Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size | Journal of Global Optimization Skip to main content

Advertisement

Log in

Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size

  • Published:
Journal of Global Optimization Aims and scope Submit manuscript

Abstract

We study a differential game of information security investment and information sharing in a market consisting of n complementary firms. Two game approaches, the non-cooperative game and the totally cooperative game, are employed to investigate the steady state strategy of each firm. Under certain conditions, a unique steady state can be obtained for both games. We find that the steady state security investment and information sharing level are not always less in the non-cooperative game than that in the totally cooperative game. In addition, some theoretical analyses are made on the impacts of the complementarity degree and industry size on firms’ steady state strategies for both games. Finally, some numerical experiments are conducted to give some insights related to the instantaneous profit in the steady state. It can be found that a firm will obtain more instantaneous profit in the steady state of the totally cooperative game than that of the non-cooperative game, which emphasizes the importance of coordinating strategies. The effects of the complementarity degree and industry size on the instantaneous profits in the steady state are also obtained through the numerical experiment results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Armerding, T.: The 15 worst data security breaches of the 21st Century. http://www.csoonline.com/article/2130877/data-protection/data-protection-the-15-worst-data-security-breaches-of-the-21st-century.html?page=3 (2015)

  2. Huang, C.D., Hu, Q., Behara, R.S.: An economic analysis of the optimal information security investment in the case of a risk-averse firm. Int. J. Prod. Econ. 114, 793–804 (2008)

    Article  Google Scholar 

  3. Lelarge, M.: Coordination in network security games: a monotone comparative statics approach. IEEE J. Sel. Areas Commun. 30, 2210–2219 (2012)

    Article  Google Scholar 

  4. Huang, C.D., Behara, R.S.: Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints. Int. J. Prod. Econ. 141, 255–268 (2013)

    Article  Google Scholar 

  5. Chai, S., Kim, M., Rao, H.R.: Firms’ information security investment decisions: stock market evidence of investors’ behavior. Decis. Support Syst. 50, 651–661 (2011)

    Article  Google Scholar 

  6. Bandyopadhyay, T., Jacob, V., Raghunathan, S.: Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest. Inf. Technol. Manag. 11, 7–23 (2010)

    Article  Google Scholar 

  7. Eisenga, A., Jones, T.L., Rodriguez, W.: Investing in IT security: how to determine the maximum threshold. Int. J. Inf. Secur. Priv. 6, 75–87 (2012)

    Article  Google Scholar 

  8. Wu, Y., Feng, G., Wang, N., Liang, H.: Game of information security investment: impact of attack types and network vulnerability. Expert Syst. Appl. 42, 6132–6146 (2015)

    Article  Google Scholar 

  9. Gao, X., Zhong, W., Mei, S.: Security investment and information sharing under an alternative security breach probability function. Inf. Syst. Front. 17, 423–438 (2015)

    Article  Google Scholar 

  10. Qian, X., Liu, X., Pei, J., Pardalos, P.M., Liu, L.: A game-theoretic analysis of information security investment for multiple firms in a network. J. Oper. Res. Soc. 68, 1290–1305 (2017)

  11. Gao, X., Zhong, W.: Economic incentives in security information sharing: the effects of market structures. Inf. Technol. Manag. 17, 361–377 (2016)

    Article  Google Scholar 

  12. Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Inf. Syst. Res. 16, 186–208 (2005)

    Article  Google Scholar 

  13. Gao, X., Zhong, W., Mei, S.: A differential game approach to information security investment under hackers’ knowledge dissemination. Oper. Res. Lett. 41, 421–425 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  14. Marte, J.: Are data breaches creating smarter consumers? http://www.washingtonpost.com/news/get-there/wp/2014/10/20/are-data-breaches-creating-better-consumers/ (2014)

  15. Cellini, R., Lambertini, L.: Advertising with spillover effects in a differential oligopoly game with differentiated goods. CEJOR 11, 409–423 (2003)

    MathSciNet  MATH  Google Scholar 

  16. Cellini, R., Lambertini, L.: A differential game approach to investment in product differentiation. J. Econ. Dyn. Control 27, 51–62 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  17. Kumar, A., Tan, Y.: Demand effects of joint product advertising in online videos. Manag. Sci. 61, 1921–1937 (2015)

    Article  Google Scholar 

  18. Tan, Y., Carrillo, J., Cheng, H.K.: The agency model for digital goods. Decis. Sci. 4, 628–660 (2016)

    Article  Google Scholar 

  19. Tan, Y., Carrillo, J.: Strategic analysis of the agency model for digital goods. Prod. Oper. Manag. 26, 724–741 (2017)

    Article  Google Scholar 

  20. Mukhopadhyay, S.K., Yue, X., Zhu, X.: A Stackelberg model of pricing of complementary goods under information asymmetry. Int. J. Prod. Econ. 134, 424–433 (2011)

    Article  Google Scholar 

  21. Liu, D., Ji, Y., Mookerjee, V.: Knowledge sharing and investment decisions in information security. Decis. Support Syst. 52, 95–107 (2011)

    Article  Google Scholar 

  22. Gordon, L.A., Loeb, M., Lucyshyn, W.: Sharing information on computer systems security: an economic analysis. J. Account. Public Policy 22, 461–485 (2003)

    Article  Google Scholar 

  23. Hausken, K.: Information sharing among firms and cyber attacks. J. Account. Public Policy 26, 639–688 (2007)

    Article  Google Scholar 

  24. Gao, X., Zhong, W., Mei, S.: A game-theoretic analysis of information sharing and security investment for complementary firms. J. Oper. Res. Soc. 65, 1682–1691 (2014)

    Article  Google Scholar 

  25. Yan, R., Bandyopadhyay, S.: The profit benefits of bundle pricing of complementary products. J. Retail. Consum. Serv. 18, 355–361 (2011)

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (Nos. 71231004, 71601065, 71690235, 71690230, 71501058), and Innovative Research Groups of the National Natural Science Foundation of China (71521001), the Humanities and Social Sciences Foundation of the Chinese Ministry of Education (No. 15YJC630097), Anhui Province Natural Science Foundation (No. 1608085QG167), and the Science and Technology Project of Zhejiang Province (No. 2017C31069). Panos M. Pardalos is partially supported by the project of “Distinguished International Professor by the Chinese Ministry of Education” (MS2014HFGY026).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xiaofei Qian or Jun Pei.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, X., Qian, X., Pei, J. et al. Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size. J Glob Optim 70, 413–436 (2018). https://doi.org/10.1007/s10898-017-0585-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10898-017-0585-y

Keywords

Navigation