Hausken, Kjell - In: Games 8 (2017) 2, pp. 1-23
sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more … attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two … hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information …