|
|
Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach |
Zhu Guang(), Feng Mining, Zhang Weiwei |
School of Management Science and Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China |
|
|
Abstract [Objective] This paper analyzes the library’s investment on information security from the benefit and cost perspectives, aiming to improve the effectiveness and efficiency of library security management. [Methods] First, we used the evolutionary game theory to define two players: library and technical enterprise. Then, we explored the intentions of investments on information security. Third, we analyzed the benefits and costs of investments, the payoff matrices and evolutionarily stable strategies (ESS). Finally, we designed an incentive mechanism to enhance the investment on information security. [Results] The investments from libraries and enterprises were correlated with benefit growth and cost reduction. If the benefit growth was small, the game players are less likely to invest. Once the profit growth became big, the game players tend to invest and then generated different strategies. [Limitations] We did not design the nonlinear profit function. Other factors, such as user’s demands and advertisement effects should also be included. [Conclusions] This study promotes the development of information security management in library.
|
Received: 05 November 2017
Published: 11 July 2018
|
|
[1] |
朱学芳. 图博档信息资源数字化建设及服务融合探讨[J].情报资料工作, 2011(5): 57-60
|
[1] |
Zhu Xuefang.On the Digitalized Construction and Service Integration of the Information Resources of Libraries, Museums and Archives[J]. Information and Documentation Services, 2011(5): 57-60.)
|
[2] |
朱光. 基于零水印的图博档彩色图像资源版权保护策略研究[J]. 现代图书情报技术, 2015(12): 87-93
|
[2] |
Zhu Guang.Copyright Protection Scheme of Color Images for Libraries, Museums and Archives Based on Zero-Watermarking[J]. New Technology of Library and Information Service, 2015(12): 87-93.)
|
[3] |
Khaled L, Ahmed R, Khalil Z.Comments on “Homomorphic Image Watermarking with a Singular Value Decomposition Algorithm”[J]. Information Processing & Management, 2016, 52(4): 644-645.
doi: 10.1016/j.ipm.2015.12.009
|
[4] |
Yu Y H, Zhang L.Research on a Provable Security RFID Authentication Protocol Based on Hash Function[J]. The Journal of China Universities of Posts and Telecommunications, 2016, 23(2): 31-37.
|
[5] |
Liang X, Xiao Y.Game Theory for Network Security[J]. IEEE Communications Surveys & Tutorials, 2013, 15(1): 472-486.
doi: 10.1109/SURV.2012.062612.00056
|
[6] |
Ahmad J J, Li S, Thavot R, et al.Secure Computing with the MPEG RVC Framework[J]. Signal Processing: Image Communication, 2013, 28(10): 1315-1334.
doi: 10.1016/j.image.2013.08.015
|
[7] |
朱光, 丰米宁. 基于量化调制水印的图博档视频资源版权保护策略研究[J]. 现代图书情报技术, 2016(10): 105-111
|
[7] |
Zhu Guang, Feng Mining.Copyright Protection Scheme of Video Resources for Libraries, Museums and Archives Based on Quantization Modulation Watermarking[J]. New Technology of Library and Information Service, 2016(10): 105-111.)
|
[8] |
Hong L, Di X, Rui Z, et al.Robust and Hierarchical Watermarking of Encrypted Images Based on Compressive Sensing[J]. Signal Processing: Image Communication, 2016, 45(7): 41-51.
doi: 10.1016/j.image.2016.04.002
|
[9] |
Qi X J, Xin X.A Singular-value-based Semi-fragile Watermarking Scheme for Image Content Authentication with Tamper Localization[J]. Journal of Visual Communication and Image Representation, 2015, 30(7): 312-327.
doi: 10.1016/j.jvcir.2015.05.006
|
[10] |
Satoshi O, Takeru M, Kazunari M.Co-evolutionary Design of a Watermark Embedding Scheme and an Extraction Algorithm for Detecting Replicated Two-dimensional Barcodes[J]. Applied Soft Computing, 2016, 46(9): 991-1007.
doi: 10.1016/j.asoc.2015.11.001
|
[11] |
Kabir E M, Wang H, Bertino E.A Role-involved Purpose Based Access Control Model[J]. Information Systems Frontiers, 2012, 14(3): 809-822.
doi: 10.1007/s10796-011-9305-1
|
[12] |
徐文哲. LAM数字化融合服务中自适应自动信任协商模型研究[J]. 情报资料工作, 2014(5): 44-48
|
[12] |
Xu Wenzhe.Research on Self-adaptive Automated Trust Negotiation Model of LAM Digital Convergence Service[J]. Information and Documentation Services, 2014(5): 44-48.)
