EconPapers    
Economics at your fingertips  
 

Economic incentives in security information sharing: the effects of market structures

Xing Gao () and Weijun Zhong
Additional contact information
Xing Gao: Southeast University
Weijun Zhong: Southeast University

Information Technology and Management, 2016, vol. 17, issue 4, No 4, 377 pages

Abstract: Abstract The past few years have witnessed numerous information security incidents throughout the world, which unfortunately become increasingly tough to be completely addressed just by technology solutions such as advanced firewalls and intrusion detection systems. In addition to technology components, Internet environment can be viewed as a complex economic system consisting of firms, hackers, government sectors and other participants, whose economic incentives should be taken into account carefully when security solutions are formulated. In order to better protect information assets, information security economics as an emerging and thriving research branch emerges aiming at attempting to solve the problems of distorted incentives of such stakeholders by means of economic approaches. However, how these participants’ economic incentives for information security improvement change when they evolve between different market structures has remained unknown yet. Using game theory, we develop an analytical framework to investigate the effects of market structures on security investments, information sharing, attack investments, expected profits, expected consumer surplus and expected social welfare. We demonstrate that the levels of security investments, information sharing, attack investments, and expected profits are higher while expected consumer surplus and expected social welfare are lower under Cournot competition than under Bertrand competition. In particular, we surprisingly find that under either type of competition, the demand switch ratio caused by security breaches may benefit firms, consumers, government sectors and harm hackers. Our results provide some relevant managerial insights into formulating the strategies of security investments and information sharing for the firms transforming from one type of competition to the other.

Keywords: Bertrand competition; Cournot competition; Security investment; Information sharing (search for similar items in EconPapers)
JEL-codes: L11 L13 (search for similar items in EconPapers)
Date: 2016
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (4)

Downloads: (external link)
http://link.springer.com/10.1007/s10799-015-0253-1 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:infotm:v:17:y:2016:i:4:d:10.1007_s10799-015-0253-1

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/10799

DOI: 10.1007/s10799-015-0253-1

Access Statistics for this article

Information Technology and Management is currently edited by Raymond Patterson and Erik Rolland

More articles in Information Technology and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:infotm:v:17:y:2016:i:4:d:10.1007_s10799-015-0253-1