Security investment, hacking, and information sharing between firms and between hackers
From MaRDI portal
Publication:1656936
DOI10.3390/G8020023zbMath1410.91064OpenAlexW2617664835MaRDI QIDQ1656936
Publication date: 13 August 2018
Published in: Games (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3390/g8020023
game theoryinformation sharingpolicycontest success functionasset allocationcyber securitycyber warsecurity investment
Related Items (6)
A competitive analysis of information security investment: the role of hacker attacks ⋮ When Hackers Err: The Impacts of False Positives on Information Security Games ⋮ Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism ⋮ Proactivity and Retroactivity of Firms and Information Sharing of Hackers ⋮ A two-period game theoretic model of zero-day attacks with stockpiling ⋮ Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker
Cites Work
This page was built for publication: Security investment, hacking, and information sharing between firms and between hackers