999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Optimization and coordination modelof information system security investment for interdependent risk

2015-05-08 03:34:26GuJianqiangMeiShuZhongWeijun
關鍵詞:網絡安全水平模型

Gu Jianqiang Mei Shu’e Zhong Weijun

(School of Economics and Management, Southeast University, Nanjing 211189, China)

?

Optimization and coordination modelof information system security investment for interdependent risk

Gu Jianqiang Mei Shu’e Zhong Weijun

(School of Economics and Management, Southeast University, Nanjing 211189, China)

The impact of risk correlation on firm’s investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium levels of self-protection and insurance coverage under the non-cooperative condition are compared with socially optimal solutions, and the associated coordination mechanisms are proposed. The results show that self-protection investment increases in response to an increase in potential loss when the interdependent risk is small; the interdependent risk of security investments often induce firms to underinvest in security relative to the socially efficient level by ignoring marginal external costs or benefits conferred on others. A subsidy on self-protection investment from the government can help coordinate a firm’s risk management decision and, thereby, improve individual security level and overall social welfare.

interdependent risk; cyber security insurance; self-protection; coordination

Various companies are subject to different types of epidemic risks such as worms, viruses and botnets. To reduce the probability of risks, they generally invest in advanced security devices such as antivirus, firewalls and intrusion detection systems (IDSs)[1-4]. However, because of the widespread usage of electronic data interchange (EDI) and the more recent vendor managed inventory (VMI) program, the security of one firm may depend on not only the security measures taken by itself but also the security measures taken by other firms. Therefore, considering a company’s information security investment strategy and security level under interdependent risk has become an important question of information security economics.

There has been a growing body of literature concerning the interdependent risk of information security. Heal and Kunreuther[5]characterized a class of interdependent security risks and demonstrated that firms generally underinvest in security relative to the social optimum.They also noted that some methods of coordination are needed to ensure that the optimum is achieved. Since then, there has been much literature specifically addressing the information security investment of interdependent organizations. Bandyopadhyay et al.[6]studied the impact of network security vulnerability and supply chain integration on firms’ incentives to invest in information security. Gao et al.[7]studied the relationship between decisions made by two similar firms pertaining to knowledge sharing and investment in information security. The analysis shows that the complementary nature of information assets possessed by the two firms plays a crucial role in influencing these decisions.

The above authors showed the existence of interdependent risk and the value of collaboration, but they did not research subsidies as a social intervention policy to induce a firm to invest at socially optimal levels and only considered self-protection as an instrument to manage risk.

In view of the self-protection inevitable barriers to 100% risk mitigation, some researchers suggested using cyber insurance, which can transfer the security risks to the commercial insurance market[8-9].Their results show that risk correlation and unproved loss cause a firm to invest less in self-protection, compared to that at the socially optimal level.

Although information security investment is a widely discussed topic among the practitioner community, very few papers have developed economic models to understand self-protection investment under interdependent risk combined with cyber insurance from the perspective of subsidy policies. The purpose of this paper is to study the role of interdependent risk in self-protection and insurance coverage of firms from a public policy perspective.Our findings suggest that the government should offer a subsidy on self-protection to achieve socially optimal results.From the interdependent risk perspective, our findings have significant implications for the design of effective public policy, if firms’ security investments cannot be coordinated.

1 Model Description

Consider two firms,iandj. The information systems of the two firms are physically connected through a communication network. The communication network is vulnerable to the propagation of security breaches from one firm to another[6]. Thus, the two firms are both subjected to direct attacks and to indirect attacks[8,10]. In order to reduce the probability of a successful invasion from hackers, it is necessary to invest in information security technology.

The probability of breach for firm,Bi(zi,zj), may depend on not only the self-protection investment of itself but also the self-protection investment of the other firm.Bi(zi,zj) can be expressed as[6]

Bi(zi,zj)=p(zi)+(1-p(zi))qp(zj)=

1-(1-p(zi))(1-qp(zj))

(1)

Note that (1-p(zi))(1-qp(zj)) is the probability that the firm does not suffer from either a direct or an indirect breach.Bi(zi,zj) has the following properties:

These properties show that an increase inqincreases the breach probability for both firms and an increase in a firm’s self-protection investment decreases its own as well as the other firm’s breach probability.

