Information sharing and security investment for substitutable firms: A game-theoretic analysis

被引:3
|
作者
Gao, Xing [1 ]
Gong, Siyu [1 ]
Wang, Ying [1 ]
Zhang, Yanfang [2 ,3 ]
机构
[1] Southeast Univ, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Finance & Econ, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Finance & Econ, Sch Econ, Nanjing, Jiangsu, Peoples R China
关键词
Substitutable firms; security investment; information sharing; game theory; ATTACK; IMPACT;
D O I
10.1080/01605682.2023.2210594
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
There are several types of relations between information assets of two firms, among which substitutable relation is such that even when one of the firms is successfully breached by one hacker, both firms would incur loss and the hacker gets benefit. This paper examines security investment and information sharing of two substitutable firms through constructing a game-theoretic model between these firms and one hacker. We derive the following interesting results: (a) the firm with more efficient security investment suffers weaker cyber-attack from the hacker because the rational hacker would switch its emphasis to the less efficient firm; (b) one firm's aggregate defense increases with its unit investment cost for the positive interdependence when this cost remains high due to more shared information and enhanced security investment from the other firm; (c) although a widely-used compensation mechanism can urge the firms to invest more when security loss remains low, it increases their expected costs because of the excess investment; (d) unlike simultaneous game, each firm's aggregate defense always increases with the unit cost of cyber-attacks under sequential game since the hacker has an advantage of learning the firms' security decisions. These results give fresh managerial guidelines to security experts of firms.
引用
收藏
页码:799 / 820
页数:22
相关论文
共 50 条
  • [31] Robust and Scalable Game-theoretic Security Investment Methods for Voltage Stability of Power Systems
    An, Lu
    Shukla, Pratishtha
    Chakrabortty, Aranya
    Duel-Hallen, Alexandra
    [J]. 2023 62ND IEEE CONFERENCE ON DECISION AND CONTROL, CDC, 2023, : 7061 - 7066
  • [32] A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation
    D'Acquisto, Giuseppe
    Flamini, Marta
    Naldi, Maurizio
    [J]. INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 412 - 423
  • [33] GAME-THEORETIC ANALYSES AND SIMULATIONS OF ADOPTIONS OF SECURITY POLICIES FOR DRM IN CONTENTS SHARING SCENARIO
    Zhang, Zhiyong
    Pei, Qingqi
    Ma, Jianfeng
    Yang, Lin
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02): : 191 - 203
  • [34] Financial reforms and regional investment conflicts in China: A game-theoretic analysis
    Li, XM
    Ma, Y
    [J]. ECONOMICS OF PLANNING, 1996, 29 (02): : 117 - 130
  • [35] An economic analysis of information security investment decision making for substitutable enterprises
    Li, Xiaotong
    Xue, Qianyao
    [J]. MANAGERIAL AND DECISION ECONOMICS, 2021, 42 (05) : 1306 - 1316
  • [36] Security of Vehicle Platooning: A Game-Theoretic Approach
    Basiri, Mohammad Hossein
    Pirani, Mohammad
    Azad, Nasser L.
    Fischmeister, Sebastian
    [J]. IEEE ACCESS, 2019, 7 : 185565 - 185579
  • [37] Automated Game-Theoretic Verification of Security Systems
    Mu, Chunyan
    [J]. QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 239 - 256
  • [38] CHECKMATE: Automated Game-Theoretic Security Reasoning
    Brugger, Lea Salome
    Kovacs, Laura
    Komel, Anja Petkovic
    Rain, Sophie
    Rawson, Michael
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1407 - 1421
  • [39] Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach
    Lavrova, D. S.
    Solovei, R. S.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 937 - 943
  • [40] Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach
    D. S. Lavrova
    R. S. Solovei
    [J]. Automatic Control and Computer Sciences, 2020, 54 : 937 - 943