Security investment and information sharing under an alternative security breach probability function

被引:0
|
作者
Xing Gao
Weijun Zhong
Shue Mei
机构
[1] Southeast University,School of Economics and Management
来源
关键词
Security investment; Information sharing; Interdependence; Social planner; Security breach probability function;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, in order to protect information assets, many firms have gradually realized the importance of security investment and information sharing. It is worth pointing out that security breach probability functions play a vital role in firms’ strategic choices. This paper investigates how to determine security investment and information sharing for two firms by employing an alternative well-accepted security breach probability function. In particular, assuming that both firms make their decisions individually, we analyze information sharing, aggregate attack, aggregate defense and the security breach probability at equilibrium. Then we compare these results with those in three (partially) centralized decision cases where a social planner regulates security investment, information sharing or both of them. Between the individual decision case and the partially centralized decision case with the social planner only controlling information sharing, and between the centralized decision case and the other partially centralized decision case, we demonstrate that, although aggregate attack, aggregate defense and the security breach probability remain unchanged, more intervention from the social planner would give rise to higher social welfare. Besides, it turns out that some well-known results of Hausken (Journal of Accounting and Public Policy, 26(6), 639–688, 2007) drastically change in our framework.
引用
收藏
页码:423 / 438
页数:15
相关论文
共 50 条
  • [31] Factors in Sharing Sensitive Security Information
    Bryant, Ian
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 569 - 575
  • [32] Knowledge Sharing and Information Security: A Paradox?
    Ahmed, Ghosia
    Ragsdell, Gillian
    Olphert, Wendy
    PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON KNOWLEDGE MANAGEMENT (ECKM 2014), VOLS 1-3, 2014, : 1083 - 1090
  • [33] The economic incentives for sharing security information
    Gal-Or, E
    Ghose, A
    INFORMATION SYSTEMS RESEARCH, 2005, 16 (02) : 186 - 208
  • [34] Sharing national security information in Finland
    Lohse, Mikael
    INFORMATION & COMMUNICATIONS TECHNOLOGY LAW, 2020, 29 (03) : 279 - 290
  • [35] An evolutionary game-theoretic analysis of enterprise information security investment based on information sharing platform
    Li, Xiaotong
    MANAGERIAL AND DECISION ECONOMICS, 2022, 43 (03) : 595 - 606
  • [36] An interorganizational knowledge-sharing security model with breach propagation detection
    Soper, Daniel S.
    Demirkan, Haluk
    Goul, Michael
    INFORMATION SYSTEMS FRONTIERS, 2007, 9 (05) : 469 - 479
  • [37] Multivariate Security Breach Probability: The Gordon-Loeb Model with Copulas
    Cherubini, Umberto
    COMPUTER SAFETY, RELIABILITY, AND SECURITY. SAFECOMP 2024 WORKSHOPS, 2024, 14989 : 257 - 265
  • [38] An interorganizational knowledge-sharing security model with breach propagation detection
    Daniel S. Soper
    Haluk Demirkan
    Michael Goul
    Information Systems Frontiers, 2007, 9 : 469 - 479
  • [39] Information security investment for competitive firms with hacker behavior and security requirements
    Gao, Xing
    Zhong, Weijun
    ANNALS OF OPERATIONS RESEARCH, 2015, 235 (01) : 277 - 300
  • [40] Information security investment for competitive firms with hacker behavior and security requirements
    Xing Gao
    Weijun Zhong
    Annals of Operations Research, 2015, 235 : 277 - 300