Optimal Security Investments and Extreme Risk
Author
Abstract
Suggested Citation
DOI: 10.1111/j.1539-6924.2012.01849.x
Download full text from publisher
References listed on IDEAS
- Howard Kunreuther & Erwann Michel-Kerjan & Beverly Porter, 2003. "Assessing, Managing, and Financing Extreme Events: Dealing with Terrorism," NBER Working Papers 10179, National Bureau of Economic Research, Inc.
- Kenneth T. Bogen & Edwin D. Jones, 2006. "Risks of Mortality and Morbidity from Worldwide Terrorism: 1968–2004," Risk Analysis, John Wiley & Sons, vol. 26(1), pages 45-59, February.
- Neil Johnson & Michael Spagat & Jorge A. Restrepo & Nicolás Suárez, 2005. "From old wars to new wars and global terrorism," Documentos de Economía 2745, Universidad Javeriana - Bogotá.
- Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.
- Hamid Mohtadi & Antu Panini Murshid, 2009. "Risk Analysis of Chemical, Biological, or Radionuclear Threats: Implications for Food Security," Risk Analysis, John Wiley & Sons, vol. 29(9), pages 1317-1335, September.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Jaume Belles‐Sampera & Montserrat Guillén & Miguel Santolino, 2014. "Beyond Value‐at‐Risk: GlueVaR Distortion Risk Measures," Risk Analysis, John Wiley & Sons, vol. 34(1), pages 121-134, January.
- Hamid Mohtadi, 2017. "Risk‐Mitigating Policies and Adversarial Behavior: Case of Backlash," Risk Analysis, John Wiley & Sons, vol. 37(3), pages 459-470, March.
- Enrico Biffis & Erik Chavez, 2017. "Satellite Data and Machine Learning for Weather Risk Management and Food Security," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1508-1521, August.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Hamid Mohtadi & Antu Panini Murshid, 2009. "Risk Analysis of Chemical, Biological, or Radionuclear Threats: Implications for Food Security," Risk Analysis, John Wiley & Sons, vol. 29(9), pages 1317-1335, September.
- Mohamed Ayadi & Mohamed Salah Matoussi, 2007. "The Impact of Higher Water Costs on the Export of Tunisian Dates and Citrus," Working Papers 718, Economic Research Forum, revised 01 Jan 2007.
- Hamid Mohtadi, 2017. "Risk‐Mitigating Policies and Adversarial Behavior: Case of Backlash," Risk Analysis, John Wiley & Sons, vol. 37(3), pages 459-470, March.
- Hamid Mohtadi & Bryan S. Weber, 2021. "Catastrophe And Rational Policy: Case Of National Security," Economic Inquiry, Western Economic Association International, vol. 59(1), pages 140-161, January.
- Shuying Li & Jun Zhuang & Shifei Shen, 2017. "Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time‐Series and Intervention Analysis," Risk Analysis, John Wiley & Sons, vol. 37(7), pages 1287-1297, July.
- Hamid Mohtadi & Antu Panini Murshid, 2009.
"Risk of catastrophic terrorism: an extreme value approach,"
Journal of Applied Econometrics, John Wiley & Sons, Ltd., vol. 24(4), pages 537-559.
- Mohtadi, Hamid & Murshid, Antu, 2009. "The risk of catastrophic terrorism: an extreme value approach," MPRA Paper 25738, University Library of Munich, Germany.
- Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
- Anna Nagurney & Ladimer Nagurney, 2015. "A game theory model of cybersecurity investments with information asymmetry," Netnomics, Springer, vol. 16(1), pages 127-148, August.
- Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
- Amitava Dutta & Rahul Roy, 2008. "Dynamics of organizational information security," System Dynamics Review, System Dynamics Society, vol. 24(3), pages 349-375, September.
- Bruno S. Frey & Simon Luechinger & Alois Stutzer, 2007.
"Calculating Tragedy: Assessing The Costs Of Terrorism,"
Journal of Economic Surveys, Wiley Blackwell, vol. 21(1), pages 1-24, February.
- Bruno S. Frey & Simon Luechinger & Alois Stutzer, "undated". "Calculating Tragedy: Assessing the Costs of Terrorism," IEW - Working Papers 205, Institute for Empirical Research in Economics - University of Zurich.
- Bruno S. Frey & Simon Luechinger & Alois Stutzer, 2004. "Calculating Tragedy: Assessing the Costs of Terrorism," CREMA Working Paper Series 2004-23, Center for Research in Economics, Management and the Arts (CREMA).
- Bruno S. Frey & Simon Luechinger & Alois Stutzer, 2004. "Calculating Tragedy: Assessing the Costs of Terrorism," CESifo Working Paper Series 1341, CESifo.
- Bin Srinidhi & Jia Yan & Giri Kumar Tayi, 2008. "Firm-level Resource Allocation to Information Security in the Presence of Financial Distress," Working Papers 2008-17, School of Economic Sciences, Washington State University.
- Jaume Belles‐Sampera & Montserrat Guillén & Miguel Santolino, 2014. "Beyond Value‐at‐Risk: GlueVaR Distortion Risk Measures," Risk Analysis, John Wiley & Sons, vol. 34(1), pages 121-134, January.
- Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.
- Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
- Khusrav Gaibulloev & Todd Sandler & Donggyu Sul, "undated". "Reevaluating Terrorism and Economic Growth: Dynamic Panel Analysis and Cross-Sectional Dependence," Economics Working Papers 02-03/2013, School of Business Administration, American University of Sharjah.
- Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.
- Alessandro Fedele & Cristian Roner, 2022.
"Dangerous games: A literature review on cybersecurity investments,"
Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
- Alessandro Fedele & Cristian Roner, 2020. "Dangerous Games: A Literature Review on Cybersecurity Investments," BEMPS - Bozen Economics & Management Paper Series BEMPS75, Faculty of Economics and Management at the Free University of Bozen.
- Hee-Kyung Kong & Tae-Sung Kim & Jungduk Kim, 2012. "An analysis on effects of information security investments: a BSC perspective," Journal of Intelligent Manufacturing, Springer, vol. 23(4), pages 941-953, August.
- Yanling Chang & Alan Erera & Chelsea White, 2015. "A leader–follower partially observed, multiobjective Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 103-128, December.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:32:y:2012:i:8:p:1309-1325. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.