A COMPETITIVE ANALYSIS OF INFORMATION SECURITY INVESTMENT: THE ROLE OF HACKER ATTACKS

被引:1
|
作者
Gao, Xing [1 ]
Yang, Donghui [1 ]
机构
[1] Southeast Univ, Sch Econ & Management, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Information security investment; security differentiation; market competition; SOFTWARE SECURITY; LIABILITY; INCENTIVES; DECISIONS; EXCHANGE; POLICIES; FIRMS;
D O I
10.3934/jimo.2022208
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The role of hacker attacks on information security investment and firm profits is fundamental in information security economics, which, however, has not been fully examined yet. This paper builds a duopolistic horizontal differentiation model to study this issue and yields a series of interesting findings. First, we find that each firm may benefit from an increase of the probability of hacker attacks when it gains more from security differentiation and suffers less from investment competition. Second, when market competition becomes fiercer, each firm invests less in information security to maintain security differentiation. Third, each firm may benefit from an increase of consumer security loss because the resulting security investment can lead to a more desirable security differentiation. Finally, an increase of cost coefficient of security investment may be profitable to each firm in spite of an increase of security expenditure. This is because an increase of cost coefficient may facilitate security differentiation through discouraging security investment. Additionally, the model is extended to analytically and numerically check the robustness of the main results.
引用
收藏
页码:6104 / 6129
页数:26
相关论文
共 50 条
  • [1] Information security investment for competitive firms with hacker behavior and security requirements
    Xing Gao
    Weijun Zhong
    [J]. Annals of Operations Research, 2015, 235 : 277 - 300
  • [2] Information security investment for competitive firms with hacker behavior and security requirements
    Gao, Xing
    Zhong, Weijun
    [J]. ANNALS OF OPERATIONS RESEARCH, 2015, 235 (01) : 277 - 300
  • [3] COMPETITIVE INFORMATION SECURITY INVESTMENT UNDER HACKER KNOWLEDGE DISSEMINATION
    Gao, Xing
    [J]. JOURNAL OF INDUSTRIAL AND MANAGEMENT OPTIMIZATION, 2023, 19 (06) : 4199 - 4221
  • [4] Do Hacker Forums Contribute to Security Attacks?
    Wang, Qiu-Hong
    Yue, Wei T.
    Hui, Kai-Lung
    [J]. E-LIFE: WEB-ENABLED CONVERGENCE OF COMMERCE, WORK, AND SOCIAL LIFE, 2012, 108 : 143 - 152
  • [5] Interdependency Analysis in Security Investment against Strategic Attacks
    Mansooreh Ezhei
    Behrouz Tork Ladani
    [J]. Information Systems Frontiers, 2020, 22 : 187 - 201
  • [6] Interdependency Analysis in Security Investment against Strategic Attacks
    Ezhei, Mansooreh
    Ladani, Behrouz
    [J]. INFORMATION SYSTEMS FRONTIERS, 2020, 22 (01) : 187 - 201
  • [7] A differential game approach to security investment and information sharing in a competitive environment
    Gao, Xing
    Zhong, Weijun
    [J]. IIE TRANSACTIONS, 2016, 48 (06) : 511 - 526
  • [8] Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints
    Huang, C. Derrick
    Behara, Ravi S.
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2013, 141 (01) : 255 - 268
  • [9] Analysis of Security Mechanisms to Mitigate Hacker Attacks to Improve e-Commerce Management in Ecuador
    Toapanta Toapanta, Segundo Moises
    Mera Caicedo, Harold Ariel
    Naranjo Sanchez, Bertha Alice
    Mafla Gallegos, Luis Enrique
    [J]. 2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2020), 2020, : 242 - 250
  • [10] Analysis of Information Security Attacks on Mobile Messaging Applications
    Ramamoorthi, Lokesh
    Peko, Gabrielle
    Sundaram, David
    [J]. 25TH AMERICAS CONFERENCE ON INFORMATION SYSTEMS (AMCIS 2019), 2019,