[1] |
ANDERSON R , . Why information security is hard:an economic perspective[C]// The Seventeenth Annual Computer Security Applications Conference. 2001: 358-365.
|
[2] |
GORDON L A , LOEB M P . The economics of information security investment[J]. ACM Transactions on Information & System Security, 2002,5(4): 438-457.
|
[3] |
陈天平, 张串绒, 郭威武 ,等. 效用理论在信息安全投资优化中的应用[J]. 计算机科学, 2009,36(12): 70-72.
|
|
CHEN T P , ZHANG C R , GUO W W ,et al. Application of utility theory in investment optimizing of information security[J]. Computer Science, 2009,36(12): 70-72.
|
[4] |
GORDON L A , LOEB M P , LUCYSHYN W ,et al. Externalities and the magnitude of cyber security underinvestment by private sector firms:a modification of the Gordon-Loeb model[J]. Journal of Information Security, 2015,6(1): 24-30.
|
[5] |
HUANG C D , HU Q , BEHARA R S . Economics of information security investment in the case of simultaneous attacks[C]// The Fifth Workshop on the Economics of Information Security. 2006.
|
[6] |
HUANG C D , HU Q , BEHARA R S . An economic analysis of the optimal information security investment in the case of a risk-averse firm[J]. International Journal of Production Economics, 2008,114(2): 793-804.
|
[7] |
HUANG C D , BEHARA R S , GOO J . Optimal information security investment in a Healthcare Information Exchange:an economic analysis[J]. Decision Support Systems, 2013,61(1): 1-11.
|
[8] |
GORDON L A , LOEB M P , LUCYSHYN W . Sharing information on computer systems security:an economic analysis[J]. Journal of Accounting & Public Policy, 2003,22(6): 461-485.
|
[9] |
巩国权, 王军, 强爽 . 双寡头垄断市场的信息安全投资模型研究[J]. 中国管理科学, 2007,15(z1): 444-448.
|
|
GONG G Q , WANG J , QIANG S . Information security investment model in dual-oligopoly market[J]. Chinese Journal of Management Science, 2007,15(z1): 444-448.
|
[10] |
LELARGE M . Coordination in network security games:a monotone comparative statics approach[J]. IEEE Journal on Selected Areas in Communications, 2012,30(11): 2210-2219.
|
[11] |
WU Y , FENG G , WANG N ,et al. Game of information security investment:impact of attack types and network vulnerability[J]. Expert Systems with Applications, 2015,42(15-16): 6132-6146.
|
[12] |
QIAN X , LIU X , PEI J ,et al. A game-theoretic analysis of information security investment for multiple firms in a network[J]. Journal of the Operational Research Society, 2017,68(10): 1-16.
|
[13] |
IOANNIDIS C , PYM D , WILLIAMS J . Fixed costs,investment rigidities,and risk aversion in information security:a utility-theoretic approach[M]// Economics of Information Security and Privacy III. 2013: 171-191.
|
[14] |
?APKO Z , AKSENTIJEVI? S , TIJAN E . Economic and financial analysis of investments in information security[C]// The 37th International Convention on Information and Communication Technology,Electronics and Microelectronics. 2014: 1550-1556.
|