber hackers

K Hausken - JISTEM-Journal of Information Systems and …, 2015 - SciELO Brasil
We build a game theory model where the market design is such that one firm invests in
security to defend against cyber attacks by two hackers. The firm has an asset, which is …

Information security decisions of firms considering security risk interdependency

Y Wu, L Wang, D Cheng, T Dai - Expert Systems with Applications, 2021 - Elsevier
Abstract Information security management becomes more challenging nowadays due to the
diverse security risk interdependency between firms. Prior researches rarely consider the …

A differential game approach to information security investment under hackers' knowledge dissemination

X Gao, W Zhong, S Mei - Operations Research Letters, 2013 - Elsevier
We investigate how firms invest in information security under Cournot and Bertrand
competition, constructing a differential game where over time hackers become …