Please wait a minute...
Data Analysis and Knowledge Discovery  2018, Vol. 2 Issue (6): 13-24    DOI: 10.11925/infotech.2096-3467.2017.1101
Current Issue | Archive | Adv Search |
Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach
Zhu Guang(), Feng Mining, Zhang Weiwei
School of Management Science and Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China
Download: PDF (4800 KB)   HTML ( 19
Export: BibTeX | EndNote (RIS)      
Abstract  

[Objective] This paper analyzes the library’s investment on information security from the benefit and cost perspectives, aiming to improve the effectiveness and efficiency of library security management. [Methods] First, we used the evolutionary game theory to define two players: library and technical enterprise. Then, we explored the intentions of investments on information security. Third, we analyzed the benefits and costs of investments, the payoff matrices and evolutionarily stable strategies (ESS). Finally, we designed an incentive mechanism to enhance the investment on information security. [Results] The investments from libraries and enterprises were correlated with benefit growth and cost reduction. If the benefit growth was small, the game players are less likely to invest. Once the profit growth became big, the game players tend to invest and then generated different strategies. [Limitations] We did not design the nonlinear profit function. Other factors, such as user’s demands and advertisement effects should also be included. [Conclusions] This study promotes the development of information security management in library.

Key wordsLibrary      Information Security Management      Investment Desire      Incentive      Evolutionary Game     
Received: 05 November 2017      Published: 11 July 2018
ZTFLH:  G250  

Cite this article:

Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach. Data Analysis and Knowledge Discovery, 2018, 2(6): 13-24.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.2096-3467.2017.1101     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2018/V2/I6/13