|
[13] |
Gordon L A, Loeb M P.The Economics of Information Security Investment[J]. ACM Transactions on Information and System Security (TISSEC), 2002, 5(4): 438-457.
doi: 10.1145/581271.581274
|
[14] |
Cavusoglu H, Mishra B, Raghunathan S.A Model for Evaluating IT Security Investments[J]. Communications of the ACM, 2004, 47(7): 87-92.
doi: 10.1145/1005817.1005828
|
[15] |
Fielder A, Panaousis E, Malacaria P, et al.Decision Support Approaches for Cyber Security Investment[J]. Decision Support Systems, 2016, 86(6): 13-23.
doi: 10.1016/j.dss.2016.02.012
|
[16] |
Gao X, Zhong W, Mei S.A Game-Theoretic Analysis of Information Sharing and Security Investment for Complementary Firms[J]. Journal of the Operational Research Society, 2014, 65(11): 1682-1691.
doi: 10.1057/jors.2013.133
|
[17] |
Liu D, Ji Y, Mookerjee V.Knowledge Sharing and Investment Decisions in Information Security[J]. Decision Support Systems, 2011, 52(1): 95-107.
doi: 10.1016/j.dss.2011.05.007
|
[18] |
顾建强, 梅姝娥, 仲伟俊. 考虑相互依赖性的信息系统安全投资及协调机制[J]. 运筹与管理, 2015, 24(6): 136-142
doi: 10.12005/orms.2015.0205
|
[18] |
Gu Jianqiang, Mei Shue, Zhong Weijun.Dynamic Coordination Mechanism of Information System Security Investment Based on Interdependent Security[J]. Operation Research and Management Science, 2015, 24(6): 136-142.)
doi: 10.12005/orms.2015.0205
|
[19] |
Deng X, Han D, Dezert J, et al.Evidence Combination from an Evolutionary Game Theory Perspective[J]. IEEE Transactions on Cybernetics, 2016, 46(9): 2070-2082.
doi: 10.1109/TCYB.2015.2462352
pmid: 26285231
|
[20] |
Zhao R, Neighbour G, Han J, et al.Using Game Theory to Describe Strategy Selection for Environmental Risk and Carbon Emissions Reduction in the Green Supply Chain[J]. Journal of Loss Prevention in the Process Industries, 2012, 25(6): 927-936.
doi: 10.1016/j.jlp.2012.05.004
|
[21] |
Demirezen E M, Kumar S, Sen A.Sustainability of Healthcare Information Exchanges: A Game-Theoretic Approach[J]. Information Systems Research, 2016, 27(2): 240-258.
doi: 10.1287/isre.2016.0626
|
[22] |
Gao X, Zhong W.A Differential Game Approach to Security Investment and Information Sharing in a Competitive Environment[J]. IIE Transactions, 2016, 48(6): 511-526.
doi: 10.1080/0740817X.2015.1125044
|
[23] |
Du S, Li X, Du J, et al.An Attack-and-Defense Game for Security Assessment in Vehicular Ad Hoc Networks[J]. Peer- to-Peer Networking and Applications, 2014, 7(3): 215-228.
doi: 10.1007/s12083-012-0127-9
|
[24] |
Hausken K, Zhuang J.Governments’ and Terrorists’ Defense and Attack in a T-period Game[J]. Decision Analysis, 2011, 8(1): 46-70.
doi: 10.1287/deca.1100.0194
|
[25] |
Guo S X.Environmental Options of Local Governments for Regional Air Pollution Joint Control: Application of Evolutionary Game Theory[J]. Economic and Political Studies, 2016, 4(3):238-257.
doi: 10.1080/20954816.2016.1218691
|
[26] |
Tian Y, Govindan K, Zhu Q.A System Dynamics Model Based on Evolutionary Game Theory for Green Supply Chain Management Diffusion among Chinese Manufacturers[J]. Journal of Cleaner Production, 2014, 80(10): 96-105.
doi: 10.1016/j.jclepro.2014.05.076
|
[27] |
Friedman D.On Economic Applications of Evolutionary Game Theory[J]. Journal of Evolutionary Economics, 1998, 8(1): 15-43.
doi: 10.1007/s001910050054
|
[28] |
Park J S, Kwiat K A, Kamhoua C A, et al.Trusted Online Social Network (OSN) Services with Optimal Data Management[J]. Computers & Security, 2014, 42(5): 116-136.
doi: 10.1016/j.cose.2014.02.004
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|