Similar to Ref.[8], we consider each firm with an initial wealthwiand utility functionU(·). We assume that both firms are rational and averse to risk, indicating that the firm’s utility function is increasing and concave (U′(·)>0,U″(·)<0) and with a constant absolute risk aversion (coefficient of risk aversion,r=-U″/U′). LetLi∈(0,ωi) denote the monetary loss associated with the threat against the information system of each firm.

We assume that there is a market for security technology and cyber insurance. Firms are able to reduce the probability of a successful invasion by investing in information security technology and are also able to transfer the information system security risk by purchasing insurance. In the cyber insurance market, the firm pays a premium ofπiIi, whereπiis the price of insurance coverage, andIiis the indemnity paid by the insurer if a security incident occurs to the firm’s information systems. But in reality, the insurance price may be expressed asπi=(1+λ)Bi(zi,zj), whereλ≥0 is the loading factor. The loading factor resembles the profitability per contract that the insurer is keen on making. If competition in the insurance market is ideal, then the loading factorλtends to 0.

Next, we consider that both firms can manage the information system risk by investing in self-protection and purchasing cyber insurance. According to this hypothesis, the firm’s utility function isUi(ωi-Li+(1-πi)Ii-zi) when it suffers a security breach and the firm’s utility function isUi(ωi-πiIi-zi) when it does not suffer any security breach.

Therefore, the expected utilityVfor firmiis given by

(1-Bi(zi,zj))Ui(ωi-πiIi-zi)}

whereBi(zi,zj)=1-(1-p(zi))(1-qp(zj)).

In the next section, we will analyze a firm’s self-protection level and insurance coverage in the non-cooperative situation and cooperative situation, and compare these two game equilibrium results.

2 Model Analysis

2.1 Non-cooperative game situation

In this section, we study the equilibrium level where the two firms cannot contract on the level of investment. Since they aim to maximize their own respective payoffs, their incentives may not be aligned. Firmi’s expected utilityVis

Ui(ωi-Li+(1-πi)Ii-zi)+

(1-p(zi))(1-qp(zj)Ui(ωi-πiIi-zi)}

(2)

According to Ref.[9,11], any well-behaved utility function can be expanded by a Taylor series approximation. We use the Taylor series approximation:

ωi-Li+(1-πi)Ii-zi≤ξ≤ωi-πiIi-zi

ωi-Li+(1-πi)Ii-zi≤ξ≤ωi-πiIi-zi

(3)

From Eq.(2), the first-order condition with respect toIican be expressed as

(1+λ)(1-(1-p(zi))(1-qp(zj))))-

(1-p(zi))(1-qp(zj)))=0

(4)

Substituting Eq.(3) into Eq.(4), we obtain

(1-(1-p(zi))(1-qp(zj)))U″L(Li-Ii)=0

Therefore, the optimal level of cyber insurance can be expressed as

After substitutingr=-U″/U′,Iisimplifies to

(5)

From Eq.(2), the first-order condition with respect tozican be expressed as

p′(zi) (1-qp(zj))(UL-UN)-

((1+λ)p′(zi)(1-qp(zj))Ii+1)((1-

(6)

Similarly, substituting Eq.(3) into Eq.(6), we obtain

which can be further rewritten as

(7)

Substituting Eq.(5) into Eq.(7), we obtain

(8)

Symmetric parameters between the firms characterize this case:zi=zj, and the equilibrium level of insurance coverage and self-protection investment are determined by

(9)

(10)

Hereafter, we refer toISB,zSBas the optimal insurance coverage and self-protection investment in the non-cooperative situation.

Proposition 1 If the loading factor is greater than zero, then the firm buys less insurance and invests more in self-protection.

