Skip to main content

The Economic Consequences of Sharing Security Information

  • Chapter
Economics of Information Security

Part of the book series: Advances in Information Security ((ADIS,volume 12))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Anderson, Ross. (2001). Why Information Security is Hard: An Economic Perspective, Proceedings of 17th Annual Computer Security Applications Conference, Dec. 10–14.

    Google Scholar 

  • Bulow, J., J. Geanakoplos and P. Klemperer. (1985). Multimarket Oligopoly: Strategic Substitutes and Complements, The Journal of Political Economy, Vol 93, Issue 3,pp 488–511.

    Article  Google Scholar 

  • Campbell, K., L. Gordon, M. Loeb and L. Zhou. (2003). The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market forthcoming, Journal of Computer Security.

    Google Scholar 

  • d’Aspremont, C. and A. Jacquemin. (1988). Cooperative and Non-cooperative R&D in a Duopoly with Spillovers, American Economic Review, 78: 1133–1137.

    Google Scholar 

  • Fried, D. (1984). Incentives for Information Production and Disclosure in a Duopolistic Environment, The Quarterly Journal of Economics, Vol. 99, pp. 367–381.

    Google Scholar 

  • Gal-Or, E. (1985). Information Sharing in Oligopoly, Econometrica, Vol. 3, pp. 329–343.

    Google Scholar 

  • Gal-Or, E. (1986). First mover and second mover advantages, International Economic Review, 26(3) pp. 649653.

    Google Scholar 

  • Gordon, L.A. and M. P. Loeb. (2002). The Economics of Investment in Information Security, ACM Transactions on Information and System Security, Vol. 5,(4) November, pp. 438–457.

    Article  Google Scholar 

  • Gordon, L. A., M. P. Loeb, and W. Lucyshyn. (2003). Sharing Information on Computer Systems Security: An Economic Analysis, Journal of Accounting and Public Policy, Vol 22,(6).

    Google Scholar 

  • McGuire, Timothy M., Richard P. Staelin. (1983). An industry equilibrium analysis of downstream vertical integration, Marketing Science, Vol. 2, pp. 161 192.

    Google Scholar 

  • Milgrom, P. (1994). Comparing optima: Do simplifying assumptions affect conclusions?, Journal of Political Economy, 102(June), pp. 607 615.

    Google Scholar 

  • (NIPC) National Infrastructure Protection Center (2001). Information Sharing & Analysis Centers, May 15th.

    Google Scholar 

  • Schecter, Stuart E., and Michael D. Smith. (2003). How Much Security is Enough to Stop a Thief? The Economics of Outsider Theft via Computer Systems Networks, Proceedings of the Financial Cryptography Conference, Guadeloupe, January 27–30.

    Google Scholar 

  • Schenk, M. and M. Schenk. (2002). Defining the Value of Strategic Security, Secure Busines Quarterly, Vol. 1(1), pp 1–6.

    Google Scholar 

  • Shapiro, C. (1986). Exchange of Cost Information in Oligopoly, Review of Economic Studies, Vol. 53 (1986), pp. 433–446.

    MATH  MathSciNet  Google Scholar 

  • Varian, H. (2002). System Reliability and Free Riding, Proceedings of the First WEIS, UC Berkeley, May 16–17.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer Science + Business Media, Inc.

About this chapter

Cite this chapter

Gal-Or, E., Ghose, A. (2004). The Economic Consequences of Sharing Security Information. In: Camp, L.J., Lewis, S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8090-5_8

Download citation

  • DOI: https://doi.org/10.1007/1-4020-8090-5_8

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-8089-0

  • Online ISBN: 978-1-4020-8090-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics