XIONG Qiang, YANG Xin-qi, LI Zhi-wen. Evolutionary Game Analysis of Multi Participant Behavior Strategy of Network Security Vulnerability Information Disclosure[J]. Operations Research and Management Science, 2021, 30(7): 102-109.
[1] 黄道丽.网络安全漏洞披露规则及其体系设计[J].暨南学报(哲学社会科学版),2018(01):94-106. [2] Ransbotham S, Mitra S, Ramsey J. Are Markets for Vulnerabilities Effective?[J]. Mis Quarterly, 2008, 36(1): 43-64. [3] Bandyopadhyay T, Jacob V, Raghunathan S. Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest[J]. Information Technology and Management. 2010, 11(1): 7-23. [4] Feng N, Wu H, Li M, et al. Managing security risks for inter-organisational information systems: a multiagent collaborative model[J]. Enterprise Information Systems. 2016, 10(7-9): 751-770. [5] 董俊祺.韩国网络空间的主体博弈对我国信息安全治理的启示——以韩国网络实名制政策为例[J].情报科学,2016;34(4):153-157. [6] Mitra S, Ransbotham S. Information disclosure and the diffusion of information security attacks[J]. Information Systems Research. 2015, 26(3): 565-584. [7] Tang Q, Whinston A B. Improving internet security through mandatory information disclosure[C]// Hawaii International Conference on System Sciences. IEEE Computer Society, 2015. 4813-4823. [8] Hausken K. Security investment, hacking, and information sharing between firms and between hackers[J]. Games (20734336), 2017, 8(2): 1-23. [9] 王青娥,柴玄玄,张譞.智慧城市信息安全风险及保障体系构建[J].科技进步与对策,2018,35(24):20-23. [10] 蔡传晰,梅姝娥,仲伟俊.拟态式蜜罐诱骗机制最优配置策略的博弈分析[J].管理工程学报,2018,32(04):110-117. [11] Gao X, Zhong W. Information security investment for competitive firms with hacker behavior and security requirements[J]. Annals of Operations Research, 2015, 235(1): 277-300.