Information security investment with budget constraint and security information snaring in resource-snaring environments

被引:2
|
作者
Gao, Xing [1 ]
Qiu, Manting [1 ]
Wang, Ying [1 ]
Wang, Xifan [1 ]
机构
[1] Southeast Univ, Sch Econ & Management, Nanjing 210096, Peoples R China
基金
中国国家自然科学基金;
关键词
Resource sharing; security information sharing; budget constraint; hacker; DIFFERENTIAL GAME APPROACH; IMPACT;
D O I
10.1080/01605682.2022.2096506
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Nowadays, business connection between firms becomes rather common so that one firm stores not only its information asset but also some of other firms' information asset. The management of information security is vital for these resource-sharing firms. This paper constructs a game-theoretic model between two resource-sharing firms and one hacker to examine their strategic interaction when the firms face budget constraint on security investment. We consider security information sharing between the firms, which can improve their overall security effort but meantime facilitate the hacker's learning to reduce attack costs. We find that although a tight budget constraint can help save investment cost, the firms always suffer from a poorly secure environment. It shows that although security information sharing is usually encouraged, the firms may be hurt when security information sharing is excessive so that fierce cyber-attacks are induced. We finally design an optimal compensation mechanism, in which the compensation fund is shown to increase with the degree of resource sharing.
引用
收藏
页码:1520 / 1535
页数:16
相关论文
共 50 条
  • [1] Framing information security budget requests to influence investment decisions
    Beebe, Nicole L.
    Young, Diana K.
    Chang, Frederick R.
    Communications of the Association for Information Systems, 2014, 35 : 133 - 143
  • [2] Framing Information Security Budget Requests to Influence Investment Decisions
    Beebe, Nicole L.
    Young, Diana K.
    Chang, Frederick R.
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2014, 35 : 133 - 143
  • [3] Information Security as a Resource
    Blakey, Ed
    INFORMATION AND COMPUTATION, 2013, 226 : 1 - 2
  • [4] The Economics of Information Security Investment
    Wang, Heng
    ADVANCED RESEARCH ON INFORMATION SCIENCE, AUTOMATION AND MATERIAL SYSTEM, PTS 1-6, 2011, 219-220 : 1550 - 1553
  • [5] An economic analysis of information security decisions with mandatory security standards in resource sharing environments
    Gao, Xing
    Gong, Siyu
    Wang, Ying
    Wang, Xifan
    Qiu, Manting
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 206
  • [6] Information security in workstation environments
    Stahl, Stanley H.
    Computers and Security, 1993, 12 (02): : 117 - 122
  • [7] How does overconfidence affect information security investment and information security performance?
    Dong, Kunxiang
    Lin, Runhui
    Yin, Xile
    Xie, Zongxiao
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) : 474 - 491
  • [8] A game of information security investment considering security insurance and complementary information assets
    Qian, Xiaofei
    Yang, Wujuan
    Pei, Jun
    Liu, Xinbao
    Pardalos, Panos M.
    INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH, 2022, 29 (03) : 1791 - 1824
  • [9] Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints
    Huang, C. Derrick
    Behara, Ravi S.
    INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2013, 141 (01) : 255 - 268
  • [10] Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    Kjell Hausken
    Information Systems Frontiers, 2006, 8 : 338 - 349