skip to main content
10.1145/3695652.3695687acmotherconferencesArticle/Chapter ViewAbstractPublication PagesimmsConference Proceedingsconference-collections
research-article

Research on Internet Enterprise Information Security Investment Strategy Considering Protection Level

Published: 15 October 2024 Publication History

Abstract

The continuous progress of information technology has not only promoted the development of business, but also brought serious information security problems. This paper considers the information security rank protection system, establishes two information security investment models, and discusses the investment strategies of independent and shared Internet enterprises in the face of targeted attacks and indiscriminate attacks by hackers. This paper finds that whether it is an independent enterprise or a joint enterprise, there is a potential loss threshold when making investment. At the same time, safety investment does not always increase with investment efficiency, and when investment efficiency reaches a certain level, it will inhibit the growth of investment. When discussing the investment strategies of joint ventures under different protection levels, it is found that the investment of large enterprises is not always higher than that of small enterprises. Finally, based on the research content of this paper, the future research direction of information security investment is discussed.

References

[1]
Anderson R, Moore T. The economics of information security[J]. cience, 2006, 314(5799): 610-613.
[2]
Casey E. Determining intent—opportunistic vs targeted attacks[J]. Computer Fraud & Security, 2003, 2003(4): 8-11.
[3]
Wu Y, Feng G, Wang N, Game of information security investment: Impact of attack types and network vulnerability[J]. Expert Systems with Applications, 2015,42(15-16):6132-6146.
[4]
Gao X, Zhong W. Information security investment for competitive firms with hacker behavior and security requirements[J]. Annals of Operations Research, 2015, 235: 277-300.
[5]
Wu X, Wu Y, Li Q, How to react to hacker types and asset types in security decision-making[J]. Expert Systems with Applications, 2023: 120654.
[6]
Pan C, Zhong W, Mei S. Investment strategy analysis of information systems with different security levels[C]//2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA). IEEE, 2017: 703-708.
[7]
Gao X, Gong S, Wang Y, Information security outsourcing in a resource-sharing environment: The impacts of attack modes[J]. Journal of the Operational Research Society, 2023: 1-19.
[8]
Gordon L A, Loeb M P. The economics of information security investment[J]. ACM Transactions on Information and System Security (TISSEC), 2002, 5(4): 438-457.
[9]
Gordon L A, Loeb M P, Lucyshyn W. Sharing information on computer systems security: An economic analysis[J]. Journal of Accounting and Public Policy, 2003, 22(6): 461-485.
[10]
Solak S, Zhuo Y. Optimal policies for information sharing in information system security[J]. European Journal of Operational Research, 2020, 284(3): 934-950.
[11]
Dong Kunxiang, Xie Zongxiao, Zhen Jie. Analysis on Optimal Decision of Enterprise Information Security Investment and Network Insurance under mandatory constraints [J]. Chinese Journal of Management Science, 2019,29(06):70-81.
[12]
Wu Y, Xu M, Cheng D, Information security strategies for information-sharing firms considering a strategic hacker[J]. Decision Analysis, 2022, 19(2): 99-122.
[13]
Mohapatra P R, Parida A K, Swain S K, Gradient Boosting and LSTM Based Hybrid Ensemble Learning for Two Step Prediction of Stock Market[J]. Journal of Advances in Information Technology, 2023, 14(6).

Index Terms

  1. Research on Internet Enterprise Information Security Investment Strategy Considering Protection Level
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          IMMS '24: Proceedings of the 2024 7th International Conference on Information Management and Management Science
          August 2024
          465 pages
          ISBN:9798400716997
          DOI:10.1145/3695652
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 15 October 2024

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. Hacker attack types
          2. Information security investment strategy
          3. Information sharing
          4. Protection level

          Qualifiers

          • Research-article
          • Research
          • Refereed limited

          Conference

          IMMS 2024

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • 0
            Total Citations
          • 21
            Total Downloads
          • Downloads (Last 12 months)21
          • Downloads (Last 6 weeks)7
          Reflects downloads up to 08 Mar 2025

          Other Metrics

          Citations

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format.

          HTML Format

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media