A game theory model of cybersecurity investments with information asymmetry

被引:10
|
作者
Nagurney, Anna [1 ]
Nagurney, Ladimer S. [2 ]
机构
[1] Univ Massachusetts, Isenberg Sch Management, Amherst, MA 01003 USA
[2] Univ Hartford, Dept Elect & Comp Engn, Hartford, CT 06117 USA
来源
NETNOMICS | 2015年 / 16卷 / 1-2期
基金
美国国家科学基金会;
关键词
Cybersecurity; Investments; Game theory; Nash equilibrium; Information asymmetry; Variational inequalities;
D O I
10.1007/s11066-015-9094-7
中图分类号
F [经济];
学科分类号
02 ;
摘要
In this paper, we develop a game theory model consisting of sellers and buyers with sellers competing non-cooperatively in order to maximize their expected profits by determining their optimal product transactions as well as cybersecurity investments. The buyers reflect their preferences through the demand price functions, which depend on the product demands and on the average level of security in the marketplace. We demonstrate that the governing equilibrium conditions of this model with security information asymmetry can be formulated as a variational inequality problem. We provide qualitative properties and propose an algorithmic scheme that is easy to implement. Three sets of numerical examples are presented which reveal the impacts of the addition of buyers and sellers and a variety of changes in demand price and investment cost functions on the equilibrium product transaction and security level patterns.
引用
收藏
页码:127 / 148
页数:22
相关论文
共 50 条
  • [1] A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
    Anna Nagurney
    Patrizia Daniele
    Shivani Shukla
    [J]. Annals of Operations Research, 2017, 248 : 405 - 427
  • [2] A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
    Nagurney, Anna
    Daniele, Patrizia
    Shukla, Shivani
    [J]. ANNALS OF OPERATIONS RESEARCH, 2017, 248 (1-2) : 405 - 427
  • [3] Research on the Project Supervision Game Model Based on the Information Asymmetry Theory
    Zheng, Xiazhong
    Guo, Jie
    Chen, Shu
    [J]. 2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 486 - +
  • [4] A Coalitional Game Theory Approach for Cybersecurity Information Sharing
    Vakilinia, Iman
    Sengupta, Shamik
    [J]. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 237 - 242
  • [5] Game Theory for Privacy-Preserving Cybersecurity Information Exchange Framework
    Astaburuaga, Ignacio
    Sengupta, Shamik
    [J]. 2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 730 - 735
  • [6] Optimal Cybersecurity Investments for SIS Model
    Mai, Van Sy
    La, Richard J.
    Battou, Abdella
    [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [7] A game theory based cybersecurity assessment model for advanced manufacturing systems
    Zarreh, Alireza
    Saygin, Can
    Wan, HungDa
    Lee, Yooneun
    Bracho, Alejandro
    [J]. 46TH SME NORTH AMERICAN MANUFACTURING RESEARCH CONFERENCE, NAMRC 46, 2018, 26 : 1255 - 1264
  • [8] N-Player Cybersecurity Game Theory Model in Power Grids
    Egan, Matthew S.
    Sengupta, Shamik
    [J]. 2023 NORTH AMERICAN POWER SYMPOSIUM, NAPS, 2023,
  • [9] GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments
    Kalderemidis, Ioannis
    Farao, Aristeidis
    Bountakas, Panagiotis
    Panda, Sakshyam
    Xenakis, Christos
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [10] Advertising investments, information asymmetry, and insider gains
    Joseph, Kissan
    Wintoki, M. Babajide
    [J]. JOURNAL OF EMPIRICAL FINANCE, 2013, 22 : 1 - 15