期刊文献+

Optimization and coordination model of information system security investment for interdependent risk

风险相互依赖下的信息系统安全投资协调优化模型(英文)
下载PDF
导出
摘要 The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium levels of self-protection and insurance coverage under the non- cooperative condition are compared with socially optimal solutions, and the associated coordination mechanisms are proposed. The results show that self-protection investment increases in response to an increase in potential loss when the interdependent risk is small; the interdependent risk of security investments often induce firms to underinvest in security relative to the socially efficient level by ignoring marginal external costs or benefits conferred on others. A subsidy on self-protection investment from the government can help coordinate a firm's risk management decision and, thereby, improve individual security level and overall social welfare. 结合风险管理理论和博弈理论,运用定量化模型研究了风险关联对企业信息系统安全投资的影响.通过对比非合作博弈和社会最优下的自我防御投资和网络安全保险水平,提出相应的协调机制.研究结果表明:当关联性风险趋于很小时,自我防御投资水平随其潜在安全损失的上升而增大;企业在进行信息系统安全投资时往往会忽略对其他企业的边际外部成本或收益的影响,这种负外部性特征会导致企业自我防御投资和网络安全保险水平均低于社会最优化水平.政府通过补贴企业自我防御投资可以在一定程度上协调企业的风险管理决策,进而改善企业安全水平,有效提高社会福利.
出处 《Journal of Southeast University(English Edition)》 EI CAS 2015年第2期288-293,共6页 东南大学学报(英文版)
基金 The National Natural Science Foundation of China(No.71071033)
关键词 interdependent risk cyber security insurance SELF-PROTECTION COORDINATION 风险相互依赖 网络安全保险 自我防御 合作协调
  • 相关文献

参考文献2

二级参考文献32

  • 1徐南荣 仲伟俊.科学决策理论与方法[M].南京:东南大学出版社,1996.2-10.
  • 2Holden G. Guide to Firewalls and Network Security[M]. Boston: Course Technology, 2004.
  • 3Neumarm P, Porras P. Experience with emerald to date[C]//Proceedings of 1st USENIX Workshop Conference. Santa Clara: Intru- sion Detection Network Monitoring, 1999: 73-80.
  • 4Huseyin C, Srinivasan R. Configuration of detection software: A comparison of decision and game theory approach[J]. Decision Analysis, 2004, 1(3): 131-148.
  • 5Alpcan T, Basar T. A game theoretic approach to decision and analysis in network intrusion detection[C]//Proceedings of 42nd IEEE Conference Decision and Control. Hawaii: 2003: 2595-2600.
  • 6Ross A, Tyler M. The economics of information security: A survey and open questions[J]. Science, 2006, 314(27): 610-613. 8.
  • 7Chen L, Jean L. A game theoretical framework on intrusion detection in heterogeneous networks[J]. IEEE Transactions on Informa- tion Forensics and Security, 2009, 4(2): 165-17.
  • 8Hasan C, Huseyin C, Zhang Jun. Security patch management: Share the burden or share the damage[J]. Management science, 2008, 54(4): 657-670.
  • 9Huseyin C, Srinivasan R, Hasan C. Configuration of and interaction between information security technologies: the case of firewalls and intrusion detection systems[J]. Information Systems Research, 2009, 20(2): 198-217.
  • 10Ogut Hulisi, Huseyin C, Srinivasan R. Intrusion-detection policies for IT security breaches[J]. Journal on Computing, 2008, 20(1): 112-123.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部