Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability

被引:80
|
作者
Hausken, Kjell [1 ]
机构
[1] Univ Stavanger, Fac Social Sci, N-4036 Stavanger, Norway
关键词
security investment; information protection; returns assumptions; information security breach; vulnerability; logistic function; convexity; concavity; linearity;
D O I
10.1007/s10796-006-9011-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Four kinds of marginal returns to security investment to protect an information set are decrease, first increase and then decrease (logistic function), increase, and constancy. Gordon, L. A. and Loeb, M. (ACM Trans. Inf. Syst. Secur., 5:438-457, 2002). find for decreasing marginal returns that a firm invests maximum 37% (1/e) of the expected loss from a security breach, and that protecting moderately rather than extremely vulnerable information sets may be optimal. This article presents classes of all four kinds where the optimal investment is no longer capped at 1/e. First, investment in information security activities for the logistic function is zero for low vulnerabilities, jumps in a limited "bang-bang" manner to a positive level for intermediate vulnerabilities, and thereafter increases concavely in absolute terms. Second, we present an alternative class with decreasing marginal returns where the investment increases convexly in the vulnerability until a bound is reached, investing most heavily to protect the extremely vulnerable information sets. For the third and fourth kinds the optimal investment is of an all-out "bang-bang" nature, that is, zero for low vulnerabilities, and jumping to maximum investment for intermediate vulnerabilities.
引用
收藏
页码:338 / 349
页数:12
相关论文
共 50 条
  • [21] Adaptive model of information security technique investment
    Dong, Hong
    Qiu, Wan-Hua
    Lu, Jun-Jie
    Zhang, Wen
    Kongzhi yu Juece/Control and Decision, 2008, 23 (05): : 535 - 540
  • [22] POLICIES OF OPTIMIZING THE LEVEL OF INVESTMENT IN INFORMATION SECURITY
    Stroie, Elena Ramona
    Panait, Robert Constantin
    INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2012, : 277 - 281
  • [23] Information security investment for competitive firms with hacker behavior and security requirements
    Xing Gao
    Weijun Zhong
    Annals of Operations Research, 2015, 235 : 277 - 300
  • [24] Information security investment for competitive firms with hacker behavior and security requirements
    Gao, Xing
    Zhong, Weijun
    ANNALS OF OPERATIONS RESEARCH, 2015, 235 (01) : 277 - 300
  • [25] Security investment's returns in question
    Croft, J
    AVIATION WEEK & SPACE TECHNOLOGY, 2002, 157 (16): : 48 - 49
  • [26] Information security investment with budget constraint and security information snaring in resource-snaring environments
    Gao, Xing
    Qiu, Manting
    Wang, Ying
    Wang, Xifan
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2023, 74 (06) : 1520 - 1535
  • [27] The Theory of Optimal Investment in Information Security and Adjustment Costs: An Impulse Control Approach
    Goto, Makoto
    Tatsumi, Ken-ichi
    RECENT ADVANCES IN FINANCIAL ENGINEERING 2011, 2012, : 73 - 96
  • [28] Information Security Investment: Expected Utility Approach with Correlated Information Assets
    Park, Sungjune
    Mayadunne, Sanjaya
    AMCIS 2015 PROCEEDINGS, 2015,
  • [29] Information Security Investment When Hackers Disseminate Knowledge
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    DECISION ANALYSIS, 2013, 10 (04) : 352 - 368
  • [30] Integrated framework for information security investment and cyber insurance
    Wang, Shaun S.
    PACIFIC-BASIN FINANCE JOURNAL, 2019, 57