Please wait a minute...
Data Analysis and Knowledge Discovery  2018, Vol. 2 Issue (6): 13-24    DOI: 10.11925/infotech.2096-3467.2017.1101
Current Issue | Archive | Adv Search |
Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach
Guang Zhu(),Mining Feng,Weiwei Zhang
School of Management Science and Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China
Download: PDF(4800 KB)   HTML ( 1
Export: BibTeX | EndNote (RIS)      
Abstract  

[Objective] This paper analyzes the library’s investment on information security from the benefit and cost perspectives, aiming to improve the effectiveness and efficiency of library security management. [Methods] First, we used the evolutionary game theory to define two players: library and technical enterprise. Then, we explored the intentions of investments on information security. Third, we analyzed the benefits and costs of investments, the payoff matrices and evolutionarily stable strategies (ESS). Finally, we designed an incentive mechanism to enhance the investment on information security. [Results] The investments from libraries and enterprises were correlated with benefit growth and cost reduction. If the benefit growth was small, the game players are less likely to invest. Once the profit growth became big, the game players tend to invest and then generated different strategies. [Limitations] We did not design the nonlinear profit function. Other factors, such as user’s demands and advertisement effects should also be included. [Conclusions] This study promotes the development of information security management in library.

Key wordsLibrary      Information Security Management      Investment Desire      Incentive      Evolutionary Game     
Received: 05 November 2017      Published: 11 July 2018

Cite this article:

Guang Zhu,Mining Feng,Weiwei Zhang. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach. Data Analysis and Knowledge Discovery, 2018, 2(6): 13-24.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.2096-3467.2017.1101     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2018/V2/I6/13