符号 意义和说明
L 图书馆
E 技术研发企业
PL 博弈双方同时选择“低效投入”, 图书馆所获得的收益, PL > 0
PE 博弈双方同时选择“低效投入”, 技术研发企业所获得的收益, PE > 0
DL 图书馆选择“高效投入”时的投入成本, CL > 0
CE 技术研发企业选择“高效投入”时的投入成本, CE>0
ξL 图书馆“搭便车”所获得的额外收益, ξL >PL>0
ξE 技术研发企业“搭便车”所获得的额外收益, ξE >PE>0
a0 图书馆选择“高效投入”, 技术研发企业选择“低效投入”时, 图书馆的投入增益系数, a0>0
a1 博弈双方都选择“高效投入”时, 图书馆的投入增益系数, a1> a0>0
b0 图书馆选择“低效投入”, 技术研发企业选择“高效投入”时, 技术研发企业的投入增益系数, b0>0
b1 博弈双方都选择“高效投入”时, 技术研发企业的投入增益系数, b1> b0>0
L E
高效投入 低效投入
高效投入 (1+a1)PL-CL, (1+b1)PE-CE (1+a0)PL-CL, ξE
低效投入 ξL, (1+b0)PE-CE PL, PE
均衡点 ${{a}_{11}}$ ${{a}_{12}}$ ${{a}_{21}}$ ${{a}_{22}}$
(0, 0) a0PL-CL 0 0 b0PE-CE
(0, 1) a1PL-CL-ξL+PL 0 0 -(b0PE-CE)
(1, 0) -(a0PL-CL) 0 0 b1PE-CE-ξE+PE
(1, 1) -(a1PL-CL-ξL+PL) 0 0 -(b1PE-CE-ξE+PE)
(A, B) 0 a12(A, B) a21(A, B) 0
L E
高效投入 低效投入
高效投入 (1+a1)PL-CL, (1+b1)PE-CE (1+a0)PL-CL+K, ξE-K
低效投入 ξL-K, (1+b0)PE-CE+K PL-K, PE-K
均衡点 a11 a12 a21 a22
(0, 0) a0PL-CL+K 0 0 b0PE-CE+K
(0, 1) a1PL-CL-ξL+PL+K 0 0 -(b0PE-CE+K)
(1, 0) -(a1PL-CL+K) 0 0 b1PE-CE-ξE+PE+K
(1, 1) -(a1PL-CL-ξL+PL+K) 0 0 -(b1PE-CE-ξE+PE+K)
(A’, B’) 0 a12
(A', B')
a21
(A', B')
0
a0 a1 b0 b1 演化稳定策略
0.25 0.45 0.25 0.45 (低效投入, 低效投入)
0.25 0.45 0.5 0.7 (低效投入, 高效投入)
0.6 0.8 0.25 0.45 (高效投入, 低效投入)
0.6 0.8 0.5 0.7 搭便车
1.2 1.4 1.1 1.3 (高效投入, 高效投入)
[1] 朱学芳. 图博档信息资源数字化建设及服务融合探讨[J].情报资料工作, 2011(5): 57-60
[1] Zhu Xuefang.On the Digitalized Construction and Service Integration of the Information Resources of Libraries, Museums and Archives[J]. Information and Documentation Services, 2011(5): 57-60.)
[2] 朱光. 基于零水印的图博档彩色图像资源版权保护策略研究[J]. 现代图书情报技术, 2015(12): 87-93
[2] Zhu Guang.Copyright Protection Scheme of Color Images for Libraries, Museums and Archives Based on Zero-Watermarking[J]. New Technology of Library and Information Service, 2015(12): 87-93.)
[3] Khaled L, Ahmed R, Khalil Z.Comments on “Homomorphic Image Watermarking with a Singular Value Decomposition Algorithm”[J]. Information Processing & Management, 2016, 52(4): 644-645.
doi: 10.1016/j.ipm.2015.12.009
[4] Yu Y H, Zhang L.Research on a Provable Security RFID Authentication Protocol Based on Hash Function[J]. The Journal of China Universities of Posts and Telecommunications, 2016, 23(2): 31-37.
[5] Liang X, Xiao Y.Game Theory for Network Security[J]. IEEE Communications Surveys & Tutorials, 2013, 15(1): 472-486.
doi: 10.1109/SURV.2012.062612.00056
[6] Ahmad J J, Li S, Thavot R, et al.Secure Computing with the MPEG RVC Framework[J]. Signal Processing: Image Communication, 2013, 28(10): 1315-1334.
doi: 10.1016/j.image.2013.08.015
[7] 朱光, 丰米宁. 基于量化调制水印的图博档视频资源版权保护策略研究[J]. 现代图书情报技术, 2016(10): 105-111
[7] Zhu Guang, Feng Mining.Copyright Protection Scheme of Video Resources for Libraries, Museums and Archives Based on Quantization Modulation Watermarking[J]. New Technology of Library and Information Service, 2016(10): 105-111.)
[8] Hong L, Di X, Rui Z, et al.Robust and Hierarchical Watermarking of Encrypted Images Based on Compressive Sensing[J]. Signal Processing: Image Communication, 2016, 45(7): 41-51.
doi: 10.1016/j.image.2016.04.002
[9] Qi X J, Xin X.A Singular-value-based Semi-fragile Watermarking Scheme for Image Content Authentication with Tamper Localization[J]. Journal of Visual Communication and Image Representation, 2015, 30(7): 312-327.
doi: 10.1016/j.jvcir.2015.05.006
[10] Satoshi O, Takeru M, Kazunari M.Co-evolutionary Design of a Watermark Embedding Scheme and an Extraction Algorithm for Detecting Replicated Two-dimensional Barcodes[J]. Applied Soft Computing, 2016, 46(9): 991-1007.
doi: 10.1016/j.asoc.2015.11.001
[11] Kabir E M, Wang H, Bertino E.A Role-involved Purpose Based Access Control Model[J]. Information Systems Frontiers, 2012, 14(3): 809-822.
doi: 10.1007/s10796-011-9305-1
[12] 徐文哲. LAM数字化融合服务中自适应自动信任协商模型研究[J]. 情报资料工作, 2014(5): 44-48
[12] Xu Wenzhe.Research on Self-adaptive Automated Trust Negotiation Model of LAM Digital Convergence Service[J]. Information and Documentation Services, 2014(5): 44-48.)
[13] Gordon L A, Loeb M P.The Economics of Information Security Investment[J]. ACM Transactions on Information and System Security (TISSEC), 2002, 5(4): 438-457.
doi: 10.1145/581271.581274
[14] Cavusoglu H, Mishra B, Raghunathan S.A Model for Evaluating IT Security Investments[J]. Communications of the ACM, 2004, 47(7): 87-92.
doi: 10.1145/1005817.1005828
[15] Fielder A, Panaousis E, Malacaria P, et al.Decision Support Approaches for Cyber Security Investment[J]. Decision Support Systems, 2016, 86(6): 13-23.
doi: 10.1016/j.dss.2016.02.012
[16] Gao X, Zhong W, Mei S.A Game-Theoretic Analysis of Information Sharing and Security Investment for Complementary Firms[J]. Journal of the Operational Research Society, 2014, 65(11): 1682-1691.
doi: 10.1057/jors.2013.133
[17] Liu D, Ji Y, Mookerjee V.Knowledge Sharing and Investment Decisions in Information Security[J]. Decision Support Systems, 2011, 52(1): 95-107.
