{"id":"https://openalex.org/W4376104809","doi":"https://doi.org/10.1080/01605682.2023.2210594","title":"Information sharing and security investment for substitutable firms: A game-theoretic analysis","display_name":"Information sharing and security investment for substitutable firms: A game-theoretic analysis","publication_year":2023,"publication_date":"2023-05-10","ids":{"openalex":"https://openalex.org/W4376104809","doi":"https://doi.org/10.1080/01605682.2023.2210594"},"language":"en","primary_location":{"id":"doi:10.1080/01605682.2023.2210594","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01605682.2023.2210594","pdf_url":null,"source":{"id":"https://openalex.org/S169988927","display_name":"Journal of the Operational Research Society","issn_l":"0160-5682","issn":["0160-5682","1476-9360"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319703","host_organization_name":"Palgrave Macmillan","host_organization_lineage":["https://openalex.org/P4310319703","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Palgrave Macmillan","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of the Operational Research Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070688951","display_name":"Xing Gao","orcid":"https://orcid.org/0000-0001-9944-3626"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xing Gao","raw_affiliation_strings":["Southeast University, Nanjing City, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, Nanjing City, Jiangsu Province, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030280999","display_name":"Siyu Gong","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siyu Gong","raw_affiliation_strings":["Southeast University, Nanjing City, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, Nanjing City, Jiangsu Province, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091917304","display_name":"Ying Wang","orcid":"https://orcid.org/0000-0003-0618-5328"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Wang","raw_affiliation_strings":["Southeast University, Nanjing City, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, Nanjing City, Jiangsu Province, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100749853","display_name":"Yanfang Zhang","orcid":"https://orcid.org/0000-0003-0119-7741"},"institutions":[{"id":"https://openalex.org/I137056471","display_name":"Nanjing University of Finance and Economics","ror":"https://ror.org/031y8am81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137056471"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanfang Zhang","raw_affiliation_strings":["Nanjing University of Finance &amp; Economics, Nanjing City, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Finance &amp; Economics, Nanjing City, Jiangsu Province, China","institution_ids":["https://openalex.org/I137056471"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100749853"],"corresponding_institution_ids":["https://openalex.org/I137056471"],"apc_list":null,"apc_paid":null,"fwci":3.2122,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.92714586,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"75","issue":"4","first_page":"799","last_page":"820"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.8233247995376587},{"id":"https://openalex.org/keywords/investment","display_name":"Investment (military)","score":0.5332697629928589},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.501854419708252},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5015521049499512},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.4929220676422119},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.4790709912776947},{"id":"https://openalex.org/keywords/industrial-organization","display_name":"Industrial organization","score":0.4495842456817627},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.40509361028671265},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3651009202003479},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2522898018360138}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.8233247995376587},{"id":"https://openalex.org/C27548731","wikidata":"https://www.wikidata.org/wiki/Q88272","display_name":"Investment (military)","level":3,"score":0.5332697629928589},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.501854419708252},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5015521049499512},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.4929220676422119},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.4790709912776947},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.4495842456817627},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.40509361028671265},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3651009202003479},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2522898018360138},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1080/01605682.2023.2210594","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01605682.2023.2210594","pdf_url":null,"source":{"id":"https://openalex.org/S169988927","display_name":"Journal