{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T07:44:15Z","timestamp":1769240655276,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,11,26]],"date-time":"2015-11-26T00:00:00Z","timestamp":1448496000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s10799-015-0253-1","type":"journal-article","created":{"date-parts":[[2015,11,26]],"date-time":"2015-11-26T06:56:03Z","timestamp":1448520963000},"page":"361-377","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Economic incentives in security information sharing: the effects of market structures"],"prefix":"10.1007","volume":"17","author":[{"given":"Xing","family":"Gao","sequence":"first","affiliation":[]},{"given":"Weijun","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,26]]},"reference":[{"issue":"5799","key":"253_CR1","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1126\/science.1130992","volume":"314","author":"R Anderson","year":"2006","unstructured":"Anderson R, Moore T (2006) The economics of information security. Science 314(5799):610\u2013613","journal-title":"Science"},{"issue":"4","key":"253_CR2","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1007\/s10796-012-9373-x","volume":"16","author":"T Bandyopadhyay","year":"2014","unstructured":"Bandyopadhyay T, Liu D, Mookerjee VS, Wilhite AW (2014) Dynamic competition in IT security: a differential games approach. Informat Syst Frontiers 16(4):643\u2013661","journal-title":"Informat Syst Frontiers"},{"issue":"2","key":"253_CR3","doi-asserted-by":"crossref","first-page":"281","DOI":"10.2753\/MIS0742-1222250211","volume":"25","author":"H Cavusoglu","year":"2008","unstructured":"Cavusoglu H, Raghunathan S, Yue WT (2008) Decision-theoretic and game-theoretic approaches to IT security investment. J Manage Inform Syst 25(2):281\u2013304","journal-title":"J Manage Inform Syst"},{"issue":"3","key":"253_CR4","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1016\/j.jedc.2008.08.006","volume":"33","author":"R Cellini","year":"2009","unstructured":"Cellini R, Lambertini L (2009) Dynamic R&D with spillovers: competition vs cooperation. J Econ Dyn Control 33(3):568\u2013582","journal-title":"J Econ Dyn Control"},{"key":"253_CR5","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/978-1-4419-6967-5_15","volume-title":"Economics of information security and privacy","author":"A Cezar","year":"2010","unstructured":"Cezar A, Cavusoglu H, Raghunathan S (2010) Competition, speculative risks, and IT security outsourcing. In: Moore T, Pym D, Ioannidis C (eds) Economics of information security and privacy. Springer, Boston, MA, pp 301\u2013320"},{"issue":"1","key":"253_CR6","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s001990050184","volume":"11","author":"DJ Clark","year":"1998","unstructured":"Clark DJ, Riis C (1998) Contest success functions: an extension. Econ Theory 11(1):201\u2013204","journal-title":"Econ Theory"},{"key":"253_CR7","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1016\/j.jet.2014.11.007","volume":"155","author":"L Colombo","year":"2015","unstructured":"Colombo L, Labrecciosa P (2015) On the Markovian efficiency of Bertrand and Cournot equilibria. J Econ Theory 155:332\u2013358","journal-title":"J Econ Theory"},{"issue":"3","key":"253_CR8","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1007\/s001990100211","volume":"20","author":"H Cheng","year":"2002","unstructured":"Cheng H (2002) Bertrand vs. Cournot equilibrium with risk averse firms and cost uncertainty. Econ Theor 20(3):555\u2013577","journal-title":"Econ Theor"},{"issue":"1","key":"253_CR9","doi-asserted-by":"crossref","first-page":"146","DOI":"10.2307\/2555596","volume":"16","author":"L Cheng","year":"1985","unstructured":"Cheng L (1985) Comparing Bertrand and Cournot equilibria: a geometric approach. Rand J Econ 16(1):146\u2013147","journal-title":"Rand J Econ"},{"issue":"3","key":"253_CR10","doi-asserted-by":"crossref","first-page":"241","DOI":"10.2753\/MIS0742-1222260308","volume":"26","author":"M Cremonini","year":"2009","unstructured":"Cremonini