A differential game approach to information security investment under hackers' knowledge dissemination

被引:27
|
作者
Gao, Xing [1 ]
Zhong, Weijun [1 ]
Mei, Shue [1 ]
机构
[1] Southeast Univ, Sch Econ & Management, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Information security investment; Knowledge dissemination; Cournot competition; Bertrand competition; COMPETITION;
D O I
10.1016/j.orl.2013.05.002
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
We investigate how firms invest in information security under Cournot and Bertrand competition, constructing a differential game where over time hackers become knowledgeable by disseminating security knowledge while the firms can inhibit it through security investments. We demonstrate that higher effectiveness of inhibiting knowledge dissemination may not necessarily give a higher investment since it may harm one firm's market share. Meanwhile, we find Cournot competition usually yields a higher investment than Bertrand competition, implying that the investment is more effective under Cournot competition. (c) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:421 / 425
页数:5
相关论文
共 50 条
  • [1] COMPETITIVE INFORMATION SECURITY INVESTMENT UNDER HACKER KNOWLEDGE DISSEMINATION
    Gao, Xing
    [J]. JOURNAL OF INDUSTRIAL AND MANAGEMENT OPTIMIZATION, 2023, 19 (06) : 4199 - 4221
  • [2] Information Security Investment When Hackers Disseminate Knowledge
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    [J]. DECISION ANALYSIS, 2013, 10 (04) : 352 - 368
  • [3] When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination
    Mookerjee, Vijay
    Mookerjee, Radha
    Bensoussan, Alain
    Yue, Wei T.
    [J]. INFORMATION SYSTEMS RESEARCH, 2011, 22 (03) : 606 - 623
  • [4] A differential game approach to security investment and information sharing in a competitive environment
    Gao, Xing
    Zhong, Weijun
    [J]. IIE TRANSACTIONS, 2016, 48 (06) : 511 - 526
  • [5] Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach
    Gupta, Rohit
    Biswas, Baidyanath
    Biswas, Indranil
    Sana, Shib Sankar
    [J]. INFORMATION AND COMPUTER SECURITY, 2021, 29 (01) : 73 - 104
  • [6] A game of information security investment considering security insurance and complementary information assets
    Qian, Xiaofei
    Yang, Wujuan
    Pei, Jun
    Liu, Xinbao
    Pardalos, Panos M.
    [J]. INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH, 2022, 29 (03) : 1791 - 1824
  • [7] A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors
    Moayedi, Behzad Zare
    Azgomi, Mohammad Abdollahi
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 508 - 513
  • [8] Knowledge sharing and investment decisions in information security
    Liu, Dengpan
    Ji, Yonghua
    Mookerjee, Vijay
    [J]. DECISION SUPPORT SYSTEMS, 2011, 52 (01) : 95 - 107
  • [9] A differential game approach to investment in product differentiation
    Cellini, R
    Lambertini, L
    [J]. JOURNAL OF ECONOMIC DYNAMICS & CONTROL, 2002, 27 (01): : 51 - 62
  • [10] Sustainability of Information Security Investment in Online Social Networks: An Evolutionary Game-Theoretic Approach
    Zhu, Guang
    Liu, Hu
    Feng, Mining
    [J]. MATHEMATICS, 2018, 6 (10)