A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation

被引:0
|
作者
D'Acquisto, Giuseppe [1 ]
Flamini, Marta [2 ]
Naldi, Maurizio [3 ]
机构
[1] Garante Protez Dati Personali, Rome, Italy
[2] Univ Telemat Int UNINETTUNO, Rome, Italy
[3] Univ Roma Tor Vergata, Rome, Italy
关键词
Privacy; Data breach; Game theory; Security economics; Security investments;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data breaches represents a major source of worries (and economic losses) for customers and service providers. We introduce a data breach model that recognizes that breaches can take place on the customer's premises as well as on the service provider's side, but the customer bears the economic loss. In order to induce the service provider into investing in security, a regulatory policy that apportions the money loss between the customer and the service provider is introduced. A game-theoretic formulation is given for the strategic interaction to the customer and the service provider, where the former sets the amount of personal information it releases and the latter decides how much to invest in security. The game's outcome shows that shifting the burden of the money loss due to data breaches towards the service provider spurs its investment in security (though up to moderate levels) and leads the customer to be more confident, but the apportionment must not be too unbalanced for a Nash equilibrium to exist. On the other hand, changes in the probability of data breach of both sides do not affect significantly the service provider's behaviour, but cause heavy consequences on the customer's confidence.
引用
收藏
页码:412 / 423
页数:12
相关论文
共 50 条
  • [41] Experimental analysis of a game-theoretic formulation of target tracking
    Yang, Yanbo
    Moran, Bill
    Wang, Xuezhi
    Brown, Timothy C.
    Williams, Simon
    Pan, Quan
    [J]. AUTOMATICA, 2020, 114
  • [42] Ex-ante estate division under strong Pareto efficiency
    Schumacher, Johannes M.
    [J]. MATHEMATICAL SOCIAL SCIENCES, 2021, 113 : 10 - 24
  • [43] An evolutionary game-theoretic analysis of enterprise information security investment based on information sharing platform
    Li, Xiaotong
    [J]. MANAGERIAL AND DECISION ECONOMICS, 2022, 43 (03) : 595 - 606
  • [44] Strategic decisions of new technology adoption under asymmetric information: A game-theoretic model
    Zhu, K
    Weyant, JP
    [J]. DECISION SCIENCES, 2003, 34 (04) : 643 - 675
  • [45] A REAL OPTIONS AND GAME-THEORETIC APPROACH TO CORPORATE-INVESTMENT STRATEGY UNDER COMPETITION
    SMIT, HTJ
    ANKUM, LA
    [J]. FINANCIAL MANAGEMENT, 1993, 22 (03) : 241 - 250
  • [46] Game-Theoretic Approach Towards Network Security A Review
    Tom, Litti
    [J]. 2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [47] A game-theoretic framework for the security system of visible watermarking
    Tsai, Min-Jen
    Liu, Jung
    Wang, Chen-Sheng
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (05) : 5748 - 5754
  • [48] MAJOR CAPITAL INVESTMENT DECISIONS - EX ANTE EXPECTATIONS AND EX POST RESULTS
    SKEDDLE, RW
    [J]. OPERATIONS RESEARCH, 1975, 23 : B396 - B396
  • [49] A game-theoretic approach to stochastic security and dependability evaluation
    Sallhammar, Karin
    Helvik, Bjarne E.
    Knapskog, Sven J.
    [J]. DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 61 - +
  • [50] A Game-Theoretic Approach for Network Security Using Honeypots
    Florea, Razvan
    Craus, Mitica
    [J]. FUTURE INTERNET, 2022, 14 (12):