Proof Substitutingλ=0 into Eq.(10), we obtain

(11)

Proposition 2 When the interdependent risk approaches 0, the self-protection investment increases in response to an increase in potential loss.

Proof From Eq.(10), we obtain

which can be written as

Therefore,

2.2 Socially optimal self-protection and insurance coverage

If the firms can contract on the externalities, i.e. they jointly determine and implementzi,zj. In this case,zi=zj=z.

Firmi’s expected utilityVis

Ui(ωi-Li+(1-πi)Ii-z)+(1-p(z))·

(1-qp(z)Ui(ωi-πiIi-z)}

We also use the first-order Taylor series approximation, then the equilibrium level of insurance coverage and self-protection investment are determined by

(12)

(13)

we refer toIFB,zFBas the optimal insurance coverage and self-protection investment in the cooperative game situation.

2.3 Comparison

In this section, we compare the optimal level of investment in self-protection and insurance coverage in the non-cooperative situation with both of them in the cooperative situation.

Proposition 3 Under the non-cooperative situation, firms invest in self-protection and insurance coverage less than that of the socially optimal level.

Comparing Eq.(9) with Eq.(12), sincezFB>zSB, we obtainIFB>ISB.

Proposition 3 shows that the firms invest less than the socially optimal level of self-protection. The reason is that when firms maximize their own utility, a firm does not consider the effect of marginal external costs or benefits conferred on other firms, which is an externality. Due to the complementary relationship between self-protection and insurance, the firm also buys less insurance.

3 Improving Welfare Through Subsidies on Self-Protection

In this prescriptive research, we show that under-investment in self-protection and insurance coverage relative to the socially efficient level is a common phenomenon. To solve the above mentioned problem, we design an appropriate social intervention policy to induce a firm to invest at socially optimal levels.

Assume that the government offers a subsidy ofs≤1 for each unit of investment by a firm in self-protection.In order to fund the subsidy, the government charges a lump-sum tax ofki=sizito the firm. Firmi’s expected utilityVis

Ui(ωi-Li+(1-πi(zi,zj))Ii-(1-s)zi-ki)+

(1-p(zi))(1-qp(zj))Ui(ωi-πi(zi,zj)Ii-

(1-s)zi-ki)}

(14)

Proof The firm maximizes the expected payoff with respect toIi, then we obtain the optimal insurance coverage as

(15)

The first-order conditions with respect tozican be expressed as

p′(zi) (1-qp(zj))(UL-UN)-

((1+λ)p′(zi)(1-qp(zj))Ii+(1-s))·

(16)

Substituting Eq.(3) into Eq.(16), we obtain

(17)

Rewriting Eq.(17), we obtain

(18)

Substituting Eq.(15) into Eq.(18), we obtain

(19)

Comparing Eq.(10) with Eq.(19), we obtain

Proposition 4 shows that a subsidy on self-protection can effectively reduce the marginal cost of investment in self-protection.Through the optimal level of subsidy, the marginal revenue declines since interdependent risk is a partial offset, so as to internalize negative externalities and guide firms to invest in the socially optimal self-protection. Once the firms invest in socially optimal self-protection, the optimal insurance coverage must be purchased at the socially optimal level.

4 Numerical Analysis

We illustrate our above analysis with a numerical example and plot three figures to illustrate the above proposition.The primary purpose of the numerical analysis is to assess the impact of interdependent risk on firms’ insurance coverage and self-protection investment. For the numerical analysis, we choose the following parameters:L=0.5,p(z)=e-kz,k=3,λ=0.1,r=2. When examining the effect ofqon insurance coverage, self-protection investment and the optimal level of subsidy, we allowqto vary in the range of [0,0.1] (see Figs.1,2 and 3).

Fig.1 Impact of interdependent risk on self-protection investment

Fig.2 Impact of interdependent risk on the insurance coverage

Fig.3 Impact of interdependent risk on the optimal level of the subsidies

Fig.1 and Fig.2 show the impact of interdependent risk on the insurance coverage and self-protection investment, respectively. From Fig.1 and Fig.2, we find the following observations: 1) The firm invests less in self-protection and buys less insurance in response to an increase in the interdependent riskq; 2) In the non-cooperative situation, the firm buys less than the socially optimal insurance coverage and invests less than the socially optimal level of self-protection.

