Security investment and information sharing under an alternative security breach probability function

被引:0
|
作者
Xing Gao
Weijun Zhong
Shue Mei
机构
[1] Southeast University,School of Economics and Management
来源
Information Systems Frontiers | 2015年 / 17卷
关键词
Security investment; Information sharing; Interdependence; Social planner; Security breach probability function;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, in order to protect information assets, many firms have gradually realized the importance of security investment and information sharing. It is worth pointing out that security breach probability functions play a vital role in firms’ strategic choices. This paper investigates how to determine security investment and information sharing for two firms by employing an alternative well-accepted security breach probability function. In particular, assuming that both firms make their decisions individually, we analyze information sharing, aggregate attack, aggregate defense and the security breach probability at equilibrium. Then we compare these results with those in three (partially) centralized decision cases where a social planner regulates security investment, information sharing or both of them. Between the individual decision case and the partially centralized decision case with the social planner only controlling information sharing, and between the centralized decision case and the other partially centralized decision case, we demonstrate that, although aggregate attack, aggregate defense and the security breach probability remain unchanged, more intervention from the social planner would give rise to higher social welfare. Besides, it turns out that some well-known results of Hausken (Journal of Accounting and Public Policy, 26(6), 639–688, 2007) drastically change in our framework.
引用
收藏
页码:423 / 438
页数:15
相关论文
共 50 条
  • [31] Returns to information security investment: Endogenizing the expected loss
    Kjell Hausken
    Information Systems Frontiers, 2014, 16 : 329 - 336
  • [32] Secure and Robust Cyber Security Threat Information Sharing
    Bkakria, Anis
    Yaich, Reda
    Arabi, Walid
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 3 - 18
  • [33] Security screening metrics for information-sharing partnerships
    Yu, Wendy
    Collier, Zachary A.
    Thekdi, Shital
    RISK ANALYSIS, 2024, 44 (07) : 1560 - 1572
  • [34] Towards Trustworthy Information Sharing by Creating Cyber Security Alliances
    Deljoo, Ameneh
    van Engers, Tom
    Koning, Ralph
    Gommans, Leon
    de Laat, Cees
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1506 - 1510
  • [35] Proposal of the security information sharing system with RDF site summary
    Terada, M
    Doi, N
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 41 - 46
  • [36] COMPREHENSIVE APPROACH TO INFORMATION SHARING FOR INCREASED NETWORK SECURITY AND SURVIVABILITY
    Choras, Michal
    CYBERNETICS AND SYSTEMS, 2013, 44 (6-7) : 550 - 568
  • [37] Can We Evaluate the Impact of Cyber Security Information Sharing?
    Zibak, Adam
    Simpson, Andrew
    2018 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2018,
  • [38] Security Requirements and Controls for Incident Information Sharing in the Polish Power System
    Leszczyna, Rafal
    Wrobel, Michal R.
    Malkowski, Robert
    2016 10TH INTERNATIONAL CONFERENCE ON COMPATIBILITY, POWER ELECTRONICS AND POWER ENGINEERING (CPE-POWERENG), 2016, : 94 - 99
  • [39] Security Information Sharing for Smart Grids Developing the Right Data Model
    Leszczyna, Rafal
    Wrobel, Michal R.
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 163 - 169
  • [40] WISCS 2014: The First ACM Workshop on Information Sharing and Collaborative Security
    Sander, Tomas
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1552 - 1553