Information security decisions for two firms in a market with different types of customers

被引:6
|
作者
Qian, Xiaofei [1 ,2 ,3 ]
Pei, Jun [1 ,2 ,3 ]
Liu, Xinbao [1 ,3 ]
Zhou, Mi [1 ,3 ]
Pardalos, Panos M. [2 ]
机构
[1] Hefei Univ Technol, Sch Management, Hefei, Anhui, Peoples R China
[2] Univ Florida, Dept Ind & Syst Engn, Ctr Appl Optimizat, Gainesville, FL 32611 USA
[3] Minist Educ, Key Lab Proc Optimizat & Intelligent Decis Making, Hefei, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Information security decision; Game model; Loyal customer; Switcher; Nash equilibrium; Optimal solution; Coordination contract; GAME-THEORETIC ANALYSIS; INVESTMENT; IMPACT;
D O I
10.1007/s10878-019-00446-6
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper investigates an information security game between two competitive firms in a market consisting of loyal customers and switchers. The switchers are classified into unaggressive switchers and aggressive switchers based on whether they always transact with the more secure firm. We find that the switcher type plays a significant role in affecting firms' information security decisions. Firms can achieve pure strategy Nash equilibrium in the unaggressive case while no pure strategy Nash equilibrium exists in the aggressive case. Instead, a mixed strategy Nash equilibrium in the aggressive case is obtained. Our analyses show that firms will acquire more profits in the unaggressive case compared to that in the aggressive case when they determine their information security levels individually. Whereas, when they make their information security decisions jointly, the profits in the unaggressive case will be smaller than that in the aggressive case. Furthermore, we find that the loyal customer rate has different impacts on firms' profits in Nash equilibrium and optimal solution for both the unaggressive case and the aggressive case. At last, two contracts are proposed to help firms coordinate their information security strategies when they make individual decisions.
引用
收藏
页码:1263 / 1285
页数:23
相关论文
共 50 条
  • [1] Information security decisions for two firms in a market with different types of customers
    Xiaofei Qian
    Jun Pei
    Xinbao Liu
    Mi Zhou
    Panos M. Pardalos
    Journal of Combinatorial Optimization, 2019, 38 : 1263 - 1285
  • [2] Firms' information security investment decisions: Stock market evidence of investors' behavior
    Chai, Sangmi
    Kim, Minkyun
    Rao, H. Raghav
    DECISION SUPPORT SYSTEMS, 2011, 50 (04) : 651 - 661
  • [3] OVERSEAS MARKET INFORMATION AND FIRMS' EXPORT DECISIONS
    Inui, Tomohiko
    Ito, Keiko
    Miyakawa, Daisuke
    ECONOMIC INQUIRY, 2015, 53 (03) : 1671 - 1688
  • [4] Information security decisions of firms considering security risk interdependency
    Wu, Yong
    Wang, Linping
    Cheng, Dong
    Dai, Tao
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 178
  • [5] Information security decisions of security-interdependent firms in the presence of consumer sensitivity
    Wu, Yong
    Jin, Zhijie
    Dai, Tao
    Yang, Dong
    MANAGERIAL AND DECISION ECONOMICS, 2024,
  • [6] Pricing decisions for complementary products with firms' different market powers
    Wei, Jie
    Zhao, Jing
    Li, Yongjian
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2013, 224 (03) : 507 - 519
  • [7] Decisions making in information security outsourcing: Impact of complementary and substitutable firms
    Wu, Yong
    Fung, Richard Y. K.
    Feng, Gengzhong
    Wang, Nengmin
    COMPUTERS & INDUSTRIAL ENGINEERING, 2017, 110 : 1 - 12
  • [8] Comparison of information security decisions under different security and business environments
    Wu, Yong
    Feng, Gengzhong
    Fung, Richard Y. K.
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2018, 69 (05) : 747 - 761
  • [9] Different pellet types for different customers
    Chung, G
    SEMINAR ON SINTER AND PELLETES 1999, 2000, : 91 - 97
  • [10] Behavioral economics and customers' decisions at energy market
    Zika, Vojtech
    Koblovsky, Petr
    MANAGING AND MODELLING OF FINANCIAL RISKS - 8TH INTERNATIONAL SCIENTIFIC CONFERENCE PROCEEDINGS, PT III, 2016, : 1084 - 1092