Market Impact on IT Security Spending

ABSTRACT Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing these decisions. We utilize the notions of direct‐ and cross‐risk elasticity to describe the...

Full description

Saved in:
Bibliographic Details
Published inDecision sciences Vol. 44; no. 3; pp. 517 - 556
Main Authors Kolfal, Bora, Patterson, Raymond A., Yeo, M. Lisa
Format Journal Article
LanguageEnglish
Published Atlanta Blackwell Publishing Ltd 01.06.2013
American Institute for Decision Sciences
Subjects
Online AccessGet full text

Cover

Loading…
Abstract ABSTRACT Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing these decisions. We utilize the notions of direct‐ and cross‐risk elasticity to describe the customer response to adverse IT security events in the firm and competitor, respectively, thus allowing us to analyze optimal security investment decisions. Examining both symmetric and asymmetric duopoly cases using a continuous‐time Markov chain (CTMC) model, we demonstrate that optimal IT security spending, expected firm profits and willingness of firms to cooperate on security improvements are highly dependent on the nature of customer response to adverse events. We also examine the investment problem when security attacks on different firms are correlated.
AbstractList ABSTRACT Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing these decisions. We utilize the notions of direct‐ and cross‐risk elasticity to describe the customer response to adverse IT security events in the firm and competitor, respectively, thus allowing us to analyze optimal security investment decisions. Examining both symmetric and asymmetric duopoly cases using a continuous‐time Markov chain (CTMC) model, we demonstrate that optimal IT security spending, expected firm profits and willingness of firms to cooperate on security improvements are highly dependent on the nature of customer response to adverse events. We also examine the investment problem when security attacks on different firms are correlated.
Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing these decisions. We utilize the notions of direct- and cross-risk elasticity to describe the customer response to adverse IT security events in the firm and competitor, respectively, thus allowing us to analyze optimal security investment decisions. Examining both symmetric and asymmetric duopoly cases using a continuous-time Markov chain (CTMC) model, we demonstrate that optimal IT security spending, expected firm profits and willingness of firms to cooperate on security improvements are highly dependent on the nature of customer response to adverse events. We also examine the investment problem when security attacks on different firms are correlated.
Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing these decisions. We utilize the notions of direct- and cross-risk elasticity to describe the customer response to adverse IT security events in the firm and competitor, respectively, thus allowing us to analyze optimal security investment decisions. Examining both symmetric and asymmetric duopoly cases using a continuous-time Markov chain (CTMC) model, we demonstrate that optimal IT security spending, expected firm profits and willingness of firms to cooperate on security improvements are highly dependent on the nature of customer response to adverse events. We also examine the investment problem when security attacks on different firms are correlated. [PUBLICATION ABSTRACT]
Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing these decisions. We utilize the notions of direct- and cross-risk elasticity to describe the customer response to adverse IT security events in the firm and competitor, respectively, thus allowing us to analyze optimal security investment decisions. Examining both symmetric and asymmetric duopoly cases using a continuous-time Markov chain (CTMC) model, we demonstrate that optimal IT security spending, expected firm profits and willingness of firms to cooperate on security improvements are highly dependent on the nature of customer response to adverse events. We also examine the investment problem when security attacks on different firms are correlated. Reprinted by permission of Blackwell Publishing
Author Yeo, M. Lisa
Kolfal, Bora
Patterson, Raymond A.
Author_xml – sequence: 1
  givenname: Bora
  surname: Kolfal
  fullname: Kolfal, Bora
  email: bkolfal@ualberta.ca
  organization: Department of Accounting, Operations and Information Systems, University of Alberta, AB, T6G 2R6, Edmonton
– sequence: 2
  givenname: Raymond A.
  surname: Patterson
  fullname: Patterson, Raymond A.
