2005
DOI: 10.1287/isre.1050.0053
|View full text |Cite
|
Sign up to set email alerts
|

The Economic Incentives for Sharing Security Information

Abstract: Given that information technology (IT) security has emerged as an important issue in the last few years, the subject of security information sharing among firms, as a tool to minimize security breaches, has gained the interest of practitioners and academics. To promote the disclosure and sharing of cyber security information among firms, the U.S. federal government has encouraged the establishment of many industry-based Information Sharing and Analysis Centers (ISACs) under Presidential Decision Directive (PDD… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
143
0

Year Published

2005
2005
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 308 publications
(144 citation statements)
references
References 22 publications
1
143
0
Order By: Relevance
“…In their paper, they also provide an overview for developing economic models to study issues such as free-riding, which Varian (2002) has recognized as an important element in the information security space. Two other papers- Gordon et al (2003) and Gal-Or and Ghose (2003)-have followed up on this idea and developed game-theoretic models to study the economic consequences of sharing security information in ISACs. The focus of Gordon et al (2003) is on how information sharing affects the overall level of information security by examining the effect of security investment on expected security costs.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In their paper, they also provide an overview for developing economic models to study issues such as free-riding, which Varian (2002) has recognized as an important element in the information security space. Two other papers- Gordon et al (2003) and Gal-Or and Ghose (2003)-have followed up on this idea and developed game-theoretic models to study the economic consequences of sharing security information in ISACs. The focus of Gordon et al (2003) is on how information sharing affects the overall level of information security by examining the effect of security investment on expected security costs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The focus of Gordon et al (2003) is on how information sharing affects the overall level of information security by examining the effect of security investment on expected security costs. Gordon et al (2003) focus on the cost-side, and Gal-Or and Ghose (2003) focus on the demand side effects of security breaches and information sharing.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Previous relevant work includes in the literature on oligopolies, cooperative relationships, joint ventures, and trade associations (Gal-Or 1986, Kirby 1988, Novshek and Sonnenschein 1982, Shapiro 1986, Vives 1990). More recently, information sharing among firms to defend against cyber attacks has been analyzed by Gordon, Loeb and Lucyshyn (2003), Gal-Or and Ghose (2005), and Hausken (2007Hausken ( , 2009). The focus of is on how information sharing affects the overall level of information security.…”
Section: Introductionmentioning
confidence: 99%
“…They highlight the tradeoff that firms face between improved information security and the potential for free riding, which can lead to under-investment in security expenditures. While focus on the cost side effects of security breaches and information sharing, Gal-or and Ghose (2005) focus on the demand side effects and highlight the strategic implication of competition in the product market on information sharing and security technology investment levels. Hausken (2007) sharing and security investment for two firms are inverse U shaped in the aggregate attack, and interlinked through the interdependence between firms and the firm's unit cost of security investment.…”
Section: Introductionmentioning
confidence: 99%
“…Past work has, for example, considered the role of intermediaries such as Information Sharing & Analysis Centers to create incentives for exchanging and disclosing data between companies. Researchers investigated under which conditions organizations are willing to contribute to an information pool about security breaches and investments when (negative) competitive effects may result from this cooperation [9,12]. In different contexts disclosure is not always voluntary and companies may question how much profit they squander when undesirable information is released.…”
Section: Introductionmentioning
confidence: 99%