Economic incentives in security information sharing: the effects of market structures

被引:14
作者
Gao, Xing [1 ]
Zhong, Weijun [1 ]
机构
[1] Southeast Univ, Sch Econ & Management, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Bertrand competition; Cournot competition; Security investment; Information sharing; RESEARCH-AND-DEVELOPMENT; DIFFERENTIATED DUOPOLY; COURNOT EQUILIBRIA; COMPARING COURNOT; BERTRAND; INVESTMENT; COMPETITION; EFFICIENCY; RETURNS; IMPACT;
D O I
10.1007/s10799-015-0253-1
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
The past few years have witnessed numerous information security incidents throughout the world, which unfortunately become increasingly tough to be completely addressed just by technology solutions such as advanced firewalls and intrusion detection systems. In addition to technology components, Internet environment can be viewed as a complex economic system consisting of firms, hackers, government sectors and other participants, whose economic incentives should be taken into account carefully when security solutions are formulated. In order to better protect information assets, information security economics as an emerging and thriving research branch emerges aiming at attempting to solve the problems of distorted incentives of such stakeholders by means of economic approaches. However, how these participants' economic incentives for information security improvement change when they evolve between different market structures has remained unknown yet. Using game theory, we develop an analytical framework to investigate the effects of market structures on security investments, information sharing, attack investments, expected profits, expected consumer surplus and expected social welfare. We demonstrate that the levels of security investments, information sharing, attack investments, and expected profits are higher while expected consumer surplus and expected social welfare are lower under Cournot competition than under Bertrand competition. In particular, we surprisingly find that under either type of competition, the demand switch ratio caused by security breaches may benefit firms, consumers, government sectors and harm hackers. Our results provide some relevant managerial insights into formulating the strategies of security investments and information sharing for the firms transforming from one type of competition to the other.
引用
收藏
页码:361 / 377
页数:17
相关论文
共 43 条
[1]   The economics of information security [J].
Anderson, Ross ;
Moore, Tyler .
SCIENCE, 2006, 314 (5799) :610-613
[2]  
[Anonymous], 2007, Journal of Accounting and Public Policy, DOI DOI 10.1016/J.JACCPUBPOL.2007.10.001
[3]  
[Anonymous], 2003, Journal of Accounting and Public Policy, DOI [10.1016/j.jaccpubpol.2003.09.001, DOI 10.1016/J.JACCPUBPOL.2003.09.001]
[4]   Dynamic competition in IT security: A differential games approach [J].
Bandyopadhyay, Tridib ;
Liu, Dengpan ;
Mookerjee, Vijay S. ;
Wilhite, Allen W. .
INFORMATION SYSTEMS FRONTIERS, 2014, 16 (04) :643-661
[5]   Decision-theoretic and game-theoretic approaches to IT security investment [J].
Cavusoglu, Huseyin ;
Raghunathan, Srinivasan ;
Yue, Wei T. .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) :281-304
[6]   Dynamic R&D with spillovers: Competition vs cooperation [J].
Cellini, Roberto ;
Lambertini, Luca .
JOURNAL OF ECONOMIC DYNAMICS & CONTROL, 2009, 33 (03) :568-582
[7]   Competition, Speculative Risks, and IT Security Outsourcing [J].
Cezar, Asunur ;
Cavusoglu, Huseyin ;
Raghunathan, Srinivasan .
ECONOMICS OF INFORMATION SECURITY AND PRIVACY, 2010, :301-+
[8]   Bertrand vs. Cournot equilibrium with risk averse firms and cost uncertainty [J].
Cheng, H .
ECONOMIC THEORY, 2002, 20 (03) :555-577
[9]   COMPARING BERTRAND AND COURNOT EQUILIBRIA - A GEOMETRIC APPROACH [J].
CHENG, L .
RAND JOURNAL OF ECONOMICS, 1985, 16 (01) :146-152
[10]   Contest success functions: an extension [J].
Clark, DJ ;
Riis, C .
ECONOMIC THEORY, 1998, 11 (01) :201-204