Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability

被引:80
|
作者
Hausken, Kjell [1 ]
机构
[1] Univ Stavanger, Fac Social Sci, N-4036 Stavanger, Norway
关键词
security investment; information protection; returns assumptions; information security breach; vulnerability; logistic function; convexity; concavity; linearity;
D O I
10.1007/s10796-006-9011-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Four kinds of marginal returns to security investment to protect an information set are decrease, first increase and then decrease (logistic function), increase, and constancy. Gordon, L. A. and Loeb, M. (ACM Trans. Inf. Syst. Secur., 5:438-457, 2002). find for decreasing marginal returns that a firm invests maximum 37% (1/e) of the expected loss from a security breach, and that protecting moderately rather than extremely vulnerable information sets may be optimal. This article presents classes of all four kinds where the optimal investment is no longer capped at 1/e. First, investment in information security activities for the logistic function is zero for low vulnerabilities, jumps in a limited "bang-bang" manner to a positive level for intermediate vulnerabilities, and thereafter increases concavely in absolute terms. Second, we present an alternative class with decreasing marginal returns where the investment increases convexly in the vulnerability until a bound is reached, investing most heavily to protect the extremely vulnerable information sets. For the third and fourth kinds the optimal investment is of an all-out "bang-bang" nature, that is, zero for low vulnerabilities, and jumping to maximum investment for intermediate vulnerabilities.
引用
收藏
页码:338 / 349
页数:12
相关论文
共 50 条
  • [41] An economic analysis of the optimal information security investment in the case of a risk-averse firm
    Huang, C. Derrick
    Hu, Qing
    Behara, Ravi S.
    INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2008, 114 (02) : 793 - 804
  • [42] Quantitative Model for Economic Analyses of Information Security Investment in an Enterprise Information System
    Bojanc, Rok
    Jerman-Blazic, Borka
    ORGANIZACIJA, 2012, 45 (06) : 276 - 288
  • [43] Litigation Finance Investing: Alternative Investment Returns in the Presence of Information Asymmetry
    Healey, Thomas
    McDonald, Michael B.
    Haley, Thea S.
    JOURNAL OF ALTERNATIVE INVESTMENTS, 2022, 24 (04): : 110 - 122
  • [44] Framing information security budget requests to influence investment decisions
    Beebe, Nicole L.
    Young, Diana K.
    Chang, Frederick R.
    Communications of the Association for Information Systems, 2014, 35 : 133 - 143
  • [45] Economic valuation for information security investment: a systematic literature review
    Daniel Schatz
    Rabih Bashroush
    Information Systems Frontiers, 2017, 19 : 1205 - 1228
  • [46] A model of the information security investment decision-making process
    Dor, Daniel
    Elovici, Yuual
    COMPUTERS & SECURITY, 2016, 63 : 1 - 13
  • [47] The dynamic analysis of investment information security using System Dynamics
    Kong, Hee-kyung
    Kim, Jong-Tae
    Proceedings of the 2005 Conference of System Dynamics and Management Science, Vol 1: SUSTAINABLE DEVELOPMENT OF ASIA PACIFIC, 2005, : 420 - 425
  • [48] Investment Strategy Analysis of Information Systems with Different Security Levels
    Pan, Chongxia
    Zhong, Weijun
    Mei, Shu-E
    2017 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2017, : 703 - 708
  • [49] A COMPETITIVE ANALYSIS OF INFORMATION SECURITY INVESTMENT: THE ROLE OF HACKER ATTACKS
    Gao, Xing
    Yang, Donghui
    JOURNAL OF INDUSTRIAL AND MANAGEMENT OPTIMIZATION, 2023, 19 (08) : 6104 - 6129
  • [50] Framing Information Security Budget Requests to Influence Investment Decisions
    Beebe, Nicole L.
    Young, Diana K.
    Chang, Frederick R.
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2014, 35 : 133 - 143