A game theory model of cybersecurity investments with information asymmetry
Author
Abstract
Suggested Citation
DOI: 10.1007/s11066-015-9094-7
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Nagurney, Anna & Yu, Min, 2012. "Sustainable fashion supply chain management under oligopolistic competition and brand differentiation," International Journal of Production Economics, Elsevier, vol. 135(2), pages 532-540.
- Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
- Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.
- Dafermos, Stella & Nagurney, Anna, 1987. "Oligopolistic and competitive behavior of spatially separated markets," Regional Science and Urban Economics, Elsevier, vol. 17(2), pages 245-254.
- Anna Nagurney & Dong Li & Tilman Wolf & Sara Saberi, 2013. "A network economic game theory model of a service-oriented internet with choices and quality competition," Netnomics, Springer, vol. 14(1), pages 1-25, November.
- George A. Akerlof, 1970. "The Market for "Lemons": Quality Uncertainty and the Market Mechanism," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 84(3), pages 488-500.
- Anna Nagurney & Dong Li, 2014. "Equilibria and dynamics of supply chain network competition with information asymmetry in quality and minimum quality standards," Computational Management Science, Springer, vol. 11(3), pages 285-315, July.
- Anna Nagurney & Min Yu & Qiang Qiang, 2011. "Supply chain network design for critical needs with outsourcing," Papers in Regional Science, Wiley Blackwell, vol. 90(1), pages 123-142, March.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Mazaher Kianpour & Stewart J. Kowalski & Harald Øverby, 2021. "Systematically Understanding Cybersecurity Economics: A Survey," Sustainability, MDPI, vol. 13(24), pages 1-28, December.
- Alessandro Fedele & Cristian Roner, 2022.
"Dangerous games: A literature review on cybersecurity investments,"
Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
- Alessandro Fedele & Cristian Roner, 2020. "Dangerous Games: A Literature Review on Cybersecurity Investments," BEMPS - Bozen Economics & Management Paper Series BEMPS75, Faculty of Economics and Management at the Free University of Bozen.
- Nagurney, Anna & Shukla, Shivani, 2017. "Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability," European Journal of Operational Research, Elsevier, vol. 260(2), pages 588-600.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Nagurney, Anna & Li, Dong & Nagurney, Ladimer S., 2014. "Spatial price equilibrium with information asymmetry in quality and minimum quality standards," International Journal of Production Economics, Elsevier, vol. 158(C), pages 300-313.
- Nagurney, Anna & Saberi, Sara & Shukla, Shivani & Floden, Jonas, 2015. "Supply chain network competition in price and quality with multiple manufacturers and freight service providers," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 77(C), pages 248-267.
- Nagurney, Anna & Yu, Min & Floden, Jonas & Nagurney, Ladimer S., 2014. "Supply chain network competition in time-sensitive markets," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 70(C), pages 112-127.
- Anna Nagurney & Dong Li, 2014. "Equilibria and dynamics of supply chain network competition with information asymmetry in quality and minimum quality standards," Computational Management Science, Springer, vol. 11(3), pages 285-315, July.
- Anna Nagurney & Dong Li & Tilman Wolf & Sara Saberi, 2013. "A network economic game theory model of a service-oriented internet with choices and quality competition," Netnomics, Springer, vol. 14(1), pages 1-25, November.
- Anna Nagurney & Dong Li, 2014. "A Dynamic Network Oligopoly Model with Transportation Costs, Product Differentiation, and Quality Competition," Computational Economics, Springer;Society for Computational Economics, vol. 44(2), pages 201-229, August.
- Li, Dong & Nagurney, Anna, 2015. "A general multitiered supply chain network model of quality competition with suppliers," International Journal of Production Economics, Elsevier, vol. 170(PA), pages 336-356.
- Masoumi, Amir H. & Yu, Min & Nagurney, Anna, 2012. "A supply chain generalized network oligopoly model for pharmaceuticals under brand differentiation and perishability," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 48(4), pages 762-780.
- Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
- Alessandro Fedele & Cristian Roner, 2022.
"Dangerous games: A literature review on cybersecurity investments,"
Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
- Alessandro Fedele & Cristian Roner, 2020. "Dangerous Games: A Literature Review on Cybersecurity Investments," BEMPS - Bozen Economics & Management Paper Series BEMPS75, Faculty of Economics and Management at the Free University of Bozen.
- Han, Xiaoya & Liu, Xin, 2020. "Equilibrium decisions for multi-firms considering consumer quality preference," International Journal of Production Economics, Elsevier, vol. 227(C).
- Liao, Chun-Hsiung & Chen, Chun-Wei, 2014. "Network externality and incentive to invest in network security," Economic Modelling, Elsevier, vol. 36(C), pages 398-404.
- Anna Nagurney & Tilman Wolf, 2014. "A Cournot–Nash–Bertrand game theory model of a service-oriented Internet with price and quality competition among network transport providers," Computational Management Science, Springer, vol. 11(4), pages 475-502, October.
- Nagurney, Anna & Shukla, Shivani & Nagurney, Ladimer S. & Saberi, Sara, 2018. "A game theory model for freight service provision security investments for high-value cargo," Economics of Transportation, Elsevier, vol. 16(C), pages 21-28.
- Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
- Anna Nagurney & Min Yu & Jonas Floden, 2013. "Supply chain network sustainability under competition and frequencies of activities from production to distribution," Computational Management Science, Springer, vol. 10(4), pages 397-422, December.
- Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston, 2014. "An economic mechanism to manage operational security risks for inter-organizational information systems," Information Systems Frontiers, Springer, vol. 16(3), pages 399-416, July.
- Yu, Min & Cruz, Jose M. & Li, Dong Michelle, 2019. "The sustainable supply chain network competition with environmental tax policies," International Journal of Production Economics, Elsevier, vol. 217(C), pages 218-231.
- Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
- Li, Dong & Nagurney, Anna & Yu, Min, 2018. "Consumer learning of product quality with time delay: Insights from spatial price equilibrium models with differentiated products," Omega, Elsevier, vol. 81(C), pages 150-168.
More about this item
Keywords
Cybersecurity; Investments; Game theory; Nash equilibrium; Information asymmetry; Variational inequalities;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:netnom:v:16:y:2015:i:1:p:127-148. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.