A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation

被引:0
|
作者
D'Acquisto, Giuseppe [1 ]
Flamini, Marta [2 ]
Naldi, Maurizio [3 ]
机构
[1] Garante Protez Dati Personali, Rome, Italy
[2] Univ Telemat Int UNINETTUNO, Rome, Italy
[3] Univ Roma Tor Vergata, Rome, Italy
关键词
Privacy; Data breach; Game theory; Security economics; Security investments;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data breaches represents a major source of worries (and economic losses) for customers and service providers. We introduce a data breach model that recognizes that breaches can take place on the customer's premises as well as on the service provider's side, but the customer bears the economic loss. In order to induce the service provider into investing in security, a regulatory policy that apportions the money loss between the customer and the service provider is introduced. A game-theoretic formulation is given for the strategic interaction to the customer and the service provider, where the former sets the amount of personal information it releases and the latter decides how much to invest in security. The game's outcome shows that shifting the burden of the money loss due to data breaches towards the service provider spurs its investment in security (though up to moderate levels) and leads the customer to be more confident, but the apportionment must not be too unbalanced for a Nash equilibrium to exist. On the other hand, changes in the probability of data breach of both sides do not affect significantly the service provider's behaviour, but cause heavy consequences on the customer's confidence.
引用
收藏
页码:412 / 423
页数:12
相关论文
共 50 条
  • [31] Automated Game-Theoretic Verification of Security Systems
    Mu, Chunyan
    [J]. QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 239 - 256
  • [32] CHECKMATE: Automated Game-Theoretic Security Reasoning
    Brugger, Lea Salome
    Kovacs, Laura
    Komel, Anja Petkovic
    Rain, Sophie
    Rawson, Michael
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1407 - 1421
  • [33] Ex-ante versus ex-post regulation in the German railway sector
    Eisenkopf, A
    [J]. TRENDS IN INFRASTRUCTURE REGULATION AND FINANCING: INTERNATIONAL EXPERIENCE AND CASE STUDIES FROM GERMANY, 2004, : 123 - 136
  • [34] Existence of an interim and ex-ante minimax point for an asymmetric information game
    Pesce, Marialaura
    Yannelis, Nicholas C.
    [J]. ECONOMICS LETTERS, 2010, 108 (01) : 4 - 6
  • [35] A Game-Theoretic Approach to Personnel Decisions in American Football
    McGough, Erin
    Clemons, Curtis
    Ferrara, Michael
    Norfolk, Timothy
    Young, Gerald W.
    [J]. JOURNAL OF QUANTITATIVE ANALYSIS IN SPORTS, 2010, 6 (04)
  • [36] GAME-THEORETIC INTERPRETATION OF SELECTED AUDIT REPORT DECISIONS
    FROMOVITZ, S
    LOEB, SE
    [J]. OPERATIONS RESEARCH, 1975, 23 : B393 - B393
  • [37] Ex-Ante Regulation and Ex-Post Liability under Uncertainty and Irreversibility: Governing the Coexistence of GM Crops
    Beckmann, Volker
    Soregaroli, Claudio
    Wesseler, Justus
    [J]. ECONOMICS-THE OPEN ACCESS OPEN-ASSESSMENT E-JOURNAL, 2010, 4
  • [38] Pricing Decisions with Social Interactions: A Game-Theoretic Model
    Wang, Xiaofang
    Yang, Yaoyao
    Zhuang, Jun
    [J]. DECISION ANALYSIS, 2023, 20 (01) : 40 - 54
  • [39] Optimization of Investment Planning Based on Game-Theoretic Approach
    Butsenko, E. V.
    [J]. EKONOMIKA REGIONA-ECONOMY OF REGION, 2018, 14 (01): : 270 - 280
  • [40] A game-theoretic formulation of joint implementation of environmental projects
    Breton, M
    Zaccour, G
    Zahaf, M
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2006, 168 (01) : 221 - 239