2015
DOI: 10.1016/j.eswa.2015.03.033
|View full text |Cite
|
Sign up to set email alerts
|

Game of information security investment: Impact of attack types and network vulnerability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 55 publications
(34 citation statements)
references
References 25 publications
0
33
0
1
Order By: Relevance
“…The cybersecurity problem among interconnected firms could be seen as the typical interdependent security (IDS) problem, proposed firstly by Kunreuther and Heal [29], who conducted a case study of security investment behaviors among firms in airline security and found that there is a "free-riding problem" of firms' security investment, also denoted as negative externality. Later, some research committed to solving such a negative external issue [10,17,30,31]. For example, Zhao, Xue, and Whinston [9] explored the effects of three risk management methods including cyberinsurance, managed security services (MSSs), and risk pooling arrangements (RPAs) in addressing the investment inefficiency, and the results showed that MSSs has the best effect on security risk management, followed by RPAs and cyberinsurance.…”
Section: Interdependent Cybersecurity Investmentmentioning
confidence: 99%
See 2 more Smart Citations
“…The cybersecurity problem among interconnected firms could be seen as the typical interdependent security (IDS) problem, proposed firstly by Kunreuther and Heal [29], who conducted a case study of security investment behaviors among firms in airline security and found that there is a "free-riding problem" of firms' security investment, also denoted as negative externality. Later, some research committed to solving such a negative external issue [10,17,30,31]. For example, Zhao, Xue, and Whinston [9] explored the effects of three risk management methods including cyberinsurance, managed security services (MSSs), and risk pooling arrangements (RPAs) in addressing the investment inefficiency, and the results showed that MSSs has the best effect on security risk management, followed by RPAs and cyberinsurance.…”
Section: Interdependent Cybersecurity Investmentmentioning
confidence: 99%
“…For example, Zhao, Xue, and Whinston [9] explored the effects of three risk management methods including cyberinsurance, managed security services (MSSs), and risk pooling arrangements (RPAs) in addressing the investment inefficiency, and the results showed that MSSs has the best effect on security risk management, followed by RPAs and cyberinsurance. Wu et al [17] focused on the impacts of attack types and network vulnerabilities on security investments, and examined three economic incentives for solving security underinvestment among interconnected firms. A differential game model was established to study the impact of interdependence of security investments between firms and strategic attackers [32].…”
Section: Interdependent Cybersecurity Investmentmentioning
confidence: 99%
See 1 more Smart Citation
“…The researches in [12][13] [14][15][2] [16] analyze information sharing in the context of cybersecurity. Those papers show that multiple factors impact cyber threat information sharing including competition [14], free riding [2], interconnection [17], and the possibility to exploit vulnerabilities for cyber war [16]. However, none of those work look into sharing cybersecurity information in cloud computing.…”
Section: Background On Cloud Computing Security and Information Smentioning
confidence: 99%
“…Wu et al [17] use game theory to model the cybersecurity investment of interconnected firms. When a firm's information systems are difficult to breach, the hackers chose to attack the less secure firm's information systems that are connected and easier to breach.…”
Section: Background On Cloud Computing Security and Information Smentioning
confidence: 99%