Economic incentives in security information sharing: the effects of market structures
详细信息    查看全文
  • 作者:Xing Gao ; Weijun Zhong
  • 关键词:Bertrand competition ; Cournot competition ; Security investment ; Information sharing
  • 刊名:Information Technology and Management
  • 出版年:2016
  • 出版时间:December 2016
  • 年:2016
  • 卷:17
  • 期:4
  • 页码:361-377
  • 全文大小:
  • 刊物主题:IT in Business; Data Structures, Cryptology and Information Theory; Operation Research/Decision Theory; Computer Communication Networks; Business and Management, general;
  • 出版者:Springer US
  • ISSN:1573-7667
  • 卷排序:17
文摘
The past few years have witnessed numerous information security incidents throughout the world, which unfortunately become increasingly tough to be completely addressed just by technology solutions such as advanced firewalls and intrusion detection systems. In addition to technology components, Internet environment can be viewed as a complex economic system consisting of firms, hackers, government sectors and other participants, whose economic incentives should be taken into account carefully when security solutions are formulated. In order to better protect information assets, information security economics as an emerging and thriving research branch emerges aiming at attempting to solve the problems of distorted incentives of such stakeholders by means of economic approaches. However, how these participants’ economic incentives for information security improvement change when they evolve between different market structures has remained unknown yet. Using game theory, we develop an analytical framework to investigate the effects of market structures on security investments, information sharing, attack investments, expected profits, expected consumer surplus and expected social welfare. We demonstrate that the levels of security investments, information sharing, attack investments, and expected profits are higher while expected consumer surplus and expected social welfare are lower under Cournot competition than under Bertrand competition. In particular, we surprisingly find that under either type of competition, the demand switch ratio caused by security breaches may benefit firms, consumers, government sectors and harm hackers. Our results provide some relevant managerial insights into formulating the strategies of security investments and information sharing for the firms transforming from one type of competition to the other.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700