Author List: Gal-Or, Esther; Ghose, Anindya;
Information Systems Research, 2005, Volume 16, Issue 2, Page 186-208.
Given that information technology (IT) security has emerged as an important issue in the last few years, the subject of security information sharing among firms, as a tool to minimize security breaches, has gained the interest of practitioners and academics. To promote the disclosure and sharing of cyber security information among firms, the U.S. federal government has encouraged the establishment of many industry-based Information Sharing and Analysis Centers (ISACs) under Presidential Decision Directive (PDD) 63. Sharing security vulnerabilities and technological solutions related to methods for preventing, detecting, and correcting security breaches is the fundamental goal of the ISACs. However, there are a number of interesting economic issues that will affect the achievement of this goal. Using game theory, we develop an analytical framework to investigate the competitive implications of sharing security information and investments in security technologies. We find that security technology investments and security information sharing act as "strategic complements" in equilibrium. Our results suggest that information sharing is more valuable when product substitutability is higher, implying that such sharing alliances yield greater benefits in more competitive industries. We also highlight that the benefits from such information-sharing alliances increase with the size of the firm. We compare the levels of information sharing and technology investments obtained when firms behave independently (Bertrand-Nash) to those selected by an ISAC, which maximizes social welfare or joint industry profits. Our results help us predict the consequences of establishing organizations such as ISACs, Computer Emergency Response Team (CERT), or InfraGard by the federal government.
Keywords: externality benefit; information sharing; security breaches; security technology investment; social welfare; spillover effect
Algorithm:

List of Topics

#186 0.220 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection
#271 0.183 technology investments investment information firm firms profitability value performance impact data higher evidence diversification industry payoff return findings decisions greater
#133 0.134 data predictive analytics sharing big using modeling set power inference behavior explanatory related prediction statistical generated substantially novel building million
#242 0.092 market competition competitive network markets firms products competing competitor differentiation advantage competitors presence dominant structure share using incumbent make important
#225 0.085 information environment provide analysis paper overall better relationships outcomes increasingly useful valuable available increasing greater regarding levels decisions viewed relative
#40 0.068 increased increase number response emergency monitoring warning study reduce messages using reduced decreased reduction decrease act sessions cost good key
#79 0.063 public government private sector state policy political citizens governments contributors agencies issues forums mass development organizations issue differences economic study