Information security decisions of security-interdependent firms in the presence of consumer sensitivity

被引:0
|
作者
Wu, Yong [1 ]
Jin, Zhijie [1 ]
Dai, Tao [1 ]
Yang, Dong [1 ]
机构
[1] Donghua Univ, Glorious Sun Sch Business & Management, Shanghai, Peoples R China
关键词
INVESTMENT; CONTRACTS; SERVICES; DESIGN;
D O I
10.1002/mde.4345
中图分类号
F [经济];
学科分类号
02 ;
摘要
Firms suffer security-interdependent risks while applying network technology, causing severe customer churn. This paper studies the security and price decisions of security-interdependent firms that face security-sensitivity consumers. We show that one firm's product price increases (decreases) with the other's security efforts under positive (negative) interdependence. Firms can overinvest or underinvest in security due to security interdependence. Two mechanisms are proposed to solve this distortion. In the Reward mechanism, the firms reward (penalize) the other under the positive (negative) interdependence. In the Outsourcing mechanism, the security service providers raise (reduce) the compensations with consumer sensitivity.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Information security decisions of firms considering security risk interdependency
    Wu, Yong
    Wang, Linping
    Cheng, Dong
    Dai, Tao
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2021, 178
  • [2] A Survey of Interdependent Information Security Games
    Laszka, Aron
    Felegyhazi, Mark
    Buttyan, Levente
    [J]. ACM COMPUTING SURVEYS, 2015, 47 (02)
  • [3] Information security decisions for two firms in a market with different types of customers
    Xiaofei Qian
    Jun Pei
    Xinbao Liu
    Mi Zhou
    Panos M. Pardalos
    [J]. Journal of Combinatorial Optimization, 2019, 38 : 1263 - 1285
  • [4] Decisions making in information security outsourcing: Impact of complementary and substitutable firms
    Wu, Yong
    Fung, Richard Y. K.
    Feng, Gengzhong
    Wang, Nengmin
    [J]. COMPUTERS & INDUSTRIAL ENGINEERING, 2017, 110 : 1 - 12
  • [5] Information security decisions for two firms in a market with different types of customers
    Qian, Xiaofei
    Pei, Jun
    Liu, Xinbao
    Zhou, Mi
    Pardalos, Panos M.
    [J]. JOURNAL OF COMBINATORIAL OPTIMIZATION, 2019, 38 (04) : 1263 - 1285
  • [6] Firms' information security investment decisions: Stock market evidence of investors' behavior
    Chai, Sangmi
    Kim, Minkyun
    Rao, H. Raghav
    [J]. DECISION SUPPORT SYSTEMS, 2011, 50 (04) : 651 - 661
  • [7] Information Handling in Security Solution Decisions
    Based, Md Abdul
    [J]. INNOVATIONS AND ADVANCES IN COMPUTER SCIENCES AND ENGINEERING, 2010, : 383 - 388
  • [8] Whither information security? Examining the complementarities and substitutive effects among IT and information security firms
    Khansa, Lara
    Liginlal, Divakaran
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2012, 32 (03) : 271 - 281
  • [9] Information security investment for competitive firms with hacker behavior and security requirements
    Gao, Xing
    Zhong, Weijun
    [J]. ANNALS OF OPERATIONS RESEARCH, 2015, 235 (01) : 277 - 300
  • [10] Information security investment for competitive firms with hacker behavior and security requirements
    Xing Gao
    Weijun Zhong
    [J]. Annals of Operations Research, 2015, 235 : 277 - 300