Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach

被引:7
|
作者
Gupta, Rohit [1 ]
Biswas, Baidyanath [2 ]
Biswas, Indranil [3 ]
Sana, Shib Sankar [4 ]
机构
[1] Indian Inst Management Ranchi, Operat Management Area, Ranchi, Bihar, India
[2] Int Management Inst Kolkata, Informat Technol & Operat Area, Kolkata, India
[3] Indian Inst Management Lucknow, Operat Management Area, Lucknow, Uttar Pradesh, India
[4] Kishore Bharati Bhagini Nivedita Coll, Dept Math, Kolkata, India
关键词
Vulnerability; Information security modeling; Game theory; Fuzzy sets; Gordon; Loeb breach function; Information security investment; CYBER-SECURITY; RISK ANALYSIS; EXPECTED VALUE; DEFENSE; ATTACK; CYBERSECURITY; SYSTEM; IMPACT; MODEL; PROTECTION;
D O I
10.1108/ICS-02-2020-0028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose - This paper aims to examine optimal decisions for information security investments for a firm in a fuzzy environment. Under both sequential and simultaneous attack scenarios, optimal investment of firm, optimal efforts of attackers and their economic utilities are determined. Design/methodology/approach - Throughout the analysis, a single firm and two attackers for a "firm as a leader" in a sequential game setting and "firm versus attackers" in a simultaneous game setting are considered. While the firm makes investments to secure its information assets, the attackers spend their efforts to launch breaches. Findings - It is observed that the firm needs to invest more when it announces its security investment decisions ahead of attacks. In contrast, the firm can invest relatively less when all agents are unaware of each other's choices in advance. Further, the study reveals that attackers need to exert higher effort when no agent enjoys the privilege of being a leader. Research limitations/implications - In a novel approach, inherent system vulnerability of the firm, financial benefit of attackers from the breach and monetary loss suffered by the firm are considered, as fuzzy variables in the well-recognized Gordon - Loeb breach function, with the help of fuzzy expectation operator. Practical implications - This study reports that the optimal breach effort exerted by each attacker is proportional to its obtained economic benefit for both sequential and simultaneous attack scenarios. A set of numerical experiments and sensitivity analyzes complement the analytical modeling. Originality/value - In a novel approach, inherent system vulnerability of the firm, financial benefit of attackers from the breach and monetary loss suffered by the firm are considered, as fuzzy variables in the well-recognized Gordon - Loeb breach function, with the help of fuzzy expectation operator.
引用
收藏
页码:73 / 104
页数:32
相关论文
共 50 条
  • [1] A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation
    D'Acquisto, Giuseppe
    Flamini, Marta
    Naldi, Maurizio
    [J]. INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 412 - 423
  • [2] Sustainability of Information Security Investment in Online Social Networks: An Evolutionary Game-Theoretic Approach
    Zhu, Guang
    Liu, Hu
    Feng, Mining
    [J]. MATHEMATICS, 2018, 6 (10)
  • [3] A game-theoretic analysis of information sharing and security investment for complementary firms
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2014, 65 (11) : 1682 - 1691
  • [4] Information sharing and security investment for substitutable firms: A game-theoretic analysis
    Gao, Xing
    Gong, Siyu
    Wang, Ying
    Zhang, Yanfang
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2024, 75 (04) : 799 - 820
  • [5] A game-theoretic analysis of information security investment for multiple firms in a network
    Qian, Xiaofei
    Liu, Xinbao
    Pei, Jun
    Pardalos, Panos M.
    Liu, Lin
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2017, 68 (10) : 1290 - 1305
  • [6] Decision-theoretic and game-theoretic approaches to IT security investment
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    Yue, Wei T.
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) : 281 - 304
  • [7] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    [J]. 47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [8] Security Resource Investment Optimization for Critical Infrastructure Systems: A Game-Theoretic Approach
    Clanin, Joe
    Bhattacharya, Sourabh
    [J]. 2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 4642 - 4647
  • [9] Game-theoretic approach for information sharing
    Raweewan, Morrakot
    Ferrell, William G., Jr.
    [J]. 2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 111 - +
  • [10] An evolutionary game-theoretic analysis of enterprise information security investment based on information sharing platform
    Li, Xiaotong
    [J]. MANAGERIAL AND DECISION ECONOMICS, 2022, 43 (03) : 595 - 606