4.6 Article

Information security investment for competitive firms with hacker behavior and security requirements

期刊

ANNALS OF OPERATIONS RESEARCH
卷 235, 期 1, 页码 277-300

出版社

SPRINGER
DOI: 10.1007/s10479-015-1925-2

关键词

Targeted attacks; Mass attacks; Information security; Security requirements

资金

  1. Fundamental Research Support Funds from Southeast University [2242015S20002]
  2. Fundamental Research Funds for the Central Universities [2242014K10019]

向作者/读者索取更多资源

This paper investigates information security investment strategies under both targeted attacks and mass attacks by considering strategic interactions between two competitive firms and a hacker. We find that the more attractive firm invests more in information security, suffers more frequent attacks and enjoys a lower expected benefit, while the hacker achieves a higher expected benefit under targeted attacks than under mass attacks. We further examine the effect of security requirements on the two firms' investment strategies in information security. We indicate that security requirements sometimes can drastically alter the comparisons of these investment strategies under the two types of cyber attacks. The hacker would balance the firms' attractiveness in information assets and security requirements when determining its investment decisions in cyber attacks. By assuming that security requirements are endogenous, we demonstrate that under targeted attacks and mass attacks both firms would like to regulate rigorous security requirements when their degree of competition becomes fierce but would like to choose loose security requirements when the degree of competition remains mild.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据