{"id":"https://openalex.org/W4289522718","doi":"https://doi.org/10.1080/01605682.2022.2096506","title":"Information security investment with budget constraint and security information sharing in resource-sharing environments","display_name":"Information security investment with budget constraint and security information sharing in resource-sharing environments","publication_year":2022,"publication_date":"2022-08-02","ids":{"openalex":"https://openalex.org/W4289522718","doi":"https://doi.org/10.1080/01605682.2022.2096506"},"language":"en","primary_location":{"id":"doi:10.1080/01605682.2022.2096506","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01605682.2022.2096506","pdf_url":null,"source":{"id":"https://openalex.org/S169988927","display_name":"Journal of the Operational Research Society","issn_l":"0160-5682","issn":["0160-5682","1476-9360"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319703","host_organization_name":"Palgrave Macmillan","host_organization_lineage":["https://openalex.org/P4310319703","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Palgrave Macmillan","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of the Operational Research Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070688951","display_name":"Xing Gao","orcid":"https://orcid.org/0000-0001-9944-3626"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xing Gao","raw_affiliation_strings":["School of Economics and Management, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Economics and Management, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048738365","display_name":"Manting Qiu","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Manting Qiu","raw_affiliation_strings":["School of Economics and Management, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Economics and Management, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100347095","display_name":"Ying Wang","orcid":"https://orcid.org/0000-0002-4541-9169"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Wang","raw_affiliation_strings":["School of Economics and Management, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Economics and Management, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5104085849","display_name":"Xifan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xifan Wang","raw_affiliation_strings":["School of Economics and Management, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Economics and Management, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5070688951"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":2.122,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.89730587,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"74","issue":"6","first_page":"1520","last_page":"1535"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.5810976624488831},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5593095421791077},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5485554337501526},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.5146823525428772},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5126339793205261},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.4569743871688843},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.43621790409088135},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4335366487503052},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4118134081363678},{"id":"https://openalex.org/keywords/shared-resource","display_name":"Shared resource","score":0.41155123710632324},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.383181631565094},{"id":"https://openalex.org/keywords/industrial-organization","display_name":"Industrial organization","score":0.35587677359580994},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3210316598415375},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.2977498173713684},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.08898976445198059}],"concepts":[{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.5810976624488831},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5593095421791077},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5485554337501526},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.5146823525428772},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5126339793205261},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.4569743871688843},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.43621790409088135},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4335366487503052},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4118134081363678},{"id":"https://openalex.org/C51332947","wikidata":"https://www.wikidata.org/wiki/Q1172305","display_name":"Shared resource","level":2,"score":0.41155123710632324},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.383181631565094},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.35587677359580994},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3210316598415375},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.2977498173713684},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.08898976445198059},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1080/01605682.2022.2096506","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01605682.2022.2096506","pdf_url":null,"source":{"id":"https://openalex.org/S169988927","display_name":"Journal of the Operational Research Society","issn_l":"0160-5682","issn":["0160-5682","1476-9360"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319703","host_organization_name":"Palgrave Macmillan","host_organization_lineage":["https://openalex.org/P4310319703","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Palgrave Macmillan","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of the Operational Research Society","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:taf:tjorxx:v:74:y:2023:i:6:p:1520-1535","is_oa":false,"landing_page_url":"http://hdl.handle.net/10.1080/01605682.2022.2096506","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W618475404","https://openalex.org/W1966684751","https://openalex.org/W1967820237","https://openalex.org/W1975358884","https://openalex.org/W1990600682","https://openalex.org/W2036883724","https://openalex.org/W2039133158","https://openalex.org/W2045006695","https://openalex.org/W2053924964","https://openalex.org/W2056075452","https://openalex.org/W2069192276","https://openalex.org/W2078175444","https://openalex.org/W2081135753","https://openalex.org/W2085585817","https://openalex.org/W2091860459","https://openalex.org/W2098376610","https://openalex.org/W2131951904","https://openalex.org/W2141961894","https://openalex.org/W2286305083","https://openalex.org/W2340507773","https://openalex.org/W2343984271","https://openalex.org/W2535610796","https://openalex.org/W2580728631","https://openalex.org/W2597751094","https://openalex.org/W2605381169","https://openalex.org/W3011497956","https://openalex.org/W3121840377","https://openalex.org/W3123442059","https://openalex.org/W3125210271","https://openalex.org/W3128027351","https://openalex.org/W3140039291","https://openalex.org/W4221016031"],"related_works":["https://openalex.org/W1953627998","https://openalex.org/W2103623742","https://openalex.org/W922973732","https://openalex.org/W2541923677","https://openalex.org/W2558115332","https://openalex.org/W2804473781","https://openalex.org/W2366471546","https://openalex.org/W2078202280","https://openalex.org/W2353403933","https://openalex.org/W2078706642"],"abstract_inverted_index":{"Nowadays,":[0],"business":[1],"connection":[2],"between":[3,43,69],"firms":[4,46,57,103,122],"becomes":[5],"rather":[6],"common":[7],"so":[8,132],"that":[9,91,113,133],"one":[10,48],"firm":[11],"stores":[12],"not":[13],"only":[14],"its":[15],"information":[16,24,29,67,116,128],"asset":[17],"but":[18,79],"also":[19],"some":[20],"of":[21,28,157],"other":[22],"firms\u2019":[23],"asset.":[25],"The":[26],"management":[27],"security":[30,62,66,77,115,127],"is":[31,118,130,150],"vital":[32],"for":[33],"these":[34],"resource-sharing":[35,45],"firms.":[36],"This":[37],"paper":[38],"constructs":[39],"a":[40,93,107],"game-theoretic":[41],"model":[42],"two":[44],"and":[47],"hacker":[49],"to":[50,85,152],"examine":[51],"their":[52,75],"strategic":[53],"interaction":[54],"when":[55,126],"the":[56,70,82,102,121,147,155],"face":[58],"budget":[59,95],"constraint":[60,96],"on":[61],"investment.":[63],"We":[64,89,138],"consider":[65],"sharing":[68,117,129],"firms,":[71],"which":[72,146],"can":[73,97],"improve":[74],"overall":[76],"effort":[78],"meantime":[80],"facilitate":[81],"hacker\u2019s":[83],"learning":[84],"reduce":[86],"attack":[87],"costs.":[88],"find":[90],"although":[92,114],"tight":[94],"help":[98],"save":[99],"investment":[100],"cost,":[101],"always":[104],"suffer":[105],"from":[106],"poorly":[108],"secure":[109],"environment.":[110],"It":[111],"shows":[112],"usually":[119],"encouraged,":[120],"may":[123],"be":[124],"hurt":[125],"excessive":[131],"fierce":[134],"cyber-attacks":[135],"are":[136],"induced.":[137],"finally":[139],"design":[140],"an":[141],"optimal":[142],"compensation":[143,148],"mechanism,":[144],"in":[145],"fund":[149],"shown":[151],"increase":[153],"with":[154],"degree":[156],"resource":[158],"sharing.":[159]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
