Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, Ross. (2001). Why Information Security is Hard: An Economic Perspective, Proceedings of 17th Annual Computer Security Applications Conference, Dec. 10–14.
Bulow, J., J. Geanakoplos and P. Klemperer. (1985). Multimarket Oligopoly: Strategic Substitutes and Complements, The Journal of Political Economy, Vol 93, Issue 3,pp 488–511.
Campbell, K., L. Gordon, M. Loeb and L. Zhou. (2003). The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market forthcoming, Journal of Computer Security.
d’Aspremont, C. and A. Jacquemin. (1988). Cooperative and Non-cooperative R&D in a Duopoly with Spillovers, American Economic Review, 78: 1133–1137.
Fried, D. (1984). Incentives for Information Production and Disclosure in a Duopolistic Environment, The Quarterly Journal of Economics, Vol. 99, pp. 367–381.
Gal-Or, E. (1985). Information Sharing in Oligopoly, Econometrica, Vol. 3, pp. 329–343.
Gal-Or, E. (1986). First mover and second mover advantages, International Economic Review, 26(3) pp. 649653.
Gordon, L.A. and M. P. Loeb. (2002). The Economics of Investment in Information Security, ACM Transactions on Information and System Security, Vol. 5,(4) November, pp. 438–457.
Gordon, L. A., M. P. Loeb, and W. Lucyshyn. (2003). Sharing Information on Computer Systems Security: An Economic Analysis, Journal of Accounting and Public Policy, Vol 22,(6).
McGuire, Timothy M., Richard P. Staelin. (1983). An industry equilibrium analysis of downstream vertical integration, Marketing Science, Vol. 2, pp. 161 192.
Milgrom, P. (1994). Comparing optima: Do simplifying assumptions affect conclusions?, Journal of Political Economy, 102(June), pp. 607 615.
(NIPC) National Infrastructure Protection Center (2001). Information Sharing & Analysis Centers, May 15th.
Schecter, Stuart E., and Michael D. Smith. (2003). How Much Security is Enough to Stop a Thief? The Economics of Outsider Theft via Computer Systems Networks, Proceedings of the Financial Cryptography Conference, Guadeloupe, January 27–30.
Schenk, M. and M. Schenk. (2002). Defining the Value of Strategic Security, Secure Busines Quarterly, Vol. 1(1), pp 1–6.
Shapiro, C. (1986). Exchange of Cost Information in Oligopoly, Review of Economic Studies, Vol. 53 (1986), pp. 433–446.
Varian, H. (2002). System Reliability and Free Riding, Proceedings of the First WEIS, UC Berkeley, May 16–17.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this chapter
Cite this chapter
Gal-Or, E., Ghose, A. (2004). The Economic Consequences of Sharing Security Information. In: Camp, L.J., Lewis, S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8090-5_8
Download citation
DOI: https://doi.org/10.1007/1-4020-8090-5_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8089-0
Online ISBN: 978-1-4020-8090-6
eBook Packages: Springer Book Archive