IDEAS home Printed from https://ideas.repec.org/p/arx/papers/2308.00795.html
   My bibliography  Save this paper

Duopoly insurers' incentives for data quality under a mandatory cyber data sharing regime

Author

Listed:
  • Carlos Barreto
  • Olof Reinert
  • Tobias Wiesinger
  • Ulrik Franke

Abstract

We study the impact of data sharing policies on cyber insurance markets. These policies have been proposed to address the scarcity of data about cyber threats, which is essential to manage cyber risks. We propose a Cournot duopoly competition model in which two insurers choose the number of policies they offer (i.e., their production level) and also the resources they invest to ensure the quality of data regarding the cost of claims (i.e., the data quality of their production cost). We find that enacting mandatory data sharing sometimes creates situations in which at most one of the two insurers invests in data quality, whereas both insurers would invest when information sharing is not mandatory. This raises concerns about the merits of making data sharing mandatory.

Suggested Citation

  • Carlos Barreto & Olof Reinert & Tobias Wiesinger & Ulrik Franke, 2023. "Duopoly insurers' incentives for data quality under a mandatory cyber data sharing regime," Papers 2308.00795, arXiv.org.
  • Handle: RePEc:arx:papers:2308.00795
    as

    Download full text from publisher

    File URL: http://arxiv.org/pdf/2308.00795
    File Function: Latest version
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Esther Gal-or, 1986. "Information Transmission—Cournot and Bertrand Equilibria," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 53(1), pages 85-92.
    2. Jennifer L. Wang & Larry Y. Tzeng & En-Lin Wang, 2003. "The Nightmare of the Leader: The Impact of Deregulation on an Oligopoly Insurance Market," Journal of Insurance Issues, Western Risk and Insurance Association, vol. 26(1), pages 15-28.
    3. Esther Gal-Or & Anindya Ghose, 2005. "The Economic Incentives for Sharing Security Information," Information Systems Research, INFORMS, vol. 16(2), pages 186-208, June.
    4. Drew Fudenberg & David Levine, 2008. "Limit Games and Limit Equilibria," World Scientific Book Chapters, in: Drew Fudenberg & David K Levine (ed.), A Long-Run Collaboration On Long-Run Games, chapter 2, pages 21-39, World Scientific Publishing Co. Pte. Ltd..
    5. Gale, Douglas & Hellwig, Martin, 2002. "Competitive Insurance Markets with Asymmetric Information : a Cournot-Arrow-Debreu Approach," Papers 02-19, Sonderforschungsbreich 504.
    6. Yang Gao & Linda Nosick & Jamie Kruse & Rachel Davidson, 2016. "Modeling Competition in a Market for Natural Catastrophe Insurance," Journal of Insurance Issues, Western Risk and Insurance Association, vol. 39(1), pages 38-68.
    7. Gordon, Lawrence A. & Loeb, Martin P. & Lucyshyn, William, 2003. "Sharing information on computer systems security: An economic analysis," Journal of Accounting and Public Policy, Elsevier, vol. 22(6), pages 461-485.
    8. Raith, Michael, 1996. "A General Model of Information Sharing in Oligopoly," Journal of Economic Theory, Elsevier, vol. 71(1), pages 260-288, October.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Sjaak Hurkens, 2014. "Bayesian Nash equilibrium in “linear” Cournot models with private information about costs," International Journal of Economic Theory, The International Society for Economic Theory, vol. 10(2), pages 203-217, June.
    2. Ding, Haina, 2015. "Innovation strategies and stock price informativeness," Discussion Paper Series of SFB/TR 15 Governance and the Efficiency of Economic Systems 491, Free University of Berlin, Humboldt University of Berlin, University of Bonn, University of Mannheim, University of Munich.
    3. Juan-José Ganuza & Jos Jansen, 2013. "Too Much Information Sharing? Welfare Effects of Sharing Acquired Cost Information in Oligopoly," Journal of Industrial Economics, Wiley Blackwell, vol. 61(4), pages 845-876, December.
    4. Junjie Zhou & Xiaoshuai Fan & Ying-Ju Chen & Christopher S. Tang, 2021. "Information Provision and Farmer Welfare in Developing Economies," Manufacturing & Service Operations Management, INFORMS, vol. 23(1), pages 230-245, 1-2.
    5. Piccolo, Salvatore & Pagnozzi, Marco, 2013. "Information sharing between vertical hierarchies," Games and Economic Behavior, Elsevier, vol. 79(C), pages 201-222.
    6. Hyoduk Shin & Tunay I. Tunca, 2010. "Do Firms Invest in Forecasting Efficiently? The Effect of Competition on Demand Forecast Investments and Supply Chain Coordination," Operations Research, INFORMS, vol. 58(6), pages 1592-1610, December.
    7. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    8. Huseyin Cavusoglu & Srinivasan Raghunathan & Hasan Cavusoglu, 2009. "Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems," Information Systems Research, INFORMS, vol. 20(2), pages 198-217, June.
    9. David Spector, 2021. "Market share transparency, signaling and welfare: Cournot and Bertrand," PSE Working Papers halshs-02946654, HAL.
    10. Markus Christen, 2005. "Research Note---Cost Uncertainty Is Bliss: The Effect of Competition on the Acquisition of Cost Information for Pricing New Products," Management Science, INFORMS, vol. 51(4), pages 668-676, April.
    11. Xiaotong Li, 2022. "An evolutionary game‐theoretic analysis of enterprise information security investment based on information sharing platform," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(3), pages 595-606, April.
    12. Goltsman, Maria & Pavlov, Gregory, 2014. "Communication in Cournot oligopoly," Journal of Economic Theory, Elsevier, vol. 153(C), pages 152-176.
    13. Wei-Shiun Chang & Daniel A. Sanchez-Loor, 2020. "Downstream Information Leaking and Information Sharing Between Partially Informed Retailers," Journal of Industry, Competition and Trade, Springer, vol. 20(4), pages 733-760, December.
    14. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
    15. António Brandão & Joana Pinho, 2015. "Asymmetric Information And Exchange Of Information About Product Differentiation," Bulletin of Economic Research, Wiley Blackwell, vol. 67(2), pages 166-185, April.
    16. Ilkka Leppänen, 2020. "Partial commitment in an endogenous timing duopoly," Annals of Operations Research, Springer, vol. 287(2), pages 783-799, April.
    17. Arya, Anil & Mittendorf, Brian, 2007. "The interaction among disclosure, competition between firms, and analyst following," Journal of Accounting and Economics, Elsevier, vol. 43(2-3), pages 321-339, July.
    18. Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.
    19. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    20. repec:ebl:ecbull:v:12:y:2006:i:9:p:1-10 is not listed on IDEAS
    21. Hao-Chang Sung & Chunsheng Yuan, 2017. "Biased Voluntary Disclosure, Earnings Target, And Product Market Competition," Annals of Financial Economics (AFE), World Scientific Publishing Co. Pte. Ltd., vol. 12(03), pages 1-20, September.

    More about this item

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:arx:papers:2308.00795. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: arXiv administrators (email available below). General contact details of provider: http://arxiv.org/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.