Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment

Firms have been increasing their information technology (IT) security budgets significantly to deal with increased security threats. An examination of current practices reveals that managers view security investment as any other and use traditional decision-theoretic risk management techniques to de...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:Journal of Management Information Systems. - Taylor & Francis, Ltd.. - 25(2008), 2, Seite 281-304
1. Verfasser: Cavusoglu, Huseyin (VerfasserIn)
Weitere Verfasser: Raghunathan, Srinivasan, Yue, Wei T.
Format: Online-Aufsatz
Sprache:English
Veröffentlicht: 2008
Zugriff auf das übergeordnete Werk:Journal of Management Information Systems
Schlagworte:decision theory game theory IT security investments Mathematics Behavioral sciences Economics Applied sciences
Beschreibung
Zusammenfassung:Firms have been increasing their information technology (IT) security budgets significantly to deal with increased security threats. An examination of current practices reveals that managers view security investment as any other and use traditional decision-theoretic risk management techniques to determine security investments. We argue in this paper that this method is incomplete because of thè problem's strategie nature—hackers alter their hacking strategies in response to a firm's investment stratégies. We propose game theory for determining IT security investment levels and compare game theory and decision theory approaches on several dimensions such as the investment levels, vulnerability, and payoff from investments. We show that the sequential game results in the maximum payoff to the firm, but requires that the firm move first before the hacker. Even if a simultaneous game is played, the firm enjoys a higher payoff than that in the décision theory approach, except when the firm's estimate of the hacker effort in the decision theory approach is sufficiently close to the actual hacker effort. We also show that if the firm learns from prior observations of hacker effort and uses thèse to estimate future hacker effort in the decision theory approach, then thè gap between the results of decision theory and game theory approaches diminishes over time. The rate of convergence and the extent of loss the firm suffers before convergence depend on the learning model employed by the firm to estimate hacker effort.
ISSN:1557928X