  email: ray.patterson@ualberta.ca
  organization: Department of Accounting, Operations and Information Systems, University of Alberta, AB, T6G 2R6, Edmonton
– sequence: 3
  givenname: M. Lisa
  surname: Yeo
  fullname: Yeo, M. Lisa
  email: mlyeo@loyola.edu
  organization: Department of Information Systems and Operations Management, The Sellinger School of Business and Management, Loyola University Maryland, MD, 21210, Baltimore
BookMark eNqFkMFOwkAQhjcGExG9-ARNjIkxKc50u7vdo0HAJlUPYDhuljI1xdJit0R5e4uoBw86l5nD909mvmPWKauSGDtD6GNb1wtK8z4GEPAD1kURgi80ig7rAiD6iqM4YsfOLQFAipB32cW9rV-o8eLV2qaNV5VePPUmlG7qvNl6kzWVi7x8PmGHmS0cnX71HnsaDaeDOz95HMeDm8RPQ6G5TzYjDllEADbSaIXQei4zITJLkls9R8FJBhDxLIjkvD1CLLRqZyUh1Rp4j13u967r6nVDrjGr3KVUFLakauMMCpBcBqjU_2iIESIPdNii57_QZbWpy_YRg1wFKuKAvKWu9lRaV87VlJl1na9svTUIZifX7OSaT7ktjHv4LS9o-wdpboeD-Dvj7zO5a-j9J9P6N1JxJczsYWyms2Q0GoeJSfgH3xGIdQ
CODEN DESCDQ
CitedBy_id crossref_primary_10_1016_j_ijpe_2016_09_018
crossref_primary_10_1080_0740817X_2015_1125044
crossref_primary_10_1016_j_ejor_2019_09_017
crossref_primary_10_1016_j_eswa_2015_03_033
crossref_primary_10_1111_risa_14186
crossref_primary_10_1111_poms_12681
crossref_primary_10_1002_mde_3560
crossref_primary_10_1145_3505227
crossref_primary_10_1007_s10799_015_0253_1
crossref_primary_10_1016_j_ejor_2015_05_049
crossref_primary_10_1016_j_eswa_2021_114990
Cites_doi 10.1287/mnsc.1070.0794
10.3386/w15183
10.1057/crr.2008.6
10.1007/978-1-4419-6967-5_15
10.1023/A:1024119208153
10.1287/isre.1050.0053
10.1145/581271.581274
10.1016/j.jaccpubpol.2003.09.001
10.2753/MIS0742-1222240110
10.1108/00070700510586498
10.1007/1-4020-8090-5_1
ContentType Journal Article
Copyright 2013 The Authors Decision Sciences Journal © 2013 Decision Sciences Institute
Copyright American Institute for Decision Sciences Jun 2013
Copyright_xml – notice: 2013 The Authors Decision Sciences Journal © 2013 Decision Sciences Institute
– notice: Copyright American Institute for Decision Sciences Jun 2013
DBID BSCLL
AAYXX
CITATION
7SC
7TB
8BJ
8FD
FQK
FR3
JBE
JQ2
L7M
L~C
L~D
DOI 10.1111/deci.12023
DatabaseName Istex
CrossRef
Computer and Information Systems Abstracts
Mechanical & Transportation Engineering Abstracts
International Bibliography of the Social Sciences (IBSS)
Technology Research Database
International Bibliography of the Social Sciences
Engineering Research Database
International Bibliography of the Social Sciences
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
International Bibliography of the Social Sciences (IBSS)
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef
Technology Research Database
International Bibliography of the Social Sciences (IBSS)

International Bibliography of the Social Sciences (IBSS)
DeliveryMethod fulltext_linktorsrc
Discipline Business
EISSN 1540-5915
EndPage 556
ExternalDocumentID 3009251711
10_1111_deci_12023
DECI12023
ark_67375_WNG_TWLFFG4L_L
Genre article
Feature
GroupedDBID -~X
.-4
.3N
.GA
.Y3
05W
0R~
10A
1OB
1OC
1OL
29F
31~
33P
3V.
4.4
41~
50Y
50Z
51W
51Y
52M
52O
52Q
52S
52T
52U
52W
5GY
5HH
5LA
5VS
66C
6P2
702
7PT
7WY
8-0
8-1
8-3
8-4
8-5
85S
88I
8AF
8FE
8FG
8FL
8R4
8R5
8UM
8VB
930
96U
9M8
A04
AABNI
AAESR
AAHHS
AAONW
AAOUF
AASGY
AAXRX
AAYJJ
AAZKR
ABCQN
ABCUV
ABDPE
ABIVO
ABJCF
ABJNI
ABPPZ
ABPVW
ABSOO
ABTAH
ABUWG
ACAHQ
ACBKW
ACBWZ
ACCFJ
ACCZN
ACGFO
ACGFS
ACGOD
ACHQT
ACIWK
ACNCT
ACPOU
ACSCC
ACXQS
ADBBV
ADEMA
ADEOM
ADIZJ
ADKYN
ADMGS
ADXAS
ADZMN
ADZOD
AEEZP
AEGXH
AEIGN
AEIMD
AEMOZ
AEQDE
AEUQT
AEUYR
AFAZI
AFBPY
AFEBI
AFFNX
AFFPM
AFGKR
AFKFF
AFKRA
AFPWT
AFZJQ
AHBTC
AHEFC
AI.
