A game theory model of cybersecurity investments with information asymmetry

被引:10
|
作者
Nagurney, Anna [1 ]
Nagurney, Ladimer S. [2 ]
机构
[1] Univ Massachusetts, Isenberg Sch Management, Amherst, MA 01003 USA
[2] Univ Hartford, Dept Elect & Comp Engn, Hartford, CT 06117 USA
来源
NETNOMICS | 2015年 / 16卷 / 1-2期
基金
美国国家科学基金会;
关键词
Cybersecurity; Investments; Game theory; Nash equilibrium; Information asymmetry; Variational inequalities;
D O I
10.1007/s11066-015-9094-7
中图分类号
F [经济];
学科分类号
02 ;
摘要
In this paper, we develop a game theory model consisting of sellers and buyers with sellers competing non-cooperatively in order to maximize their expected profits by determining their optimal product transactions as well as cybersecurity investments. The buyers reflect their preferences through the demand price functions, which depend on the product demands and on the average level of security in the marketplace. We demonstrate that the governing equilibrium conditions of this model with security information asymmetry can be formulated as a variational inequality problem. We provide qualitative properties and propose an algorithmic scheme that is easy to implement. Three sets of numerical examples are presented which reveal the impacts of the addition of buyers and sellers and a variety of changes in demand price and investment cost functions on the equilibrium product transaction and security level patterns.
引用
收藏
页码:127 / 148
页数:22
相关论文
共 50 条
  • [21] Game theoretic approach applied in cybersecurity information exchange framework
    Thakkar, Ankita
    Badsha, Shahriar
    Sengupta, Shamik
    [J]. 2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [22] Cybersecurity graph model of information resources
    Nesterenko A.V.
    Netesin I.E.
    [J]. Journal of Automation and Information Sciences, 2020, 52 (08) : 14 - 31
  • [23] Teaching Game Theory to Improve Adversarial Thinking in Cybersecurity Students
    Hamman, Seth T.
    Hopkinson, Kenneth M.
    Markham, Ruth L.
    Chaplik, Andrew M.
    Metzler, Gabrielle E.
    [J]. IEEE TRANSACTIONS ON EDUCATION, 2017, 60 (03) : 205 - 211
  • [24] Adverse Selection Problem Analysis in E-commerce Information Asymmetry Based on Game Theory
    Li Yanhong
    [J]. RECENT ACHIEVEMENT ON MERGING SUPPLY CHAIN AND E-COMMERCE IN CHINA, 2009, : 116 - 119
  • [25] An Information Source Selection Model Based on Evolutionary Game Theory
    Deng, Xinyang
    Jiang, Wen
    Wang, Zhen
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2020, 385
  • [26] AI and Game Theory based Autonomous UAV Swarm for Cybersecurity
    Kusyk, Janusz
    Uyar, M. Umit
    Ma, Kelvin
    Plishka, Joseph
    Bertoli, Giorgio
    Boksiner, Jeffrey
    [J]. MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [27] Optimal Cybersecurity Investments Using SIS Model: Weakly Connected Networks
    Van Sy Mai
    La, Richard J.
    Battou, Abdella
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6097 - 6102
  • [28] A game theory model for freight service provision security investments for high-value cargo
    Nagurney, Anna
    Shukla, Shivani
    Nagurney, Ladimer S.
    Saberi, Sara
    [J]. ECONOMICS OF TRANSPORTATION, 2018, 16 : 21 - 28
  • [29] Analyzing information system investments: A game-theoretic approach
    Butterfield, J
    Pendegraft, N
    [J]. INFORMATION SYSTEMS MANAGEMENT, 2001, 18 (03) : 73 - 82
  • [30] Effects of information asymmetry on cooperation in the prisoners' dilemma game
    王锡朋
    姜罗罗
    汪秉宏
    [J]. Chinese Physics B, 2012, (07) : 78 - 83