z-logo
Premium
Market Impact on IT Security Spending
Author(s) -
Kolfal Bora,
Patterson Raymond A.,
Yeo M. Lisa
Publication year - 2013
Publication title -
decision sciences
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.238
H-Index - 108
eISSN - 1540-5915
pISSN - 0011-7315
DOI - 10.1111/deci.12023
Subject(s) - investment (military) , duopoly , business , investment decisions , microeconomics , markov chain , industrial organization , economics , behavioral economics , computer science , cournot competition , politics , political science , law , machine learning
Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing these decisions. We utilize the notions of direct‐ and cross‐risk elasticity to describe the customer response to adverse IT security events in the firm and competitor, respectively, thus allowing us to analyze optimal security investment decisions. Examining both symmetric and asymmetric duopoly cases using a continuous‐time Markov chain (CTMC) model, we demonstrate that optimal IT security spending, expected firm profits and willingness of firms to cooperate on security improvements are highly dependent on the nature of customer response to adverse events. We also examine the investment problem when security attacks on different firms are correlated.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here