Information security investment for competitive firms with hacker behavior and security requirements

被引:1
|
作者
Xing Gao
Weijun Zhong
机构
[1] Southeast University,School of Economics and Management
来源
关键词
Targeted attacks; Mass attacks; Information security; Security requirements;
D O I
暂无
中图分类号
学科分类号
摘要
This paper investigates information security investment strategies under both targeted attacks and mass attacks by considering strategic interactions between two competitive firms and a hacker. We find that the more attractive firm invests more in information security, suffers more frequent attacks and enjoys a lower expected benefit, while the hacker achieves a higher expected benefit under targeted attacks than under mass attacks. We further examine the effect of security requirements on the two firms’ investment strategies in information security. We indicate that security requirements sometimes can drastically alter the comparisons of these investment strategies under the two types of cyber attacks. The hacker would balance the firms’ attractiveness in information assets and security requirements when determining its investment decisions in cyber attacks. By assuming that security requirements are endogenous, we demonstrate that under targeted attacks and mass attacks both firms would like to regulate rigorous security requirements when their degree of competition becomes fierce but would like to choose loose security requirements when the degree of competition remains mild.
引用
收藏
页码:277 / 300
页数:23
相关论文
共 50 条
  • [1] Information security investment for competitive firms with hacker behavior and security requirements
    Gao, Xing
    Zhong, Weijun
    [J]. ANNALS OF OPERATIONS RESEARCH, 2015, 235 (01) : 277 - 300
  • [2] COMPETITIVE INFORMATION SECURITY INVESTMENT UNDER HACKER KNOWLEDGE DISSEMINATION
    Gao, Xing
    [J]. JOURNAL OF INDUSTRIAL AND MANAGEMENT OPTIMIZATION, 2023, 19 (06) : 4199 - 4221
  • [3] A COMPETITIVE ANALYSIS OF INFORMATION SECURITY INVESTMENT: THE ROLE OF HACKER ATTACKS
    Gao, Xing
    Yang, Donghui
    [J]. JOURNAL OF INDUSTRIAL AND MANAGEMENT OPTIMIZATION, 2023, 19 (08) : 6104 - 6129
  • [4] Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker
    Wu, Yong
    Xu, Mengyao
    Cheng, Dong
    Dai, Tao
    [J]. DECISION ANALYSIS, 2022, 19 (02) : 99 - 122
  • [5] Firms' information security investment decisions: Stock market evidence of investors' behavior
    Chai, Sangmi
    Kim, Minkyun
    Rao, H. Raghav
    [J]. DECISION SUPPORT SYSTEMS, 2011, 50 (04) : 651 - 661
  • [6] An economic analysis of information security outsourcing with competitive firms
    Gao, Xing
    Gong, Siyu
    [J]. MANAGERIAL AND DECISION ECONOMICS, 2022, 43 (07) : 2748 - 2758
  • [7] SMEs and knowledge requirements for operating hacker and security tools
    Jennex, ME
    Walters, A
    Addo, TBA
    [J]. Innovations Through Information Technology, Vols 1 and 2, 2004, : 276 - 279
  • [8] Information security investment for complementary and substitutable firms: The role of technology similarity
    Gao, Xing
    Qiu, Manting
    Gong, Siyu
    Wang, Ying
    Zhang, Yanfang
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2023, 225
  • [9] A differential game approach to security investment and information sharing in a competitive environment
    Gao, Xing
    Zhong, Weijun
    [J]. IIE TRANSACTIONS, 2016, 48 (06) : 511 - 526
  • [10] Helping the hacker? Library information, security, and social engineering
    Thompson, Samuel T. C.
    [J]. INFORMATION TECHNOLOGY AND LIBRARIES, 2006, 25 (04) : 222 - 225