Information security investment with budget constraint and security information snaring in resource-snaring environments

被引:2
|
作者
Gao, Xing [1 ]
Qiu, Manting [1 ]
Wang, Ying [1 ]
Wang, Xifan [1 ]
机构
[1] Southeast Univ, Sch Econ & Management, Nanjing 210096, Peoples R China
基金
中国国家自然科学基金;
关键词
Resource sharing; security information sharing; budget constraint; hacker; DIFFERENTIAL GAME APPROACH; IMPACT;
D O I
10.1080/01605682.2022.2096506
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Nowadays, business connection between firms becomes rather common so that one firm stores not only its information asset but also some of other firms' information asset. The management of information security is vital for these resource-sharing firms. This paper constructs a game-theoretic model between two resource-sharing firms and one hacker to examine their strategic interaction when the firms face budget constraint on security investment. We consider security information sharing between the firms, which can improve their overall security effort but meantime facilitate the hacker's learning to reduce attack costs. We find that although a tight budget constraint can help save investment cost, the firms always suffer from a poorly secure environment. It shows that although security information sharing is usually encouraged, the firms may be hurt when security information sharing is excessive so that fierce cyber-attacks are induced. We finally design an optimal compensation mechanism, in which the compensation fund is shown to increase with the degree of resource sharing.
引用
收藏
页码:1520 / 1535
页数:16
相关论文
共 50 条
  • [21] Optimal Information Security Investment with Penetration Testing
    Boehme, Rainer
    Felegyhazi, Mark
    DECISION AND GAME THEORY FOR SECURITY, 2010, 6442 : 21 - 37
  • [22] Towards an optimal information security investment strategy
    Wang, Zikai
    Song, Haitao
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 756 - 761
  • [23] POLICIES OF OPTIMIZING THE LEVEL OF INVESTMENT IN INFORMATION SECURITY
    Stroie, Elena Ramona
    Panait, Robert Constantin
    INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2012, : 277 - 281
  • [24] Adaptive model of information security technique investment
    Dong, Hong
    Qiu, Wan-Hua
    Lu, Jun-Jie
    Zhang, Wen
    Kongzhi yu Juece/Control and Decision, 2008, 23 (05): : 535 - 540
  • [25] Human resource information systems: Information security concerns for organizations
    Zafar, Humayun
    HUMAN RESOURCE MANAGEMENT REVIEW, 2013, 23 (01) : 105 - 113
  • [26] A generic scheme for cyber security in resource constraint network using incomplete information game
    Singh, Moirangthem Tiken
    Borkotokey, Surajit
    Lahcen, Rachid Ait Maalem
    Mohapatra, Ram N.
    EVOLUTIONARY INTELLIGENCE, 2023, 16 (03) : 819 - 832
  • [27] A generic scheme for cyber security in resource constraint network using incomplete information game
    Moirangthem Tiken Singh
    Surajit Borkotokey
    Rachid Ait Maalem Lahcen
    Ram N. Mohapatra
    Evolutionary Intelligence, 2023, 16 : 819 - 832
  • [28] Information security due to electromagnetic environments - EMC emission and TEMPEST security
    Sekiguchi, Hidenori
    Seto, Shinji
    IEEJ Transactions on Fundamentals and Materials, 2009, 129 (01) : 1 - 6
  • [29] Comparison of information security decisions under different security and business environments
    Wu, Yong
    Feng, Gengzhong
    Fung, Richard Y. K.
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2018, 69 (05) : 747 - 761
  • [30] Crowd Energy Information Security Culture - Security Guidelines for Smart Environments
    Teufel, Stephanie
    Teufel, Bernd
    2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 123 - 128