A game of information security investment considering security insurance and complementary information assets

被引:6
|
作者
Qian, Xiaofei [1 ,2 ,3 ,4 ]
Yang, Wujuan [1 ]
Pei, Jun [1 ,2 ,3 ,4 ]
Liu, Xinbao [1 ,3 ,4 ]
Pardalos, Panos M. [2 ]
机构
[1] Hefei Univ Technol, Sch Management, Hefei 230009, Anhui, Peoples R China
[2] Univ Florida, Dept Ind & Syst Engn, Ctr Appl Optimizat, Gainesville, FL 32611 USA
[3] Hefei Univ Technol, Key Lab Proc Optimizat & Intelligent Decis Making, Hefei 230009, Anhui, Peoples R China
[4] Minist Educ, Engn Res Ctr Intelligent Decis Making & Informat, Hefei 230009, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
information security investment; insurance; complementary information; game; THEORETIC ANALYSIS; RISK; IMPACT; FIRMS; POLICIES; MARKET;
D O I
10.1111/itor.12972
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Considering information security insurance, this paper investigates an information security investment game between two firms with complementary information assets. Each firm's information security investment and expected profit in Nash equilibrium (i.e., firms make decisions individually) and social optimum (i.e., firms make decisions jointly) are analyzed through rigorous theoretical analyses and numerical examples. We find that making decisions jointly will make the two firms as a whole obtain more profits than when they make decisions alone, whereas this does not mean that each firm will benefit from the joint decision-making process. Our results show that a firm yields a smaller expected profit in the joint decision game than the individual decision game under some conditions. In addition, the impacts of a higher insurance price and a higher investment efficiency on a firm's information security investment and expected profit are explored. The results indicate that, for a single firm, a higher insurance price does not necessarily result in smaller profit, and a higher investment efficiency does not always lead to larger profit. Then we design a compensation-based contract to coordinate the two firms' information security investments when they make decisions individually. The contract will make the two firms achieve social optimum and ensure that each firm yields more profits than firms without the contract. Finally, we extend our research by setting the insurance amount as a decision variable to verify the above analyses.
引用
收藏
页码:1791 / 1824
页数:34
相关论文
共 50 条
  • [31] A model of return on investment for information systems security
    Al-Humaigani, M
    Dunn, DB
    [J]. Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 483 - 485
  • [32] Prospect Theory and Information Security Investment Decisions
    Young, Diana K.
    Beebe, Nicole L.
    Chang, Frederick R.
    [J]. AMCIS 2012 PROCEEDINGS, 2012,
  • [33] Knowledge sharing and investment decisions in information security
    Liu, Dengpan
    Ji, Yonghua
    Mookerjee, Vijay
    [J]. DECISION SUPPORT SYSTEMS, 2011, 52 (01) : 95 - 107
  • [34] Optimal Information Security Investment with Penetration Testing
    Boehme, Rainer
    Felegyhazi, Mark
    [J]. DECISION AND GAME THEORY FOR SECURITY, 2010, 6442 : 21 - 37
  • [35] Adaptive model of information security technique investment
    Dong, Hong
    Qiu, Wan-Hua
    Lu, Jun-Jie
    Zhang, Wen
    [J]. Kongzhi yu Juece/Control and Decision, 2008, 23 (05): : 535 - 540
  • [36] Towards an optimal information security investment strategy
    Wang, Zikai
    Song, Haitao
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 756 - 761
  • [37] POLICIES OF OPTIMIZING THE LEVEL OF INVESTMENT IN INFORMATION SECURITY
    Stroie, Elena Ramona
    Panait, Robert Constantin
    [J]. INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2012, : 277 - 281
  • [38] A Data-driven Security Game to Facilitate Information Security Education
    Lovgren, Dag Erik Homdrum
    Li, Jingyue
    Oyetoyan, Tosin Daniel
    [J]. 2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2019), 2019, : 256 - 257
  • [39] Information security outsourcing strategies in the supply chain considering security externality
    Wu, Yong
    Wang, Nan
    Dai, Tao
    Cheng, Dong
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2024,
  • [40] Information Security Game Analysis with Penalty Parameter
    Sun, Wei
    Kong, Xiangwei
    He, Dequan
    You, Xingang
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 453 - 456