Data survivability vs. security in information systems
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ress.2011.12.015
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Gal-Or, Esther, 1985. "Information Sharing in Oligopoly," Econometrica, Econometric Society, vol. 53(2), pages 329-343, March.
- Tanaka, Hideyuki & Matsuura, Kanta & Sudoh, Osamu, 2005. "Vulnerability and information security investment: An empirical analysis of e-local government in Japan," Journal of Accounting and Public Policy, Elsevier, vol. 24(1), pages 37-59.
- Amir Ziv, 1993. "Information Sharing in Oligopoly: The Truth-Telling Problem," RAND Journal of Economics, The RAND Corporation, vol. 24(3), pages 455-465, Autumn.
- Esther Gal-Or & Anindya Ghose, 2005.
"The Economic Incentives for Sharing Security Information,"
Information Systems Research, INFORMS, vol. 16(2), pages 186-208, June.
- Esther Gal-Or & Anindya Ghose, 2005. "The Economic Incentives for Sharing Security Information," Industrial Organization 0503004, University Library of Munich, Germany.
- Hausken, Kjell, 2006. "Income, interdependence, and substitution effects affecting incentives for security investment," Journal of Accounting and Public Policy, Elsevier, vol. 25(6), pages 629-665.
- Gordon, Lawrence A. & Loeb, Martin P. & Lucyshyn, William, 2003. "Sharing information on computer systems security: An economic analysis," Journal of Accounting and Public Policy, Elsevier, vol. 22(6), pages 461-485.
- Alison J. Kirby, 1988. "Trade Associations as Information Exchange Mechanisms," RAND Journal of Economics, The RAND Corporation, vol. 19(1), pages 138-146, Spring.
- Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.
- Gordon, Lawrence A. & Loeb, Martin P. & Lucyshyn, William & Sohail, Tashfeen, 2006. "The impact of the Sarbanes-Oxley Act on the corporate disclosures of information security activities," Journal of Accounting and Public Policy, Elsevier, vol. 25(5), pages 503-530.
- William Novshek & Hugo Sonnenschein, 1982. "Fulfilled Expectations Cournot Duopoly with Information Acquisition and Release," Bell Journal of Economics, The RAND Corporation, vol. 13(1), pages 214-218, Spring.
- Hausken, Kjell, 2007. "Information sharing among firms and cyber attacks," Journal of Accounting and Public Policy, Elsevier, vol. 26(6), pages 639-688.
- Xavier Vives, 1990. "Trade Association Disclosure Rules, Incentives to Share Information, and Welfare," RAND Journal of Economics, The RAND Corporation, vol. 21(3), pages 409-430, Autumn.
- Carl Shapiro, 1986. "Exchange of Cost Information in Oligopoly," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 53(3), pages 433-446.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Chołda, Piotr & Følstad, Eirik L. & Helvik, Bjarne E. & Kuusela, Pirkko & Naldi, Maurizio & Norros, Ilkka, 2013. "Towards risk-aware communications networking," Reliability Engineering and System Safety, Elsevier, vol. 109(C), pages 160-174.
- Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2020. "Optimization of time constrained N-version programming service components with competing task execution and version corruption processes," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
- Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
- Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2020. "Optimal early warning defense of N-version programming service against co-resident attacks in cloud system," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
- Levitin, Gregory & Xing, Liudong & Dai, Yuanshun, 2018. "Co-residence based data vulnerability vs. security in cloud computing system with random server assignment," European Journal of Operational Research, Elsevier, vol. 267(2), pages 676-686.
- Zhang, Xiaoyu & Xu, Maochao & Da, Gaofeng & Zhao, Peng, 2021. "Ensuring confidentiality and availability of sensitive data over a network system under cyber threats," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
- Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
- Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
- Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
- Xing, Liudong & Levitin, Gregory, 2017. "Balancing theft and corruption threats by data partition in cloud system with independent server protection," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 248-254.
- Gregory Levitin & Liudong Xing & Hong‐Zhong Huang, 2019. "Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 846-858, April.
- Luo, Liang & Xing, Liudong & Levitin, Gregory, 2019. "Optimizing dynamic survivability and security of replicated data in cloud systems under co-residence attacks," Reliability Engineering and System Safety, Elsevier, vol. 192(C).
- Heping Jia & Rui Peng & Yi Ding & Changzheng Shao, 2020. "Reliability analysis of distributed storage systems considering data loss and theft," Journal of Risk and Reliability, , vol. 234(2), pages 303-321, April.
- Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Optimal defense of a distributed data storage system against hackers’ attacks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
- Xiaotong Li, 2022. "An evolutionary game‐theoretic analysis of enterprise information security investment based on information sharing platform," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(3), pages 595-606, April.
- Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
- Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
- António Brandão & Joana Pinho, 2015.
"Asymmetric Information And Exchange Of Information About Product Differentiation,"
Bulletin of Economic Research, Wiley Blackwell, vol. 67(2), pages 166-185, April.
- António Brandão & Joana Pinho, 2010. "Asymmetric information and exchange of information about product differentiation," FEP Working Papers 379, Universidade do Porto, Faculdade de Economia do Porto.
- Medín, J. Andrés Faíña & Rodríguez, Jesús López & Rodríguez, José López, 2003. "Information Exchanges in Cournot Duopolies," Revista Brasileira de Economia - RBE, EPGE Brazilian School of Economics and Finance - FGV EPGE (Brazil), vol. 57(1), January.
- Malueg, David A. & Tsutsui, Shunichi O., 1996. "Duopoly information exchange: The case of unknown slope," International Journal of Industrial Organization, Elsevier, vol. 14(1), pages 119-136.
