[1] Gordon L A, Loeb M P. The economics of information security investment[J]. ACM Transactions on Information and System Security, 2002, 5(4):438-457. [2] Gordon L A, Loeb M P, Sohail T. A framework for using insurance for cyber-risk management[J]. Communications of the ACM, 2003, 46(3):81-85. [3] Anderson R, Moore T. The economics of information security[J]. Science, 2006, 314(5799):610-613. [4] Herath H S B, Herath T C. Investments in information security:A real options perspective with bayesian postaudit[J]. Journal of Management Information Systems, 2008, 25(3):337-375. [5] Benaroch M. Real options models for proactive uncertainty-reducing mitigations and applications in cybersecurity investment decision making[J]. Information Systems Research, 2018, 29(2):315-340. [6] Gao Xing, Zhong Weijun. A differential game approach to security investment and information sharing in a competitive environment[J]. IIE Transactions, 2016, 48(6):511-526. [7] Nagurney A, Daniele P, Shukla S. A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints[J]. Annals of Operations Research, 2017, 248(1-2):405-427. [8] 吕俊杰, 邱菀华, 王元卓. 基于相互依赖性的信息安全投资博弈[J]. 中国管理科学, 2006, 14(3):7-12. Lyu Junjie, Qiu Wanhua, Wang Yuanzhuo. An analysis of games of information security investment based on interdependent security[J]. Chinese Journal of Management Science, 2006, 14(3):7-12. [9] Ezhei M, Tork Ladani B. Interdependency analysis in security investment against strategic attacks[J]. Information Systems Frontiers, 2018:1-15. [10] Hasheminasab S A, Tork Ladani B. Security investment in contagious networks[J]. Risk Analysis, 2018, 38(8):1559-1575. [11] Marotta A, Martinelli F, Nanni S, et al. Cyber-insurance survey[J]. Computer Science Review, 2017, 24:35-61. [12] 向尚, 邹凯, 蒋知义,等. 基于随机森林的智慧城市信息安全风险预测[J]. 中国管理科学, 2016, 24(S1):277-281. Xiang Shang, Zou Kai, Jiang Zhiyi, et al. Risk prediction of smart city information security based on random forest[J]. Chinese Journal of Management Science, 2016, 24(S1):277-281. [13] Eling M, Schnell W. What do we know about cyber risk and cyber risk insurance?[J]. The Journal of Risk Finance, 2016, 17(5):474-491. [14] Khalili M M, Naghizadeh P, Liu M. Designing cyber insurance policies:The role of pre-screening and security interdependence[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(9):2226-2239. [15] Vakilinia I, Sengupta S. A coalitional cyber-insurance framework for a common platform[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(6):1526-1538. [16] 顾建强, 梅姝娥, 仲伟俊. 基于网络安全保险的信息系统安全投资激励机制[J]. 系统工程理论与实践, 2015, 35(4):1057-1062. Gu Jianqiang, Mei Sue, Zhong Weijun. Cyber insurance as an incentive for information system security[J]. Systems Engineering Theory & Practice, 2015, 35(4):1057-1062. [17] Massacci F, Swierzbinski J, Williams J. Cyberinsurance and public policy:Self-protection and insurance with endogenous adversaries[J]. Paragraph, 2017, 1(2):1-38. [18] 董坤祥, 谢宗晓, 甄杰,等. 相依风险下保险公司投资信息安全软件的最优决策分析[J]. 保险研究, 2019, 6:66-80. Dong Kunxiang, Xie Zongxiao, Zhen Jie. Optimal decision analysis of insurance company investment information security software under dependent risk[J]. Insurance Studies, 2019, (6):66-80. [19] Zhao X, Xue L, Whinston A B. Managing interdependent information security risks:Cyberinsurance, managed security services, and risk pooling arrangements[J]. Journal of Management Information Systems, 2013, 30(1):123-152. [20] Öǧüt H, Raghunathan S, Menon N. Cyber security risk management:Public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection[J]. Risk Analysis:An International Journal, 2011, 31(3):497-512. [21] Lee C H, Geng X, Raghunathan S. Mandatory standards and organizational information security[J]. Information Systems Research, 2016, 27(1):70-86. [22] Laube S, B hme R. The economics of mandatory security breach reporting to authorities[J]. Journal of Cybersecurity, 2016, 2(1):29-41. [23] Woods D, Simpson A. Policy measures and cyber insurance:A framework[J]. Journal of Cyber Policy, 2017, 2(2):209-226. |