Volume 32 Issue 12
Dec.  2006
Turn off MathJax
Article Contents
Lü Junjie, Qiu Wanhua, Wang Yuanzhuoet al. Investment externality and game strategies of network security[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(12): 1499-1502. (in Chinese)
Citation: Lü Junjie, Qiu Wanhua, Wang Yuanzhuoet al. Investment externality and game strategies of network security[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(12): 1499-1502. (in Chinese)

Investment externality and game strategies of network security

  • Received Date: 27 Dec 2005
  • Publish Date: 31 Dec 2006
  • An investment game theoretic model was presented to study the externality in firms′ network security investment with different investment costs and profits.Taking virus contagion as an example, the negative investment externality exerted by the contagion between firms in the network was investigated. Under such an environment, the investment threshold and factors concerned such as contagion probability and the number of investing firms were computed to determine several Nash equilibrium solutions with externality representing the risk. The model was analyzed further when the risk was endogenous and the invest threshold was much more complicated than that in exogenous environment. This endogenous threshold is determined not only by the probability of contagion between firms but also by the sign and absolute value of externalities. This method provides a novel viewpoint to information security risk management and advices for firms′ decision on security investment and government policies to induce investment under externality.

     

  • loading
  • [1] Nathaniel O K, Richard J Z. The ecology of terror defense[J]. Journal of Risk and Uncertainty, 2003, 26:201-229 [2] Peter R O, Joseph E S. Optimal fire departments:evaluating public policy in the face of externalities .Washington DC:The Brookings Institution,2002 . http://www.brookings.edu/views/papers/orszag/20020104.htm [3] Kunreuther H, Heal G. Interdependent security [J].Journal of Risk and Uncertainty,2003,26:231-249  [4] Sandler T. Collective action and transnational terrorism[J]. World Economy,2003,26:779-802 [5] Sandler T, Daniel G A.Terrorism and game theory[J]. Simulation & Gaming,2003,34(3):319-337 [6] Ayres I, Steven D. Measuring the positive externalities from unobservable victim precaution:an empirical analysis of lojack[J]. Quarterly Journal of Economics,1998,113:43-77
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2630) PDF downloads(891) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return