M, Nizovtsev D (2009) Risks and benefits of signaling information system characteristics to strategic attackers. J Manage Inform Syst 26(3):241\u2013274","journal-title":"J Manage Inform Syst"},{"issue":"1","key":"253_CR11","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1006\/jeth.1997.2268","volume":"75","author":"KG Dastidar","year":"1997","unstructured":"Dastidar KG (1997) Comparing Cournot and Bertrand in a homogeneous product market. J Econ Theory 75(1):205\u2013212","journal-title":"J Econ Theory"},{"issue":"2","key":"253_CR12","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1287\/opre.1100.0900","volume":"59","author":"A Farahat","year":"2011","unstructured":"Farahat A, Perakis G (2011) A comparison of Bertrand and Cournot profits in oligopolies with differentiated products. Oper Res 59(2):507\u2013513","journal-title":"Oper Res"},{"issue":"2","key":"253_CR13","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/isre.1050.0053","volume":"16","author":"E Gal-Or","year":"2005","unstructured":"Gal-Or E, Ghose A (2005) The economic incentives for sharing security information. Inform Syst Res 16(2):186\u2013208","journal-title":"Inform Syst Res"},{"issue":"6","key":"253_CR14","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1016\/j.jaccpubpol.2003.09.001","volume":"22","author":"LA Gordon","year":"2003","unstructured":"Gordon LA, Loeb M, Lucyshyn W (2003) Sharing information on computer systems security: an economic analysis. J Account Public Policy 22(6):461\u2013485","journal-title":"J Account Public Policy"},{"issue":"3","key":"253_CR15","doi-asserted-by":"crossref","first-page":"595","DOI":"10.2307\/25750693","volume":"34","author":"MR Galbreth","year":"2010","unstructured":"Galbreth MR, Shor M (2010) The impact of malicious agents on the enterprise software industry. MIS Quart 34(3):595\u2013612","journal-title":"MIS Quart"},{"issue":"3","key":"253_CR16","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.mathsocsci.2012.02.004","volume":"63","author":"X Gao","year":"2012","unstructured":"Gao X, Zhong W, Mei S (2012) On local stability of Cournot models with simultaneous and sequential decisions. Math Soc Sci 63(3):207\u2013212","journal-title":"Math Soc Sci"},{"issue":"4","key":"253_CR17","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1287\/deca.2013.0278","volume":"10","author":"X Gao","year":"2013","unstructured":"Gao X, Zhong W, Mei S (2013) Information security investment when hackers disseminate knowledge. Decision Anal 10(4):352\u2013368","journal-title":"Decision Anal"},{"issue":"5","key":"253_CR18","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1016\/j.orl.2013.05.002","volume":"41","author":"X Gao","year":"2013","unstructured":"Gao X, Zhong W, Mei S (2013) A differential game approach to information security investment under hackers\u2019 knowledge dissemination. Oper Res Lett 41(5):421\u2013425","journal-title":"Oper Res Lett"},{"issue":"11","key":"253_CR19","doi-asserted-by":"crossref","first-page":"1682","DOI":"10.1057\/jors.2013.133","volume":"65","author":"X Gao","year":"2014","unstructured":"Gao X, Zhong W, Mei S (2014) A game-theoretic analysis of information sharing and security investment for complementary firms. J Oper Res Soc 65(11):1682\u20131691","journal-title":"J Oper Res Soc"},{"issue":"2","key":"253_CR20","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1007\/s10796-013-9411-3","volume":"17","author":"X Gao","year":"2015","unstructured":"Gao X, Zhong W, Mei S (2015) Security investment and information sharing under an alternative security breach probability function. Informat Syst Frontiers 17(2):423\u2013438","journal-title":"Informat Syst Frontiers"},{"issue":"5","key":"253_CR21","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/s10796-006-9011-6","volume":"8","author":"K Hausken","year":"2006","unstructured":"Hausken K (2006) Returns to information security investment: the effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Informat Syst Frontiers 8(5):338\u2013349","journal-title":"Informat Syst