DSpace Repository

Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach

Show simple item record

dc.contributor.author Gupta, Rohit.
dc.contributor.author Biswas, Baidyanath.
dc.contributor.author Biswas, Indranil.
dc.contributor.author Sana, Shib Sankar.
dc.date.accessioned 2021-08-02T06:18:19Z
dc.date.available 2021-08-02T06:18:19Z
dc.date.issued 2021-05-10
dc.identifier.citation Gupta, R., Biswas, B., Biswas, I., & Sana, S. S. (2021). Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach. Information and Computer Security, 29(1), 73-104. https://doi.org/10.1108/ICS-02-2020-0028 en_US
dc.identifier.issn 2056-4961
dc.identifier.uri https://doi.org/10.1108/ICS-02-2020-0028
dc.identifier.uri http://idr.iimranchi.ac.in:8080/xmlui/handle/123456789/941
dc.description.abstract Purpose This paper aims to examine optimal decisions for information security investments for a firm in a fuzzy environment. Under both sequential and simultaneous attack scenarios, optimal investment of firm, optimal efforts of attackers and their economic utilities are determined. Design/methodology/approach Throughout the analysis, a single firm and two attackers for a “firm as a leader” in a sequential game setting and “firm versus attackers” in a simultaneous game setting are considered. While the firm makes investments to secure its information assets, the attackers spend their efforts to launch breaches. Findings It is observed that the firm needs to invest more when it announces its security investment decisions ahead of attacks. In contrast, the firm can invest relatively less when all agents are unaware of each other’s choices in advance. Further, the study reveals that attackers need to exert higher effort when no agent enjoys the privilege of being a leader. Research limitations/implications In a novel approach, inherent system vulnerability of the firm, financial benefit of attackers from the breach and monetary loss suffered by the firm are considered, as fuzzy variables in the well-recognized Gordon – Loeb breach function, with the help of fuzzy expectation operator. Practical implications This study reports that the optimal breach effort exerted by each attacker is proportional to its obtained economic benefit for both sequential and simultaneous attack scenarios. A set of numerical experiments and sensitivity analyzes complement the analytical modeling. Originality/value In a novel approach, inherent system vulnerability of the firm, financial benefit of attackers from the breach and monetary loss suffered by the firm are considered, as fuzzy variables in the well-recognized Gordon – Loeb breach function, with the help of fuzzy expectation operator. en_US
dc.language.iso en en_US
dc.publisher Information and Computer Security en_US
dc.subject Vulnerability en_US
dc.subject Information security modeling en_US
dc.subject Game theory en_US
dc.subject Fuzzy sets en_US
dc.subject Gordon – Loeb breach function en_US
dc.subject Information security investment en_US
dc.subject IIM Ranchi en_US
dc.title Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach en_US
dc.type Article en_US
dc.volume 29 en_US
dc.issue 1 en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record