AIAGR
AIFKG
AIURR
AIWBW
AJBDE
AKVCP
ALAGY
ALEEW
ALMA_UNASSIGNED_HOLDINGS
ALUQN
AMBMR
AMYDB
ASPBG
ASTYK
AVWKF
AZBYB
AZFZN
AZQEC
AZVAB
BAFTC
BDRZF
BENPR
BEZIV
BFHJK
BGLVJ
BKOMP
BMKGK
BMXJE
BNVMJ
BPHCQ
BQESF
BROTX
BRXPI
BSCLL
BY8
C1A
CAG
CCPQU
COF
CS3
D-C
D-D
DC6
DCZOG
DPXWK
DR2
DRFUL
DRSSH
DU5
DWQXO
E3Z
EBA
EBO
EBR
EBS
EBU
EJD
EMK
F00
F01
FEDTE
FRNLG
FZ0
G-S
G.N
G50
GNUQQ
GODZA
GROUPED_ABI_INFORM_COMPLETE
GROUPED_ABI_INFORM_RESEARCH
HCIFZ
HF~
HGLYW
HVGLF
HZI
HZ~
H~9
IHE
IX1
J0M
K1G
K48
K60
K6~
L6V
LATKE
LC2
LC4
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LW6
LYRES
M0C
M2P
M2Q
M7S
MEWTI
MK4
MRFUL
MRSSH
MSFUL
MSSSH
MXFUL
MXSSH
N04
N06
N9A
NEJ
NF~
O66
O9-
OHT
OIG
P2P
P2W
P2Y
P4C
PALCI
PQBIZ
PQBZA
PQQKQ
PROAC
PSYQQ
PTHSS
Q.N
Q11
Q2X
QB0
QWB
R.K
RIWAO
RJQFR
ROL
RWL
RX1
RXW
S0X
SAMSI
SUPJJ
TAE
TH9
TN5
U5U
UB1
UCJ
UKR
UPT
V8K
VH1
VQA
W8V
W99
WBKPD
WEBCB
WH7
WIH
WII
WOHZO
WQZ
WRC
WSUWO
WXSBR
XG1
XSW
YQJ
ZCA
ZL0
ZY4
ZZTAW
~IA
~WP
G8K
AAYXX
CITATION
7SC
7TB
8BJ
8FD
FQK
FR3
JBE
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c4593-eafe30f8e00a891a5599b6f55fae63a9b153e62083f286b0005d97f28760c9903
IEDL.DBID DR2
ISSN 0011-7315
IngestDate Fri Aug 16 08:01:01 EDT 2024
Sat Aug 17 00:27:26 EDT 2024
Thu Oct 10 17:38:04 EDT 2024
Fri Aug 23 10:51:37 EDT 2024
Sat Aug 24 01:14:07 EDT 2024
Wed Oct 30 09:53:10 EDT 2024
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c4593-eafe30f8e00a891a5599b6f55fae63a9b153e62083f286b0005d97f28760c9903
Notes ArticleID:DECI12023
The authors would like to thank the research workshop participants at the University of Calgary, University of Alberta and University of California Riverside, as well as the reviewers and associate editor for their insightful comments on this article.
