Proceedings of the 2nd International Conference on Science and Social Research 2013
DOI: 10.2991/icssr-13.2013.90
|View full text |Cite
|
Sign up to set email alerts
|

Incentive Mechanism Design Based on Repeated Game Theory in Security Information Sharing

Abstract: Abstract-In addition to the security investment, security information sharing among firms has been proved to be an effective measure. In order to enhance the level of information security and improve the social welfare, this paper studies how to promote sharing through a certain reasonable incentive mechanism. We adopt the repeated game theory to establish incentive mechanism and analyze how similarity, isolation period, discount factor, proportion of rational firms and so on effect the efficiency of this ince… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…It is surmised that members increase their contribution in expectation to be rewarded for it in form of reciprocity [20]. The work in [44] suggested a punishment model which inclines isolation from the threat sharing community. If an entity decides not to share, and only consume, CTI, then the punishment process will revoke permission rights.…”
Section: Industry Sector Sharingmentioning
confidence: 99%
“…It is surmised that members increase their contribution in expectation to be rewarded for it in form of reciprocity [20]. The work in [44] suggested a punishment model which inclines isolation from the threat sharing community. If an entity decides not to share, and only consume, CTI, then the punishment process will revoke permission rights.…”
Section: Industry Sector Sharingmentioning
confidence: 99%
“…The researches in [12][13] [14][15][2] [16] analyze information sharing in the context of cybersecurity. Those papers show that multiple factors impact cyber threat information sharing including competition [14], free riding [2], interconnection [17], and the possibility to exploit vulnerabilities for cyber war [16].…”
Section: Background On Cloud Computing Security and Information Smentioning
confidence: 99%