Security investment and information sharing under an alternative security breach probability function

被引:0
|
作者
Xing Gao
Weijun Zhong
Shue Mei
机构
[1] Southeast University,School of Economics and Management
来源
Information Systems Frontiers | 2015年 / 17卷
关键词
Security investment; Information sharing; Interdependence; Social planner; Security breach probability function;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, in order to protect information assets, many firms have gradually realized the importance of security investment and information sharing. It is worth pointing out that security breach probability functions play a vital role in firms’ strategic choices. This paper investigates how to determine security investment and information sharing for two firms by employing an alternative well-accepted security breach probability function. In particular, assuming that both firms make their decisions individually, we analyze information sharing, aggregate attack, aggregate defense and the security breach probability at equilibrium. Then we compare these results with those in three (partially) centralized decision cases where a social planner regulates security investment, information sharing or both of them. Between the individual decision case and the partially centralized decision case with the social planner only controlling information sharing, and between the centralized decision case and the other partially centralized decision case, we demonstrate that, although aggregate attack, aggregate defense and the security breach probability remain unchanged, more intervention from the social planner would give rise to higher social welfare. Besides, it turns out that some well-known results of Hausken (Journal of Accounting and Public Policy, 26(6), 639–688, 2007) drastically change in our framework.
引用
收藏
页码:423 / 438
页数:15
相关论文
共 50 条
  • [1] Security investment and information sharing under an alternative security breach probability function
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    INFORMATION SYSTEMS FRONTIERS, 2015, 17 (02) : 423 - 438
  • [2] Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    Kjell Hausken
    Information Systems Frontiers, 2006, 8 : 338 - 349
  • [3] Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    Hausken, Kjell
    INFORMATION SYSTEMS FRONTIERS, 2006, 8 (05) : 338 - 349
  • [4] Knowledge sharing and investment decisions in information security
    Liu, Dengpan
    Ji, Yonghua
    Mookerjee, Vijay
    DECISION SUPPORT SYSTEMS, 2011, 52 (01) : 95 - 107
  • [5] A game-theoretic analysis of information sharing and security investment for complementary firms
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2014, 65 (11) : 1682 - 1691
  • [6] A differential game approach to security investment and information sharing in a competitive environment
    Gao, Xing
    Zhong, Weijun
    IIE TRANSACTIONS, 2016, 48 (06) : 511 - 526
  • [7] Information sharing and security investment for substitutable firms: A game-theoretic analysis
    Gao, Xing
    Gong, Siyu
    Wang, Ying
    Zhang, Yanfang
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2024, 75 (04) : 799 - 820
  • [8] ON THE SHARING OF CYBER SECURITY INFORMATION
    Luiijf, Eric
    Klaver, Marieke
    CRITICAL INFRASTRUCTURE PROTECTION IX, 2015, 466 : 29 - 46
  • [9] Rules in information sharing for security
    Chan, Janet
    Logan, Sarah
    Bennett Moses, Lyria
    CRIMINOLOGY & CRIMINAL JUSTICE, 2022, 22 (02) : 304 - 322
  • [10] A new game of information sharing and security investment between two allied firms
    Qian, Xiaofei
    Liu, Xinbao
    Pei, Jun
    Pardalos, Panos M.
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2018, 56 (12) : 4069 - 4086