ark:/67375/WNG-TWLFFG4L-L
istex:29A9847EE4399B09EC8ED451374D497611D9B778
ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
PQID 1372783013
PQPubID 37118
PageCount 40
ParticipantIDs proquest_miscellaneous_1506362177
proquest_miscellaneous_1418113294
proquest_journals_1372783013
crossref_primary_10_1111_deci_12023
wiley_primary_10_1111_deci_12023_DECI12023
istex_primary_ark_67375_WNG_TWLFFG4L_L
PublicationCentury 2000
PublicationDate 2013-06
June 2013
2013-06-00
20130601
PublicationDateYYYYMMDD 2013-06-01
PublicationDate_xml – month: 06
  year: 2013
  text: 2013-06
PublicationDecade 2010
PublicationPlace Atlanta
PublicationPlace_xml – name: Atlanta
PublicationTitle Decision sciences
PublicationTitleAlternate Decision Sciences
PublicationYear 2013
Publisher Blackwell Publishing Ltd
American Institute for Decision Sciences
Publisher_xml – name: Blackwell Publishing Ltd
– name: American Institute for Decision Sciences
References Gal-Or, E. & Ghose, A. (2005). The economic incentives for sharing security information. Information Systems Research, 16(2), 186-208.
Kunreuther, H., & Heal, G. (2003). Interdependent security. Journal of Risk and Uncertainty, 26(2), 231-249.
Duh, R.-R., Sunder, S., & Jamal, K. (2002). Control and assurance in e-Commerce: Privacy, integrity, and security at eBay. Taiwan Accounting Review, 3(1), 1-27.
Yu, T., & Lester, R. H. (2008). Moving beyond firm boundaries: A social network perspective on reputation spillover. Corporate Reputation Review, 11(1), 94-108.
Cavusoglu, H., Cavusoglu, H., & Zhang, J. (2008). Security patch management: Share the burden or share the damage? Management Science, 54(4), 657-670.
Gordon, L. A., Loeb, M. P., & Lucyshyn, W. (2003). Sharing information on computer systems security: An economic analysis. Journal of Accounting and Public Policy, 22(6), 461-485.
HIPAA. (1996). Health Insurance Portability and Accountability Act of 1996. PUBLIC LAW 104-191 (US).
Acohido, B. (2009). Cybercrooks stalk small businesses that bank online. USA Today, accessed February 7, 2013, available at http://usatoday30.usatoday.com/tech/news/computersecurity/2009-12-30-cybercrime-small-business-online-banking_N.htm.
Conz, N. (2008). Selling security-Innovative carriers are nurturing a new kind of customer loyalty by establishing themselves as IT security stalwarts. Insurance and Technology, 33(3), 31.
Yue, W., & Çakanyildirim, M. (2007). Intrusion prevention in information systems: Reactive and proactive responses. Journal of Management Information Systems, 24(1), 329-353.
Gordon, L. A. & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security, 5(4), 438-457.
Allan, A., & Warden, P. (2011). Got an iPhone or 3G iPad? Apple is recording your moves. O'Reilly Radar, accessed February 7, 2013, available at http://radar.oreilly.com/2011/04/apple-location-tracking.html.
Freedman, S., Kearney, M. S., & Lederman, M. (2009). Product recalls, imperfect information, and spillover effects: Lessons from the consumer response to the 2007 toy recalls. NBER Working Paper No. 15183.
Smed, S., & Jensen, J. (2005). Food safety information and food demand. British Food Journal, 107(3), 173-186.
2012
2011
2010
2002; 5
2009
1998
2008
2002; 3
1996
2007
2011b
2011a
2008; 54
2008; 33
2004
2008; 11
2002
2011; 7
2009b
2009a
2005; 107
2003; 26
2013
2005; 16
2007; 24
2003; 22
Duh R.‐R (e_1_2_6_14_1) 2002; 3
e_1_2_6_32_1
e_1_2_6_31_1
Allan A. (e_1_2_6_3_1) 2011; 7
e_1_2_6_30_1
Conz N (e_1_2_6_10_1) 2008; 33
e_1_2_6_19_1
Krebs B (e_1_2_6_22_1) 2009
e_1_2_6_13_1
e_1_2_6_11_1
e_1_2_6_12_1
e_1_2_6_17_1
e_1_2_6_18_1
e_1_2_6_15_1
e_1_2_6_16_1
e_1_2_6_21_1
e_1_2_6_20_1
e_1_2_6_9_1
e_1_2_6_8_1
e_1_2_6_5_1
e_1_2_6_4_1
e_1_2_6_6_1
e_1_2_6_25_1
e_1_2_6_24_1
e_1_2_6_23_1
Acohido B (e_1_2_6_2_1) 2009
e_1_2_6_29_1
e_1_2_6_28_1
e_1_2_6_27_1
Burke R. J (e_1_2_6_7_1) 2011
e_1_2_6_26_1
References_xml – year: 2008
  article-title: Maple Leaf Foods plant reopens after listeriosis outbreak
– year: 2009
  article-title: Cybercrooks stalk small businesses that bank online
  publication-title: USA Today
– year: 1996
  article-title: Health Insurance Portability and Accountability Act of 1996
  publication-title: PUBLIC LAW 104‐191
– start-page: 31
  year: 2011
  end-page: 42
– volume: 54
  start-page: 657
  issue: 4
  year: 2008
  end-page: 670
  article-title: Security patch management: Share the burden or share the damage?
