Ghose, Anindya; Hausken, Kjell - 2014
security to defend against cyber attacks by hackers. Hackers choose an optimal attack, and they share information with each … other about the firm's vulnerabilities. Each hacker prefers to receive information, but delivering gives competitive … advantage to the other hacker. We find that each hacker's attack and information sharing are strategic complements while one …