A game-theoretic analysis of information security investment for multiple firms in a network

被引:26
|
作者
Qian, Xiaofei [1 ,2 ]
Liu, Xinbao [1 ]
Pei, Jun [1 ,2 ]
Pardalos, Panos M. [2 ]
Liu, Lin [1 ]
机构
[1] Hefei Univ Technol, Sch Management, 193 Tunxi Rd, Hefei, Anhui, Peoples R China
[2] Univ Florida, Dept Ind & Syst Engn, Ctr Appl Optimizat, Gainesville, FL 32611 USA
关键词
IoT; information security investment; multiple-step propagation; Nash equilibrium; optimal solution; DECISIONS;
D O I
10.1057/s41274-016-0134-y
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
The application of Internet of Things promotes the cooperation among firms, and it also introduces some information security issues. Due to the vulnerability of the communication network, firms need to invest in information security technologies to protect their confidential information. In this paper, considering the multiple-step propagation of a security breach in a fully connected network, an information security investment game among n firms is investigated. We make meticulous theoretic and experimental analyses on both the Nash equilibrium solution and the optimal solution. The results show that a larger network size (n) or a larger one-step propagation probability (q) has a negative effect on the Nash equilibrium investment. The optimal investment does not necessarily increase in n or q, and its variation trend depends on the concrete conditions. A compensation mechanism is proposed to encourage firms to coordinate their strategies and invest a higher amount equal to the optimal investment when they make decisions individually. At last, our model is extended by considering another direct breach probability function and another network structure, respectively. We find that a higher connection density of the network will result in a greater expected cost for each firm.
引用
收藏
页码:1290 / 1305
页数:16
相关论文
共 50 条
  • [1] A game-theoretic analysis of information sharing and security investment for complementary firms
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2014, 65 (11) : 1682 - 1691
  • [2] Information sharing and security investment for substitutable firms: A game-theoretic analysis
    Gao, Xing
    Gong, Siyu
    Wang, Ying
    Zhang, Yanfang
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2024, 75 (04) : 799 - 820
  • [3] An evolutionary game-theoretic analysis of enterprise information security investment based on information sharing platform
    Li, Xiaotong
    [J]. MANAGERIAL AND DECISION ECONOMICS, 2022, 43 (03) : 595 - 606
  • [4] A Game-Theoretic Analysis of Security Investment for Service Computing Applications
    Ye, Xinfeng
    [J]. 2014 IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2014, : 224 - 231
  • [5] On Game-Theoretic Network Security Provisioning
    Stefan Rass
    [J]. Journal of Network and Systems Management, 2013, 21 : 47 - 64
  • [6] On Game-Theoretic Network Security Provisioning
    Rass, Stefan
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (01) : 47 - 64
  • [7] Decision-theoretic and game-theoretic approaches to IT security investment
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    Yue, Wei T.
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) : 281 - 304
  • [8] Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach
    Gupta, Rohit
    Biswas, Baidyanath
    Biswas, Indranil
    Sana, Shib Sankar
    [J]. INFORMATION AND COMPUTER SECURITY, 2021, 29 (01) : 73 - 104
  • [9] Sustainability of Information Security Investment in Online Social Networks: An Evolutionary Game-Theoretic Approach
    Zhu, Guang
    Liu, Hu
    Feng, Mining
    [J]. MATHEMATICS, 2018, 6 (10)
  • [10] Game-Theoretic Security Analysis of Quantum Networks
    Rass, Stefan
    Schartner, Peter
    [J]. ICQNM 2009: THIRD INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES: PROCEEDINGS, 2009, : 20 - 25