  publication-title: Management Science
– year: 2007
  article-title: Data breaches and buyer behavior: Unfolding TJX Press release
– year: 2011b
  article-title: Sony suffers second data breach with theft of 25m more user details
– volume: 33
  start-page: 31
  issue: 3
  year: 2008
  article-title: Selling security—Innovative carriers are nurturing a new kind of customer loyalty by establishing themselves as IT security stalwarts
  publication-title: Insurance and Technology
– year: 1998
  article-title: Data Protection Act 1998
– year: 2013
  article-title: PCI SSC Data Security Standards Overview
– volume: 7
  start-page: 2013
  year: 2011
  article-title: Got an iPhone or 3G iPad? Apple is recording your moves
  publication-title: Reilly Radar, accessed February
– start-page: 301
  year: 2010
  end-page: 320
– start-page: 1
  year: 2004
  end-page: 15
– volume: 11
  start-page: 94
  issue: 1
  year: 2008
  end-page: 108
  article-title: Moving beyond firm boundaries: A social network perspective on reputation spillover
  publication-title: Corporate Reputation Review
– year: 2011
  article-title: 2010 annual study: U
– volume: 16
  start-page: 186
  issue: 2
  year: 2005
  end-page: 208
  article-title: The economic incentives for sharing security information
  publication-title: Information Systems Research
– year: 2011
  article-title: Pending cyber security bills 03‐19‐11
– volume: 107
  start-page: 173
  issue: 3
  year: 2005
  end-page: 186
  publication-title: British Food Journal
– year: 2011
  article-title: Massive breach at Epsilon compromises customer lists of major brands
– year: 2009b
  article-title: The growing threat to business banking online
– volume: 5
  start-page: 438
  issue: 4
  year: 2002
  end-page: 457
  article-title: The economics of information security investment
  publication-title: ACM Transactions on Information and System Security
– volume: 24
  start-page: 329
  issue: 1
  year: 2007
  end-page: 353
  article-title: Intrusion prevention in information systems: Reactive and proactive responses
  publication-title: Journal of Management Information Systems
– volume: 3
  start-page: 1
  issue: 1
  year: 2002
  end-page: 27
  article-title: Control and assurance in e‐Commerce: Privacy, integrity, and security at eBay
  publication-title: Taiwan Accounting Review
– year: 2012
  article-title: ISO 27001 & Information Security
– volume: 26
  start-page: 231
  issue: 2
  year: 2003
  end-page: 249
  article-title: Interdependent security
  publication-title: Journal of Risk and Uncertainty
– year: 2011
  article-title: Sony PlayStation suffers massive data breach
– year: 2009a
– year: 2011a
  article-title: iPhone keeps record of everywhere you go
– start-page: 15183
  year: 2009
– volume: 22
  start-page: 461
  issue: 6
  year: 2003
  end-page: 485
  article-title: Sharing information on computer systems security: An economic analysis
  publication-title: Journal of Accounting and Public Policy
– year: 2002
  article-title: California Senate Bill: Personal information: privacy
– ident: e_1_2_6_8_1
  doi: 10.1287/mnsc.1070.0794
– ident: e_1_2_6_20_1
– ident: e_1_2_6_23_1
– ident: e_1_2_6_26_1
– volume: 7
  start-page: 2013
  year: 2011
  ident: e_1_2_6_3_1
  article-title: Got an iPhone or 3G iPad? Apple is recording your moves
  publication-title: Reilly Radar, accessed February
  contributor:
    fullname: Allan A.
