Economic incentives in security information sharing: the effects of market structures
Author
Abstract
Suggested Citation
DOI: 10.1007/s10799-015-0253-1
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
- Hausken, Kjell, 2008. "Whether to attack a terrorist's resource stock today or tomorrow," Games and Economic Behavior, Elsevier, vol. 64(2), pages 548-564, November.
- Dastidar, Krishnendu Ghosh, 1997.
"Comparing Cournot and Bertrand in a Homogeneous Product Market,"
Journal of Economic Theory, Elsevier, vol. 75(1), pages 205-212, July.
- K.G. Dastidar, 1994. "Comparing Cournot And Bertrand In A Homogeneous Product Market," Working papers 22, Centre for Development Economics, Delhi School of Economics.
- Tridib Bandyopadhyay & Dengpan Liu & Vijay S. Mookerjee & Allen W. Wilhite, 2014. "Dynamic competition in IT security: A differential games approach," Information Systems Frontiers, Springer, vol. 16(4), pages 643-661, September.
- Cellini, Roberto & Lambertini, Luca, 2009.
"Dynamic R&D with spillovers: Competition vs cooperation,"
Journal of Economic Dynamics and Control, Elsevier, vol. 33(3), pages 568-582, March.
- R. Cellini & L. Lambertini, 2003. "Dynamic R&D with Spillovers: Competition vs Cooperation," Working Papers 495, Dipartimento Scienze Economiche, Universita' di Bologna.
- Harrison Cheng, 2002. "Bertrand vs. Cournot equilibrium with risk averse firms and cost uncertainty," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 20(3), pages 555-577.
- Piercarlo Zanchettin, 2006. "Differentiated Duopoly with Asymmetric Costs," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 15(4), pages 999-1015, December.
- Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
- Colombo, Luca & Labrecciosa, Paola, 2015. "On the Markovian efficiency of Bertrand and Cournot equilibria," Journal of Economic Theory, Elsevier, vol. 155(C), pages 332-358.
- Stergios Skaperdas, 1996.
"Contest success functions (*),"
Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290.
- Skaperdas, Stergios, 1996. "Contest Success Functions," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290, February.
- Stergios Skaperdas, 1996. "Contest success functions," Springer Books, in: Roger D. Congleton & Arye L. Hillman & Kai A. Konrad (ed.), 40 Years of Research on Rent Seeking 1, pages 263-270, Springer.
- Lin, Ping & Saggi, Kamal, 2002. "Product differentiation, process R&D, and the nature of market competition," European Economic Review, Elsevier, vol. 46(1), pages 201-211, January.
- Qiu, Larry D., 1997. "On the Dynamic Efficiency of Bertrand and Cournot Equilibria," Journal of Economic Theory, Elsevier, vol. 75(1), pages 213-229, July.
- Esther Gal-Or & Anindya Ghose, 2005.
"The Economic Incentives for Sharing Security Information,"
Information Systems Research, INFORMS, vol. 16(2), pages 186-208, June.
- Esther Gal-Or & Anindya Ghose, 2005. "The Economic Incentives for Sharing Security Information," Industrial Organization 0503004, University Library of Munich, Germany.
- Gordon, Lawrence A. & Loeb, Martin P. & Lucyshyn, William, 2003. "Sharing information on computer systems security: An economic analysis," Journal of Accounting and Public Policy, Elsevier, vol. 22(6), pages 461-485.
- Leonard Cheng, 1985. "Comparing Bertrand and Cournot Equilibria: A Geometric Approach," RAND Journal of Economics, The RAND Corporation, vol. 16(1), pages 146-152, Spring.
- Amr Farahat & Georgia Perakis, 2011. "TECHNICAL NOTE---A Comparison of Bertrand and Cournot Profits in Oligopolies with Differentiated Products," Operations Research, INFORMS, vol. 59(2), pages 507-513, April.
- Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
- Charles A. Holt & David T. Scheffman, 1987. "Facilitating Practices: The Effects of Advance Notice and Best-Price Policies," RAND Journal of Economics, The RAND Corporation, vol. 18(2), pages 187-197, Summer.
- Symeonidis, George, 2003. "Comparing Cournot and Bertrand equilibria in a differentiated duopoly with product R&D," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 39-55, January.
- Leininger, Wolfgang, 1993. "More Efficient Rent-Seeking--A Munchhausen Solution," Public Choice, Springer, vol. 75(1), pages 43-62, January.
- Nirvikar Singh & Xavier Vives, 1984. "Price and Quantity Competition in a Differentiated Duopoly," RAND Journal of Economics, The RAND Corporation, vol. 15(4), pages 546-554, Winter.
- Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
- Derrick Huang, C. & Hu, Qing & Behara, Ravi S., 2008. "An economic analysis of the optimal information security investment in the case of a risk-averse firm," International Journal of Production Economics, Elsevier, vol. 114(2), pages 793-804, August.
- Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.
- Gao, Xing & Zhong, Weijun & Mei, Shue, 2012. "On local stability of Cournot models with simultaneous and sequential decisions," Mathematical Social Sciences, Elsevier, vol. 63(3), pages 207-212.
- Hackner, Jonas, 2000.
"A Note on Price and Quantity Competition in Differentiated Oligopolies,"
Journal of Economic Theory, Elsevier, vol. 93(2), pages 233-239, August.
- Häckner, Jonas, 1999. "A Note on Price and Quantity Competition in Differentiated Oligopolies," Research Papers in Economics 1999:9, Stockholm University, Department of Economics.
- Hausken, Kjell, 2007. "Information sharing among firms and cyber attacks," Journal of Accounting and Public Policy, Elsevier, vol. 26(6), pages 639-688.
- Lofaro, Andrea, 2002. "On the efficiency of Bertrand and Cournot competition under incomplete information," European Journal of Political Economy, Elsevier, vol. 18(3), pages 561-578, September.
- Judy Hsu & X. Wang, 2005.
"On Welfare under Cournot and Bertrand Competition in Differentiated Oligopolies,"
Review of Industrial Organization, Springer;The Industrial Organization Society, vol. 27(2), pages 185-191, September.
- X. Henry Wang & Judy Hsu, 2005. "On Welfare under Cournot and Bertrand Competition in Differentiated Oligopolies," Working Papers 0514, Department of Economics, University of Missouri.
- Vijay Mookerjee & Radha Mookerjee & Alain Bensoussan & Wei T. Yue, 2011. "When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination," Information Systems Research, INFORMS, vol. 22(3), pages 606-623, September.
- Vives, Xavier, 1985. "On the efficiency of Bertrand and Cournot equilibria with product differentation," Journal of Economic Theory, Elsevier, vol. 36(1), pages 166-175, June.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Xiaofei Qian & Jun Pei & Xinbao Liu & Mi Zhou & Panos M. Pardalos, 2019. "Information security decisions for two firms in a market with different types of customers," Journal of Combinatorial Optimization, Springer, vol. 38(4), pages 1263-1285, November.
- Alessandro Fedele & Cristian Roner, 2022.
"Dangerous games: A literature review on cybersecurity investments,"
Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
- Alessandro Fedele & Cristian Roner, 2020. "Dangerous Games: A Literature Review on Cybersecurity Investments," BEMPS - Bozen Economics & Management Paper Series BEMPS75, Faculty of Economics and Management at the Free University of Bozen.
- Xinbao Liu & Xiaofei Qian & Jun Pei & Panos M. Pardalos, 2018. "Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size," Journal of Global Optimization, Springer, vol. 70(2), pages 413-436, February.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.
- Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
- Delbono, Flavio & Lambertini, Luca, 2016.
"Ranking Bertrand, Cournot and supply function equilibria in oligopoly,"
Energy Economics, Elsevier, vol. 60(C), pages 73-78.
- F. Delbono & L. Lambertini, 2015. "Ranking Bertrand, Cournot and Supply Function Equilibria in Oligopoly," Working Papers wp1000, Dipartimento Scienze Economiche, Universita' di Bologna.
- Lee, DongJoon & Choi, Kangsik & Nariu, Tatsuhiko, 2016. "Endogenous Choice of Price or Quantity Contract with Upstream R&D Investment: Linear Pricing and Two-part Tariff Contract with Bargaining," MPRA Paper 72752, University Library of Munich, Germany.
- Luciano Fanti & Nicola Meccheri, 2015. "On the Cournot–Bertrand Profit Differential and the Structure of Unionisation in a Managerial Duopoly," Australian Economic Papers, Wiley Blackwell, vol. 54(4), pages 266-287, December.
- Xing Gao & Weijun Zhong, 2015. "Information security investment for competitive firms with hacker behavior and security requirements," Annals of Operations Research, Springer, vol. 235(1), pages 277-300, December.
- Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
- Choné, Philippe & Linnemer, Laurent, 2020.
"Linear demand systems for differentiated goods: Overview and user’s guide,"
International Journal of Industrial Organization, Elsevier, vol. 73(C).
