Information security investment and purchase decision for personalized products
Author
Abstract
Suggested Citation
DOI: 10.1002/mde.3551
Download full text from publisher
References listed on IDEAS
- Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
- Brocas, Isabelle & Carrillo, Juan D. & Sachdeva, Ashish, 2018. "The path to equilibrium in sequential and simultaneous games: A mousetracking study," Journal of Economic Theory, Elsevier, vol. 178(C), pages 246-274.
- Niladri B. Syam & Ranran Ruan & James D. Hess, 2005. "Customized Products: A Competitive Analysis," Marketing Science, INFORMS, vol. 24(4), pages 569-584, February.
- Huang, C. Derrick & Behara, Ravi S., 2013. "Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints," International Journal of Production Economics, Elsevier, vol. 141(1), pages 255-268.
- Irina Baye & Irina Hasnas, 2017.
"Consumer flexibility, data quality and location choice,"
Journal of Economics, Springer, vol. 120(2), pages 135-169, March.
- Baye, Irina & Hasnas, Irina, 2014. "Consumer flexibility, data quality and location choice," DICE Discussion Papers 139, Heinrich Heine University Düsseldorf, Düsseldorf Institute for Competition Economics (DICE).
- Alexander Osharin & Valery Verbus, 2018. "Heterogeneity of consumer preferences and trade patterns in a monopolistically competitive setting," Journal of Economics, Springer, vol. 125(3), pages 211-237, November.
- Xinbao Liu & Xiaofei Qian & Jun Pei & Panos M. Pardalos, 2018. "Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size," Journal of Global Optimization, Springer, vol. 70(2), pages 413-436, February.
- Lee, Jongkuk & Palekar, Udatta S. & Qualls, William, 2011. "Supply chain efficiency and security: Coordination for collaborative investment in technology," European Journal of Operational Research, Elsevier, vol. 210(3), pages 568-578, May.
- Mary J. Culnan & Pamela K. Armstrong, 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science, INFORMS, vol. 10(1), pages 104-115, February.
- Jurui Zhang & Yong Liu & Yubo Chen, 2015. "Social Learning in Networks of Friends versus Strangers," Marketing Science, INFORMS, vol. 34(4), pages 573-589, July.
- Clark, Kenneth & Sefton, Martin, 2001. "The Sequential Prisoner's Dilemma: Evidence on Reciprocation," Economic Journal, Royal Economic Society, vol. 111(468), pages 51-68, January.
- Jai, Tun-Min (Catherine) & King, Nancy J., 2016. "Privacy versus reward: Do loyalty programs increase consumers' willingness to share personal information with third-party advertisers and data brokers?," Journal of Retailing and Consumer Services, Elsevier, vol. 28(C), pages 296-303.
- Vidyanand Choudhary & Anindya Ghose & Tridas Mukhopadhyay & Uday Rajan, 2005. "Personalized Pricing and Quality Differentiation," Management Science, INFORMS, vol. 51(7), pages 1120-1130, July.
- Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
- Anna Nagurney & Patrizia Daniele & Shivani Shukla, 2017. "A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints," Annals of Operations Research, Springer, vol. 248(1), pages 405-427, January.
- Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Vaclav Moravec & Nik Hynek & Marinko Skare & Beata Gavurova & Volodymyr Polishchuk, 2025. "Algorithmic personalization: a study of knowledge gaps and digital media literacy," Humanities and Social Sciences Communications, Palgrave Macmillan, vol. 12(1), pages 1-12, December.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Brho, Mazen & Jazairy, Amer & Glassburner, Aaron V., 2025. "The finance of cybersecurity: Quantitative modeling of investment decisions and net present value," International Journal of Production Economics, Elsevier, vol. 279(C).
- Morlok, Tina & Matt, Christian & Hess, Thomas, 2017. "Privatheitsforschung in den Wirtschaftswissenschaften: Entwicklung, Stand und Perspektiven," Working Papers 1/2017, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
- Pallant, Jason I. & Pallant, Jessica L. & Sands, Sean J. & Ferraro, Carla R. & Afifi, Eslam, 2022. "When and how consumers are willing to exchange data with retailers: An exploratory segmentation," Journal of Retailing and Consumer Services, Elsevier, vol. 64(C).
- Arisian, Sobhan & Halat, Kourosh & Hafezalkotob, Ashkan & Maskey, Reenu, 2025. "Coopetitive Resilience: Integrating Cyber Threat Intelligence Platforms in Critical Supply Chains," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 197(C).
