Information security investment with budget constraint and security information snaring in resource-snaring environments

被引:2
|
作者
Gao, Xing [1 ]
Qiu, Manting [1 ]
Wang, Ying [1 ]
Wang, Xifan [1 ]
机构
[1] Southeast Univ, Sch Econ & Management, Nanjing 210096, Peoples R China
基金
中国国家自然科学基金;
关键词
Resource sharing; security information sharing; budget constraint; hacker; DIFFERENTIAL GAME APPROACH; IMPACT;
D O I
10.1080/01605682.2022.2096506
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Nowadays, business connection between firms becomes rather common so that one firm stores not only its information asset but also some of other firms' information asset. The management of information security is vital for these resource-sharing firms. This paper constructs a game-theoretic model between two resource-sharing firms and one hacker to examine their strategic interaction when the firms face budget constraint on security investment. We consider security information sharing between the firms, which can improve their overall security effort but meantime facilitate the hacker's learning to reduce attack costs. We find that although a tight budget constraint can help save investment cost, the firms always suffer from a poorly secure environment. It shows that although security information sharing is usually encouraged, the firms may be hurt when security information sharing is excessive so that fierce cyber-attacks are induced. We finally design an optimal compensation mechanism, in which the compensation fund is shown to increase with the degree of resource sharing.
引用
收藏
页码:1520 / 1535
页数:16
相关论文
共 50 条
  • [31] A Review on Information, Information Security and Security Processes
    Canbek, Gurol
    Sagiroglu, Seref
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2006, 9 (03): : 165 - 174
  • [32] Optimal information security investment in a Healthcare Information Exchange: An economic analysis
    Huang, C. Derrick
    Behara, Ravi S.
    Goo, Jahyun
    DECISION SUPPORT SYSTEMS, 2014, 61 : 1 - 11
  • [33] Information Security Investment: Expected Utility Approach with Correlated Information Assets
    Park, Sungjune
    Mayadunne, Sanjaya
    AMCIS 2015 PROCEEDINGS, 2015,
  • [34] AN ANALYSIS OF INFORMATION AND TELECOMMUNICATION SECURITY IN MOBILE ENVIRONMENTS
    Sagiroglu, Seref
    Bulut, Huelya
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2009, 24 (03): : 499 - 507
  • [35] Information and Information Security
    Henno, Jaak
    INFORMATION MODELLING AND KNOWLEDGE BASES XXVII, 2016, 280 : 103 - 120
  • [36] Security investment and information sharing under an alternative security breach probability function
    Xing Gao
    Weijun Zhong
    Shue Mei
    Information Systems Frontiers, 2015, 17 : 423 - 438
  • [37] Security investment and information sharing under an alternative security breach probability function
    School of Economics and Management, Southeast University, Nanjing
    Jiangsu, China
    Inf. Syst. Front., 2 (423-438):
  • [38] Security investment and information sharing under an alternative security breach probability function
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    INFORMATION SYSTEMS FRONTIERS, 2015, 17 (02) : 423 - 438
  • [39] WHERE IS IT IN INFORMATION SECURITY? THE INTERRELATIONSHIP AMONG IT INVESTMENT, SECURITY AWARENESS, AND DATA BREACHES
    Li, Wilson Weixun
    Leung, Alvin Chung Man
    Yue, Wei Thoo
    MIS QUARTERLY, 2023, 47 (01) : 317 - 342
  • [40] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602