Fig.3 depicts the effect of interdependent risk on the optimal level of subsidy. We find that a high degree of interdependent risk increases the optimal level of subsidy when firms make investment decisions individually.

5 Conclusion

In this paper, we compare the optimal level of investment in self-protection and insurance coverage in the non-cooperative situation with both of them at the socially optimal level. We note that in the non-cooperative situation, individuals inefficiently underinvest in self-protection and insurance coverage. This raises the question about regulatory mechanisms that provide stronger incentives for firms to invest at the socially optimal level and, thereby, improve both individual and social welfare. We show that this can be achieved by offering a subsidy for each unit of investment by a firm in self-protection. As usual, a number of avenues remain for future research. One should consider the impact of the firms’ risk aversion on the optimum investment. Another possibility is to collect firms’ data on attack incidents, expected loss and investment, so as to prove the rationality of the social intervention policy.

[1]Gao X, Zhong W J, Mei S E. A game-theory approach to configuration of detection software with decision errors[J].ReliabilityEngineering&SystemSafety, 2013, 119(11): 35-43.

[2]Zhao L R, Mei S E, Zhong W J. Configuration strategy of two information security technologies based on risk preference[J].JournalofSystemsEngineering, 2014, 29(3): 324-333. (in Chinese)

[3]Zhao L R, Mei S E, Zhong W J. Game analysis on optimal configuration strategy of virtual private network and intrusion detection systems[J].JournalofIndustrialEngineering/EngineeringManagement, 2014, 28(4): 187-192. (in Chinese)

[4]Cavusoglu H, Raghunathan S. Configuration of and interaction between information security technologies:the case of firewalls and intrusion detection systems[J].InformationSystemsResearch, 2009, 20(2): 198-217.

[5]Heal G, Kunreuther H. Modeling interdependent risks[J].RiskAnalysis, 2007, 27(3): 621-634.

[6]Bandyopadhyay T, Jacob V, Raghunathan S. Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest[J].InformationTechnologyandManagement, 2010, 11(1): 7-23.

[7]Gao X, Zhong W J, Mei S E. A game-theoretic analysis of information sharing and security investment for complementary firms[J].JournaloftheOperationalResearchSociety, 2014, 65(11): 1682-1691.

[8]Ogut H, Menon N, Raghunathan S. Cyber security risk management:public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection[J].RiskAnalysis, 2011, 31(3): 497-512.

[9]Woohyun S. An analysis of information security management strategies in the presence of interdependent security risk[J].AsiaPacificJournalofInformationSystems, 2012, 22(1): 79-101.

[10]Zhuang J. Impacts of subsidized security on stability and total social costs of equilibrium solutions in an N-player game with errors [J].TheEngineeringEconomist, 2010, 52(2): 131-149.

[11]Schoemaker P. The expected utility model: its variants, purposes, evidence and limitations[J].JournalofEconomicLiterature, 1982, 20(2): 529-563.

風險相互依賴下的信息系統安全投資協調優化模型

顧建強 梅姝娥 仲偉俊

(東南大學經濟管理學院, 南京 211189)

結合風險管理理論和博弈理論, 運用定量化模型研究了風險關聯對企業信息系統安全投資的影響.通過對比非合作博弈和社會最優下的自我防御投資和網絡安全保險水平, 提出相應的協調機制.研究結果表明:當關聯性風險趨于很小時, 自我防御投資水平隨其潛在安全損失的上升而增大;企業在進行信息系統安全投資時往往會忽略對其他企業的邊際外部成本或收益的影響, 這種負外部性特征會導致企業自我防御投資和網絡安全保險水平均低于社會最優化水平.政府通過補貼企業自我防御投資可以在一定程度上協調企業的風險管理決策,進而改善企業安全水平,有效提高社會福利.

