Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size

被引:0
|
作者
Xinbao Liu
Xiaofei Qian
Jun Pei
Panos M. Pardalos
机构
[1] Hefei University of Technology,School of Management
[2] University of Florida,Center for Applied Optimization, Department of Industrial and Systems Engineering
[3] Key Laboratory of Process Optimization and Intelligent Decision-Making of Ministry of Education,undefined
来源
关键词
Information security investment; Information sharing; Differential game; Complementary firms; Steady state;
D O I
暂无
中图分类号
学科分类号
摘要
We study a differential game of information security investment and information sharing in a market consisting of n complementary firms. Two game approaches, the non-cooperative game and the totally cooperative game, are employed to investigate the steady state strategy of each firm. Under certain conditions, a unique steady state can be obtained for both games. We find that the steady state security investment and information sharing level are not always less in the non-cooperative game than that in the totally cooperative game. In addition, some theoretical analyses are made on the impacts of the complementarity degree and industry size on firms’ steady state strategies for both games. Finally, some numerical experiments are conducted to give some insights related to the instantaneous profit in the steady state. It can be found that a firm will obtain more instantaneous profit in the steady state of the totally cooperative game than that of the non-cooperative game, which emphasizes the importance of coordinating strategies. The effects of the complementarity degree and industry size on the instantaneous profits in the steady state are also obtained through the numerical experiment results.
引用
下载
收藏
页码:413 / 436
页数:23
相关论文
共 50 条
  • [1] Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size
    Liu, Xinbao
    Qian, Xiaofei
    Pei, Jun
    Pardalos, Panos M.
    JOURNAL OF GLOBAL OPTIMIZATION, 2018, 70 (02) : 413 - 436
  • [2] A game-theoretic analysis of information sharing and security investment for complementary firms
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2014, 65 (11) : 1682 - 1691
  • [3] Information security investment for complementary and substitutable firms: The role of technology similarity
    Gao, Xing
    Qiu, Manting
    Gong, Siyu
    Wang, Ying
    Zhang, Yanfang
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 225
  • [4] Information sharing and security investment for substitutable firms: A game-theoretic analysis
    Gao, Xing
    Gong, Siyu
    Wang, Ying
    Zhang, Yanfang
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2024, 75 (04) : 799 - 820
  • [5] A new game of information sharing and security investment between two allied firms
    Qian, Xiaofei
    Liu, Xinbao
    Pei, Jun
    Pardalos, Panos M.
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2018, 56 (12) : 4069 - 4086
  • [6] Decisions making in information security outsourcing: Impact of complementary and substitutable firms
    Wu, Yong
    Fung, Richard Y. K.
    Feng, Gengzhong
    Wang, Nengmin
    COMPUTERS & INDUSTRIAL ENGINEERING, 2017, 110 : 1 - 12
  • [7] Firms' information security investment decisions: Stock market evidence of investors' behavior
    Chai, Sangmi
    Kim, Minkyun
    Rao, H. Raghav
    DECISION SUPPORT SYSTEMS, 2011, 50 (04) : 651 - 661
  • [8] Knowledge sharing and investment decisions in information security
    Liu, Dengpan
    Ji, Yonghua
    Mookerjee, Vijay
    DECISION SUPPORT SYSTEMS, 2011, 52 (01) : 95 - 107
  • [9] A game of information security investment considering security insurance and complementary information assets
    Qian, Xiaofei
    Yang, Wujuan
    Pei, Jun
    Liu, Xinbao
    Pardalos, Panos M.
    INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH, 2022, 29 (03) : 1791 - 1824
  • [10] Information security investment for competitive firms with hacker behavior and security requirements
    Xing Gao
    Weijun Zhong
    Annals of Operations Research, 2015, 235 : 277 - 300