Security investment and information sharing under an alternative security breach probability function

被引:0
|
作者
Xing Gao
Weijun Zhong
Shue Mei
机构
[1] Southeast University,School of Economics and Management
来源
Information Systems Frontiers | 2015年 / 17卷
关键词
Security investment; Information sharing; Interdependence; Social planner; Security breach probability function;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, in order to protect information assets, many firms have gradually realized the importance of security investment and information sharing. It is worth pointing out that security breach probability functions play a vital role in firms’ strategic choices. This paper investigates how to determine security investment and information sharing for two firms by employing an alternative well-accepted security breach probability function. In particular, assuming that both firms make their decisions individually, we analyze information sharing, aggregate attack, aggregate defense and the security breach probability at equilibrium. Then we compare these results with those in three (partially) centralized decision cases where a social planner regulates security investment, information sharing or both of them. Between the individual decision case and the partially centralized decision case with the social planner only controlling information sharing, and between the centralized decision case and the other partially centralized decision case, we demonstrate that, although aggregate attack, aggregate defense and the security breach probability remain unchanged, more intervention from the social planner would give rise to higher social welfare. Besides, it turns out that some well-known results of Hausken (Journal of Accounting and Public Policy, 26(6), 639–688, 2007) drastically change in our framework.
引用
收藏
页码:423 / 438
页数:15
相关论文
共 50 条
  • [41] An Improved Grayscale Visual Secret Sharing Scheme for Visual Information Security
    Blesswin, A. John
    Visalakshi, P.
    2013 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2013, : 560 - 564
  • [42] Blockchain Based Sharing of Security Information for Critical Infrastructures of the Finance Sector
    Karagiannis, Ioannis
    Mavrogiannis, Konstantinos
    Soldatos, John
    Drakoulis, Dimitris
    Troiano, Ernesto
    Polyviou, Ariana
    COMPUTER SECURITY: ESORICS 2019 INTERNATIONAL WORKSHOPS, IOSEC, MSTEC, AND FINSEC, 2020, 11981 : 226 - 241
  • [43] The Design of Enterprise Network Information Sharing Scheme Based on Security Technology
    Ji, Jun
    Xing, Fei-Fei
    Zang, Yu-Qing
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 : 623 - 626
  • [44] Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information
    Nick Hajli
    Xiaolin Lin
    Journal of Business Ethics, 2016, 133 : 111 - 123
  • [45] Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information
    Hajli, Nick
    Lin, Xiaolin
    JOURNAL OF BUSINESS ETHICS, 2016, 133 (01) : 111 - 123
  • [46] Information sharing in cybersecurity Enhancing security, trust and privacy by capacity building
    Ghernaouti, Solange
    Cellier, Leonore
    Wanner, Bastien
    2019 3RD CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2019,
  • [47] Security Investment under Cognitive Constraints: A Gestalt Nash Equilibrium Approach
    Chen, Juntao
    Zhu, Quanyan
    2018 52ND ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2018,
  • [48] Retailer information sharing under endogenous channel structure with investment spillovers
    Huang, Song
    Chen, Shuting
    Guan, Xu
    COMPUTERS & INDUSTRIAL ENGINEERING, 2020, 142
  • [49] Optimal information sharing strategy for retailer under competitive manufacturers' innovation investment
    Wang T.-Y.
    Li J.-J.
    Li Y.-L.
    Kongzhi yu Juece/Control and Decision, 2021, 35 (12): : 3006 - 3016
  • [50] WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security
    Kerschbaum, Florian
    Blass, Erik-Oliver
    Sander, Tomas
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1877 - 1878