首页 | 本学科首页   官方微博 | 高级检索  
     检索      

网络安全投资外部性及博弈策略
引用本文:吕俊杰,邱菀华,王元卓.网络安全投资外部性及博弈策略[J].北京航空航天大学学报,2006,32(12):1499-1502.
作者姓名:吕俊杰  邱菀华  王元卓
作者单位:1.北京航空航天大学 经济管理学院, 北京 100083
摘    要:在企业投资成本和投资利润不同的情况下,应用博弈论理论计算了网络安全投资过程中,由于病毒传染所带来的投资负外部性,提出了信息安全的投资博弈模型.确定了相互依赖前提下企业的投资成本临界点及其影响因素,以及多个企业进行信息安全投资的多个纳什均衡解.同时将问题扩展到风险内生的条件下,阐明该条件下企业投资成本临界点的变化不仅取决于相互传染的可能性大小,还取决于内生外部性的正负及其绝对值大小.该方法为信息安全的风险管理提供了新的思路,为企业确定自身的投资策略以及国家确定相应的政策指导提供依据. 

关 键 词:博弈论    互联网络    信息安全    投资
文章编号:1001-5965(2006)12-1499-04
收稿时间:2005-12-27
修稿时间:2005年12月27日

Investment externality and game strategies of network security
Lü Junjie,Qiu Wanhua,Wang Yuanzhuo.Investment externality and game strategies of network security[J].Journal of Beijing University of Aeronautics and Astronautics,2006,32(12):1499-1502.
Authors:Lü Junjie  Qiu Wanhua  Wang Yuanzhuo
Institution:1.School of Economics and Management, Beijing University of Aeronautics and Astronautics, Beijing 100083, China2. Information Engineering School, University of Science and Technology Beijing, Beijing 100083, China
Abstract:An investment game theoretic model was presented to study the externality in firms′ network security investment with different investment costs and profits.Taking virus contagion as an example, the negative investment externality exerted by the contagion between firms in the network was investigated. Under such an environment, the investment threshold and factors concerned such as contagion probability and the number of investing firms were computed to determine several Nash equilibrium solutions with externality representing the risk. The model was analyzed further when the risk was endogenous and the invest threshold was much more complicated than that in exogenous environment. This endogenous threshold is determined not only by the probability of contagion between firms but also by the sign and absolute value of externalities. This method provides a novel viewpoint to information security risk management and advices for firms′ decision on security investment and government policies to induce investment under externality.
Keywords:game theory  interconnection networks  security of data  investments
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《北京航空航天大学学报》浏览原始摘要信息
点击此处可从《北京航空航天大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号