Information Security Measures and Regulation Research

被引:0
作者
Gong Guo-quan [1 ]
Qiang Shuang [1 ]
Wang Jun [2 ]
机构
[1] Harbin Inst Technol, Sch Management, Harbin 150001, Peoples R China
[2] NE Univ Qinhuangdao, Dept Management, Qinhuangdao 066004, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (16TH), VOLS I AND II, CONFERENCE PROCEEDINGS | 2009年
基金
中国国家自然科学基金;
关键词
government regulation; information security; optimization security measures; vulnerability;
D O I
10.1109/ICMSE.2009.5317613
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to analyze the online enterprises Information Security optimal management measures quantitatively, a information security decision model is constructed. Based on the online firms information security decision analysis, found that the information security measures investment is proportioned to firm online business scale, Lots of online small-and-medium-enterprises become huge threads to interne because they are without incentive investment in security measures. When firms are attacked by independent threads, the enterprises can deploy security measures optimization respectively, but net attacks are contagious threats, the enterprises will loss enormous profits in spite of deployed security measures. Then government regulation is necessary. Government takes taxes and subsidy strategy to realize social optimal welfare, the comparing difference regulation results with complete and incomplete information are proposed in the model.
引用
收藏
页码:2184 / +
页数:2
相关论文
共 19 条
[1]   The economics of information security [J].
Anderson, Ross ;
Moore, Tyler .
SCIENCE, 2006, 314 (5799) :610-613
[2]  
[Anonymous], 2001, P 17 ANN COMP SEC AP
[3]  
[Anonymous], 2003, Journal of Accounting and Public Policy, DOI [10.1016/j.jaccpubpol.2003.09.001, DOI 10.1016/J.JACCPUBPOL.2003.09.001]
[4]  
ARORA A, 2004, WORKSH EC INF SEC U
[5]  
ASHISH A, 2004, TIMING DISCLOSURE SO
[6]  
CAMP L, 2000, P CERT INF SURV WORK
[7]  
CAVUSOGLU H, 2006, WORKSH EC INF SEC CA
[8]  
DONNER M, 2003, SECURE BUSINESS Q, V3, P45
[9]   The economic incentives for sharing security information [J].
Gal-Or, E ;
Ghose, A .
INFORMATION SYSTEMS RESEARCH, 2005, 16 (02) :186-208
[10]  
Gal-Or E, 2004, ADV INF SEC, V12, P95