The Theory of Optimal Investment in Information Security and Adjustment Costs: An Impulse Control Approach

被引:0
作者
Goto, Makoto [1 ]
Tatsumi, Ken-ichi [2 ]
机构
[1] Hokkaido Univ, Grad Sch Econ & Business Adm, Kita Ku, Sapporo, Hokkaido 0600809, Japan
[2] Gakushuin Univ, Fac Econ, Toshima Ku, Mejiro 1-5-1, Tokyo 1718588, Japan
来源
RECENT ADVANCES IN FINANCIAL ENGINEERING 2011 | 2012年
关键词
information security investment; threat; impulse control; real options; adjustment costs; inventory investment theory; UNCERTAINTY; DECISIONS;
D O I
暂无
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
This paper applies the theory of real options and impulse control to information security investment and derives properties of an optimal investment rule. It also incorporates adjustment costs incurred whenever the level of the investment changes. We observe among others that if firm has opportunity of multiple investments, it behaves so cautiously that the timing is earlier and to invest more. Both adjustment costs and volatility of threat make interval of the investment longer, while vulnerability leads to shorter interval and therefore frequent investment.
引用
收藏
页码:73 / 96
页数:24
相关论文
共 19 条
[1]  
[Anonymous], 1982, IMPULSE CONTROL QUAS
[2]  
[Anonymous], 1996, REAL OPTIONS MANAGER
[3]   Optimality of an (s, S) policy with compound poisson and diffusion demands:: A quasi-variational inequalities approach [J].
Bensoussan, A ;
Liu, RH ;
Sethi, SP .
SIAM JOURNAL ON CONTROL AND OPTIMIZATION, 2005, 44 (05) :1650-1676
[4]  
Bensoussan A., 1982, Stochastic Control by Functional Analysis Methods
[5]  
Boehme R., 2009, 8 ANN WORKSH EC INF
[6]  
Brealey RichardA., 2000, PRINCIPLES CORPORATE, V6th
[7]  
COPELAND T.V. ANTIKAROV., 2001, REAL OPTIONS PRACTIT
[8]   ENTRY AND EXIT DECISIONS UNDER UNCERTAINTY [J].
DIXIT, A .
JOURNAL OF POLITICAL ECONOMY, 1989, 97 (03) :620-638
[9]   INVESTMENT UNDER UNCERTAINTY - DIXIT,AK, PINDYCK,RS [J].
SCHWARTZ, ES .
JOURNAL OF FINANCE, 1994, 49 (05) :1924-1928
[10]  
Gordon L. A., 2002, ACM Transactions on Information and Systems Security, V5, P438, DOI 10.1145/581271.581274