of the Operational Research Society","issn_l":"0160-5682","issn":["0160-5682","1476-9360"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319703","host_organization_name":"Palgrave Macmillan","host_organization_lineage":["https://openalex.org/P4310319703","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Palgrave Macmillan","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of the Operational Research Society","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:taf:tjorxx:v:75:y:2024:i:4:p:799-820","is_oa":false,"landing_page_url":"http://hdl.handle.net/10.1080/01605682.2023.2210594","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W73648504","https://openalex.org/W618475404","https://openalex.org/W1593741082","https://openalex.org/W1979074206","https://openalex.org/W1990600682","https://openalex.org/W2013232145","https://openalex.org/W2028833175","https://openalex.org/W2039133158","https://openalex.org/W2041149981","https://openalex.org/W2045006695","https://openalex.org/W2047736339","https://openalex.org/W2055847123","https://openalex.org/W2056075452","https://openalex.org/W2069192276","https://openalex.org/W2075988797","https://openalex.org/W2078175444","https://openalex.org/W2081135753","https://openalex.org/W2086238455","https://openalex.org/W2111962383","https://openalex.org/W2141961894","https://openalex.org/W2248217515","https://openalex.org/W2288890063","https://openalex.org/W2340507773","https://openalex.org/W2535610796","https://openalex.org/W2595223733","https://openalex.org/W2619152032","https://openalex.org/W2728007126","https://openalex.org/W2800085194","https://openalex.org/W2907277971","https://openalex.org/W2996124252","https://openalex.org/W3011497956","https://openalex.org/W3115362282","https://openalex.org/W3121840377","https://openalex.org/W3122267592","https://openalex.org/W3123442059","https://openalex.org/W3125210271","https://openalex.org/W3128027351","https://openalex.org/W3154210923","https://openalex.org/W3184806186","https://openalex.org/W3206777315","https://openalex.org/W3214445149","https://openalex.org/W4205288660","https://openalex.org/W4206365219","https://openalex.org/W4221016031","https://openalex.org/W4225654215","https://openalex.org/W4236841844","https://openalex.org/W4281616937","https://openalex.org/W4285298659","https://openalex.org/W4295763194","https://openalex.org/W4308198969"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W1982580243","https://openalex.org/W2183730421","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W4286284259","https://openalex.org/W1507118973","https://openalex.org/W2004781009"],"abstract_inverted_index":{"There":[0],"are":[1],"several":[2],"types":[3],"of":[4,9,22,49,154,172,183,198],"relations":[5],"between":[6,58],"information":[7,47,121],"assets":[8],"two":[10,50],"firms,":[11],"among":[12],"which":[13],"substitutable":[14,51],"relation":[15],"is":[16,25],"such":[17],"that":[18],"even":[19],"when":[20,112,143],"one":[21,29,62,98],"the":[23,37,66,71,82,85,93,109,127,138,155,169,178,185],"firms":[24,32,52,60,139],"successfully":[26],"breached":[27],"by":[28],"hacker,":[30],"both":[31],"would":[33,88],"incur":[34],"loss":[35,145],"and":[36,46,61,122],"hacker":[38,83,87,179],"gets":[39],"benefit.":[40],"This":[41],"paper":[42],"examines":[43],"security":[44,76,124,144,187,196],"investment":[45,77,106,125],"sharing":[48],"through":[53],"constructing":[54],"a":[55,132],"game-theoretic":[56],"model":[57],"these":[59],"hacker.":[63],"We":[64],"derive":[65],"following":[67],"interesting":[68],"results:":[69],"(a)":[70],"firm":[72],"with":[73,103,168],"more":[74,119,142],"efficient":[75,95],"suffers":[78],"weaker":[79],"cyber-attack":[80],"from":[81,126],"because":[84,153],"rational":[86],"switch":[89],"its":[90,104],"emphasis":[91],"to":[92,118,140,195],"less":[94],"firm;":[96,129],"(b)":[97],"firm\u2019s":[99,163],"aggregate":[100,164],"defense":[101,165],"increases":[102,149,167],"unit":[105,170],"cost":[107,114,171],"for":[108],"positive":[110],"interdependence":[111],"this":[113],"remains":[115,146],"high":[116],"due":[117],"shared":[120],"enhanced":[123],"other":[128],"(c)":[130],"although":[131],"widely-used":[133],"compensation":[134],"mechanism":[135],"can":[136],"urge":[137],"invest":[141],"low,":[147],"it":[148],"their":[150],"expected":[151],"costs":[152],"excess":[156],"investment;":[157],"(d)":[158],"unlike":[159],"simultaneous":[160],"game,":[161],"each":[162],"always":[166],"cyber-attacks":[173],"under":[174],"sequential":[175],"game":[176],"since":[177],"has":[180],"an":[181],"advantage":[182],"learning":[184],"firms\u2019":[186],"decisions.":[188],"These":[189],"results":[190],"give":[191],"fresh":[192],"managerial":[193],"guidelines":[194],"experts":[197],"firms.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
