Please wait a minute...
Advanced Search
数据分析与知识发现  2018, Vol. 2 Issue (6): 13-24     https://doi.org/10.11925/infotech.2096-3467.2017.1101
  研究论文 本期目录 | 过刊浏览 | 高级检索 |
激励机制下图书馆信息安全管理的投入意愿研究*——基于演化博弈的视角
朱光(), 丰米宁, 张薇薇
南京信息工程大学管理工程学院 南京 210044
Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach
Zhu Guang(), Feng Mining, Zhang Weiwei
School of Management Science and Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China
全文: PDF (4800 KB)   HTML ( 19
输出: BibTeX | EndNote (RIS)      
摘要 

目的】分析不同成本和收益条件下图书馆信息安全管理的投入意愿, 解决投入过程中可能存在的“搭便车”问题, 提高图书馆信息安全管理的水平和效率。【方法】运用演化博弈理论, 设计由图书馆和技术研发企业组成的博弈主体, 探究双方在图书馆信息安全管理过程中的投入意愿。根据不同博弈策略的收益和成本, 计算博弈双方的支付矩阵, 分析信息安全投入的演化稳定策略。据此设计第三方激励机制, 以增强博弈双方的投入意愿。【结果】图书馆与技术研发企业的投入意愿与投入收益增率、投入成本、“搭便车”所获收益密切相关。当投入收益增率较小时, 博弈双方不会选择“高效投入”。随着投入收益增率逐渐变大, 博弈双方选择“高效投入”的概率随之提高, 并会出现多种演化稳定策略。【局限】未能设计非线性收益函数; 未能考虑其他影响演化稳定策略的因素(如用户意愿、广告因素等)。【结论】通过分析“收益-成本”因素对信息安全管理投入意愿的影响, 促进图书馆信息安全管理的发展, 并提高管理水平。

服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
朱光
丰米宁
张薇薇
关键词 图书馆信息安全管理投入意愿激励演化博弈    
Abstract

[Objective] This paper analyzes the library’s investment on information security from the benefit and cost perspectives, aiming to improve the effectiveness and efficiency of library security management. [Methods] First, we used the evolutionary game theory to define two players: library and technical enterprise. Then, we explored the intentions of investments on information security. Third, we analyzed the benefits and costs of investments, the payoff matrices and evolutionarily stable strategies (ESS). Finally, we designed an incentive mechanism to enhance the investment on information security. [Results] The investments from libraries and enterprises were correlated with benefit growth and cost reduction. If the benefit growth was small, the game players are less likely to invest. Once the profit growth became big, the game players tend to invest and then generated different strategies. [Limitations] We did not design the nonlinear profit function. Other factors, such as user’s demands and advertisement effects should also be included. [Conclusions] This study promotes the development of information security management in library.

Key wordsLibrary    Information Security Management    Investment Desire    Incentive    Evolutionary Game
收稿日期: 2017-11-05      出版日期: 2018-07-11
ZTFLH:  G250  
基金资助:*本文系国家自然科学基金项目“信息生命周期视角下的大数据隐私风险评估和溯源问责机制研究”(项目编号: 71503133)、南京信息工程大学科学技术史研究院开放课题“信息生命周期视角下的图博档多媒体资源安全策略研究”(项目编号: 2017KJSKT006)和南京信息工程大学本科生优秀毕业论文(设计)支持计划项目的研究成果之一
引用本文:   
朱光, 丰米宁, 张薇薇. 激励机制下图书馆信息安全管理的投入意愿研究*——基于演化博弈的视角[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach. Data Analysis and Knowledge Discovery, 2018, 2(6): 13-24.
