Optimal policies for information sharing in information system security
From MaRDI portal
Publication:2178126
Recommendations
- Information investment strategies for two risk-averse firms under heterogeneous attacks
- scientific article; zbMATH DE number 6613302
- Optimizing information security investments with limited budget
- Information security investment when hackers disseminate knowledge
- A differential game approach to information security investment under hackers' knowledge dissemination
Cites work
- scientific article; zbMATH DE number 5076448 (Why is no real title available?)
- Exchange of Cost Information in Oligopoly
- Information Distortion in a Supply Chain: The Bullwhip Effect
- Information Sharing in Oligopoly
- Information sharing in a supply chain with horizontal competition
- The Value of Information Sharing in a Two-Level Supply Chain
- Value of information in capacitated supply chains
Cited in
(12)- Optimal policies for security patch management
- Information investment strategies for two risk-averse firms under heterogeneous attacks
- Incentive and trust issues in assured information sharing
- A framework for secure IT operations in an uncertain and changing environment
- A game of information security investment considering security insurance and complementary information assets
- scientific article; zbMATH DE number 2080971 (Why is no real title available?)
- Financial Cryptography and Data Security
- Information sharing among cyber hackers in successive attacks
- A Policy Model for Secure Information Flow
- Optimizing information security investments with limited budget
- A competitive analysis of information security investment: the role of hacker attacks
- Cyber deterrence with imperfect attribution and unverifiable signaling
This page was built for publication: Optimal policies for information sharing in information system security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2178126)