– start-page: 31
  volume-title: Corporate reputation: Managing opportunities & threats
  year: 2011
  ident: e_1_2_6_7_1
  contributor:
    fullname: Burke R. J
– ident: e_1_2_6_15_1
  doi: 10.3386/w15183
– volume-title: Washington Post
  year: 2009
  ident: e_1_2_6_22_1
  contributor:
    fullname: Krebs B
– ident: e_1_2_6_31_1
  doi: 10.1057/crr.2008.6
– ident: e_1_2_6_9_1
  doi: 10.1007/978-1-4419-6967-5_15
– ident: e_1_2_6_11_1
– ident: e_1_2_6_28_1
– ident: e_1_2_6_4_1
– ident: e_1_2_6_25_1
– ident: e_1_2_6_24_1
  doi: 10.1023/A:1024119208153
– ident: e_1_2_6_19_1
– year: 2009
  ident: e_1_2_6_2_1
  article-title: Cybercrooks stalk small businesses that bank online
  publication-title: USA Today
  contributor:
    fullname: Acohido B
– ident: e_1_2_6_5_1
– ident: e_1_2_6_16_1
  doi: 10.1287/isre.1050.0053
– ident: e_1_2_6_27_1
– ident: e_1_2_6_17_1
  doi: 10.1145/581271.581274
– ident: e_1_2_6_13_1
– ident: e_1_2_6_21_1
– ident: e_1_2_6_18_1
  doi: 10.1016/j.jaccpubpol.2003.09.001
– ident: e_1_2_6_6_1
– ident: e_1_2_6_32_1
  doi: 10.2753/MIS0742-1222240110
– volume: 33
  start-page: 31
  issue: 3
  year: 2008
  ident: e_1_2_6_10_1
  article-title: Selling security—Innovative carriers are nurturing a new kind of customer loyalty by establishing themselves as IT security stalwarts
  publication-title: Insurance and Technology
  contributor:
    fullname: Conz N
– ident: e_1_2_6_12_1
– volume: 3
  start-page: 1
  issue: 1
  year: 2002
  ident: e_1_2_6_14_1
  article-title: Control and assurance in e‐Commerce: Privacy, integrity, and security at eBay
  publication-title: Taiwan Accounting Review
  contributor:
    fullname: Duh R.‐R
– ident: e_1_2_6_29_1
  doi: 10.1108/00070700510586498
– ident: e_1_2_6_30_1
  doi: 10.1007/1-4020-8090-5_1
SSID ssj0006543
Score 2.158069
Snippet ABSTRACT Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely...
Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a...
SourceID proquest
crossref
wiley
istex
SourceType Aggregation Database
Publisher
StartPage 517
SubjectTerms Asymmetry
Capital investments
Continuous-Time Markov Chain
Decision analysis
Direct and Cross-Risk Elasticity of Demand
Duopoly
Economic behaviour
Elasticity
Information technology
Investment decision
IT Security
Markovian processes
Regulation
Security
Security management
Studies
Title Market Impact on IT Security Spending
URI https://api.istex.fr/ark:/67375/WNG-TWLFFG4L-L/fulltext.pdf
https://onlinelibrary.wiley.com/doi/abs/10.1111%2Fdeci.12023
https://www.proquest.com/docview/1372783013
https://search.proquest.com/docview/1418113294
https://search.proquest.com/docview/1506362177
Volume 44