- Goltsman, Maria & Pavlov, Gregory, 2014.
"Communication in Cournot oligopoly,"
Journal of Economic Theory, Elsevier, vol. 153(C), pages 152-176.
- Maria Goltsman & Gregory Pavlov, 2012. "Communication in Cournot Oligopoly," University of Western Ontario, Departmental Research Report Series 20121, University of Western Ontario, Department of Economics.
- Esther Gal-Or & Anindya Ghose, 2005.
"The Economic Incentives for Sharing Security Information,"
Information Systems Research, INFORMS, vol. 16(2), pages 186-208, June.
- Esther Gal-Or & Anindya Ghose, 2005. "The Economic Incentives for Sharing Security Information," Industrial Organization 0503004, University Library of Munich, Germany.
- Duarte Brito & Pedro Pereira & João Vareda, 2016. "Can More Information About Rivals' Costs Decrease Welfare?," Manchester School, University of Manchester, vol. 84(2), pages 251-269, March.
- Jin, Jim Y., 1996. "A test for information sharing in Cournot oligopoly," Information Economics and Policy, Elsevier, vol. 8(1), pages 75-86, March.
- Bacchetta, Philippe & Espinosa, Maria Paz, 1995.
"Information sharing and tax competition among governments,"
Journal of International Economics, Elsevier, vol. 39(1-2), pages 103-121, August.
- Bacchetta, P. & Paz Espinosa, M., 1992. "Information Sharing and Tax Competition Among Governments," UFAE and IAE Working Papers 173.92, Unitat de Fonaments de l'Anàlisi Econòmica (UAB) and Institut d'Anàlisi Econòmica (CSIC).
- Philippe Bacchetta & Maria Paz Espinosa, 1993. "Information Sharing and Tax Competition Among Governments," CEPR Financial Markets Paper 0028, European Science Foundation Network in Financial Markets, c/o C.E.P.R, 33 Great Sutton Street, London EC1V 0DX..
- Maura P. Doyle & Christopher M. Snyder, 1999.
"Information Sharing and Competition in the Motor Vehicle Industry,"
Journal of Political Economy, University of Chicago Press, vol. 107(6), pages 1326-1364, December.
- Maura P. Doyle & Christopher M. Snyder, "undated". "Information Sharing and Competition in the Motor Vehicle Industry," Finance and Economics Discussion Series 1997-04, Board of Governors of the Federal Reserve System (U.S.), revised 10 Dec 2019.
- Maura P. Doyle & Christopher M. Snyder, 1997. "Information sharing and competition in the motor vehicle industry," Finance and Economics Discussion Series 1997-4, Board of Governors of the Federal Reserve System (U.S.).
- Malueg, David A. & Tsutsui, Shunichi O., 1998. "Distributional assumptions in the theory of oligopoly information exchange1," International Journal of Industrial Organization, Elsevier, vol. 16(6), pages 785-797, November.
- Yong Wu & Mengyao Xu & Dong Cheng & Tao Dai, 2022. "Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker," Decision Analysis, INFORMS, vol. 19(2), pages 99-122, June.
- Myatt, David P. & Wallace, Chris, 2015. "Cournot competition and the social value of information," Journal of Economic Theory, Elsevier, vol. 158(PB), pages 466-506.
- Charles Z. Liu & Humayun Zafar & Yoris A. Au, 2013. "Rethinking Fs-Isac: An It Security Information Sharing Model For The Financial Services Sector," Working Papers 0209is, College of Business, University of Texas at San Antonio.
- Sjaak Hurkens, 2014.
"Bayesian Nash equilibrium in “linear” Cournot models with private information about costs,"
International Journal of Economic Theory, The International Society for Economic Theory, vol. 10(2), pages 203-217, June.
- Sjaak Hurkens, 2012. "Bayesian Nash Equilibrium in ''Linear'' Cournot Models with Private Information About Cost," UFAE and IAE Working Papers 924.12, Unitat de Fonaments de l'Anàlisi Econòmica (UAB) and Institut d'Anàlisi Econòmica (CSIC).
- Sjaak Hurkens, 2012. "Bayesian Nash Equilibrium in "Linear" Cournot Models with Private Information about Costs," Working Papers 674, Barcelona School of Economics.
- Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
- Lagerlof, Johan N.M., 2007.
"Insisting on a non-negative price: Oligopoly, uncertainty, welfare, and multiple equilibria,"
International Journal of Industrial Organization, Elsevier, vol. 25(4), pages 861-875, August.
- Johan Lagerlof, 2003. "Insisting on a Non-Negative Price: Oligopoly, Uncertainty, Welfare, and Multiple Equilibria," Industrial Organization 0304007, University Library of Munich, Germany.
- Johan Lagerlöf, 2003. "Insisting on a Non-Negative Price: Oligopoly, Uncertainty, Welfare, and Multiple Equilibria," CIG Working Papers SP II 2003-04, Wissenschaftszentrum Berlin (WZB), Research Unit: Competition and Innovation (CIG).
- Johan Lagerlof, 2003. "Insisting on a Non-Negative Price: Oligopoly, Uncertainty, Welfare, and Multiple Equilibria," Microeconomics 0304006, University Library of Munich, Germany.
- Lagerlof, Johan, 2003. "Insisting on a Non-negative Price: Oligopoly, Uncertainty, Welfare and Multiple Equilibria," CEPR Discussion Papers 3901, C.E.P.R. Discussion Papers.
More about this item
Keywords
Data survivability; Data security; Protection; Redundancy; Attack; Optimization;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:100:y:2012:i:c:p:19-27. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.