IDEAS home Printed from
   My bibliography  Save this article

An economic analysis of the optimal information security investment in the case of a risk-averse firm


  • Derrick Huang, C.
  • Hu, Qing
  • Behara, Ravi S.


No abstract is available for this item.

Suggested Citation

  • Derrick Huang, C. & Hu, Qing & Behara, Ravi S., 2008. "An economic analysis of the optimal information security investment in the case of a risk-averse firm," International Journal of Production Economics, Elsevier, vol. 114(2), pages 793-804, August.
  • Handle: RePEc:eee:proeco:v:114:y:2008:i:2:p:793-804

    Download full text from publisher

    File URL:
    Download Restriction: Full text for ScienceDirect subscribers only

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    1. Fishburn, Peter C, 1989. "Retrospective on the Utility Theory of von Neumann and Morgenstern," Journal of Risk and Uncertainty, Springer, vol. 2(2), pages 127-157, June.
    2. Browne, S., 1995. "Optimal Investment Policies for a Firm with a Random Risk Process: Exponential Utility and Minimizing the Probability of Ruin," Papers 95-08, Columbia - Graduate School of Business.
    3. Menoncin, Francesco, 2002. "Optimal portfolio and background risk: an exact and an approximated solution," Insurance: Mathematics and Economics, Elsevier, vol. 31(2), pages 249-265, October.
    4. Milton Friedman & L. J. Savage, 1952. "The Expected-Utility Hypothesis and the Measurability of Utility," Journal of Political Economy, University of Chicago Press, vol. 60, pages 463-463.
    5. Stapleton, R C & Subrahmanyam, M G, 1990. "Risk Aversion and the Intertemporal Behavior of Asset Prices," Review of Financial Studies, Society for Financial Studies, vol. 3(4), pages 677-693.
    6. Henderson, Vicky & Hobson, David G., 2002. "Real options with constant relative risk aversion," Journal of Economic Dynamics and Control, Elsevier, vol. 27(2), pages 329-355, December.
    Full references (including those not matched with items on IDEAS)


    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.

    Cited by:

    1. repec:spr:elcore:v:17:y:2017:i:4:d:10.1007_s10660-016-9238-3 is not listed on IDEAS
    2. Huang, C. Derrick & Behara, Ravi S., 2013. "Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints," International Journal of Production Economics, Elsevier, vol. 141(1), pages 255-268.
    3. repec:spr:infosf:v:17:y:2015:i:2:d:10.1007_s10796-013-9411-3 is not listed on IDEAS
    4. Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
    5. Mayadunne, Sanjaya & Park, Sungjune, 2016. "An economic model to evaluate information security investment of risk-taking small and medium enterprises," International Journal of Production Economics, Elsevier, vol. 182(C), pages 519-530.
    6. Yosra Miaoui & Noureddine Boudriga, 0. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 0, pages 1-40.
    7. Liao, Chun-Hsiung & Chen, Chun-Wei, 2014. "Network externality and incentive to invest in network security," Economic Modelling, Elsevier, vol. 36(C), pages 398-404.
    8. repec:spr:jglopt:v:70:y:2018:i:2:d:10.1007_s10898-017-0585-y is not listed on IDEAS
    9. repec:pal:jorsoc:v:68:y:2017:i:10:d:10.1057_s41274-016-0134-y is not listed on IDEAS
    10. Jhih-Hua Jhang-Li & Cheng-Wei Chang, 0. "Analyzing the operation of cloud supply chain: adoption barriers and business model," Electronic Commerce Research, Springer, vol. 0, pages 1-34.

    More about this item


    Access and download statistics


    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:proeco:v:114:y:2008:i:2:p:793-804. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Dana Niculescu). General contact details of provider: .

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service hosted by the Research Division of the Federal Reserve Bank of St. Louis . RePEc uses bibliographic data supplied by the respective publishers.