[1] 朱学芳. 图博档信息资源数字化建设及服务融合探讨[J].情报资料工作, 2011(5): 57-60
[1] Zhu Xuefang.On the Digitalized Construction and Service Integration of the Information Resources of Libraries, Museums and Archives[J]. Information and Documentation Services, 2011(5): 57-60.)
[2] 朱光. 基于零水印的图博档彩色图像资源版权保护策略研究[J]. 现代图书情报技术, 2015(12): 87-93
[2] Zhu Guang.Copyright Protection Scheme of Color Images for Libraries, Museums and Archives Based on Zero-Watermarking[J]. New Technology of Library and Information Service, 2015(12): 87-93.)
[3] Khaled L, Ahmed R, Khalil Z.Comments on “Homomorphic Image Watermarking with a Singular Value Decomposition Algorithm”[J]. Information Processing & Management, 2016, 52(4): 644-645.
[4] Yu Y H, Zhang L.Research on a Provable Security RFID Authentication Protocol Based on Hash Function[J]. The Journal of China Universities of Posts and Telecommunications, 2016, 23(2): 31-37.
[5] Liang X, Xiao Y.Game Theory for Network Security[J]. IEEE Communications Surveys & Tutorials, 2013, 15(1): 472-486.
[6] Ahmad J J, Li S, Thavot R, et al.Secure Computing with the MPEG RVC Framework[J]. Signal Processing: Image Communication, 2013, 28(10): 1315-1334.
[7] 朱光, 丰米宁. 基于量化调制水印的图博档视频资源版权保护策略研究[J]. 现代图书情报技术, 2016(10): 105-111
[7] Zhu Guang, Feng Mining.Copyright Protection Scheme of Video Resources for Libraries, Museums and Archives Based on Quantization Modulation Watermarking[J]. New Technology of Library and Information Service, 2016(10): 105-111.)
[8] Hong L, Di X, Rui Z, et al.Robust and Hierarchical Watermarking of Encrypted Images Based on Compressive Sensing[J]. Signal Processing: Image Communication, 2016, 45(7): 41-51.
[9] Qi X J, Xin X.A Singular-value-based Semi-fragile Watermarking Scheme for Image Content Authentication with Tamper Localization[J]. Journal of Visual Communication and Image Representation, 2015, 30(7): 312-327.
[10] Satoshi O, Takeru M, Kazunari M.Co-evolutionary Design of a Watermark Embedding Scheme and an Extraction Algorithm for Detecting Replicated Two-dimensional Barcodes[J]. Applied Soft Computing, 2016, 46(9): 991-1007.
[11] Kabir E M, Wang H, Bertino E.A Role-involved Purpose Based Access Control Model[J]. Information Systems Frontiers, 2012, 14(3): 809-822.
[12] 徐文哲. LAM数字化融合服务中自适应自动信任协商模型研究[J]. 情报资料工作, 2014(5): 44-48
[12] Xu Wenzhe.Research on Self-adaptive Automated Trust Negotiation Model of LAM Digital Convergence Service[J]. Information and Documentation Services, 2014(5): 44-48.)
[13] Gordon L A, Loeb M P.The Economics of Information Security Investment[J]. ACM Transactions on Information and System Security (TISSEC), 2002, 5(4): 438-457.
[14] Cavusoglu H, Mishra B, Raghunathan S.A Model for Evaluating IT Security Investments[J]. Communications of the ACM, 2004, 47(7): 87-92.
[15] Fielder A, Panaousis E, Malacaria P, et al.Decision Support Approaches for Cyber Security Investment[J]. Decision Support Systems, 2016, 86(6): 13-23.
[16] Gao X, Zhong W, Mei S.A Game-Theoretic Analysis of Information Sharing and Security Investment for Complementary Firms[J]. Journal of the Operational Research Society, 2014, 65(11): 1682-1691.
[17] Liu D, Ji Y, Mookerjee V.Knowledge Sharing and Investment Decisions in Information Security[J]. Decision Support Systems, 2011, 52(1): 95-107.
[18] 顾建强, 梅姝娥, 仲伟俊. 考虑相互依赖性的信息系统安全投资及协调机制[J]. 运筹与管理, 2015, 24(6): 136-142
[18] Gu Jianqiang, Mei Shue, Zhong Weijun.Dynamic Coordination Mechanism of Information System Security Investment Based on Interdependent Security[J]. Operation Research and Management Science, 2015, 24(6): 136-142.)
[19] Deng X, Han D, Dezert J, et al.Evidence Combination from an Evolutionary Game Theory Perspective[J]. IEEE Transactions on Cybernetics, 2016, 46(9): 2070-2082.
[20] Zhao R, Neighbour G, Han J, et al.Using Game Theory to Describe Strategy Selection for Environmental Risk and Carbon Emissions Reduction in the Green Supply Chain[J]. Journal of Loss Prevention in the Process Industries, 2012, 25(6): 927-936.
[21] Demirezen E M, Kumar S, Sen A.Sustainability of Healthcare Information Exchanges: A Game-Theoretic Approach[J]. Information Systems Research, 2016, 27(2): 240-258.
[22] Gao X, Zhong W.A Differential Game Approach to Security Investment and Information Sharing in a Competitive Environment[J]. IIE Transactions, 2016, 48(6): 511-526.
[23] Du S, Li X, Du J, et al.An Attack-and-Defense Game for Security Assessment in Vehicular Ad Hoc Networks[J]. Peer- to-Peer Networking and Applications, 2014, 7(3): 215-228.
[24] Hausken K, Zhuang J.Governments’ and Terrorists’ Defense and Attack in a T-period Game[J]. Decision Analysis, 2011, 8(1): 46-70.
[25] Guo S X.Environmental Options of Local Governments for Regional Air Pollution Joint Control: Application of Evolutionary Game Theory[J]. Economic and Political Studies, 2016, 4(3):238-257.
[26] Tian Y, Govindan K, Zhu Q.A System Dynamics Model Based on Evolutionary Game Theory for Green Supply Chain Management Diffusion among Chinese Manufacturers[J]. Journal of Cleaner Production, 2014, 80(10): 96-105.
[27] Friedman D.On Economic Applications of Evolutionary Game Theory[J]. Journal of Evolutionary Economics, 1998, 8(1): 15-43.
[28] Park J S, Kwiat K A, Kamhoua C A, et al.Trusted Online Social Network (OSN) Services with Optimal Data Management[J]. Computers & Security, 2014, 42(5): 116-136.
[1] Guang Zhu,Hu Liu,Xinmeng Du. Health APPs and Privacy Concerns: A Three-Entities Game-theoretic Approach[J]. 数据分析与知识发现, 2019, 3(5): 93-106.
[2] Datian Bi,Fu Wang,Pengcheng Xu. Analyzing Mobile Library Users and Recommending Services with VSM[J]. 数据分析与知识发现, 2018, 2(9): 100-108.
[3] Xuanhui Zhang,Yuxiang Zhao. Evolution Path and Hot Topics of Citizen Science Studies[J]. 数据分析与知识发现, 2017, 1(7): 22-34.
[4] Yunfei Qi,Yuxiang Zhao,Qinghua Zhu. Linked Data for Mobile Visual Search System of Digital Library[J]. 数据分析与知识发现, 2017, 1(1): 81-90.
[5] Wang Yuefen,Jin Jialin. Characteristics and Development Trends of Papers from “New Technology of Library and Information Service”[J]. 现代图书情报技术, 2016, 32(9): 1-16.
[6] Sun Rong. Building Library APP with Mobile Platform on Campus——Case Study of Whistle Platform[J]. 现代图书情报技术, 2016, 32(9): 95-101.
[7] Hong Liang,Qian Chen,Fan Xing. Context-aware Recommendation System for Mobile Digital Libraries[J]. 现代图书情报技术, 2016, 32(7-8): 110-119.
[8] Liu Jian,Bi Qiang,Ma Zhuo. Assessment of Digital Library’s Micro-services: An Empirical Study[J]. 现代图书情报技术, 2016, 32(5): 22-29.
[9] Li Feng,Li Shu’ning,Yu Jing. A Department Oriented Library Usage Data System for Graduates[J]. 现代图书情报技术, 2016, 32(5): 99-103.
[10] Zhang Jinzhu,Wang Xiaomei,Han Tao. Predicting Co-authorship with Combination of Paths in Paper-author Bipartite Networks[J]. 现代图书情报技术, 2016, 32(10): 42-49.
[11] Dun Wenjie, Sun Yigang, Zhu Xianzhong. Design and Realization of Multimedia Document Structure of Internet TV[J]. 现代图书情报技术, 2015, 31(9): 82-89.
[12] Wang Xiaoliang, Hu Jun. Design and Implementation of Library Self-service Graduation Deactivate Account System[J]. 现代图书情报技术, 2015, 31(4): 96-102.
[13] Li Sheng, Wang Yemao. An Ontology-based and Location-aware Book Recommendation Model in Library[J]. 现代图书情报技术, 2015, 31(3): 58-66.
[14] Lu Xiaoming. Research on a Lightweight Academic Library Context-aware Recommendation Service Platform Based on GimbalTM[J]. 现代图书情报技术, 2015, 31(3): 101-107.
[15] Bi Jian, Liu Xiaoyan, Zhang Yu. Using Responsive Web Design to Build a Library Mobile Portal ——Taking Yunnan University Library as an Example[J]. 现代图书情报技术, 2015, 31(2): 97-102.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn