Vis enkel innførsel

dc.contributor.authorHausken, Kjell
dc.date.accessioned2013-08-15T12:21:00Z
dc.date.available2013-08-15T12:21:00Z
dc.date.issued2007
dc.identifier.citationHausken, K. (2007) Information sharing among firms and cyber attacks. Journal of Accounting and Public Policy, 26(6), pp. 639-688no_NO
dc.identifier.urihttp://hdl.handle.net/11250/184311
dc.descriptionReprinted from Journal of Accounting and Public Policy, 26 /6, Kjell Hausken, Information sharing among firms and cyber attacks, Pages No. 639–688, Copyright (2007), with permission from Elsevier.no_NO
dc.description.abstractAs the Sarbanes-Oxley Act strengthens internal controls, and the government encourages information sharing, accounting gains significance through secure representation, storage, and transfer of information, and by laying the foundation for assessing costs and benefits. Information sharing and security investment for two firms are inverse U shaped in the aggregate attack, and interlinked through the interdependence and the firm’s unit cost of security investment. Both increase in the interdependence (e.g. US telecommunications industry). With given security investment, social welfare is inverse U shaped in information sharing. Individual optimization implies free riding. A social planner is introduced controlling information sharing, security investment, or both, in simultaneous and two period games. Two period games where the social planner moves first are realistic when the social planner is highly respected. For the simultaneous game, a social planner controlling information sharing (security investment) imposes unreasonably high sharing (security investment). Firms free ride in the variable they control. The social planner imposes more moderate levels in the two period games. A social planner controlling both information sharing and security investment in a two period game where the social planner moves first is the most beneficial control scenario when the firms’ defense efficiencies are high. If these are sufficiently high, the attack is deterred altogether.no_NO
dc.language.isoengno_NO
dc.publisherElsevierno_NO
dc.subjectcyber warno_NO
dc.subjectconflictno_NO
dc.subjectsecurity investmentno_NO
dc.subjectinformation sharingno_NO
dc.subjectsecurity breachesno_NO
dc.subjectinterdependenceno_NO
dc.subjectsocial welfareno_NO
dc.subjectbudget controlno_NO
dc.titleInformation sharing among firms and cyber attacksno_NO
dc.typeJournal articleno_NO
dc.typePeer reviewedno_NO
dc.subject.nsiVDP::Social science: 200no_NO
dc.source.pagenumber639-688no_NO
dc.source.volume26no_NO
dc.source.journalJournal of Accounting and Public Policyno_NO
dc.source.issue6no_NO
dc.identifier.doi10.1016/j.jaccpubpol.2007.10.001


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel