Information security investment for complementary and substitutable firms: The role of technology similarity.
Xing GaoManting QiuSiyu GongYing WangYanfang ZhangPublished in: Expert Syst. Appl. (2023)
Keyphrases
- information security
- senior management
- information systems
- information security management
- technical issues
- countermeasures
- information technology
- smart card
- security requirements
- security issues
- intrusion detection
- information assurance
- network security
- case study
- cost effective
- security level
- decision making
- data processing
- cyber defense
- internet enabled
- iso iec
- technological innovation
- security risks
- network effects
- databases
- metadata
- similarity measure
- investment decisions
- object recognition
- risk analysis
- e government
- risk assessment