메뉴 건너뛰기




Volumn 22, Issue 6, 2003, Pages 461-485

Sharing information on computer systems security: An economic analysis

Author keywords

Cyber security; Homeland security; Information security economics; Information sharing

Indexed keywords


EID: 0344899914     PISSN: 02784254     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jaccpubpol.2003.09.001     Document Type: Article
Times cited : (241)

References (24)
  • 2
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • Campbell K. Gordon L. Loeb M. Zhou L. The economic cost of publicly announced information security breaches: Empirical evidence from the stock market Journal of Computer Security 11 3 2003 431-448
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Gordon, L.2    Loeb, M.3    Zhou, L.4
  • 3
    • 0001312586 scopus 로고
    • Incentives for information production and disclosure in a duopolistic environment
    • Fried D. Incentives for information production and disclosure in a duopolistic environment The Quarterly Journal of Economics 99 2 1984 367-381
    • (1984) The Quarterly Journal of Economics , vol.99 , Issue.2 , pp. 367-381
    • Fried, D.1
  • 4
    • 0001094198 scopus 로고
    • Information sharing in oligopoly
    • Gal-Or E. Information sharing in oligopoly Econometrica 53 2 1985 329-343
    • (1985) Econometrica , vol.53 , Issue.2 , pp. 329-343
    • Gal-Or, E.1
  • 5
    • 0002953723 scopus 로고
    • Information transmission - Cournot and Bertrand equilibria
    • Gal-Or E. Information transmission - Cournot and Bertrand equilibria Review of Economic Studies 53 1 1986 85-92
    • (1986) Review of Economic Studies , vol.53 , Issue.1 , pp. 85-92
    • Gal-Or, E.1
  • 7
    • 0008515212 scopus 로고
    • Does reporting deter burglars? - An empirical analysis of risk and return in crime
    • Goldberg I. Gold F. Does reporting deter burglars? - An empirical analysis of risk and return in crime The Review of Economics and Statistics 62 3 1980 424-431
    • (1980) The Review of Economics and Statistics , vol.62 , Issue.3 , pp. 424-431
    • Goldberg, I.1    Gold, F.2
  • 9
    • 0345386339 scopus 로고    scopus 로고
    • An economics perspective on the sharing of information related to security breaches: Concepts and empirical evidence
    • May 16-17, University of California, Berkeley
    • Gordon, L., Loeb, M., Lucyshyn, W., 2002. An economics perspective on the sharing of information related to security breaches: Concepts and empirical evidence. In: Proceedings of the First Workshop on Economics and Information Security, May 16-17, University of California, Berkeley
    • (2002) Proceedings of the First Workshop on Economics and Information Security
    • Gordon, L.1    Loeb, M.2    Lucyshyn, W.3
  • 10
    • 0041766623 scopus 로고    scopus 로고
    • Information security expenditures and real options: A wait-and-see approach
    • Gordon L. Loeb M. Lucyshyn W. Information security expenditures and real options: A wait-and-see approach Computer Security Journal 19 2 2003 1-7
    • (2003) Computer Security Journal , vol.19 , Issue.2 , pp. 1-7
    • Gordon, L.1    Loeb, M.2    Lucyshyn, W.3
  • 11
    • 0012133705 scopus 로고    scopus 로고
    • With friends like this
    • July 8
    • Hulme G. With friends like this Information Week 896 July 8 2002 22
    • (2002) Information Week , vol.896 , pp. 22
    • Hulme, G.1
  • 13
    • 0001624735 scopus 로고
    • Trade associations as information exchange mechanisms
    • Kirby A. Trade associations as information exchange mechanisms RAND Journal of Economics 29 1 1988 138-146
    • (1988) RAND Journal of Economics , vol.29 , Issue.1 , pp. 138-146
    • Kirby, A.1
  • 14
    • 0344524037 scopus 로고    scopus 로고
    • Horn: Feds still fail security
    • December 2
    • Matthews W. Horn: Feds still fail security Federal Computer Week December 2 2002 http://www.fcw.com/fcw/articles/2002/1202/ pol-horn-12-02-02.asp
    • (2002) Federal Computer Week
    • Matthews, W.1
  • 15
    • 0001171605 scopus 로고
    • Fulfilled expectations in Cournot duopoly with information acquisition and release
    • Novshek W. Sonnenschein H. Fulfilled expectations in Cournot duopoly with information acquisition and release Bell Journal of Economics 13 1 1982 214-218
    • (1982) Bell Journal of Economics , vol.13 , Issue.1 , pp. 214-218
    • Novshek, W.1    Sonnenschein, H.2
  • 16
    • 0344524038 scopus 로고    scopus 로고
    • To establish the Department of Homeland Security, and for other purposes
    • Public Law 107-296, November 25
    • Public Law 107-296, November 25, 2002. To establish the Department of Homeland Security, and for other purposes, http://www.cio.gov/documents/pl_107_296_nov_25_2003.pdf
    • (2002)
  • 17
    • 0041766619 scopus 로고    scopus 로고
    • CSI/FBI 2003 computer crime and security survey
    • Richardson R. CSI/FBI 2003 computer crime and security survey Computer Security Journal 19 2 2003 21-40
    • (2003) Computer Security Journal , vol.19 , Issue.2 , pp. 21-40
    • Richardson, R.1
  • 18
    • 84962992157 scopus 로고
    • Exchange of cost information in oligopoly
    • Shapiro C. Exchange of cost information in oligopoly Review of Economic Studies 53 3 1986 433-446
    • (1986) Review of Economic Studies , vol.53 , Issue.3 , pp. 433-446
    • Shapiro, C.1
  • 19
    • 30344453851 scopus 로고    scopus 로고
    • How much security is enough to stop a thief? The economics of outsider theft via computer systems networks
    • January 27-30, Cosier, Guadeloupe
    • Schechter, S., Smith, C., 2003. How much security is enough to stop a thief? The economics of outsider theft via computer systems networks. In: Proceedings of the Financial Cryptography Conference, January 27-30, Cosier, Guadeloupe
    • (2003) Proceedings of the Financial Cryptography Conference
    • Schechter, S.1    Smith, C.2
  • 20
    • 0141917864 scopus 로고    scopus 로고
    • Executive guide: Information security management: Learning from leading organizations
    • United States General Accounting Office (GAO), GAO/AIMD-98-68. US Government Printing Office, Washington, DC
    • United States General Accounting Office (GAO), 1998. Executive guide: information security management: Learning from leading organizations. GAO/AIMD-98-68. US Government Printing Office, Washington, DC
    • (1998)
  • 21
    • 0003970130 scopus 로고    scopus 로고
    • Information security risk assessment: Practices of leading organizations
    • United States General Accounting Office (GAO), GAO/AIMD-00-33. US Government Printing Office, Washington, DC
    • United States General Accounting Office (GAO), 1999. Information security risk assessment: Practices of leading organizations. GAO/AIMD-00-33. US Government Printing Office, Washington, DC
    • (1999)
  • 23
    • 0000534015 scopus 로고
    • Trade association disclosure rules, incentives to share information, and welfare
    • Vives X. Trade association disclosure rules, incentives to share information, and welfare RAND Journal of Economics 21 3 1990 409-430
    • (1990) RAND Journal of Economics , vol.21 , Issue.3 , pp. 409-430
    • Vives, X.1
  • 24
    • 21844512817 scopus 로고
    • Information sharing in oligopoly: The truth-telling problem
    • Ziv A. Information sharing in oligopoly: The truth-telling problem RAND Journal of Economics 24 1993 455-465
    • (1993) RAND Journal of Economics , vol.24 , pp. 455-465
    • Ziv, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.