Optimal policies for information sharing in information system security
From MaRDI portal
Publication:2178126
DOI10.1016/J.EJOR.2019.12.016zbMATH Open1441.91042OpenAlexW2996124252MaRDI QIDQ2178126FDOQ2178126
Authors: Senay Solak, Yueran Zhuo
Publication date: 7 May 2020
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ejor.2019.12.016
Recommendations
- Information investment strategies for two risk-averse firms under heterogeneous attacks
- scientific article; zbMATH DE number 6613302
- Optimizing information security investments with limited budget
- Information security investment when hackers disseminate knowledge
- A differential game approach to information security investment under hackers' knowledge dissemination
Cites Work
- Information sharing in a supply chain with horizontal competition
- Title not available (Why is that?)
- Information Distortion in a Supply Chain: The Bullwhip Effect
- Information Sharing in Oligopoly
- The Value of Information Sharing in a Two-Level Supply Chain
- Value of information in capacitated supply chains
- Exchange of Cost Information in Oligopoly
Cited In (12)
- Financial Cryptography and Data Security
- Optimal policies for security patch management
- A game of information security investment considering security insurance and complementary information assets
- Title not available (Why is that?)
- A framework for secure IT operations in an uncertain and changing environment
- Incentive and trust issues in assured information sharing
- A Policy Model for Secure Information Flow
- Information investment strategies for two risk-averse firms under heterogeneous attacks
- Information sharing among cyber hackers in successive attacks
- Cyber deterrence with imperfect attribution and unverifiable signaling
- Optimizing information security investments with limited budget
- A competitive analysis of information security investment: the role of hacker attacks
This page was built for publication: Optimal policies for information sharing in information system security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2178126)