Information Security Investment: Expected Utility Approach with Correlated Information Assets

被引:0
|
作者
Park, Sungjune [1 ]
Mayadunne, Sanjaya [2 ]
机构
[1] Univ North Carolina Charlotte, Charlotte, NC 28223 USA
[2] Georgia Gwinnett Coll, Lawrenceville, GA USA
来源
关键词
Information security; expected utility approach; risk taking;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes the information security investment decisions by a firm with two correlated information assets. When information assets are correlated, a firm may face additional losses compared to a loss from a single breach, and the probability of security breach on one set may increase the probability on the other. We model the security investment of a risk-taking firm as well as risk-neutral firm by taking an expected utility approach. We then compare the decisions made by a risk-taking firm to those made by a risk-neutral firm. We will also examine how decision maker allocates funds in protecting two information sets with a limited budget.
引用
收藏
页数:1
相关论文
共 50 条
  • [41] Optimal Information Security Investment with Penetration Testing
    Boehme, Rainer
    Felegyhazi, Mark
    DECISION AND GAME THEORY FOR SECURITY, 2010, 6442 : 21 - 37
  • [42] Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities
    Zhang, Chenglong
    Feng, Nan
    Chen, Jianjian
    Li, Dahui
    Li, Minqiang
    INFORMATION SYSTEMS FRONTIERS, 2021, 23 (03) : 773 - 790
  • [43] Towards an optimal information security investment strategy
    Wang, Zikai
    Song, Haitao
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 756 - 761
  • [44] POLICIES OF OPTIMIZING THE LEVEL OF INVESTMENT IN INFORMATION SECURITY
    Stroie, Elena Ramona
    Panait, Robert Constantin
    INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2012, : 277 - 281
  • [45] Adaptive model of information security technique investment
    Dong, Hong
    Qiu, Wan-Hua
    Lu, Jun-Jie
    Zhang, Wen
    Kongzhi yu Juece/Control and Decision, 2008, 23 (05): : 535 - 540
  • [46] Study on an Approach for Ranking the Critical Information Assets
    Huang, Jingwen
    Ding, Yongsheng
    CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 3584 - +
  • [47] The economic approach of information security
    Tsiakis, T
    Stephanides, G
    COMPUTERS & SECURITY, 2005, 24 (02) : 105 - 108
  • [48] INFORMATION SECURITY - A PRACTICAL APPROACH
    STAPLES, E
    OFFICE ADMINISTRATION AND AUTOMATION, 1985, 46 (01): : 79 - 79
  • [49] Information Security, new approach
    Elachgar, Hicham
    Regragui, Boubker
    2012 SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2012, : 51 - 56
  • [50] Information security - A strategic approach
    Liu, Peng
    INFORMATION PROCESSING & MANAGEMENT, 2007, 43 (01) : 296 - 296