How to react to hacker types and asset types in security decision-making
X Wu, Y Wu, Q Li, T Dai - Expert Systems with Applications, 2023 - Elsevier
To efficiently manage information security, firms typically allocate limited budgets to protect
their information assets based on asset types and hacker types. This paper builds a game …
their information assets based on asset types and hacker types. This paper builds a game …
[HTML][HTML] Cybersecurity investments in supply chains with two-stage risk propagation
Cyber-attacks present a significant threat to supply chains as their nodes are directly or
indirectly vulnerable to risk propagation at various stages. The risk level varies depending …
indirectly vulnerable to risk propagation at various stages. The risk level varies depending …
Information sharing and deferral option in cybersecurity investment
C Cai, L Zhao - Plos one, 2023 - journals.plos.org
This study investigates the effect of information sharing and deferral option on a firm's
information security investment strategies by considering strategic interactions between a …
information security investment strategies by considering strategic interactions between a …
Building cybersecurity resilience: integrating defense and recovery investment strategies in an expected resilience framework
K Dong, J Zhen, Z **e, L Chen - Journal of Enterprise Information …, 2024 - emerald.com
Purpose To remain competitive in an unpredictable environment where the complexity and
frequency of cybercrime are rapidly increasing, a cyber resiliency strategy is vital for …
frequency of cybercrime are rapidly increasing, a cyber resiliency strategy is vital for …
Information security outsourcing strategies in the supply chain considering security externality
Y Wu, N Wang, T Dai, D Cheng - Journal of the Operational …, 2024 - Taylor & Francis
Abstract Information assets that complement each other capture the information security
characteristics of supply chain firms. Supply chain firms usually outsource security services …
characteristics of supply chain firms. Supply chain firms usually outsource security services …
Information security decisions of security‐interdependent firms in the presence of consumer sensitivity
Y Wu, Z **, T Dai, D Yang - Managerial and Decision …, 2024 - Wiley Online Library
Firms suffer security‐interdependent risks while applying network technology, causing
severe customer churn. This paper studies the security and price decisions of security …
severe customer churn. This paper studies the security and price decisions of security …
Information Security Decisions with Consideration of Hacker Intrusion Propagation
L Zhao, X Zhou, J Li - Mathematical Problems in Engineering, 2022 - Wiley Online Library
The spread of network attacks is extremely harmful, which poses a great threat to the assets
and reputation of firms. Therefore, making a scientific information security strategy is an …
and reputation of firms. Therefore, making a scientific information security strategy is an …
Relationship Structure Analysis on Determinants of Enterprise Information Security Investment Decision Based on ISM
X Li, S Du - IEEE Engineering Management Review, 2022 - ieeexplore.ieee.org
Information security is one of the biggest threats to enterprises; how to identify the
determinants of enterprise information security investment (EISI) and put forward …
determinants of enterprise information security investment (EISI) and put forward …
Decision-making in Cybersecurity: A Bibliometric analysis
This bibliometric analysis explores research trends and patterns in the intersection of
decision-making and cybersecurity. Using Scopus data, we conducted a systematic search …
decision-making and cybersecurity. Using Scopus data, we conducted a systematic search …
Economics of Cybersecurity Investment and Information Sharing: Firm Decision Making under Policy Constraints
L Zhao, X Wu, J Li, H Tong - Systems, 2025 - mdpi.com
With an increasing number of firms in cybersecurity information-sharing platforms, the
potential cyber risks become a critical challenge during the exchanging of information. How …
potential cyber risks become a critical challenge during the exchanging of information. How …