Security investment and information sharing under an alternative security breach probability function

被引:0
|
作者
Xing Gao
Weijun Zhong
Shue Mei
机构
[1] Southeast University,School of Economics and Management
来源
Information Systems Frontiers | 2015年 / 17卷
关键词
Security investment; Information sharing; Interdependence; Social planner; Security breach probability function;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, in order to protect information assets, many firms have gradually realized the importance of security investment and information sharing. It is worth pointing out that security breach probability functions play a vital role in firms’ strategic choices. This paper investigates how to determine security investment and information sharing for two firms by employing an alternative well-accepted security breach probability function. In particular, assuming that both firms make their decisions individually, we analyze information sharing, aggregate attack, aggregate defense and the security breach probability at equilibrium. Then we compare these results with those in three (partially) centralized decision cases where a social planner regulates security investment, information sharing or both of them. Between the individual decision case and the partially centralized decision case with the social planner only controlling information sharing, and between the centralized decision case and the other partially centralized decision case, we demonstrate that, although aggregate attack, aggregate defense and the security breach probability remain unchanged, more intervention from the social planner would give rise to higher social welfare. Besides, it turns out that some well-known results of Hausken (Journal of Accounting and Public Policy, 26(6), 639–688, 2007) drastically change in our framework.
引用
收藏
页码:423 / 438
页数:15
相关论文
共 50 条
  • [21] Economic incentives in security information sharing: the effects of market structures
    Xing Gao
    Weijun Zhong
    Information Technology and Management, 2016, 17 : 361 - 377
  • [22] WHERE IS IT IN INFORMATION SECURITY? THE INTERRELATIONSHIP AMONG IT INVESTMENT, SECURITY AWARENESS, AND DATA BREACHES
    Li, Wilson Weixun
    Leung, Alvin Chung Man
    Yue, Wei Thoo
    MIS QUARTERLY, 2023, 47 (01) : 317 - 342
  • [23] Security Information Sharing for the Polish Power System
    Leszczyna, Rafal
    Losinski, Maciej
    Malkowski, Robert
    2015 MODERN ELECTRIC POWER SYSTEMS (MEPS), 2015,
  • [24] Security risks in USAF geospatial information sharing
    Bryant, Scott
    Grimaila, Michael
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 25 - 32
  • [25] Economic incentives in security information sharing: the effects of market structures
    Gao, Xing
    Zhong, Weijun
    INFORMATION TECHNOLOGY & MANAGEMENT, 2016, 17 (04) : 361 - 377
  • [26] A value-at-risk approach to information security investment
    Wang, Jingguo
    Chaudhury, Aby
    Rao, H. Raghav
    INFORMATION SYSTEMS RESEARCH, 2008, 19 (01) : 106 - 120
  • [27] Information Sharing and Security for a Memory Channel Communication Network
    Kawanaka, Takaaki
    Rokugawa, Shuichi
    Yamashita, Hiroshi
    INDUSTRIAL ENGINEERING AND MANAGEMENT SYSTEMS, 2018, 17 (03): : 444 - 453
  • [28] Homeland security: Sharing and managing critical incident information
    Ashley, WR
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND DEFENSE AND LAW ENFORCEMENT II, 2003, 5071 : 6 - 11
  • [29] A Collaborative Information Sharing Framework for Community Cyber Security
    Zhao, Wanying
    White, Gregory
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 457 - 462
  • [30] Returns to information security investment: Endogenizing the expected loss
    Hausken, Kjell
    INFORMATION SYSTEMS FRONTIERS, 2014, 16 (02) : 329 - 336