{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T11:19:40Z","timestamp":1722683980182},"reference-count":48,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2021,3,30]],"date-time":"2021-03-30T00:00:00Z","timestamp":1617062400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71801071"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["JZ2020HGTB0035"],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int Trans Operational Res"],"published-print":{"date-parts":[[2022,5]]},"abstract":"Abstract<\/jats:title>Considering information security insurance, this paper investigates an information security investment game between two firms with complementary information assets. Each firm's information security investment and expected profit in Nash equilibrium (i.e., firms make decisions individually) and social optimum (i.e., firms make decisions jointly) are analyzed through rigorous theoretical analyses and numerical examples. We find that making decisions jointly will make the two firms as a whole obtain more profits than when they make decisions alone, whereas this does not mean that each firm will benefit from the joint decision\u2010making process. Our results show that a firm yields a smaller expected profit in the joint decision game than the individual decision game under some conditions. In addition, the impacts of a higher insurance price and a higher investment efficiency on a firm's information security investment and expected profit are explored. The results indicate that, for a single firm, a higher insurance price does not necessarily result in smaller profit, and a higher investment efficiency does not always lead to larger profit. Then we design a compensation\u2010based contract to coordinate the two firms\u2019 information security investments when they make decisions individually. The contract will make the two firms achieve social optimum and ensure that each firm yields more profits than firms without the contract. Finally, we extend our research by setting the insurance amount as a decision variable to verify the above analyses.<\/jats:p>","DOI":"10.1111\/itor.12972","type":"journal-article","created":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T06:42:43Z","timestamp":1617172963000},"page":"1791-1824","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A game of information security investment considering security insurance and complementary information assets"],"prefix":"10.1111","volume":"29","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-6865-2086","authenticated-orcid":false,"given":"Xiaofei","family":"Qian","sequence":"first","affiliation":[{"name":"School of Management Hefei University of Technology Hefei Anhui 230009 China"},{"name":"Department of Industrial and Systems Engineering Center for Applied Optimization University of Florida Gainesville FL 32611 USA"},{"name":"Key Laboratory of Process Optimization and Intelligent Decision\u2010Making Hefei University of Technology Hefei Anhui 230009 China"},{"name":"Ministry of Education Engineering Research Center for Intelligent Decision\u2010Making & Information System Technologies Hefei Anhui 230009 China"}]},{"given":"Wujuan","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Management Hefei University of Technology Hefei Anhui 230009 China"}]},{"given":"Jun","family":"Pei","sequence":"additional","affiliation":[{"name":"School of Management Hefei University of Technology Hefei Anhui 230009 China"},{"name":"Department of Industrial and Systems Engineering Center for Applied Optimization University of Florida Gainesville FL 32611 USA"},{"name":"Key Laboratory of Process Optimization and Intelligent Decision\u2010Making Hefei University of Technology Hefei Anhui 230009 China"},{"name":"Ministry of Education Engineering Research Center for Intelligent Decision\u2010Making & Information System Technologies Hefei Anhui 230009 China"}]},{"given":"Xinbao","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Management Hefei University of Technology Hefei Anhui 230009 China"},{"name":"Key Laboratory of Process Optimization and Intelligent Decision\u2010Making Hefei University of Technology Hefei Anhui 230009 China"},{"name":"Ministry of Education Engineering Research Center for Intelligent Decision\u2010Making & Information System Technologies Hefei Anhui 230009 China"}]},{"given":"Panos M.","family":"Pardalos","sequence":"additional","affiliation":[{"name":"Department of Industrial and Systems Engineering Center for Applied Optimization University of Florida Gainesville FL 32611 USA"}]}],"member":"311","published-online":{"date-parts":[[2021,3,30]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-010-0066-1"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2018.10.004"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1287\/moor.20.4.937"},{"issue":"12","key":"e_1_2_10_5_1","first-page":"35","article-title":"A computing approach of information system vulnerability's exploited probability","volume":"40","author":"Chai J.","year":"2017","journal-title":"Journal of Chongqing University"},{"key":"e_1_2_10_6_1","doi-asserted-by":"crossref","unstructured":"Chaisiri S. Ko R.K. Niyato D. 2015.A joint optimization approach to security\u2010as\u2010a\u2010service allocation and cyber insurance management. 