Information security investment for complementary and substitutable firms: The role of technology similarity

被引:5
|
作者
Gao, Xing [1 ]
Qiu, Manting [1 ]
Gong, Siyu [1 ]
Wang, Ying [1 ]
Zhang, Yanfang [2 ]
机构
[1] Southeast Univ, Sch Econ & Management, Nanjing 211189, Jiangsu, Peoples R China
[2] Nanjing Univ Finance & Econ, Sch Econ, Nanjing 210023, Jiangsu, Peoples R China
关键词
Information security; Technical similarity; Complementation; Substitution; DIFFERENTIAL GAME APPROACH;
D O I
10.1016/j.eswa.2023.120129
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
While technology similarity in network security aggravates breach interdependence, it can improve the effi-ciency of security information sharing. This paper examines the effect of technology similarity on information security investment with mandatory standards through constructing a game-theoretic model with two firms whose information assets are complementary and substitutable respectively. We show that for strict mandatory standards, while technology similarity first decreases and then increases the cost functions of complementary firms, it always decreases the cost functions of substitutable firms. We find that security information sharing always decreases the cost functions of both complementary and substitutable firms and thus should be encouraged. We reveal that when mandatory standards become much stricter, the cost functions of comple-mentary firms always increase but the cost functions of substitutable firms increase if and only if the substitution degree remains relatively high. Finally, we demonstrate that hacker learning, as a factor to intensify breach interdependence, benefits substitutable firms and harms complementary firms in the case of strict mandatory standards.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Decisions making in information security outsourcing: Impact of complementary and substitutable firms
    Wu, Yong
    Fung, Richard Y. K.
    Feng, Gengzhong
    Wang, Nengmin
    [J]. COMPUTERS & INDUSTRIAL ENGINEERING, 2017, 110 : 1 - 12
  • [2] Information sharing and security investment for substitutable firms: A game-theoretic analysis
    Gao, Xing
    Gong, Siyu
    Wang, Ying
    Zhang, Yanfang
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2024, 75 (04) : 799 - 820
  • [3] A game-theoretic analysis of information sharing and security investment for complementary firms
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2014, 65 (11) : 1682 - 1691
  • [4] An economic analysis of information security investment decision making for substitutable enterprises
    Li, Xiaotong
    Xue, Qianyao
    [J]. MANAGERIAL AND DECISION ECONOMICS, 2021, 42 (05) : 1306 - 1316
  • [5] Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size
    Liu, Xinbao
    Qian, Xiaofei
    Pei, Jun
    Pardalos, Panos M.
    [J]. JOURNAL OF GLOBAL OPTIMIZATION, 2018, 70 (02) : 413 - 436
  • [6] Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size
    Xinbao Liu
    Xiaofei Qian
    Jun Pei
    Panos M. Pardalos
    [J]. Journal of Global Optimization, 2018, 70 : 413 - 436
  • [7] A game of information security investment considering security insurance and complementary information assets
    Qian, Xiaofei
    Yang, Wujuan
    Pei, Jun
    Liu, Xinbao
    Pardalos, Panos M.
    [J]. INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH, 2022, 29 (03) : 1791 - 1824
  • [8] Decomposing Complementary and Substitutable Relations for Intercorporate Investment Recommendation
    Dai, Le
    Yin, Yu
    Qin, Chuan
    Chen, Enhong
    Xiong, Hui
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2022, : 909 - 914
  • [9] Information security investment for competitive firms with hacker behavior and security requirements
    Xing Gao
    Weijun Zhong
    [J]. Annals of Operations Research, 2015, 235 : 277 - 300
  • [10] Information security investment for competitive firms with hacker behavior and security requirements
    Gao, Xing
    Zhong, Weijun
    [J]. ANNALS OF OPERATIONS RESEARCH, 2015, 235 (01) : 277 - 300