An economic analysis of information security decisions with mandatory security standards in resource sharing environments

X Gao, S Gong, Y Wang, X Wang, M Qiu - Expert Systems with Applications, 2022 - Elsevier
While mandatory security standards are salient in the management of information security,
the related theoretic studies are scarce, especially when strategic hackers are considered …

Information security investment for complementary and substitutable firms: The role of technology similarity

X Gao, M Qiu, S Gong, Y Wang, Y Zhang - Expert Systems with Applications, 2023 - Elsevier
While technology similarity in network security aggravates breach interdependence, it can
improve the efficiency of security information sharing. This paper examines the effect of …

Information sharing and security investment for substitutable firms: A game-theoretic analysis

X Gao, S Gong, Y Wang, Y Zhang - Journal of the Operational …, 2024 - Taylor & Francis
There are several types of relations between information assets of two firms, among which
substitutable relation is such that even when one of the firms is successfully breached by …

Information security investment with budget constraint and security information sharing in resource-sharing environments

X Gao, M Qiu, Y Wang, X Wang - Journal of the Operational …, 2023 - Taylor & Francis
Nowadays, business connection between firms becomes rather common so that one firm
stores not only its information asset but also some of other firms' information asset. The …

Information security outsourcing in a resource-sharing environment: The impacts of attack modes

X Gao, S Gong, Y Wang, Y Zhang - Journal of the Operational …, 2024 - Taylor & Francis
Abstract Information security outsourcing has become an emerging trend in the operations of
information security, but the relation between information assets of firms and attack modes of …

Managing partial outsourcing on information security in the presence of security externality

Y Wu, Y Liu, T Dai, D Cheng - Expert Systems with Applications, 2024 - Elsevier
To efficiently manage information security, firms typically outsource the security of partial
business (core and non-core) to a managed security service provider (MSSP). Four options …

Trends in Decision Analysis: A Reflection on the First 20 Years of the Journal

VM Bier - Decision Analysis, 2024 - pubsonline.informs.org
With the start of 2024, Decision Analysis has now completed 20 full years of publication. As
the current editor-in-chief, I wanted to take this opportunity to reflect on the themes that have …

[HTML][HTML] 安全标准约束下的信息安全部分外包研究——基于外部性不对称视角

刘艺浩, 吴勇 - Management Science and Engineering, 2023 - hanspub.org
信息技术的快速发展不仅方便了人们的生活, 同时也给企业和个人带来了更大的安全隐患.
为了应对安全风险的挑战, 企业倾向于将部分信息安全外包给专业的管理安全服务提供商(MSSP …

A Cybersecurity Collaborative Model: Best Practices Sharing Among South African Tourism and Hospitality Businesses

T Gundu, N Mmango - International …, 2024 - papers.academic-conferences.org
In an increasingly interconnected digital landscape, cybersecurity has emerged as a
paramount concern for South African tourism and hospitality businesses, especially those …

A competitive analysis of information security investment: The role of hacker attacks.

X Gao, D Yang - Journal of Industrial & Management …, 2023 - search.ebscohost.com
The role of hacker attacks on information security investment and firm profits is fundamental
in information security economics, which, however, has not been fully examined yet. This …