链接本文:  
https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/10.11925/infotech.2096-3467.2017.1101      或      https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/Y2018/V2/I6/13
符号 意义和说明
L 图书馆
E 技术研发企业
PL 博弈双方同时选择“低效投入”, 图书馆所获得的收益, PL > 0
PE 博弈双方同时选择“低效投入”, 技术研发企业所获得的收益, PE > 0
DL 图书馆选择“高效投入”时的投入成本, CL > 0
CE 技术研发企业选择“高效投入”时的投入成本, CE>0
ξL 图书馆“搭便车”所获得的额外收益, ξL >PL>0
ξE 技术研发企业“搭便车”所获得的额外收益, ξE >PE>0
a0 图书馆选择“高效投入”, 技术研发企业选择“低效投入”时, 图书馆的投入增益系数, a0>0
a1 博弈双方都选择“高效投入”时, 图书馆的投入增益系数, a1> a0>0
b0 图书馆选择“低效投入”, 技术研发企业选择“高效投入”时, 技术研发企业的投入增益系数, b0>0
b1 博弈双方都选择“高效投入”时, 技术研发企业的投入增益系数, b1> b0>0
  模型相关参数
L E
高效投入 低效投入
高效投入 (1+a1)PL-CL, (1+b1)PE-CE (1+a0)PL-CL, ξE
低效投入 ξL, (1+b0)PE-CE PL, PE
  支付矩阵
均衡点 ${{a}_{11}}$ ${{a}_{12}}$ ${{a}_{21}}$ ${{a}_{22}}$
(0, 0) a0PL-CL 0 0 b0PE-CE
(0, 1) a1PL-CL-ξL+PL 0 0 -(b0PE-CE)
(1, 0) -(a0PL-CL) 0 0 b1PE-CE-ξE+PE
(1, 1) -(a1PL-CL-ξL+PL) 0 0 -(b1PE-CE-ξE+PE)
(A, B) 0 a12(A, B) a21(A, B) 0
  局部均衡点的具体取值
  演化相位图
L E
高效投入 低效投入
高效投入 (1+a1)PL-CL, (1+b1)PE-CE (1+a0)PL-CL+K, ξE-K
低效投入 ξL-K, (1+b0)PE-CE+K PL-K, PE-K
  激励机制下的支付矩阵
均衡点 a11 a12 a21 a22
(0, 0) a0PL-CL+K 0 0 b0PE-CE+K
(0, 1) a1PL-CL-ξL+PL+K 0 0 -(b0PE-CE+K)
(1, 0) -(a1PL-CL+K) 0 0 b1PE-CE-ξE+PE+K
(1, 1) -(a1PL-CL-ξL+PL+K) 0 0 -(b1PE-CE-ξE+PE+K)
(A’, B’) 0 a12
(A', B')
a21
(A', B')
0
  激励机制下局部均衡点的参数取值
a0 a1 b0 b1 演化稳定策略
0.25 0.45 0.25 0.45 (低效投入, 低效投入)
0.25 0.45 0.5 0.7 (低效投入, 高效投入)
0.6 0.8 0.25 0.45 (高效投入, 低效投入)
0.6 0.8 0.5 0.7 搭便车
1.2 1.4 1.1 1.3 (高效投入, 高效投入)
  投入收益增率取值
  演化稳定策略的仿真结果
  激励机制作用下演化稳定策略的仿真结果
[1] 朱学芳. 图博档信息资源数字化建设及服务融合探讨[J].情报资料工作, 2011(5): 57-60
[1] Zhu Xuefang.On the Digitalized Construction and Service Integration of the Information Resources of Libraries, Museums and Archives[J]. Information and Documentation Services, 2011(5): 57-60.)
[2] 朱光. 基于零水印的图博档彩色图像资源版权保护策略研究[J]. 现代图书情报技术, 2015(12): 87-93
[2] Zhu Guang.Copyright Protection Scheme of Color Images for Libraries, Museums and Archives Based on Zero-Watermarking[J]. New Technology of Library and Information Service, 2015(12): 87-93.)
[3] Khaled L, Ahmed R, Khalil Z.Comments on “Homomorphic Image Watermarking with a Singular Value Decomposition Algorithm”[J]. Information Processing & Management, 2016, 52(4): 644-645.
doi: 10.1016/j.ipm.2015.12.009
[4] Yu Y H, Zhang L.Research on a Provable Security RFID Authentication Protocol Based on Hash Function[J]. The Journal of China Universities of Posts and Telecommunications, 2016, 23(2): 31-37.
[5] Liang X, Xiao Y.Game Theory for Network Security[J]. IEEE Communications Surveys & Tutorials, 2013, 15(1): 472-486.
doi: 10.1109/SURV.2012.062612.00056
[6] Ahmad J J, Li S, Thavot R, et al.Secure Computing with the MPEG RVC Framework[J]. Signal Processing: Image Communication, 2013, 28(10): 1315-1334.
doi: 10.1016/j.image.2013.08.015
[7] 朱光, 丰米宁. 基于量化调制水印的图博档视频资源版权保护策略研究[J]. 现代图书情报技术, 2016(10): 105-111
[7] Zhu Guang, Feng Mining.Copyright Protection Scheme of Video Resources for Libraries, Museums and Archives Based on Quantization Modulation Watermarking[J]. New Technology of Library and Information Service, 2016(10): 105-111.)