- Paul, Jomon A. & Zhang, Minjiao, 2021. "Decision support model for cybersecurity risk planning: A two-stage stochastic programming framework featuring firms, government, and attacker," European Journal of Operational Research, Elsevier, vol. 291(1), pages 349-364.
- Anna Priester & Thomas Robbert & Stefan Roth, 2020. "A special price just for you: effects of personalized dynamic pricing on consumer fairness perceptions," Journal of Revenue and Pricing Management, Palgrave Macmillan, vol. 19(2), pages 99-112, April.
- Xiaofei Qian & Jun Pei & Xinbao Liu & Mi Zhou & Panos M. Pardalos, 2019. "Information security decisions for two firms in a market with different types of customers," Journal of Combinatorial Optimization, Springer, vol. 38(4), pages 1263-1285, November.
- Shuilin Liu & Xudong Lin & Xiaoli Huang & Hanyang Luo & Sumin Yu, 2023. "Research on Service-Driven Benign Market with Platform Subsidy Strategy," Mathematics, MDPI, vol. 11(2), pages 1-21, January.
- Lu Xu & Yanhui Li & Jing Fu, 2019. "Cybersecurity Investment Allocation for a Multi-Branch Firm: Modeling and Optimization," Mathematics, MDPI, vol. 7(7), pages 1-20, July.
- Kaur, Harpreet & Gupta, Mahima & Singh, Surya Prakash, 2024. "Integrated model to optimize supplier selection and investments for cyber resilience in digital supply chains," International Journal of Production Economics, Elsevier, vol. 275(C).
- Corey Angst, 2009. "Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges," Journal of Business Ethics, Springer, vol. 90(2), pages 169-178, November.
- Kopalle, Praveen & Biswas, Dipayan & Chintagunta, Pradeep K. & Fan, Jia & Pauwels, Koen & Ratchford, Brian T. & Sills, James A., 2009. "Retailer Pricing and Competitive Effects," Journal of Retailing, Elsevier, vol. 85(1), pages 56-70.
- Huarng, Kun-Huang & Yu, Tiffany Hui-Kuang & Lee, Cheng fang, 2022. "Adoption model of healthcare wearable devices," Technological Forecasting and Social Change, Elsevier, vol. 174(C).
- Liu, Yu-li & Wu, Yanfei & Li, Changyan & Song, Chuling & Hsu, Wen-yi, 2024. "Does displaying one's IP location influence users' privacy behavior on social media? Evidence from China's Weibo," Telecommunications Policy, Elsevier, vol. 48(5).
- Yuan Sun & Shuyue Fang & Yujong Hwang, 2019. "Investigating Privacy and Information Disclosure Behavior in Social Electronic Commerce," Sustainability, MDPI, vol. 11(12), pages 1-27, June.
- Jabbar, Abdul & Geebren, Ahmed & Hussain, Zahid & Dani, Samir & Ul-Durar, Shajara, 2023. "Investigating individual privacy within CBDC: A privacy calculus perspective," Research in International Business and Finance, Elsevier, vol. 64(C).
- Xiaofei Qian & Xinbao Liu & Jun Pei & Panos M. Pardalos & Lin Liu, 2017. "A game-theoretic analysis of information security investment for multiple firms in a network," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(10), pages 1290-1305, October.
- Tabitha L. James & Quinton Nottingham & Stephane E. Collignon & Merrill Warkentin & Jennifer L. Ziegelmayer, 2016. "The interpersonal privacy identity (IPI): development of a privacy as control model," Information Technology and Management, Springer, vol. 17(4), pages 341-360, December.
- Sarah Geschonke & Thomas Wein, 2020. "Privacy Paradox – Economic Uncertainty Theory and Legal Consequences," Working Paper Series in Economics 393, University of Lüneburg, Institute of Economics.
- Zheyin (Jane) Gu & Giri K. Tayi, 2015. "Research Note—Investigating Firm Strategies on Offering Consumer-Customizable Products," Information Systems Research, INFORMS, vol. 26(2), pages 456-468, June.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:mgtdec:v:43:y:2022:i:6:p:2619-2635. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://www3.interscience.wiley.com/cgi-bin/jhome/7976 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.
Printed from https://ideas.repec.org/a/wly/mgtdec/v43y2022i6p2619-2635.html