Information sharing and security investment for substitutable firms: A game-theoretic analysis

被引:3
|
作者
Gao, Xing [1 ]
Gong, Siyu [1 ]
Wang, Ying [1 ]
Zhang, Yanfang [2 ,3 ]
机构
[1] Southeast Univ, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Finance & Econ, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Finance & Econ, Sch Econ, Nanjing, Jiangsu, Peoples R China
关键词
Substitutable firms; security investment; information sharing; game theory; ATTACK; IMPACT;
D O I
10.1080/01605682.2023.2210594
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
There are several types of relations between information assets of two firms, among which substitutable relation is such that even when one of the firms is successfully breached by one hacker, both firms would incur loss and the hacker gets benefit. This paper examines security investment and information sharing of two substitutable firms through constructing a game-theoretic model between these firms and one hacker. We derive the following interesting results: (a) the firm with more efficient security investment suffers weaker cyber-attack from the hacker because the rational hacker would switch its emphasis to the less efficient firm; (b) one firm's aggregate defense increases with its unit investment cost for the positive interdependence when this cost remains high due to more shared information and enhanced security investment from the other firm; (c) although a widely-used compensation mechanism can urge the firms to invest more when security loss remains low, it increases their expected costs because of the excess investment; (d) unlike simultaneous game, each firm's aggregate defense always increases with the unit cost of cyber-attacks under sequential game since the hacker has an advantage of learning the firms' security decisions. These results give fresh managerial guidelines to security experts of firms.
引用
收藏
页码:799 / 820
页数:22
相关论文
共 50 条
  • [1] A game-theoretic analysis of information sharing and security investment for complementary firms
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2014, 65 (11) : 1682 - 1691
  • [2] A game-theoretic analysis of information security investment for multiple firms in a network
    Qian, Xiaofei
    Liu, Xinbao
    Pei, Jun
    Pardalos, Panos M.
    Liu, Lin
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2017, 68 (10) : 1290 - 1305
  • [3] An evolutionary game-theoretic analysis of enterprise information security investment based on information sharing platform
    Li, Xiaotong
    [J]. MANAGERIAL AND DECISION ECONOMICS, 2022, 43 (03) : 595 - 606
  • [4] Game-theoretic approach for information sharing
    Raweewan, Morrakot
    Ferrell, William G., Jr.
    [J]. 2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 111 - +
  • [5] A Game-Theoretic Analysis of Security Investment for Service Computing Applications
    Ye, Xinfeng
    [J]. 2014 IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2014, : 224 - 231
  • [6] Game Theoretic Modeling to Enforce Security Information Sharing among Firms
    Tosh, Deepak K.
    Sengupta, Shamik
    Mukhopadhyay, Sankar
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 7 - 12
  • [7] Decision-theoretic and game-theoretic approaches to IT security investment
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    Yue, Wei T.
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) : 281 - 304
  • [8] Game-theoretic approach for partial sharing of information
    Raweewan, Morrakot
    Ferrell, William G., Jr.
    [J]. 2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 122 - +
  • [9] A Game-Theoretic Analysis for Complementary and Substitutable IoT Services Delivery With Externalities
    Zhang, Yang
    Xiong, Zehui
    Niyato, Dusit
    Wang, Ping
    Poor, H. Vincent
    Kim, Dong In
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (01) : 615 - 629
  • [10] Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach
    Gupta, Rohit
    Biswas, Baidyanath
    Biswas, Indranil
    Sana, Shib Sankar
    [J]. INFORMATION AND COMPUTER SECURITY, 2021, 29 (01) : 73 - 104