Security investment and information sharing under an alternative security breach probability function

被引:0
|
作者
Xing Gao
Weijun Zhong
Shue Mei
机构
[1] Southeast University,School of Economics and Management
来源
关键词
Security investment; Information sharing; Interdependence; Social planner; Security breach probability function;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, in order to protect information assets, many firms have gradually realized the importance of security investment and information sharing. It is worth pointing out that security breach probability functions play a vital role in firms’ strategic choices. This paper investigates how to determine security investment and information sharing for two firms by employing an alternative well-accepted security breach probability function. In particular, assuming that both firms make their decisions individually, we analyze information sharing, aggregate attack, aggregate defense and the security breach probability at equilibrium. Then we compare these results with those in three (partially) centralized decision cases where a social planner regulates security investment, information sharing or both of them. Between the individual decision case and the partially centralized decision case with the social planner only controlling information sharing, and between the centralized decision case and the other partially centralized decision case, we demonstrate that, although aggregate attack, aggregate defense and the security breach probability remain unchanged, more intervention from the social planner would give rise to higher social welfare. Besides, it turns out that some well-known results of Hausken (Journal of Accounting and Public Policy, 26(6), 639–688, 2007) drastically change in our framework.
引用
收藏
页码:423 / 438
页数:15
相关论文
共 50 条
  • [41] Security Information Sharing in Smart Grids: Persisting Security Audits to the Blockchain
    Marin-Lopez, Andres
    Chica-Manjarrez, Sergio
    Arroyo, David
    Almenares-Mendoza, Florina
    Diaz-Sanchez, Daniel
    ELECTRONICS, 2020, 9 (11) : 1 - 16
  • [42] Dynamic security service negotiation to ensure security for information sharing on the Internet
    Xia, ZY
    Jiang, YC
    Wang, J
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 3495 : 640 - 641
  • [43] RESEARCH ON INFORMATION SHARING AND FUSION OF PUBLIC SECURITY INFORMATION UNDER BIG DATA ENVIRONMENT
    Fan, Jiaqi
    Hu, Kaixi
    Chen, Zeyan
    Li, Jiawen
    FRESENIUS ENVIRONMENTAL BULLETIN, 2022, 31 (6A): : 6115 - 6123
  • [44] Investment in children, social security, and intragenerational risk sharing
    Simon Fan
    Yu Pang
    Pierre Pestieau
    International Tax and Public Finance, 2022, 29 : 286 - 315
  • [45] Investment in children, social security, and intragenerational risk sharing
    Fan, Simon
    Pang, Yu
    Pestieau, Pierre
    INTERNATIONAL TAX AND PUBLIC FINANCE, 2022, 29 (02) : 286 - 315
  • [46] The Ripple Effect of an Information Security Breach Event: A Stakeholder Analysis
    Hovav, Anat
    Gray, Paul
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2014, 34 : 893 - 912
  • [47] Market reactions to information security breach announcements: An empirical analysis
    Kannan, Karthik
    Rees, Jackie
    Sridhar, Sanjay
    INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2007, 12 (01) : 69 - 91
  • [48] Optimal policies for information sharing in information system security
    Solak, Senay
    Zhuo, Yueran
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2020, 284 (03) : 934 - 950
  • [49] The ripple effect of an information security breach event: A stakeholder analysis
    Hovav, Anat
    Gray, Paul
    Communications of the Association for Information Systems, 2014, 34 (01): : 893 - 912
  • [50] Is information security under control? Investigating quality in information security management
    Baker, Wade H.
    Wallace, Linda
    IEEE SECURITY & PRIVACY, 2007, 5 (01) : 36 - 44