Show simple item record

dc.contributor.authorHausken, Kjell
dc.date.accessioned2018-05-16T08:28:59Z
dc.date.available2018-05-16T08:28:59Z
dc.date.created2017-05-09T22:06:42Z
dc.date.issued2017-05
dc.identifier.citationHausken, K. (2017) Security Investment, Hacking, and Information Sharing Between Firms and Between Hackers. Games, 8(2)nb_NO
dc.identifier.issn2073-4336
dc.identifier.urihttp://hdl.handle.net/11250/2498297
dc.description.abstractA four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more disadvantaged hacker receives less information, and mixed motives may exist between information sharing and own reputation gain. The second hacker’s attack is deterred by the first hacker’s reputation gain. Increasing information sharing effectiveness causes firms to substitute from defense to information sharing, which also increases in the firms’ unit defense cost, decreases in each firm’s unit cost of own information leakage, and increases in the unit benefit of joint leakage. Increasing interdependence between firms causes more information sharing between hackers caused by larger aggregate attacks, which firms should be conscious about. We consider three corner solutions. First and second, the firms deter disadvantaged hackers. When the second hacker is deterred, the first hacker does not share information. Third, the first hacker shares a maximum amount of information when certain conditions are met. Policy and managerial implications are provided for how firms should defend against hackers with various characteristics.nb_NO
dc.language.isoengnb_NO
dc.publisherMDPInb_NO
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.subjectinformation sharingnb_NO
dc.subjectcyber securitynb_NO
dc.subjectgame theorynb_NO
dc.subjectcyber warnb_NO
dc.subjectsecurity investmentnb_NO
dc.subjecthackingnb_NO
dc.subjectinformasjonssikkerhetnb_NO
dc.subjectdatakriminalitetnb_NO
dc.titleSecurity Investment, Hacking, and Information Sharing Between Firms and Between Hackersnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionpublishedVersionnb_NO
dc.rights.holder© 2017 by the author.nb_NO
dc.subject.nsiVDP::Social science: 200nb_NO
dc.source.pagenumber23nb_NO
dc.source.volume8nb_NO
dc.source.journalGamesnb_NO
dc.source.issue2nb_NO
dc.identifier.doi10.3390/g8020023
dc.identifier.cristin1469206
cristin.unitcode217,7,5,0
cristin.unitnameInstitutt for medie- og samfunnsfag
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Navngivelse 4.0 Internasjonal
Except where otherwise noted, this item's license is described as Navngivelse 4.0 Internasjonal