Cuiyou Yao, Lin Yu, Dongpu Fu, Yanhong Yang, Haiqing Cao, Fulei Shi
{"title":"Research on the Game Theory of Enterprise Information Security Investment Considering Information Complementarity","authors":"Cuiyou Yao, Lin Yu, Dongpu Fu, Yanhong Yang, Haiqing Cao, Fulei Shi","doi":"10.1111/exsy.70253","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The vigorous development of Internet information technology has brought a lot of convenience and fun to people's lives. However, in the modern information world, the problem of information security has always existed. Given the prevalence of information security problems and their consequences, enterprises often invest in information security technologies to strengthen their information systems. However, the security vulnerabilities of information systems cannot be eliminated, so the choice of investment strategies by enterprises is of great significance. Based on the evolutionary game method, this study analyses, from a microscopic perspective, the investment strategy selection process of enterprises when there are security vulnerabilities in information system in the context of the complementarity of information assets between enterprises, and simulates the impact of enterprises' initial investment intention and potential losses as well as breach probabilities and cost differentials on the evolutionary outcomes. The research shows that an enterprise is more willing to choose an investment strategy that minimises the sum of investment costs and expected losses. The higher the enterprise's initial high investment intention or potential losses, the more likely it is to choose a high investment strategy, whilst its partner enterprise is less likely to choose a high investment strategy. In addition, when security investments effectively reduce breach probabilities, enterprises are more inclined to adopt high-investment strategies, whilst higher hacker operational costs can help alleviate enterprises' security investment pressure.</p>\n </div>","PeriodicalId":51053,"journal":{"name":"Expert Systems","volume":"43 5","pages":""},"PeriodicalIF":2.3000,"publicationDate":"2026-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Expert Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1111/exsy.70253","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
The vigorous development of Internet information technology has brought a lot of convenience and fun to people's lives. However, in the modern information world, the problem of information security has always existed. Given the prevalence of information security problems and their consequences, enterprises often invest in information security technologies to strengthen their information systems. However, the security vulnerabilities of information systems cannot be eliminated, so the choice of investment strategies by enterprises is of great significance. Based on the evolutionary game method, this study analyses, from a microscopic perspective, the investment strategy selection process of enterprises when there are security vulnerabilities in information system in the context of the complementarity of information assets between enterprises, and simulates the impact of enterprises' initial investment intention and potential losses as well as breach probabilities and cost differentials on the evolutionary outcomes. The research shows that an enterprise is more willing to choose an investment strategy that minimises the sum of investment costs and expected losses. The higher the enterprise's initial high investment intention or potential losses, the more likely it is to choose a high investment strategy, whilst its partner enterprise is less likely to choose a high investment strategy. In addition, when security investments effectively reduce breach probabilities, enterprises are more inclined to adopt high-investment strategies, whilst higher hacker operational costs can help alleviate enterprises' security investment pressure.
期刊介绍:
Expert Systems: The Journal of Knowledge Engineering publishes papers dealing with all aspects of knowledge engineering, including individual methods and techniques in knowledge acquisition and representation, and their application in the construction of systems – including expert systems – based thereon. Detailed scientific evaluation is an essential part of any paper.
As well as traditional application areas, such as Software and Requirements Engineering, Human-Computer Interaction, and Artificial Intelligence, we are aiming at the new and growing markets for these technologies, such as Business, Economy, Market Research, and Medical and Health Care. The shift towards this new focus will be marked by a series of special issues covering hot and emergent topics.