風險相互依賴;網絡安全保險;自我防御;合作協調

TP309

Foundation item:The National Natural Science Foundation of China(No.71071033).

:Gu Jianqiang, Mei Shu’e, Zhong Weijun. Optimization and coordination model of information system security investment for interdependent risk[J].Journal of Southeast University (English Edition),2015,31(2):288-293.

10.3969/j.issn.1003-7985.2015.02.023

10.3969/j.issn.1003-7985.2015.02.023

Received 2014-09-27.

Biographies:Gu Jianqiang (1979—), male, graduate; Mei Shu’e (corresponding author), female, doctor, professor, meishue@seu.edu.cn.


登錄APP查看全文

猜你喜歡
網絡安全水平模型
一半模型
張水平作品
重尾非線性自回歸模型自加權M-估計的漸近分布
加強上下聯動 提升人大履職水平
人大建設(2019年12期)2019-05-21 02:55:32
網絡安全
網絡安全人才培養應“實戰化”
上網時如何注意網絡安全?
3D打印中的模型分割與打包
我國擬制定網絡安全法
聲屏世界(2015年7期)2015-02-28 15:20:13
做到三到位 提升新水平
中國火炬(2010年8期)2010-07-25 11:34:30
主站蜘蛛池模板: 国产在线视频自拍| 97在线观看视频免费| 色丁丁毛片在线观看| 国产精品成人观看视频国产| 91区国产福利在线观看午夜 | 在线观看精品国产入口| 亚洲天堂久久| 97视频免费看| 日韩毛片免费| 亚洲欧美综合精品久久成人网| 国产成人乱码一区二区三区在线| 亚洲成aⅴ人在线观看| 色婷婷亚洲综合五月| 欧美不卡二区| 欧美区日韩区| 91人妻日韩人妻无码专区精品| Jizz国产色系免费| 玖玖精品视频在线观看| 亚洲成人在线网| 成人综合久久综合| 国产一区二区三区在线精品专区| 亚洲国产中文欧美在线人成大黄瓜 | 亚洲va在线∨a天堂va欧美va| 91福利国产成人精品导航| 国产理论一区| 五月天综合婷婷| 亚洲乱码精品久久久久..| 成人综合网址| 日韩中文字幕亚洲无线码| 在线亚洲天堂| 国产喷水视频| 欧美五月婷婷| 亚洲第一在线播放| 国产福利在线免费| 亚洲久悠悠色悠在线播放| 国产精品男人的天堂| 亚洲中文字幕国产av| 国产女人喷水视频| 日本午夜视频在线观看| 亚洲人成成无码网WWW| 欧美视频免费一区二区三区| 欧美中文字幕在线二区| 99久久无色码中文字幕| 久久精品欧美一区二区| 国产亚洲男人的天堂在线观看| 国产全黄a一级毛片| 老司机午夜精品网站在线观看 | 一级毛片免费高清视频| 免费xxxxx在线观看网站| 国产福利免费在线观看| 亚洲男人的天堂在线观看| av在线人妻熟妇| 韩国v欧美v亚洲v日本v| 中文字幕 日韩 欧美| 五月激情综合网| 国产亚洲精久久久久久无码AV| 福利在线一区| www.狠狠| 福利在线不卡一区| 国产免费久久精品99re丫丫一| 日韩无码一二三区| 97免费在线观看视频| 成人午夜免费观看| 日韩高清一区 | 免费a级毛片18以上观看精品| 免费在线国产一区二区三区精品| 美女扒开下面流白浆在线试听| 欧美视频在线播放观看免费福利资源 | 国产精品香蕉在线| 亚洲日本精品一区二区| 一级香蕉视频在线观看| 亚洲视频二| 午夜精品影院| 亚洲AV无码不卡无码| 国产精品永久免费嫩草研究院| 欧美 亚洲 日韩 国产| 色男人的天堂久久综合| 一级毛片在线播放免费观看| 亚洲成人精品| 国产成人免费手机在线观看视频| 国产成人精品综合| 国产丝袜91|