- Philippe Choné & Laurent Linnemer, 2020. "Linear demand systems for differentiated goods: Overview and user's guide," Working Papers hal-02882403, HAL.
- Manasakis, Constantine & Vlassis, Minas, 2014.
"Downstream mode of competition with upstream market power,"
Research in Economics, Elsevier, vol. 68(1), pages 84-93.
- Constantine Manasakis & Minas Vlassis, 2010. "Downstream Mode of Competition with Upstream Market Power," Working Papers 1003, University of Crete, Department of Economics.
- Manasakis, Constantine & Vlassis, Minas, 2013. "Downstream mode of competition with upstream market power," DICE Discussion Papers 118, Heinrich Heine University Düsseldorf, Düsseldorf Institute for Competition Economics (DICE).
- M. Breton & A. Turki & G. Zaccour, 2004. "Dynamic Model of R&D, Spillovers, and Efficiency of Bertrand and Cournot Equilibria," Journal of Optimization Theory and Applications, Springer, vol. 123(1), pages 1-25, October.
- Rupayan Pal, "undated". "The Cournot-Bertrand profit differential: A Reversal result in network goods duopoly," Indira Gandhi Institute of Development Research, Mumbai Working Papers 2013-014, Indira Gandhi Institute of Development Research, Mumbai, India.
- Colombo, Luca & Labrecciosa, Paola, 2015. "On the Markovian efficiency of Bertrand and Cournot equilibria," Journal of Economic Theory, Elsevier, vol. 155(C), pages 332-358.
- Aymeric Lardon, 2019.
"On the coalitional stability of monopoly power in differentiated Bertrand and Cournot oligopolies,"
Theory and Decision, Springer, vol. 87(4), pages 421-449, November.
- Aymeric Lardon, 2017. "On the Coalitional Stability of Monopoly Power in Differentiated Bertrand and Cournot Oligopolies," GREDEG Working Papers 2017-10, Groupe de REcherche en Droit, Economie, Gestion (GREDEG CNRS), Université Côte d'Azur, France.
- Aymeric Lardon, 2019. "On the coalitional stability of monopoly power in differentiated Bertrand and Cournot oligopolies," Post-Print halshs-02355341, HAL.
- Alipranti, Maria & Milliou, Chrysovalantou & Petrakis, Emmanuel, 2014.
"Price vs. quantity competition in a vertically related market,"
Economics Letters, Elsevier, vol. 124(1), pages 122-126.
- Alipranti, Maria & Milliou, Chrysovalantou & Petrakis, Emmanuel, 2014. "Price vs. quantity competition in a vertically related market," DICE Discussion Papers 146, Heinrich Heine University Düsseldorf, Düsseldorf Institute for Competition Economics (DICE).
- Lopez, Monica Correa & Naylor, Robin A., 2001. "The Cournot-Bertrand Profit Differential: a reversal result in a differentiated duopoly with wage bargaining," Economic Research Papers 269405, University of Warwick - Department of Economics.
- Kangsik, Choi, 2012. "Cournot and Bertrand competition with asymmetric costs in a mixed duopoly revisited," MPRA Paper 37704, University Library of Munich, Germany, revised 28 Mar 2012.
- Yong Wu & Mengyao Xu & Dong Cheng & Tao Dai, 2022. "Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker," Decision Analysis, INFORMS, vol. 19(2), pages 99-122, June.
- Ming Chang & Yan-Ching Ho, 2014. "Comparing Cournot and Bertrand equilibria in an asymmetric duopoly with product R&D," Journal of Economics, Springer, vol. 113(2), pages 133-174, October.
- James A. Brander & Barbara J. Spencer, 2022. "Differentiated Entry or “Me-Too” Entry in Bertrand and Cournot Oligopoly," Review of Industrial Organization, Springer;The Industrial Organization Society, vol. 60(1), pages 1-27, February.
- Arghya Ghosh & Manipushpak Mitra, 2008. "Comparing Bertrand and Cournot Outcomes in the Presence of Public Firms," Discussion Papers 2008-18, School of Economics, The University of New South Wales.
More about this item
Keywords
Bertrand competition; Cournot competition; Security investment; Information sharing;All these keywords.
JEL classification:
- L11 - Industrial Organization - - Market Structure, Firm Strategy, and Market Performance - - - Production, Pricing, and Market Structure; Size Distribution of Firms
- L13 - Industrial Organization - - Market Structure, Firm Strategy, and Market Performance - - - Oligopoly and Other Imperfect Markets
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infotm:v:17:y:2016:i:4:d:10.1007_s10799-015-0253-1. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.