[1] Mukhopadhyay T, Kekre S, Kalathur S.Business value of information technology: a study of electronic data interchange[J]. MIS Q, 1995, 19(2): 137-155. [2] Gordon L A, Loeb M P,Lucyshyn W, Sharing information on computer system security: an economic analysis[J]. Journal of Accounting and Public Policy, 2003, 22(9): 461-485. [3] 吕俊杰,邱菀华,王元卓.基于相互依赖性的信息安全投资博弈[J].中国管理科学,2006,14(3):7-12. [4] Hausken K. Income, interdependence, and substitution effects affecting incentives for security investment[J]. Journal of Account Public Policy, 2006, 25(6): 629-665. [5] Kunreuther H, Heal G. Interdependent security[J]. Journal of Risk and Uncertainty, 2003, 26(2), 231-249. [6] Garcia A, Horowitz B. The potential for underinvestment in internet security: implications for regulatory policy[J]. Journal of Regulatory Economics, 2007, 31(1): 37-55. [7] Zhuang J, Bier V M, Gupta A. Subsidies in interdependent security with heterogeneous discount rates[J]. The Engineering Economist, 2007, 52(1): 1-19. [8] Zhuang J. Impacts of subsidized security on stability and total social costs of equilibrium solutions in an n-player game with errors[J]. The Engineering Economist, 2010, 55(2): 131-149. [9] Bandyopadhyay T, Jacob V, Raghunathan S. Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest[J]. Information Technology and Management, 2010, 11(1): 7-23. [10] Hausken K. Information sharing among firms and cyber attacks[J]. Journal of Accounting and Public Policy, 2007, 26(6): 639-688. [11] Mookerjee V, Mookerjee R, Bensoussan A, Yue W T. When hackers talk: managing information security under variable attack rates and knowledge dissemination[J]. Information Systems Research, 2011, 22(3): 606-623. [12] Png I P L, Wang Q. Information security: user precautions vis-à-vis enforcement against attackers[J]. Journal of Management Information Systems, 2009, 26(2): 97-122. [13] Cremonini M, Nizovtsev D. Risks and benefits of signaling information system characteristics to strategic attackers[J]. Journal of Management Information Systems, 2009, 26(3): 241-274. |