2015 IEEE Trustcom\/bigdatase\/ispa Vol.1.IEEE Piscataway NJ pp.426\u2013433.","DOI":"10.1109\/Trustcom.2015.403"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1111\/itor.12812"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/itor.12502"},{"key":"e_1_2_10_9_1","unstructured":"CyberInsureOne 2019. Liberty Mutual Insurance. Available athttps:\/\/cyberinsureone.com\/cyber-insurance-companies\/(accessed February 20 2020)."},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30788-4_8"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.06.005"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0053"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-015-1925-2"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.orl.2013.05.002"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2013.133"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-013-9411-3"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"e_1_2_10_18_1","doi-asserted-by":"crossref","unstructured":"Grossklags J. Christin N. Chuang J. 2008 April.Secure or insure? A game\u2010theoretic analysis of information security games.Proceedings of the 17th International Conference on World Wide Web.ACM New York pp.209\u2013218.","DOI":"10.1145\/1367497.1367526"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-006-9011-6"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1889(01)00052-5"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2012.10.004"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.10.011"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2008.04.002"},{"key":"e_1_2_10_24_1","unstructured":"Insurance Asia News Stuff 2016. China's ZhongAn launches cloud insurance with Aliyun. Available athttps:\/\/insuranceasianews.com\/chinas-zhongan-launches-cloud-insurance-with-aliyun\/(accessed February 20 2020)."},{"key":"e_1_2_10_25_1","doi-asserted-by":"crossref","unstructured":"Johnson B. B\u00f6hme R. Grossklags J. 2011.Security games with market insurance.International Conference on Decision and Game Theory for Security.Springer Berlin 117\u2013130.","DOI":"10.1007\/978-3-642-25280-8_11"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1040.0357"},{"key":"e_1_2_10_27_1","unstructured":"Kelly H. 2018. Facebook hack exposed 50 million users' info\u2014and accounts on other sites. Available athttps:\/\/money.cnn.com\/2018\/09\/28\/technology\/facebook-breach-50-million\/index.html(accessed February 20 2020)."},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2020.1721591"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.05.007"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-017-0585-y"},{"key":"e_1_2_10_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0060-x"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6687(02)00154-3"},{"key":"e_1_2_10_33_1","unstructured":"S. Morgan 2018"},{"key":"e_1_2_10_34_1","unstructured":"Ogut H. Menon N. Raghunathan S. 2005. Cyber insurance and IT security investment: impact of interdependence risk. Proceedings of the Workshop on the Economics of Information Security (WEIS) . Available athttp:\/\/dblp.uni-trier.de\/db\/conf\/weis\/weis2005.html#OgutMR05."},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2017.1400704"},{"key":"e_1_2_10_36_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41274-016-0134-y"},{"key":"e_1_2_10_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-019-00446-6"},{"key":"e_1_2_10_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6967-5_12"},{"key":"e_1_2_10_39_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221111143042"},{"key":"e_1_2_10_40_1","unstructured":"Sobers R. 2019. 110 must\u2010know cybersecurity statistics for 2020. Available athttps:\/\/www.varonis.com\/blog\/cybersecurity-statistics\/(accessed February 20 2020)."},{"key":"e_1_2_10_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2019.12.016"},{"key":"e_1_2_10_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-4266(88)90062-3"},{"key":"e_1_2_10_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-009-0109-4"},{"key":"e_1_2_10_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.001"},{"key":"e_1_2_10_45_1","doi-asserted-by":"publisher","DOI":"10.1287\/deca.2019.0406"},{"key":"e_1_2_10_46_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41274-017-0263-y"},{"key":"e_1_2_10_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.03.033"},{"key":"e_1_2_10_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2017.05.018"},{"key":"e_1_2_10_49_1","unstructured":"Zhou W. 2018. Massive data breach at major hotel chain alleged. Available athttps:\/\/www.chinadaily.com.cn\/a\/201808\/30\/WS5b87422aa310add14f3888d9.html(accessed February 20 2020)."}],"container-title":["International Transactions in Operational Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/itor.12972","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1111\/itor.12972","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/itor.12972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T13:27:43Z","timestamp":1692970063000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/itor.12972"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,30]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["10.1111\/itor.12972"],"URL":"https:\/\/doi.org\/10.1111\/itor.12972","archive":["Portico"],"relation":{},"ISSN":["0969-6016","1475-3995"],"issn-type":[{"value":"0969-6016","type":"print"},{"value":"1475-3995","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,30]]},"assertion":[{"value":"2020-01-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-10","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}