EconPapers    
Economics at your fingertips  
 

Coping with Digital Extortion: An Experimental Study of Benefit Appeals and Normative Appeals

Kay-Yut Chen (), Jingguo Wang () and Yan Lang ()
Additional contact information
Kay-Yut Chen: Information Systems and Operations Management, University of Texas at Arlington, Arlington, Texas 76019
Jingguo Wang: Information Systems and Operations Management, University of Texas at Arlington, Arlington, Texas 76019
Yan Lang: Information Systems and Operations Management, University of Texas at Arlington, Arlington, Texas 76019

Management Science, 2022, vol. 68, issue 7, 5269-5286

Abstract: Digital extortion has emerged as a significant threat to organizations that rely on information technologies for their operations. Using human subject experimentation, we study the effectiveness of message appeals in encouraging defenders to adopt two mitigation strategies, investment in security and refusal to pay ransoms, to digital extortion threats. We explore two types of appeals, benefit and normative, for this purpose. We find that the decisions of the defenders (representing any organization that can be a potential victim) deviate from the predictions of game theory. However, given the strategic interactions between the defenders and the attacker as well as noisy decision-making behaviors, it is challenging to untangle the influence of the appeals on the defenders. We develop a structural model based on the quantal response equilibrium framework to measure how message appeals change the defenders’ utilities of investment and payment refusal. Although the interventions may be successful in increasing the utilities of investment and/or payment refusal, their impacts on investment rate and payment rate are mitigated by the attacker reducing ransoms. Thus, it is challenging for an intervention to significantly boost a community’s investment rate or to suppress the ransom payment rate. We characterize how security outcomes of a community (including expected ransom, attack rate, investment rate, and payment rate) vary with the defenders’ utilities of investment and pay refusal.

Keywords: information security; behavioral economics and experimental economics; game theory; quantal response equilibrium; benefit appeals; normative appeals; descriptive norms; ransomware (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
http://dx.doi.org/10.1287/mnsc.2021.4154 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:inm:ormnsc:v:68:y:2022:i:7:p:5269-5286

Access Statistics for this article

More articles in Management Science from INFORMS Contact information at EDIRC.
Bibliographic data for series maintained by Chris Asher ().

 
Page updated 2025-03-19
Handle: RePEc:inm:ormnsc:v:68:y:2022:i:7:p:5269-5286