Showing 1 - 7 of 7
Persistent link: https://www.econbiz.de/10011879355
Persistent link: https://www.econbiz.de/10011754562
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are...
Persistent link: https://www.econbiz.de/10011708862
Persistent link: https://www.econbiz.de/10012205375
This paper models the situation where the attacker’s resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker’s resource capabilities. An attacker targets one of two assets. The attacker’s resources and...
Persistent link: https://www.econbiz.de/10011131891
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers' attacks and the firms' defenses are inverse...
Persistent link: https://www.econbiz.de/10011852689
Persistent link: https://www.econbiz.de/10009788613