How to react to hacker types and asset types in security decision-making

X Wu, Y Wu, Q Li, T Dai - Expert Systems with Applications, 2023 - Elsevier
To efficiently manage information security, firms typically allocate limited budgets to protect
their information assets based on asset types and hacker types. This paper builds a game …

[HTML][HTML] Cybersecurity investments in supply chains with two-stage risk propagation

A Dash, SP Sarmah, MK Tiwari, SK Jena… - Computers & Industrial …, 2024 - Elsevier
Cyber-attacks present a significant threat to supply chains as their nodes are directly or
indirectly vulnerable to risk propagation at various stages. The risk level varies depending …

Information sharing and deferral option in cybersecurity investment

C Cai, L Zhao - Plos one, 2023 - journals.plos.org
This study investigates the effect of information sharing and deferral option on a firm's
information security investment strategies by considering strategic interactions between a …

Building cybersecurity resilience: integrating defense and recovery investment strategies in an expected resilience framework

K Dong, J Zhen, Z **e, L Chen - Journal of Enterprise Information …, 2024 - emerald.com
Purpose To remain competitive in an unpredictable environment where the complexity and
frequency of cybercrime are rapidly increasing, a cyber resiliency strategy is vital for …

Information security outsourcing strategies in the supply chain considering security externality

Y Wu, N Wang, T Dai, D Cheng - Journal of the Operational …, 2024 - Taylor & Francis
Abstract Information assets that complement each other capture the information security
characteristics of supply chain firms. Supply chain firms usually outsource security services …

Information security decisions of security‐interdependent firms in the presence of consumer sensitivity

Y Wu, Z **, T Dai, D Yang - Managerial and Decision …, 2024 - Wiley Online Library
Firms suffer security‐interdependent risks while applying network technology, causing
severe customer churn. This paper studies the security and price decisions of security …

Information Security Decisions with Consideration of Hacker Intrusion Propagation

L Zhao, X Zhou, J Li - Mathematical Problems in Engineering, 2022 - Wiley Online Library
The spread of network attacks is extremely harmful, which poses a great threat to the assets
and reputation of firms. Therefore, making a scientific information security strategy is an …

Relationship Structure Analysis on Determinants of Enterprise Information Security Investment Decision Based on ISM

X Li, S Du - IEEE Engineering Management Review, 2022 - ieeexplore.ieee.org
Information security is one of the biggest threats to enterprises; how to identify the
determinants of enterprise information security investment (EISI) and put forward …

Decision-making in Cybersecurity: A Bibliometric analysis

M Aljanabi, AH Ali, MG Yaseen… - Wasit Journal of …, 2023 - wjcm.uowasit.edu.iq
This bibliometric analysis explores research trends and patterns in the intersection of
decision-making and cybersecurity. Using Scopus data, we conducted a systematic search …

Economics of Cybersecurity Investment and Information Sharing: Firm Decision Making under Policy Constraints

L Zhao, X Wu, J Li, H Tong - Systems, 2025 - mdpi.com
With an increasing number of firms in cybersecurity information-sharing platforms, the
potential cyber risks become a critical challenge during the exchanging of information. How …