Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability

被引:80
|
作者
Hausken, Kjell [1 ]
机构
[1] Univ Stavanger, Fac Social Sci, N-4036 Stavanger, Norway
关键词
security investment; information protection; returns assumptions; information security breach; vulnerability; logistic function; convexity; concavity; linearity;
D O I
10.1007/s10796-006-9011-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Four kinds of marginal returns to security investment to protect an information set are decrease, first increase and then decrease (logistic function), increase, and constancy. Gordon, L. A. and Loeb, M. (ACM Trans. Inf. Syst. Secur., 5:438-457, 2002). find for decreasing marginal returns that a firm invests maximum 37% (1/e) of the expected loss from a security breach, and that protecting moderately rather than extremely vulnerable information sets may be optimal. This article presents classes of all four kinds where the optimal investment is no longer capped at 1/e. First, investment in information security activities for the logistic function is zero for low vulnerabilities, jumps in a limited "bang-bang" manner to a positive level for intermediate vulnerabilities, and thereafter increases concavely in absolute terms. Second, we present an alternative class with decreasing marginal returns where the investment increases convexly in the vulnerability until a bound is reached, investing most heavily to protect the extremely vulnerable information sets. For the third and fourth kinds the optimal investment is of an all-out "bang-bang" nature, that is, zero for low vulnerabilities, and jumping to maximum investment for intermediate vulnerabilities.
引用
收藏
页码:338 / 349
页数:12
相关论文
共 50 条
  • [1] Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    Kjell Hausken
    Information Systems Frontiers, 2006, 8 : 338 - 349
  • [2] Security investment and information sharing under an alternative security breach probability function
    School of Economics and Management, Southeast University, Nanjing
    Jiangsu, China
    Inf. Syst. Front., 2 (423-438):
  • [3] Security investment and information sharing under an alternative security breach probability function
    Xing Gao
    Weijun Zhong
    Shue Mei
    Information Systems Frontiers, 2015, 17 : 423 - 438
  • [4] Security investment and information sharing under an alternative security breach probability function
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    INFORMATION SYSTEMS FRONTIERS, 2015, 17 (02) : 423 - 438
  • [5] Returns to information security investment: Endogenizing the expected loss
    Kjell Hausken
    Information Systems Frontiers, 2014, 16 : 329 - 336
  • [6] Returns to information security investment: Endogenizing the expected loss
    Hausken, Kjell
    INFORMATION SYSTEMS FRONTIERS, 2014, 16 (02) : 329 - 336
  • [7] Optimal Information Security Investment with Penetration Testing
    Boehme, Rainer
    Felegyhazi, Mark
    DECISION AND GAME THEORY FOR SECURITY, 2010, 6442 : 21 - 37
  • [8] Towards an optimal information security investment strategy
    Wang, Zikai
    Song, Haitao
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 756 - 761
  • [9] Optimal Information Security Investment in Modern Social Networking
    Trufanov, Andrey
    Kinash, Nikolay
    Tikhomirov, Alexei
    Berestneva, Olga
    Rossodivita, Alessandra
    COMPLEX NETWORKS VIII, 2017, : 175 - 182
  • [10] The Economics of Information Security Investment
    Wang, Heng
    ADVANCED RESEARCH ON INFORMATION SCIENCE, AUTOMATION AND MATERIAL SYSTEM, PTS 1-6, 2011, 219-220 : 1550 - 1553