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3da9swED9KB2Uv29p1zF1WXLr2YaBgWR-OYS-jTdqUJA9NQvsyhORIUArOWBIY--t3ku007UOhfRP4BDqd7u4n6z4AvqWUiSJPHWEzIwl3QhKTdgzx6LzglhZO-xfd4UheTvnVrbjdgh9NLkxVH2L9w81rRrDXXsG1WWwo-cwWd23qu3-jAaYs8_Fc59cPtaN80mRlhinJGBV1bVIfxvMw9ZE3euM39u8jqLkJWIPH6b2HX81aq0CT-_ZqadrFvydlHF_LzAd4V0PR-Gd1dnZhy5Z7sNNEwn-Ek2HIiI77IZEynpdxfxKP63538dg3z0W_tw_TXndydknqrgqk4CJnxGpnWeI6Nkl0J6falxwz0gnhtJVM5wZtoJUpQjOXdmQAdbM8w3EmkwJ9F_sE2-W8tJ8hFpq6xHCXSpZwJ502WTqzrMgMRxxieATHze6q31XxDNVcOjzHKnAcwWnY-DUJMufDzTKhbkYXanIz6PUu-EANImg1klG1pi0USt43C0EkG8HR-jPqiH_40KWdr5CGI47Ba3fOn6ERCNYkXtCyCL4HUT2zZHXePeuH0cFLiL_A27TqpkES2oLt5Z-V_YqYZmkOw9n9Dy8q7cI
link.rule.ids 315,783,787,1378,27936,27937,46306,46730
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LaxsxEB7SBNpe2vQRus1rQx-Hgsxq9VjvsSRx7Mb2oXFIbkJaS1AK69LYUPrrM6NdO49DILkJdgQ7kkbzSZqZD-BzzoWqyjwwMXWayaA0c3nXMULnlfS8CpZedEdj3T-XPy7VZRubQ7kwTX2I1YUbWUbcr8nA6UL6lpVPffWrw4n--xlsoL0LYm44-nlTPYrSJpuNmLNCcNVWJ6VAnpu-d_zRBg3tvztg8zZkjT6n97ohVr2KpQop1OR3ZzF3ner_vUKOT1ZnE161aDT93iyfN7Dm67fwfBkM_w6-jGJSdDqIuZTprE4Hk_SspbxLz4g_F13fezjvHU8O-6wlVmCVVKVg3gYvstD1WWa7JbdUdczpoFSwXgtbOtwGvc4RnYW8qyOum5YFtgudVei-xBas17Paf4BUWR4yJ0OuRSaDDtYV-dSLqnASoYiTCXxaDq_509TPMMtzB2lsosYJfI0jvxJB5SjirFDmYnxiJhfDXu9EDs0wgZ3l1JjW2K4MFwXxhSCYTeBg9RnNhN4-bO1nC5SRCGXw5F3KB2QU4jWNZ7QigW9xrh74ZXN0fDiIrY-PEd6HF_3JCDUZjE-34WXekGuwjO_A-vzvwu8ixJm7vbiQrwEPqvHa
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dSxwxEB-sgvSlta2la9VuaetDIcdm87G34Iuoq9eeR6kn-iIh2U1AhL3D3kHxr3eS3T0_HoT2LbATyEwyM79s5gPga0qZKPPUEVYZSbgTkpi0b4hH5yW3tHTav-iejOTxGf9xIS6WYLfLhWnqQyx-uHnNCPbaK_i0cg-UvLLlVY_67t8vYIVLhL4eEv2-Lx7lsyYbO0xJxqhoi5P6OJ77uY_c0YqX7N9HWPMhYg0up3gNl91im0iT6958Znrl7ZM6jv_LzRq8arFovNccnjewZOu3sNqFwr-DbychJToehEzKeFLHg3F82ja8i09991x0fOtwVhyO949J21aBlFzkjFjtLEtc3yaJ7udU-5pjRjohnLaS6dygEbQyRWzm0r4MqK7KMxxnMinRebH3sFxPavsBYqGpSwx3KYqfO-m0ydLKsjIzHIGI4RF86aSrpk31DNXdOjzHKnAcwU4Q_IIEmfPxZplQ56MjNT4fFsURH6phBJvdzqhW1f4oyjLfLQShbASfF59RSfzLh67tZI40HIEM3rtz_gyNQLQm8YaWRfA9bNUzS1YHh_uDMNr4F-JPsPrroFDDwejnR3iZNp01SEI3YXl2M7dbiG9mZjsc4zs_rfCJ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Market+Impact+on+IT+Security+Spending&rft.jtitle=Decision+sciences&rft.au=Kolfal%2C+Bora&rft.au=Patterson%2C+Raymond+A&rft.au=Yeo%2C+M+Lisa&rft.date=2013-06-01&rft.pub=American+Institute+for+Decision+Sciences&rft.issn=0011-7315&rft.eissn=1540-5915&rft.volume=44&rft.issue=3&rft.spage=517&rft_id=info:doi/10.1111%2Fdeci.12023&rft.externalDBID=HAS_PDF_LINK&rft.externalDocID=3009251711
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0011-7315&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0011-7315&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0011-7315&client=summon