[8] Hong L, Di X, Rui Z, et al.Robust and Hierarchical Watermarking of Encrypted Images Based on Compressive Sensing[J]. Signal Processing: Image Communication, 2016, 45(7): 41-51.
doi: 10.1016/j.image.2016.04.002
[9] Qi X J, Xin X.A Singular-value-based Semi-fragile Watermarking Scheme for Image Content Authentication with Tamper Localization[J]. Journal of Visual Communication and Image Representation, 2015, 30(7): 312-327.
doi: 10.1016/j.jvcir.2015.05.006
[10] Satoshi O, Takeru M, Kazunari M.Co-evolutionary Design of a Watermark Embedding Scheme and an Extraction Algorithm for Detecting Replicated Two-dimensional Barcodes[J]. Applied Soft Computing, 2016, 46(9): 991-1007.
doi: 10.1016/j.asoc.2015.11.001
[11] Kabir E M, Wang H, Bertino E.A Role-involved Purpose Based Access Control Model[J]. Information Systems Frontiers, 2012, 14(3): 809-822.
doi: 10.1007/s10796-011-9305-1
[12] 徐文哲. LAM数字化融合服务中自适应自动信任协商模型研究[J]. 情报资料工作, 2014(5): 44-48
[12] Xu Wenzhe.Research on Self-adaptive Automated Trust Negotiation Model of LAM Digital Convergence Service[J]. Information and Documentation Services, 2014(5): 44-48.)
[13] Gordon L A, Loeb M P.The Economics of Information Security Investment[J]. ACM Transactions on Information and System Security (TISSEC), 2002, 5(4): 438-457.
doi: 10.1145/581271.581274
[14] Cavusoglu H, Mishra B, Raghunathan S.A Model for Evaluating IT Security Investments[J]. Communications of the ACM, 2004, 47(7): 87-92.
doi: 10.1145/1005817.1005828
[15] Fielder A, Panaousis E, Malacaria P, et al.Decision Support Approaches for Cyber Security Investment[J]. Decision Support Systems, 2016, 86(6): 13-23.
doi: 10.1016/j.dss.2016.02.012
[16] Gao X, Zhong W, Mei S.A Game-Theoretic Analysis of Information Sharing and Security Investment for Complementary Firms[J]. Journal of the Operational Research Society, 2014, 65(11): 1682-1691.
doi: 10.1057/jors.2013.133
[17] Liu D, Ji Y, Mookerjee V.Knowledge Sharing and Investment Decisions in Information Security[J]. Decision Support Systems, 2011, 52(1): 95-107.
doi: 10.1016/j.dss.2011.05.007
[18] 顾建强, 梅姝娥, 仲伟俊. 考虑相互依赖性的信息系统安全投资及协调机制[J]. 运筹与管理, 2015, 24(6): 136-142
doi: 10.12005/orms.2015.0205
[18] Gu Jianqiang, Mei Shue, Zhong Weijun.Dynamic Coordination Mechanism of Information System Security Investment Based on Interdependent Security[J]. Operation Research and Management Science, 2015, 24(6): 136-142.)
doi: 10.12005/orms.2015.0205
[19] Deng X, Han D, Dezert J, et al.Evidence Combination from an Evolutionary Game Theory Perspective[J]. IEEE Transactions on Cybernetics, 2016, 46(9): 2070-2082.
doi: 10.1109/TCYB.2015.2462352 pmid: 26285231
[20] Zhao R, Neighbour G, Han J, et al.Using Game Theory to Describe Strategy Selection for Environmental Risk and Carbon Emissions Reduction in the Green Supply Chain[J]. Journal of Loss Prevention in the Process Industries, 2012, 25(6): 927-936.
doi: 10.1016/j.jlp.2012.05.004
[21] Demirezen E M, Kumar S, Sen A.Sustainability of Healthcare Information Exchanges: A Game-Theoretic Approach[J]. Information Systems Research, 2016, 27(2): 240-258.
doi: 10.1287/isre.2016.0626
[22] Gao X, Zhong W.A Differential Game Approach to Security Investment and Information Sharing in a Competitive Environment[J]. IIE Transactions, 2016, 48(6): 511-526.
