IDEAS home Printed from https://ideas.repec.org/a/kap/netnom/v16y2015i1p127-148.html
   My bibliography  Save this article

A game theory model of cybersecurity investments with information asymmetry

Author

Listed:
  • Anna Nagurney
  • Ladimer Nagurney

Abstract

In this paper, we develop a game theory model consisting of sellers and buyers with sellers competing non-cooperatively in order to maximize their expected profits by determining their optimal product transactions as well as cybersecurity investments. The buyers reflect their preferences through the demand price functions, which depend on the product demands and on the average level of security in the marketplace. We demonstrate that the governing equilibrium conditions of this model with security information asymmetry can be formulated as a variational inequality problem. We provide qualitative properties and propose an algorithmic scheme that is easy to implement. Three sets of numerical examples are presented which reveal the impacts of the addition of buyers and sellers and a variety of changes in demand price and investment cost functions on the equilibrium product transaction and security level patterns. Copyright Springer Science+Business Media New York 2015

Suggested Citation

  • Anna Nagurney & Ladimer Nagurney, 2015. "A game theory model of cybersecurity investments with information asymmetry," Netnomics, Springer, vol. 16(1), pages 127-148, August.
  • Handle: RePEc:kap:netnom:v:16:y:2015:i:1:p:127-148
    DOI: 10.1007/s11066-015-9094-7
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1007/s11066-015-9094-7
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s11066-015-9094-7?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Anna Nagurney & Dong Li, 2014. "Equilibria and dynamics of supply chain network competition with information asymmetry in quality and minimum quality standards," Computational Management Science, Springer, vol. 11(3), pages 285-315, July.
    2. Anna Nagurney & Min Yu & Qiang Qiang, 2011. "Supply chain network design for critical needs with outsourcing," Papers in Regional Science, Wiley Blackwell, vol. 90(1), pages 123-142, March.
    3. Nagurney, Anna & Yu, Min, 2012. "Sustainable fashion supply chain management under oligopolistic competition and brand differentiation," International Journal of Production Economics, Elsevier, vol. 135(2), pages 532-540.
    4. Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
    5. Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.
    6. Dafermos, Stella & Nagurney, Anna, 1987. "Oligopolistic and competitive behavior of spatially separated markets," Regional Science and Urban Economics, Elsevier, vol. 17(2), pages 245-254.
    7. Anna Nagurney & Dong Li & Tilman Wolf & Sara Saberi, 2013. "A network economic game theory model of a service-oriented internet with choices and quality competition," Netnomics, Springer, vol. 14(1), pages 1-25, November.
    8. George A. Akerlof, 1970. "The Market for "Lemons": Quality Uncertainty and the Market Mechanism," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 84(3), pages 488-500.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Mazaher Kianpour & Stewart J. Kowalski & Harald Øverby, 2021. "Systematically Understanding Cybersecurity Economics: A Survey," Sustainability, MDPI, vol. 13(24), pages 1-28, December.
    2. Alessandro Fedele & Cristian Roner, 2022. "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
    3. Nagurney, Anna & Shukla, Shivani, 2017. "Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability," European Journal of Operational Research, Elsevier, vol. 260(2), pages 588-600.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Nagurney, Anna & Li, Dong & Nagurney, Ladimer S., 2014. "Spatial price equilibrium with information asymmetry in quality and minimum quality standards," International Journal of Production Economics, Elsevier, vol. 158(C), pages 300-313.
    2. Nagurney, Anna & Saberi, Sara & Shukla, Shivani & Floden, Jonas, 2015. "Supply chain network competition in price and quality with multiple manufacturers and freight service providers," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 77(C), pages 248-267.
    3. Nagurney, Anna & Yu, Min & Floden, Jonas & Nagurney, Ladimer S., 2014. "Supply chain network competition in time-sensitive markets," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 70(C), pages 112-127.
    4. Anna Nagurney & Dong Li, 2014. "Equilibria and dynamics of supply chain network competition with information asymmetry in quality and minimum quality standards," Computational Management Science, Springer, vol. 11(3), pages 285-315, July.
    5. Anna Nagurney & Dong Li & Tilman Wolf & Sara Saberi, 2013. "A network economic game theory model of a service-oriented internet with choices and quality competition," Netnomics, Springer, vol. 14(1), pages 1-25, November.
    6. Anna Nagurney & Dong Li, 2014. "A Dynamic Network Oligopoly Model with Transportation Costs, Product Differentiation, and Quality Competition," Computational Economics, Springer;Society for Computational Economics, vol. 44(2), pages 201-229, August.
    7. Li, Dong & Nagurney, Anna, 2015. "A general multitiered supply chain network model of quality competition with suppliers," International Journal of Production Economics, Elsevier, vol. 170(PA), pages 336-356.
    8. Masoumi, Amir H. & Yu, Min & Nagurney, Anna, 2012. "A supply chain generalized network oligopoly model for pharmaceuticals under brand differentiation and perishability," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 48(4), pages 762-780.
    9. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    10. Alessandro Fedele & Cristian Roner, 2022. "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
    11. Han, Xiaoya & Liu, Xin, 2020. "Equilibrium decisions for multi-firms considering consumer quality preference," International Journal of Production Economics, Elsevier, vol. 227(C).
    12. Liao, Chun-Hsiung & Chen, Chun-Wei, 2014. "Network externality and incentive to invest in network security," Economic Modelling, Elsevier, vol. 36(C), pages 398-404.
    13. Anna Nagurney & Tilman Wolf, 2014. "A Cournot–Nash–Bertrand game theory model of a service-oriented Internet with price and quality competition among network transport providers," Computational Management Science, Springer, vol. 11(4), pages 475-502, October.
    14. Nagurney, Anna & Shukla, Shivani & Nagurney, Ladimer S. & Saberi, Sara, 2018. "A game theory model for freight service provision security investments for high-value cargo," Economics of Transportation, Elsevier, vol. 16(C), pages 21-28.
    15. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    16. Anna Nagurney & Min Yu & Jonas Floden, 2013. "Supply chain network sustainability under competition and frequencies of activities from production to distribution," Computational Management Science, Springer, vol. 10(4), pages 397-422, December.
    17. Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston, 2014. "An economic mechanism to manage operational security risks for inter-organizational information systems," Information Systems Frontiers, Springer, vol. 16(3), pages 399-416, July.
    18. Yu, Min & Cruz, Jose M. & Li, Dong Michelle, 2019. "The sustainable supply chain network competition with environmental tax policies," International Journal of Production Economics, Elsevier, vol. 217(C), pages 218-231.
    19. Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
    20. Li, Dong & Nagurney, Anna & Yu, Min, 2018. "Consumer learning of product quality with time delay: Insights from spatial price equilibrium models with differentiated products," Omega, Elsevier, vol. 81(C), pages 150-168.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:netnom:v:16:y:2015:i:1:p:127-148. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.