22
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A STRATEGIC ANALYSIS OF INFORMATION SHARING AMONG CYBER HACKERS

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          ABSTRACTWe build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm's vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker's attack and information sharing are strategic complements while one hacker's attack and the other hacker's information sharing are strategic substitutes. As the firm's unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm's defense and profit decrease, and the hackers’ information sharing and profit increase. The firm's profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and, moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm's investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm's investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm's asset causes all the variables to increase linearly, except information sharing which is constant. We extend our analysis to endogenize the firm's asset and this analysis largely confirms the preceding analysis with a fixed asset. We use the software Mathematica 10.1 (www.wolfram.com) to program the model mathematically with equilibrium constraints, and perform numerical analysis illustrated graphically.

          Related collections

          Most cited references35

          • Record: found
          • Abstract: not found
          • Article: not found

          Information Sharing in Oligopoly

            Bookmark
            • Record: found
            • Abstract: not found
            • Book: not found

            The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary

              Bookmark
              • Record: found
              • Abstract: not found
              • Book: not found

              To wards a Theory of the Rent-Seeking Society

                Bookmark

                Author and article information

                Contributors
                Role: ND
                Journal
                jistm
                JISTEM - Journal of Information Systems and Technology Management
                JISTEM J.Inf.Syst. Technol. Manag.
                TECSI Laboratório de Tecnologia e Sistemas de Informação - FEA/USP (São Paulo )
                1807-1775
                August 2015
                : 12
                : 2
                : 245-270
                Affiliations
                [1 ] University of Stavanger Norway
                Article
                S1807-17752015000200245
                10.4301/S1807-17752015000200004
                13fdf4f6-cfa4-47c6-9e57-0aa777e19600

                http://creativecommons.org/licenses/by/4.0/

                History
                Product

                SciELO Brazil

                Self URI (journal page): http://www.scielo.br/scielo.php?script=sci_serial&pid=1807-1775&lng=en
                Categories
                COMPUTER SCIENCE, INFORMATION SYSTEMS

                Information systems & theory
                Information sharing,security investment,asset allocation,cyber war,contest,decision analysis,game theory,numerical analysis

                Comments

                Comment on this article