Security investment and information sharing under an alternative security breach probability function

被引:0
|
作者
Xing Gao
Weijun Zhong
Shue Mei
机构
[1] Southeast University,School of Economics and Management
来源
关键词
Security investment; Information sharing; Interdependence; Social planner; Security breach probability function;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, in order to protect information assets, many firms have gradually realized the importance of security investment and information sharing. It is worth pointing out that security breach probability functions play a vital role in firms’ strategic choices. This paper investigates how to determine security investment and information sharing for two firms by employing an alternative well-accepted security breach probability function. In particular, assuming that both firms make their decisions individually, we analyze information sharing, aggregate attack, aggregate defense and the security breach probability at equilibrium. Then we compare these results with those in three (partially) centralized decision cases where a social planner regulates security investment, information sharing or both of them. Between the individual decision case and the partially centralized decision case with the social planner only controlling information sharing, and between the centralized decision case and the other partially centralized decision case, we demonstrate that, although aggregate attack, aggregate defense and the security breach probability remain unchanged, more intervention from the social planner would give rise to higher social welfare. Besides, it turns out that some well-known results of Hausken (Journal of Accounting and Public Policy, 26(6), 639–688, 2007) drastically change in our framework.
引用
收藏
页码:423 / 438
页数:15
相关论文
共 50 条
  • [21] It's Not My Fault: The Transfer of Information Security Breach Information
    Wang, Tawei
    Wang, Yen-Yao
    Yen, Ju-Chun
    JOURNAL OF DATABASE MANAGEMENT, 2019, 30 (03) : 18 - 37
  • [22] Information sharing, investment, and retaliatory posture: the role of age in preferences toward information security governance
    Lyon, Gregory
    INFORMATION COMMUNICATION & SOCIETY, 2025,
  • [23] Probability Based Keys Sharing for IOT Security
    Leshem, Guy
    David, Esther
    Domb, Menachem
    2018 IEEE INTERNATIONAL CONFERENCE ON THE SCIENCE OF ELECTRICAL ENGINEERING IN ISRAEL (ICSEE), 2018,
  • [24] How does overconfidence affect information security investment and information security performance?
    Dong, Kunxiang
    Lin, Runhui
    Yin, Xile
    Xie, Zongxiao
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) : 474 - 491
  • [25] A game of information security investment considering security insurance and complementary information assets
    Qian, Xiaofei
    Yang, Wujuan
    Pei, Jun
    Liu, Xinbao
    Pardalos, Panos M.
    INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH, 2022, 29 (03) : 1791 - 1824
  • [26] The Impact of Information Security Breach Incidents on CIO Turnover
    Banker, Rajiv D.
    Feng, Cecilia
    JOURNAL OF INFORMATION SYSTEMS, 2019, 33 (03) : 309 - 329
  • [27] Insight into hackers' reaction toward information security breach
    Chan, Siew H.
    Janjarasjit, Suparak
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2019, 49 : 388 - 396
  • [28] Reaction of users as potential victims of information security breach
    Janjarasjit, Suparak
    Chan, Siew H.
    INFORMATION AND COMPUTER SECURITY, 2021, 29 (01) : 187 - 206
  • [29] Efficient Threshold Function Secret Sharing With Information-Theoretic Security
    Luo, Jinglong
    Zhang, Liang Feng
    Lin, Fuchun
    Lin, Changlu
    IEEE ACCESS, 2020, 8 (08): : 6523 - 6532
  • [30] Labelling: Security in Information Management and Sharing
    Schotanus, Harm
    Hartog, Tim
    Hut, Hiddo
    Boonstra, Daniel
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 228 - 237