Frontiers"},{"issue":"6","key":"253_CR22","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1016\/j.jaccpubpol.2007.10.001","volume":"26","author":"K Hausken","year":"2007","unstructured":"Hausken K (2007) Information sharing among firms and cyber attacks. J Account Public Policy 26(6):639\u2013688","journal-title":"J Account Public Policy"},{"issue":"2","key":"253_CR23","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1016\/j.geb.2008.02.001","volume":"64","author":"K Hausken","year":"2008","unstructured":"Hausken K (2008) Whether to attack a terrorist\u2019s resource stock today or tomorrow. Game Econ Behav 64(2):548\u2013564","journal-title":"Game Econ Behav"},{"issue":"3","key":"253_CR24","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1006\/jeth.2000.2654","volume":"33","author":"J H\u00e4ckner","year":"2000","unstructured":"H\u00e4ckner J (2000) A note on price and quantity competition in differentiated oligopolies. J Econ Theory 33(3):233\u2013239","journal-title":"J Econ Theory"},{"issue":"2","key":"253_CR25","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s11151-005-1753-7","volume":"27","author":"J Hsu","year":"2005","unstructured":"Hsu J, Wang XH (2005) On welfare under Cournot and Bertrand competition in differentiated oligopolies. Rew Ind Organ 27(2):185\u2013191","journal-title":"Rew Ind Organ"},{"issue":"2","key":"253_CR26","doi-asserted-by":"crossref","first-page":"187","DOI":"10.2307\/2555546","volume":"18","author":"C Holt","year":"1987","unstructured":"Holt C, Scheffman D (1987) Facilitating practices: the effects of advance notice and best-price policies. RAND J Econom 18(2):187\u2013197","journal-title":"RAND J Econom"},{"issue":"2","key":"253_CR27","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1016\/j.ijpe.2008.04.002","volume":"114","author":"D Huang","year":"2008","unstructured":"Huang D, Qing H, Ravi B (2008) An economic analysis of the optimal information security investment in the case of a risk-averse firm. Int J Prod Econ 114(2):793\u2013804","journal-title":"Int J Prod Econ"},{"issue":"3","key":"253_CR28","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1111\/deci.12023","volume":"44","author":"B Kolfal","year":"2013","unstructured":"Kolfal B, Patterson RA, Yeo ML (2013) Market impact on it security spending. Decision Sci 44(3):517\u2013556","journal-title":"Decision Sci"},{"issue":"2\/3","key":"253_CR29","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1023\/A:1024119208153","volume":"26","author":"H Kunreuther","year":"2003","unstructured":"Kunreuther H, Heal G (2003) Interdependent security. J Risk Uncertainty 26(2\/3):231\u2013249","journal-title":"J Risk Uncertainty"},{"issue":"1","key":"253_CR30","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/BF01053880","volume":"75","author":"W Leininger","year":"1993","unstructured":"Leininger W (1993) More efficient rent-seeking: a M\u00fcnchhausen solution. Public Choice 75(1):43\u201362","journal-title":"Public Choice"},{"issue":"1","key":"253_CR31","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.dss.2011.05.007","volume":"52","author":"D Liu","year":"2011","unstructured":"Liu D, Ji Y, Mookerjee V (2011) Knowledge sharing and investment decisions in information security. Decis Support Syst 52(1):95\u2013107","journal-title":"Decis Support Syst"},{"issue":"1","key":"253_CR32","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/S0014-2921(00)00090-8","volume":"46","author":"P Lin","year":"2002","unstructured":"Lin P, Saggi K (2002) Product differentiation, process R&D, and the nature of market competition. Eur Econ Rev 46(1):201\u2013211","journal-title":"Eur Econ Rev"},{"issue":"3","key":"253_CR33","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1016\/S0176-2680(02)00106-4","volume":"18","author":"A Lofaro","year":"2002","unstructured":"Lofaro A (2002) On the efficiency of Bertrand and Cournot competition under incomplete information. Eur J Polit Econ 18(3):561\u2013578","journal-title":"Eur J Polit Econ"},{"key":"253_CR34","first-page":"273","volume-title":"Code-red: a case study on the spread and victims of an Internet worm","author":"D Moore","year":"2002","unstructured":"Moore D, Shannon C, Claffy K (2002) Code-red: a case study on the spread and victims of an Internet worm. Proceedings of ACM SIGCOMM Workshop on Internet Measurement, Marseille, France, pp 273\u2013284"},{"issue":"3","key":"253_CR35","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1287\/isre.1100.0341","volume":"22","author":"V Mookerjee","year":"2011","unstructured":"Mookerjee V, Mookerjee R, Bensoussan A, Yue WT (2011) When hackers talk: managing information security under variable attack rates and knowledge dissemination. Inform Syst Res 22(3):606\u2013623","journal-title":"Inform Syst Res"},{"issue":"1","key":"253_CR36","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1287\/mksc.16.1.81","volume":"16","author":"V Padmanabhan","year":"1997","unstructured":"Padmanabhan V, Png IPL (1997) Manufacturer\u2019s returns policies and retail competition. Market Sci 16(1):81\u201394","journal-title":"Market Sci"},{"issue":"1","key":"253_CR37","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1006\/jeth.1997.2270","volume":"75","author":"LD Qiu","year":"1997","unstructured":"Qiu LD (1997) On the dynamic efficiency of Bertrand and Cournot equilibria. J Econ Theory 75(1):213\u2013229","journal-title":"J Econ Theory"},{"issue":"2","key":"253_CR38","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/BF01213906","volume":"7","author":"S Skaperdas","year":"1996","unstructured":"Skaperdas S (1996) Contest success functions. Econ Theory 7(2):283\u2013290","journal-title":"Econ Theory"},{"issue":"4","key":"253_CR39","doi-asserted-by":"crossref","first-page":"546","DOI":"10.2307\/2555525","volume":"15","author":"N Singh","year":"1984","unstructured":"Singh N, Vives X (1984) Price and quantity competition in a differentiated duopoly. RAND J Econ 15(4):546\u2013554","journal-title":"RAND J Econ"},{"issue":"1","key":"253_CR40","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/S0167-7187(02)00052-8","volume":"21","author":"G Symeonidis","year":"2003","unstructured":"Symeonidis G (2003) Comparing Cournot and Bertrand equilibria in a differentiated duopoly with product R&D. Int J Ind Organ 21(1):39\u201355","journal-title":"Int J Ind Organ"},{"issue":"1","key":"253_CR41","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/0022-0531(85)90086-9","volume":"36","author":"X Vives","year":"1985","unstructured":"Vives X (1985) On the efficiency of Bertrand and Cournot equilibria with product differentiation. J Econ Theory 36(1):166\u2013175","journal-title":"J Econ Theory"},{"issue":"4","key":"253_CR42","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1111\/j.1530-9134.2006.00125.x","volume":"15","author":"P Zanchettin","year":"2006","unstructured":"Zanchettin P (2006) Differentiated duopoly with asymmetric costs. J Econ Manage Strat 15(4):999\u20131015","journal-title":"J Econ Manage Strat"},{"issue":"1","key":"253_CR43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/00137910601159722","volume":"52","author":"J Zhuang","year":"2007","unstructured":"Zhuang J, Bier VM, Gupta A (2007) Subsidies in interdependent security with heterogeneous discount rates. Eng Econ 52(1):1\u201319","journal-title":"Eng Econ"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-015-0253-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10799-015-0253-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-015-0253-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-015-0253-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T23:39:45Z","timestamp":1567381185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10799-015-0253-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,26]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["253"],"URL":"https:\/\/doi.org\/10.1007\/s10799-015-0253-1","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"value":"1385-951X","type":"print"},{"value":"1573-7667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,26]]}}}