Showing 1 - 10 of 18,816
misappropriation hazard and forced to elaborate protection strategies to mitigate that risk. This study shows that firms adjust the … fragments while reducing the misappropriation hazard of individual fragments. We find also that the propensity to turn to this …
Persistent link: https://www.econbiz.de/10010902180
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are...
Persistent link: https://www.econbiz.de/10011708862
Persistent link: https://www.econbiz.de/10012814895
Persistent link: https://www.econbiz.de/10011289067
Informal exchange of information among competitors has been well-documented in a variety of industries, and one's expectation of reciprocity shown to be a key determinant. We use an indeterminate horizon centipede game to establish a feedback loop in the laboratory and show that an individual's...
Persistent link: https://www.econbiz.de/10012055632
Persistent link: https://www.econbiz.de/10014551269
Persistent link: https://www.econbiz.de/10014484415
This paper studies an outsourcing problem where two service providers (suppliers) compete for the service contract from …. The findings from this paper provide useful managerial implications on information management for outsourcing firms …
Persistent link: https://www.econbiz.de/10014043744
In this paper, we consider a novel game theory model for the competitive influence maximization problem. We model this problem as a simultaneous non-cooperative game with complete information and rational players, where there are at least two players who are supposed to be out of the network and...
Persistent link: https://www.econbiz.de/10011848365