doi: 10.1016/j.dss.2011.05.007
[18] 顾建强, 梅姝娥, 仲伟俊. 考虑相互依赖性的信息系统安全投资及协调机制[J]. 运筹与管理, 2015, 24(6): 136-142
doi: 10.12005/orms.2015.0205
[18] Gu Jianqiang, Mei Shue, Zhong Weijun.Dynamic Coordination Mechanism of Information System Security Investment Based on Interdependent Security[J]. Operation Research and Management Science, 2015, 24(6): 136-142.)
doi: 10.12005/orms.2015.0205
[19] Deng X, Han D, Dezert J, et al.Evidence Combination from an Evolutionary Game Theory Perspective[J]. IEEE Transactions on Cybernetics, 2016, 46(9): 2070-2082.
doi: 10.1109/TCYB.2015.2462352 pmid: 26285231
[20] Zhao R, Neighbour G, Han J, et al.Using Game Theory to Describe Strategy Selection for Environmental Risk and Carbon Emissions Reduction in the Green Supply Chain[J]. Journal of Loss Prevention in the Process Industries, 2012, 25(6): 927-936.
doi: 10.1016/j.jlp.2012.05.004
[21] Demirezen E M, Kumar S, Sen A.Sustainability of Healthcare Information Exchanges: A Game-Theoretic Approach[J]. Information Systems Research, 2016, 27(2): 240-258.
doi: 10.1287/isre.2016.0626
[22] Gao X, Zhong W.A Differential Game Approach to Security Investment and Information Sharing in a Competitive Environment[J]. IIE Transactions, 2016, 48(6): 511-526.
doi: 10.1080/0740817X.2015.1125044
[23] Du S, Li X, Du J, et al.An Attack-and-Defense Game for Security Assessment in Vehicular Ad Hoc Networks[J]. Peer- to-Peer Networking and Applications, 2014, 7(3): 215-228.
doi: 10.1007/s12083-012-0127-9
[24] Hausken K, Zhuang J.Governments’ and Terrorists’ Defense and Attack in a T-period Game[J]. Decision Analysis, 2011, 8(1): 46-70.
doi: 10.1287/deca.1100.0194
[25] Guo S X.Environmental Options of Local Governments for Regional Air Pollution Joint Control: Application of Evolutionary Game Theory[J]. Economic and Political Studies, 2016, 4(3):238-257.
doi: 10.1080/20954816.2016.1218691
[26] Tian Y, Govindan K, Zhu Q.A System Dynamics Model Based on Evolutionary Game Theory for Green Supply Chain Management Diffusion among Chinese Manufacturers[J]. Journal of Cleaner Production, 2014, 80(10): 96-105.
doi: 10.1016/j.jclepro.2014.05.076
[27] Friedman D.On Economic Applications of Evolutionary Game Theory[J]. Journal of Evolutionary Economics, 1998, 8(1): 15-43.
doi: 10.1007/s001910050054
[28] Park J S, Kwiat K A, Kamhoua C A, et al.Trusted Online Social Network (OSN) Services with Optimal Data Management[J]. Computers & Security, 2014, 42(5): 116-136.
doi: 10.1016/j.cose.2014.02.004
[1] Lu Linong,Zhu Zhongming,Zhang Wangqiang,Wang Xiaochun. Cross-database Knowledge Integration and Fingerprint of Institutional Repositories with Lingo3G Clustering Algorithm[J]. 数据分析与知识发现, 2021, 5(5): 127-132.
[2] Chen Shiji, Qiu Junping, Yu Bo. Topic Analysis of LIS Big Data Research with Overlay Mapping[J]. 数据分析与知识发现, 2021, 5(10): 51-59.
[3] Guang Zhu,Hu Liu,Xinmeng Du. Health APPs and Privacy Concerns: A Three-Entities Game-theoretic Approach[J]. 数据分析与知识发现, 2019, 3(5): 93-106.
[4] Bi Datian,Wang Fu,Xu Pengcheng. Analyzing Mobile Library Users and Recommending Services with VSM[J]. 数据分析与知识发现, 2018, 2(9): 100-108.
[5] Zhang Xuanhui,Zhao Yuxiang. Evolution Path and Hot Topics of Citizen Science Studies[J]. 数据分析与知识发现, 2017, 1(7): 22-34.
[6] Qi Yunfei,Zhao Yuxiang,Zhu Qinghua. Linked Data for Mobile Visual Search System of Digital Library[J]. 数据分析与知识发现, 2017, 1(1): 81-90.
[7] Wang Yuefen,Jin Jialin. Characteristics and Development Trends of Papers from “New Technology of Library and Information Service”[J]. 现代图书情报技术, 2016, 32(9): 1-16.
[8] Sun Rong. Building Library APP with Mobile Platform on Campus——Case Study of Whistle Platform[J]. 现代图书情报技术, 2016, 32(9): 95-101.
[9] Hong Liang,Qian Chen,Fan Xing. Context-aware Recommendation System for Mobile Digital Libraries[J]. 现代图书情报技术, 2016, 32(7-8): 110-119.
[10] Liu Jian,Bi Qiang,Ma Zhuo. Assessment of Digital Library’s Micro-services: An Empirical Study[J]. 现代图书情报技术, 2016, 32(5): 22-29.
[11] Li Feng,Li Shu’ning,Yu Jing. A Department Oriented Library Usage Data System for Graduates[J]. 现代图书情报技术, 2016, 32(5): 99-103.
[12] Zhang Jinzhu,Wang Xiaomei,Han Tao. Predicting Co-authorship with Combination of Paths in Paper-author Bipartite Networks[J]. 现代图书情报技术, 2016, 32(10): 42-49.
[13] Dun Wenjie, Sun Yigang, Zhu Xianzhong. Design and Realization of Multimedia Document Structure of Internet TV[J]. 现代图书情报技术, 2015, 31(9): 82-89.
[14] Wang Xiaoliang, Hu Jun. Design and Implementation of Library Self-service Graduation Deactivate Account System[J]. 现代图书情报技术, 2015, 31(4): 96-102.
[15] Li Sheng, Wang Yemao. An Ontology-based and Location-aware Book Recommendation Model in Library[J]. 现代图书情报技术, 2015, 31(3): 58-66.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn