Information security decisions of firms considering security risk interdependency

被引:6
|
作者
Wu, Yong [1 ]
Wang, Linping [1 ]
Cheng, Dong [1 ]
Dai, Tao [1 ]
机构
[1] Donghua Univ, Glorious Sun Sch Business & Management, 1882 West Yanan Rd, Shanghai 200051, Peoples R China
基金
中国国家自然科学基金;
关键词
Complementation; Substitution; Technical similarity; Security effort; Incentive mechanism; MARKET VALUE; INVESTMENT; GAME; IMPACT; ECONOMICS; ATTACKS;
D O I
10.1016/j.eswa.2021.114990
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information security management becomes more challenging nowadays due to the diverse security risk interdependency between firms. Prior researches rarely consider the impact of risk interdependency on security decisions. This paper comprehensively considers two types of security risk interdependency caused by the nature of information assets and the technical similarity. We find that it is necessary to distinguish the complementary and substitutable information assets since they have different effects on the firm's investment incentive. As for the risk interdependency caused by the nature of the information assets, although both the high complementation degree and high substitution degree inhibit firms' incentives to invest, the underlying reasons are different. Besides, for another risk interdependency, the technical similarity enhances the investment incentive of the complementary firms but suppresses that of the substitutable firms. Moreover, the free-riding problem is unavoidable when the firm makes security decisions independently. Thus, we propose two efficient mechanisms to coordinate the firm's investment incentive: the effort-based mechanism and the liability-based mechanism. The effort-based mechanism demands the firm obtain a reward from its cooperative firm according to its security effort level. The liability-based mechanism demands the breached firm take the liability by compensating the non-breached firm. We find that both two mechanisms are efficient, and could guide firms to solve the problem of opportunism and shirking responsibility in practice. Finally, for generality, we extend our model to an asymmetric case and find that most of the results are robust.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Sourcing Information Security Operations: The Role of Risk Interdependency and Competitive Externality in Outsourcing Decisions
    Cezar, Asunur
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    PRODUCTION AND OPERATIONS MANAGEMENT, 2017, 26 (05) : 860 - 879
  • [2] Information security decisions of security-interdependent firms in the presence of consumer sensitivity
    Wu, Yong
    Jin, Zhijie
    Dai, Tao
    Yang, Dong
    MANAGERIAL AND DECISION ECONOMICS, 2024, 45 (08) : 5577 - 5589
  • [3] Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
    Hui, Kai-Lung
    Hui, Wendy
    Yue, Wei T.
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2012, 29 (03) : 117 - 155
  • [4] Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker
    Wu, Yong
    Xu, Mengyao
    Cheng, Dong
    Dai, Tao
    DECISION ANALYSIS, 2022, 19 (02) : 99 - 122
  • [5] Information security decisions for two firms in a market with different types of customers
    Xiaofei Qian
    Jun Pei
    Xinbao Liu
    Mi Zhou
    Panos M. Pardalos
    Journal of Combinatorial Optimization, 2019, 38 : 1263 - 1285
  • [6] Information security decisions for two firms in a market with different types of customers
    Qian, Xiaofei
    Pei, Jun
    Liu, Xinbao
    Zhou, Mi
    Pardalos, Panos M.
    JOURNAL OF COMBINATORIAL OPTIMIZATION, 2019, 38 (04) : 1263 - 1285
  • [7] Decisions making in information security outsourcing: Impact of complementary and substitutable firms
    Wu, Yong
    Fung, Richard Y. K.
    Feng, Gengzhong
    Wang, Nengmin
    COMPUTERS & INDUSTRIAL ENGINEERING, 2017, 110 : 1 - 12
  • [8] Airports at risk: The impact of information sources on security decisions
    Kirschenbaum A.A.
    Mariani M.
    van Gulijk C.
    Rapaport C.
    Lubasz S.
    Journal of Transportation Security, 2012, 5 (3) : 187 - 197
  • [9] Firms' information security investment decisions: Stock market evidence of investors' behavior
    Chai, Sangmi
    Kim, Minkyun
    Rao, H. Raghav
    DECISION SUPPORT SYSTEMS, 2011, 50 (04) : 651 - 661
  • [10] Risk Mitigation Decisions for IT Security
    Yeo, M. Lisa
    Rolland, Erik
    Ulmer, Jackie Rees
    Patterson, Raymond A.
    ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2014, 5 (01)