EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Security investment"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 16 Datensicherheit 16 Game theory 11 Investment 10 Spieltheorie 10 Investition 9 Investitionsentscheidung 9 Investment decision 9 Economics of information 8 Information dissemination 8 Informationsverbreitung 8 Informationsökonomik 8 Information security investment 6 Security investment 6 information sharing 6 security investment 6 IT crime 5 IT-Kriminalität 5 contest success function 5 game theory 5 Knowledge transfer 4 Portfolio selection 4 Portfolio-Management 4 Theorie 4 Theory 4 Wissenstransfer 4 asset allocation 4 cyber security 4 information security investment 4 Corporate security 3 Economic value added (EVA) 3 Firm performance 3 Information security 3 Information sharing 3 Network security investment 3 Unternehmenssicherheit 3 cyber war 3 policy 3 Asymmetric information 2 Asymmetrische Information 2
more ... less ...
Online availability
All
Undetermined 19 Free 7 CC license 1
Type of publication
All
Article 32
Type of publication (narrower categories)
All
Article in journal 22 Aufsatz in Zeitschrift 22 research-article 3 Article 2 Congress Report 1
Language
All
English 29 Undetermined 3
Author
All
Gao, Xing 4 Hausken, Kjell 4 Bose, Ranjit 3 Liu, Xinbao 3 Pardalos, Panos M. 3 Pei, Jun 3 Qian, Xiaofei 3 Zhong, Weijun 3 Koch, Miloš 2 Mei, Shue 2 Mouratidis, Haralambos 2 Podešva, Lukáš 2 (Robert) Luo, Xin 1 Alavi, Reza 1 Amini, Hamed 1 Balli, Faruk 1 Balli, Hatice Ozer 1 Biswas, Baidyanath 1 Biswas, Indranil 1 Chen, Chun-Wei 1 Chen, Chun-wei 1 Cheng, David C. 1 Chiao, Chaoshin 1 Choi, Jae 1 Feng, Gengzhong 1 Fung, Richard Y. K. 1 Gong, Siyu 1 Gupta, Rohit 1 Islam, Shareeful 1 Jahankhani, Hamid 1 Jean-Louis, Rosmy 1 Johnson, M. Eric 1 Kwon, Juhee 1 Leung, Alvin Chung Man 1 Li, Wilson Weixun 1 Li, Xiaotong 1 Li, Xiufeng 1 Liao, Chun-Hsiung 1 Liao, Chun-hsiung 1 Liu, Lin 1
more ... less ...
Published in...
All
Games 2 Information & Computer Security 2 International game theory review 2 Journal of the Operational Research Society 2 Journal of the Operational Research Society : OR 2 Business & information systems engineering 1 Communications & Strategies 1 Computers & operations research : and their applications to problems of world concern ; an international journal 1 Economic Modelling 1 Economic modelling 1 Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 1 Information technology and management 1 International Journal of Accounting & Information Management 1 International Journal of Accounting and Information Management 1 International journal of accounting and information management 1 International journal of production research 1 International review of financial analysis 1 International transactions in operational research : a journal of the International Federation of Operational Research Societies 1 MIS quarterly 1 Management information systems : mis quarterly 1 Mathematics and financial economics 1 Operations research letters 1 Review of Pacific Basin Financial Markets and Policies (RPBFMP) 1 Technology analysis & strategic management 1 Trends Economics and Management 1 Trends economics and management 1
more ... less ...
Source
All
ECONIS (ZBW) 22 RePEc 4 Other ZBW resources 3 EconStor 2 BASE 1
Showing 1 - 10 of 32
Cover Image
Where is IT in information security? : the interrelationship among IT investment, security awareness, and data breaches
Li, Wilson Weixun; Leung, Alvin Chung Man; Yue, Wei Thoo - In: MIS quarterly 47 (2023) 1, pp. 317-342
Persistent link: https://www.econbiz.de/10013556967
Saved in:
Cover Image
Internet of Things network security improvement investment : the role of platform and smart device manufacturer
Li, Xiufeng; Zhang, Zhen - In: Business & information systems engineering 67 (2025) 2, pp. 209-225
Persistent link: https://www.econbiz.de/10015333546
Saved in:
Cover Image
Comparison of the most important models of investments in cyber and information security
Podešva, Lukáš; Koch, Miloš - In: Trends Economics and Management 16 (2022) 39, pp. 25-34
Purpose of the article: Cyber security has become a key factor in determining the success or failure of companies that rely on information systems. However, this entails considerable investment. Typical investments in information technology aim to create value, while investments in cyber...
Persistent link: https://www.econbiz.de/10015186054
Saved in:
Cover Image
Comparison of the most important models of investments in cyber and information security
Podešva, Lukáš; Koch, Miloš - In: Trends economics and management 16 (2022) 39, pp. 25-34
Purpose of the article: Cyber security has become a key factor in determining the success or failure of companies that rely on information systems. However, this entails considerable investment. Typical investments in information technology aim to create value, while investments in cyber...
Persistent link: https://www.econbiz.de/10013277119
Saved in:
Cover Image
Information sharing and security investment for substitutable firms : a game-theoretic analysis
Gao, Xing; Gong, Siyu; Wang, Ying; Zhang, Yanfang - In: Journal of the Operational Research Society 75 (2024) 4, pp. 799-820
Persistent link: https://www.econbiz.de/10014555756
Saved in:
Cover Image
Contagion risks and security investment in directed networks
Amini, Hamed - In: Mathematics and financial economics 17 (2023) 2, pp. 247-283
Persistent link: https://www.econbiz.de/10014328922
Saved in:
Cover Image
A game of information security investment considering security insurance and complementary information assets
Qian, Xiaofei; Yang, Wujuan; Pei, Jun; Liu, Xinbao; … - In: International transactions in operational research : a … 29 (2022) 3, pp. 1791-1824
Persistent link: https://www.econbiz.de/10012795893
Saved in:
Cover Image
Decision making of optimal investment in information security for complementary enterprises based on game theory
Li, Xiaotong - In: Technology analysis & strategic management 33 (2021) 7, pp. 755-769
Persistent link: https://www.econbiz.de/10012589354
Saved in:
Cover Image
Security investment, hacking, and information sharing between firms and between hackers
Hausken, Kjell - In: Games 8 (2017) 2, pp. 1-23
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers' attacks and the firms' defenses are inverse...
Persistent link: https://www.econbiz.de/10011852689
Saved in:
Cover Image
Security investment, hacking, and information sharing between firms and between hackers
Hausken, Kjell - In: Games 8 (2017) 2, pp. 1-23
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are...
Persistent link: https://www.econbiz.de/10011708862
Saved in:
  • 1
  • 2
  • 3
  • 4
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...