메뉴 건너뛰기




Volumn 25, Issue 6, 2006, Pages 629-665

Income, interdependence, and substitution effects affecting incentives for security investment

Author keywords

Conflict; Contest success function; Cyber war; Income; Interdependence; Security breaches; Security technology investment; Substitution

Indexed keywords


EID: 33751256271     PISSN: 02784254     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jaccpubpol.2006.09.001     Document Type: Article
Times cited : (118)

References (37)
  • 1
    • 84925838576 scopus 로고    scopus 로고
    • Anderson, R., 2001. Why information security is hard: An economic perspective. In: Proceedings of 17th Annual Computer Security Applications Conference, December.
  • 4
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: empirical evidence from the stock market
    • Campbell K., Gordon L., Loeb M., and Zhou L. The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security 11 3 (2003) 431-448
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Gordon, L.2    Loeb, M.3    Zhou, L.4
  • 6
    • 12244295760 scopus 로고    scopus 로고
    • Dalvi, N., Domingos, P., Mausam, M., Sanghai, S., Verma, D., 2004. Adversarial classification. In: Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining Table of Contents, Seattle, WA, USA, pp 99-108, ISBN:1-58113-888-9.
  • 8
    • 84906628863 scopus 로고    scopus 로고
    • Enders, W., Sandler, T., 2003. What do we know about the substitution effect in transnational terrorism? In: Silke, A., Ilardi, G. (Eds.), Researching Terrorism: Trends, Achievements, Failures, Frank Cass, Ilfords, UK.
  • 9
    • 0001094198 scopus 로고
    • Information sharing in oligopoly
    • Gal-Or E. Information sharing in oligopoly. Econometrica 53 2 (1985) 329-343
    • (1985) Econometrica , vol.53 , Issue.2 , pp. 329-343
    • Gal-Or, E.1
  • 10
    • 33751202225 scopus 로고    scopus 로고
    • Gal-Or, E., Ghose, A., 2003. The economic consequences of sharing security information. In: Proceedings of the Second Workshop on Economics and Information Security, May 29-30, University of Maryland.
  • 11
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Gal-Or E., and Ghose A. The economic incentives for sharing security information. Information Systems Research 16 2 (2005) 186-208
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 12
    • 0038223766 scopus 로고    scopus 로고
    • Using information security as a response to competitor analysis systems
    • Gordon L.A., and Loeb M. Using information security as a response to competitor analysis systems. Communications of the ACM 44 9 (2001) 70-75
    • (2001) Communications of the ACM , vol.44 , Issue.9 , pp. 70-75
    • Gordon, L.A.1    Loeb, M.2
  • 14
    • 33751256079 scopus 로고    scopus 로고
    • Expenditures on competitor analysis and information security: a managerial accounting perspective
    • Bhimani A. (Ed), Oxford University Press
    • Gordon L.A., and Loeb M. Expenditures on competitor analysis and information security: a managerial accounting perspective. In: Bhimani A. (Ed). Management Accounting in the New Economy (2003), Oxford University Press 95-111
    • (2003) Management Accounting in the New Economy , pp. 95-111
    • Gordon, L.A.1    Loeb, M.2
  • 15
    • 0344899914 scopus 로고    scopus 로고
    • Sharing information on computer systems security: an economic analysis
    • Gordon L.A., Loeb M., and Lucyshyn W. Sharing information on computer systems security: an economic analysis. Journal of Accounting and Public Policy 22 6 (2003) 461-485
    • (2003) Journal of Accounting and Public Policy , vol.22 , Issue.6 , pp. 461-485
    • Gordon, L.A.1    Loeb, M.2    Lucyshyn, W.3
  • 16
    • 0036202354 scopus 로고    scopus 로고
    • Probabilistic risk analysis and game theory
    • Hausken K. Probabilistic risk analysis and game theory. Risk Analysis 22 1 (2002) 17-27
    • (2002) Risk Analysis , vol.22 , Issue.1 , pp. 17-27
    • Hausken, K.1
  • 17
    • 22544461899 scopus 로고    scopus 로고
    • Production and conflict models versus rent seeking models
    • Hausken K. Production and conflict models versus rent seeking models. Public Choice 123 (2005) 59-93
    • (2005) Public Choice , vol.123 , pp. 59-93
    • Hausken, K.1
  • 18
    • 33846138611 scopus 로고    scopus 로고
    • Hausken, K., 2006. Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers 8(5), in press.
  • 19
    • 0001685223 scopus 로고
    • Conflict and rent-seeking success functions: ratio vs. difference models of relative success
    • Hirshleifer J. Conflict and rent-seeking success functions: ratio vs. difference models of relative success. Public Choice 63 (1989) 101-112
    • (1989) Public Choice , vol.63 , pp. 101-112
    • Hirshleifer, J.1
  • 20
    • 33751251487 scopus 로고    scopus 로고
    • Howard, J., 1997. Analysis of security incidents on the Internet. Unpublished Doctoral Dissertation, Carnegie Mellon University. Available from .
  • 22
    • 0001624735 scopus 로고
    • Trade associations as information exchange mechanisms
    • Kirby A. Trade associations as information exchange mechanisms. RAND Journal of Economics 29 1 (1988) 138-146
    • (1988) RAND Journal of Economics , vol.29 , Issue.1 , pp. 138-146
    • Kirby, A.1
  • 23
    • 33750356596 scopus 로고    scopus 로고
    • A classification of computer security incidents based on reported attack data
    • Kjaerland M. A classification of computer security incidents based on reported attack data. Journal of Investigative Psychology and Offender Profiling 2 2 (2005) 105-120
    • (2005) Journal of Investigative Psychology and Offender Profiling , vol.2 , Issue.2 , pp. 105-120
    • Kjaerland, M.1
  • 25
    • 33751200746 scopus 로고    scopus 로고
    • Lakdawalla, D., Zanjani, G., 2002. Insurance, self-protection, and the economics of terrorism. RAND and NBER, Federal Reserve Bank of New York.
  • 26
    • 0001171605 scopus 로고
    • Fulfilled expectations in cournot duopoly with information acquisition and release
    • Novshek W., and Sonnenschein H. Fulfilled expectations in cournot duopoly with information acquisition and release. Bell Journal of Economics 13 1 (1982) 214-218
    • (1982) Bell Journal of Economics , vol.13 , Issue.1 , pp. 214-218
    • Novshek, W.1    Sonnenschein, H.2
  • 28
    • 33751219674 scopus 로고    scopus 로고
    • Schechter, S., Smith, M., 2003. How much security is enough to stop a thief? In: Proceedings of the Financial Cryptography Conference, Guadeloupe, January.
  • 29
    • 30344486488 scopus 로고    scopus 로고
    • Defining the value of strategic security
    • Schenk M., and Schenk M. Defining the value of strategic security. Secure Business Quarterly 1 1 (2002) 1-6
    • (2002) Secure Business Quarterly , vol.1 , Issue.1 , pp. 1-6
    • Schenk, M.1    Schenk, M.2
  • 30
    • 84962992157 scopus 로고
    • Exchange of cost information in oligopoly
    • Shapiro C. Exchange of cost information in oligopoly. Review of Economic Studies 53 3 (1986) 433-446
    • (1986) Review of Economic Studies , vol.53 , Issue.3 , pp. 433-446
    • Shapiro, C.1
  • 31
    • 0010913804 scopus 로고
    • Conflict and attitudes toward risk
    • Skaperdas S. Conflict and attitudes toward risk. American Economic Review 81 (1991) 116-120
    • (1991) American Economic Review , vol.81 , pp. 116-120
    • Skaperdas, S.1
  • 32
    • 0030304298 scopus 로고    scopus 로고
    • Contest success functions
    • Skaperdas S. Contest success functions. Economic Theory 7 (1996) 283-290
    • (1996) Economic Theory , vol.7 , pp. 283-290
    • Skaperdas, S.1
  • 33
    • 33751229398 scopus 로고    scopus 로고
    • Tanaka, H., Matsuura, K., 2005. Vulnerability and effects of information security investment: a firm level empirical analysis of Japan. Presented May 26, 2005 at the University of Maryland Forum: "Financial Information Systems and Cyber Security: A Public Policy Perspective".
  • 34
    • 12144285368 scopus 로고    scopus 로고
    • Vulnerability and information security investment: an empirical analysis of E-local government in Japan
    • Tanaka H., Matsuura K., and Sudoh O. Vulnerability and information security investment: an empirical analysis of E-local government in Japan. Journal of Accounting and Public Policy 24 (2005) 37-59
    • (2005) Journal of Accounting and Public Policy , vol.24 , pp. 37-59
    • Tanaka, H.1    Matsuura, K.2    Sudoh, O.3
  • 35
    • 33751249134 scopus 로고    scopus 로고
    • Varian, H., 2002. System reliability and free riding. In: Proceedings of the First Workshop on Economics and Information Security, May 16-17, University of California, Berkeley.
  • 36
    • 0000534015 scopus 로고
    • Trade association disclosure rules, incentives to share information, and welfare
    • Vives X. Trade association disclosure rules, incentives to share information, and welfare. RAND Journal of Economics 21 3 (1990) 409-430
    • (1990) RAND Journal of Economics , vol.21 , Issue.3 , pp. 409-430
    • Vives, X.1
  • 37
    • 21844512817 scopus 로고
    • Information sharing in oligopoly: the truth-telling problem
    • Ziv A. Information sharing in oligopoly: the truth-telling problem. RAND Journal of Economics 24 3 (1993) 455-465
    • (1993) RAND Journal of Economics , vol.24 , Issue.3 , pp. 455-465
    • Ziv, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.