期刊文献+

相互关联性与投资外部性对网络安全投资策略的影响 被引量:1

Effects of Interconnectedness and Externality on Network Security Investment Strategy
下载PDF
导出
摘要 本论文研究了相互关联性与投资外部性对网络安全投资策略的影响,论文首先分析了在投资正外部性效应和负外部性效应下两个相互关联企业的网络安全投资博弈,给出了企业网络安全投资在一定条件下具有先动优势,而在另一种条件下则具有后动优势。然后分析了多个相互关联的企业分别在正外部性效应和负外部性效应下对网络安全投资的影响,两种情况下的结论具有比较大的差别,对企业的网络安全投资策略也有不同的分析和建议。 This paper studies the impacts of interconnectedness and externality on network security investment strategy. Firstly, the paper discusses the game of network security investment of two interrelated firms under positive externality and negative externality effects conditions. The results show that the network security investment of enterprises has first-mover advantage in some certain situation and second-mover advantage in some other situations. Then, the paper analyzes the impacts of network security investment by multiple interrelated firms under positive externality and negative externality effects. The conclusions are significantly different under two situations and the paper gives different analysis and suggestions accordingly.
作者 潘崇霞
出处 《西安电子科技大学学报(社会科学版)》 2017年第1期1-8,共8页 Journal of Xidian University:Social Science Edition
基金 国家自然科学基金项目(71371050)
关键词 信息安全经济学 外部性 网络安全投资策略 相互关联的安全 STACKELBERG博弈 Economics of information security Externality Network Security investment strategy Interrelated security Stackelberg game
  • 相关文献

参考文献2

二级参考文献31

  • 1刘彤.构造复杂信息系统安全基线的研究[J].中国管理科学,2000,8(S1):636-644. 被引量:5
  • 2Gordon L, Loeb M. The Economics of Information Security In- vestment [ J]. ACM Transactions on Information and System Se- curity,2002,5(4) :438 - 457.
  • 3Bodin L D, Gordon L,Loeb M. Evaluating Information Security Investments Using the Analytic Hierarchy Process [ J ]. Commu- nications of the ACM ,2005 ,48 (2).
  • 4Gordon L , Loeb M. Budgeting process for Information Security Expenditures[ J]. Communications of the ACM,2006,49( 1 ).
  • 5Kunreuther H, Heal G. Interdependent Security [ J ]. The Journal of Risk and Uncertainty ,2003,26(2/3 ) :231 - 249.
  • 6Varian H. System Reliability and Free Riding [ A ]. Fifth Interna- tional Conference on Electronic Commerce. N. Sadeh, ed. ACM Press,2003:355 - 366.
  • 7Jiang L, Anantharam V, Walrand J. Efficiency of Selfish Invest- ment in Network Security[ A]. Proceeding of the 3rd intemation-al workshop on Economics of networked Systems,USA,2008:31 -36.
  • 8Kankanhalli A,Teo H H,Tan B Y,Wei K K,A. An Integrative study of Information Systems Security Effectiveness [ J ]. Interna- tional Journal of Information Management,2003 ( 23 ) : 139 - 154.
  • 9Gmssklags J,Christin N,Chuang J. Secure or Insure? A Game- Theoretic Analysis of Information Security Games [ A ]. Proceed- ings of the 17th International World Wide Web Conference, Chi- na,2008,209-218.
  • 10Huang C, Hu Q, Behara R. An economic Analysis of the Optimal Information Security Investment in the Case of a Risk- averse Firm[ J ]. International Journal of Production Economics,2008,114:793-804.

共引文献18

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部