Information security investment with budget constraint and security information sharing in resource-sharing environments

Xing Gao,Manting Qiu,Ying Wang,Xifan Wang
DOI: https://doi.org/10.1080/01605682.2022.2096506
IF: 3.6
2022-08-04
Journal of the Operational Research Society
Abstract:Nowadays, business connection between firms becomes rather common so that one firm stores not only its information asset but also some of other firms' information asset. The management of information security is vital for these resource-sharing firms. This paper constructs a game-theoretic model between two resource-sharing firms and one hacker to examine their strategic interaction when the firms face budget constraint on security investment. We consider security information sharing between the firms, which can improve their overall security effort but meantime facilitate the hacker's learning to reduce attack costs. We find that although a tight budget constraint can help save investment cost, the firms always suffer from a poorly secure environment. It shows that although security information sharing is usually encouraged, the firms may be hurt when security information sharing is excessive so that fierce cyber-attacks are induced. We finally design an optimal compensation mechanism, in which the compensation fund is shown to increase with the degree of resource sharing.
management,operations research & management science
What problem does this paper attempt to address?