doi: 10.1080/0740817X.2015.1125044
[23] Du S, Li X, Du J, et al.An Attack-and-Defense Game for Security Assessment in Vehicular Ad Hoc Networks[J]. Peer- to-Peer Networking and Applications, 2014, 7(3): 215-228.
doi: 10.1007/s12083-012-0127-9
[24] Hausken K, Zhuang J.Governments’ and Terrorists’ Defense and Attack in a T-period Game[J]. Decision Analysis, 2011, 8(1): 46-70.
doi: 10.1287/deca.1100.0194
[25] Guo S X.Environmental Options of Local Governments for Regional Air Pollution Joint Control: Application of Evolutionary Game Theory[J]. Economic and Political Studies, 2016, 4(3):238-257.
doi: 10.1080/20954816.2016.1218691
[26] Tian Y, Govindan K, Zhu Q.A System Dynamics Model Based on Evolutionary Game Theory for Green Supply Chain Management Diffusion among Chinese Manufacturers[J]. Journal of Cleaner Production, 2014, 80(10): 96-105.
doi: 10.1016/j.jclepro.2014.05.076
[27] Friedman D.On Economic Applications of Evolutionary Game Theory[J]. Journal of Evolutionary Economics, 1998, 8(1): 15-43.
doi: 10.1007/s001910050054
[28] Park J S, Kwiat K A, Kamhoua C A, et al.Trusted Online Social Network (OSN) Services with Optimal Data Management[J]. Computers & Security, 2014, 42(5): 116-136.
doi: 10.1016/j.cose.2014.02.004
[1] 朱光,刘虎,杜欣蒙. 隐私忧虑背景下的移动医疗APP使用意愿研究*——基于三方博弈的视角[J]. 数据分析与知识发现, 2019, 3(5): 93-106.
[2] 毕达天, 王福, 许鹏程. 基于VSM的移动图书馆用户画像及场景推荐*[J]. 数据分析与知识发现, 2018, 2(9): 100-108.
[3] 尹相权, 李书宁. 基于VSM的美国一流大学图书馆网站导航文本调查与分析[J]. 数据分析与知识发现, 2017, 1(3): 90-95.
[4] 齐云飞, 赵宇翔, 朱庆华. 关联数据在数字图书馆移动视觉搜索系统中的应用研究*[J]. 数据分析与知识发现, 2017, 1(1): 81-90.
[5] 孙荣. 移动校园平台支持下的高校移动图书馆建设研究*——以微哨平台为例[J]. 现代图书情报技术, 2016, 32(9): 95-101.
[6] 洪亮,钱晨,樊星. 移动数字图书馆资源的情境感知个性化推荐方法研究*[J]. 现代图书情报技术, 2016, 32(7-8): 110-119.
[7] 刘健,毕强,马卓. 数字图书馆微服务评价指标体系构建及实证研究*[J]. 现代图书情报技术, 2016, 32(5): 22-29.
[8] 李峰,李书宁,于静. 面向院系的高校毕业生图书馆记忆系统[J]. 现代图书情报技术, 2016, 32(5): 99-103.
[9] 李丹. 图书馆微信平台建设实践与思考*[J]. 现代图书情报技术, 2016, 32(4): 104-110.
[10] 敦文杰, 孙一钢, 朱先忠. 互联网络电视多媒体文档格式设计与实现[J]. 现代图书情报技术, 2015, 31(9): 82-89.
[11] 王孝亮, 胡军. 图书馆自助毕业清证协同处理系统的设计与实现[J]. 现代图书情报技术, 2015, 31(4): 96-102.
[12] 李胜, 王叶茂. 一种基于本体和位置感知的图书馆书籍推荐模型[J]. 现代图书情报技术, 2015, 31(3): 58-66.
[13] 鲁晓明. 基于GimbalTM的轻量级高校图书馆情景感知推送服务平台开发及试验[J]. 现代图书情报技术, 2015, 31(3): 101-107.
[14] 毕剑, 刘晓艳, 张禹. 使用响应式网页设计构建图书馆移动门户网站——以云南大学图书馆为例[J]. 现代图书情报技术, 2015, 31(2): 97-102.
[15] 姚飞, 姜爱蓉. 移动图书馆:从设备到人——2014年第5届国际移动图书馆会议综述[J]. 现代图书情报技术, 2015, 31(1): 1-8.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 2015 《数据分析与知识发现》编辑部
地址:北京市海淀区中关村北四环西路33号 邮编:100190
电话/传真:(010)82626611-6626,82624938
E-mail:jishu@mail.las.ac.cn